Steganography: Hiding information in past, present and future.

Post on 05-Dec-2014

4577 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

50min talk for a Cryptography course I did during 2010/2011 year.

Transcript

SteganographyHiding information in past, present and future.

Alberto Villegas Ercealbvi@correo.ugr.es

CryptographyUniversity of Granada

April 2010

Alberto V. E. (CRYP - UGR) Steganography April 2010 1 / 38

Review

Concepts reviewPreviously in crypto-world...

Math background

Modular arithmetics give us the power

Factorization and Primality.

Finite fields.

Pseudo-random Sequences.

...

Cryptography History

From ancient greeks to Enigma machine.

Information Theory

Shannon’s theory for perfect crypto security.

Alberto V. E. (CRYP - UGR) Steganography April 2010 2 / 38

Review

TodaySteganography

What is Steganography?We will review the topic through history

1 Past: historical examples.

2 Present: digital era.

3 Future: no-that-much science fictionideas.

Alberto V. E. (CRYP - UGR) Steganography April 2010 3 / 38

Review

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 4 / 38

Introduction

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 5 / 38

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Introduction

SteganographyDefinition

Steganography

Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.

But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]

Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38

Introduction

SteganographyDefinition

Steganography

Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.

But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]

Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Introduction

SteganographyModel (I)

Figure: Steganography abstract process

Alberto V. E. (CRYP - UGR) Steganography April 2010 9 / 38

Introduction

SteganographyModel (II)

Pure versus secret key steganography

Pure steganographic systems:no prior exchange of secret information.

Secret key steganography system:embeds secret using a secret key.

Perfect Secure Stego-system

It exists. Apply the concepts we saw twoweeks ago.

Alberto V. E. (CRYP - UGR) Steganography April 2010 10 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Past

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 13 / 38

Past

ChinaSilk passion

Paper masks: The sender and the receiver shared copies of a papermask with a number of holes cut at random locations (keep this inmind).

Wax balls: The also wrote messages on silk and encased them in ballsof wax. The wax ball could then be hidden in the messenger.

Alberto V. E. (CRYP - UGR) Steganography April 2010 14 / 38

Past

Greece#HerodotusFacts

Shaved slaves: messageswere written over slavesheads. Still in 20thcentury!

Wax tablet: a goodexample of camouflageover unsuspicious diaryobjects.

Alberto V. E. (CRYP - UGR) Steganography April 2010 15 / 38

Past

MusicStego-heros

Gaspar Schott (17thcentury): music notescoding letters.

John Wilkings (17thcentury): talkingmusicians.

J. S. Bach (17th-18th century):embedded his name in the organchorale “Vor deinen Thron”using the rule: if the i-th note ofthe scale occurs k times, thenthe k-th letter of the alphabet isto be entered in the i-th place.

Alberto V. E. (CRYP - UGR) Steganography April 2010 16 / 38

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Past

Invisible Ink

Lemon, urine: after burnedreleased carbon shows up.

Refined with chemistry: saltammoniac dissolved in water.

Refined with biology: somenatural unique responses.

Wait a second...

Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38

Past

Invisible Ink

Lemon, urine: after burnedreleased carbon shows up.

Refined with chemistry: saltammoniac dissolved in water.

Refined with biology: somenatural unique responses.

Wait a second...

Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38

Past

Publishing

Not only for war

Steganography has protected copyright even when it did not exists.

Intended gaps: Falseintended data.

Microdots: imperceptibledots.

Line spacing: modernpublishing.

Alberto V. E. (CRYP - UGR) Steganography April 2010 19 / 38

Present

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 20 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Present

A simple ideaTake a closer look

Alberto V. E. (CRYP - UGR) Steganography April 2010 22 / 38

Present

A simple ideaA said CLOSER!

