Top Banner
By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY
22

By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Dec 16, 2015

Download

Documents

Herbert Holland
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

By

Sravya Nagaraju

STEGANOGRAPHYAND NETWORK SECURITY

Page 2: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Contents:

IntroductionFrame worksCategories

Image SteganographyApplicationsReferences

Page 3: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

INTRODUCTION

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

Steganography:

Page 4: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Frame Work:

Page 5: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Categories:

Page 6: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Image Steganography:Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data.

Page 7: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

For Example

Original image Stego Image

Image sources: https://www.pushpraj.com/photos/cool-scenery

Page 8: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Methods:

Image Domain Least significant bit Substitution Pixel indicator Stego Color Cycle Max Bit Pixel value Differencing

Page 9: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes – one for Red, one for Green and one for Blue.

11111000 11001001 00000011 248 201 3

Each byte is interpreted as an integer number, which is how much of that color is used to make the final color of the pixel.

248 + 201 + 3 = Orange Color

Image Domain:

Page 10: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eye.So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents.This means we can overwrite the last bit in a byte without affecting the colors it appears to be.

Page 11: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

A common approach of hiding data within an image file is Least Significant Bit (LSB) Substitution.

In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.

Page 12: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Suppose we have the following binary representation for the Cover Image.

10010101 0000110110010110 00001111

Suppose we want to "hide" the following 4 bits of data: 1011,we get the following,

10010101 0000110110010110 00001111

Where the each data bits are accommodated in the least significant bits of each byte of the image.

Least significant bit Substitution:

Page 13: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes.

Original Image Stego Image

Image source: http://nestopia.com/blog/freshen-house-vibrant-flowers/

Page 14: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Pixel Indicator:

This method uses the least two significant bits of one of the channels to indicate existence of data in the other

two channels.

Page 15: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Stego Color Cycle:

o The SCC technique uses the RGB images to hide the data in different channels.

o It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.

Page 16: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Max Bit:

This method measures the intensity of the pixel and then hides data by random pixel selection with a goal to hide maximum data in each pixel.

This method is divided into three parts:EncryptionImage Intensity CalculationSteganography.

Page 17: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Intense Pixels

Original Image

Grayscale Image

All Black colored pixels are considered as Intense pixels

Image source: http://beartales.me/2013/07/31/old-buildings/

Page 18: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Pixel Value Differencing (PVD) is able to provide a high quality stego image in spite of the high capacity of the concealed information. That is, the number of insertion bits is dependent on whether the pixel is an edge area or smooth area. In edge area the difference between the adjacent pixels is more, whereas in smooth area it is less.

While human perception is less sensitive to subtle changes in edge areas of a pixel, it is more sensitive to changes in the smooth areas

Smooth Area

Edge Area

Pixel Value Differencing:

Page 19: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Secure Private Files and Documents.

Hide Passwords and Encryption Keys.

Transport Highly Private Documents between International Governments.

Transmit message/data without revealing the existence of available message.

Applications of Image Steganography

Page 20: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

References:http://www.garykessler.net/library/steganography.html

http://www.jjtc.com/Steganography/

http://www.wikepedia.org/

http://technet.Microsoft.com

http://www.bu.edu/

Page 21: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Questions?

Page 22: By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Thank You