(a) #18657E (b) #19657E (c) #1A657E (d) #1B657E

Figure: LSB variations over R

Alberto V. E. (CRYP - UGR) Steganography April 2010 23 / 38

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(a) #18667D

(b) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(c) #18667D

(d) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(e) #18667D

(f) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(g) #18667D

(h) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Present

LSB Steganography

Pros

Easy to understand and code.

Pure steganographic (a priori).

Lot’s of coding chances. [3]

Cons

Weak against noise attack.

Requires good images.

Requires non-coded images.

Alberto V. E. (CRYP - UGR) Steganography April 2010 25 / 38

Present

WattermarkingCopyrigthing

Problem

Lossy compression (JPEG,MGEP) destroys LSB variations.

Solution

Hide in other LSB.

Also indiscernible for human eye.

Alberto V. E. (CRYP - UGR) Steganography April 2010 26 / 38

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Future

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 28 / 38

Future

Science fiction?Keep your mind open

Where are the limits?

Science and engineering developfast.

Multiple fields merge and splitcontinuously.

What can we learn from other fields?

Keep your mind open!

Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38

Future

Science fiction?Keep your mind open

Where are the limits?

Science and engineering developfast.

Multiple fields merge and splitcontinuously.

What can we learn from other fields?

Keep your mind open!

Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38

Future

Messages through lightQuantum physics killed the cryptography stars

Idea: Polarized photons cryptosystem... in 1984! [4]

Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38

Future

Messages through lightQuantum physics killed the cryptography stars

Idea: Polarized photons cryptosystem... in 1984! [4]

Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Conclusions

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 32 / 38

Conclusions

Conclusions

Benefits

Secrecy and confusion.

Variety of combinations.

Can be combined withcryptography.

Only few pros but strong ones.

Alberto V. E. (CRYP - UGR) Steganography April 2010 33 / 38

Conclusions

Conclusions

Cons

Not suitable for massivetransmissions.

Requires more effort thanregular cryptography.

Weak against transformation.

Specific solutions for specificproblems.

Always trade security againstrobustness.

Alberto V. E. (CRYP - UGR) Steganography April 2010 34 / 38

References

References I

Information Hiding - A SurveyFabien A. P. Petitcolas, Ross J. Anderson and Markus G. KuhnProceedings of the IEEE, special issue on protection of multimediacontent, 87(7):1062-1078, July 1999

Exploring Steganography: Seeing the UnseenNeil F. Johnson and Sushil Jajodia.IEEE Computer, February 1998: 26-34.

Reliable Dectection of LSB Steganography in Color and GrayscaleImages.Jessica Fridrich, Miroslav Goljan and Rui DuMultimedia, IEEE, 2001

Alberto V. E. (CRYP - UGR) Steganography April 2010 35 / 38

References

References II

Quantum cryptography: Public-key distribution and coin tossingBennett, C. H. and Brassard, G.Proceedings of IEEE International Conference on Computers,December 1984.

Hiding Data in DNABoris Shimanovsky, Jessica Feng and Miodrag PotkonjakInformation Hiding, 2003 - Springer

Disappearing Cryptography. Information Hiding: Steganography &Watermarking. (3rd ed.)Peter Wayner.Elsevier, 2009.

Alberto V. E. (CRYP - UGR) Steganography April 2010 36 / 38

References

References III

Matematicos, espıas y piratas informaticos. Codificacion yCriptografıa.Joan GomezRBA, 2010.

Wikipedia: Steganographyhttp://en.wikipedia.org/wiki/Steganography

Kriptopolis (in Spanish)http://www.kriptopolis.org/articulos/esteganografia

Steganography: How to Send a Secret Messagehttp://www.strangehorizons.com/2001/20011008/steganography.shtml

Johnson & Johnson Technology Consultants (Neil F. Johnson)http://www.jjtc.com/Steganography/ (software)

Alberto V. E. (CRYP - UGR) Steganography April 2010 37 / 38

The end

Thank you.

Questions?Please be nice

Just one more thing!

Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38

The end

Thank you.

Questions?Please be nice

Just one more thing!

Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38

top related