Top Banner
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young
16

December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Dec 31, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

December 4, 2007

Steganography

By: Brittany Bugg and Makenzie Young

Page 2: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

What is Steganography?

The art of writing in codeHiding information by embedding messages

within other messagesOnly the person receiving the message can

decode it, but they have to have to the proper code or software to do so.

Page 3: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Background

Dates back as early as Ancient Rome where they would inscribe messages on stone tablets and then pour wax over itThe wax would be scraped off to read the messageMostly used for military intelligenceAnother method used in ancient Greece, tattooing a

message on someone’s head and then allowing their hair to grow back then the receiver of the message would shave their head

Chinese used messengers on foot where they would hide messages on silk cased in wax and the messengers sometimes carried it in them

Page 4: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Applications for Steganography

Hide and Seek (versions 4.1 and 5.0) By Colin Maroney Images 320x480 Spreads data throughtout the GIF in a random fashion

StegoDos Also known as Black Wolf’s Picture Encoder Public Domain software by an anonymous person Works with images that are 320x200 with 256 colors

Steganos is a LSB embedding system that embeds data into images

SecurEngine, an application in which small text files are hidden in larger text files

White Noise By Ray Arachelian

Page 5: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

White Noise Example

White Noise was the first software tested that could embed this message (to the left) into the picture above.

Page 6: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Other Examples

Invisible Ink Can be used in documents or even clothing

FingerprintingPeers communicating

Doesn’t stop the fact that there is a message being sent between the peers, which can obviously be detected

Chaffing and winnowingWhere the recipient receives multiple messages where

they can identify the true meaning, but only one of the messages is authentic and the rest are bogus

MicrodotsWhere only a microscope can read the message

Page 7: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Pros

Used for:Watermaking images for copyright protection

Example: holding a $20 bill up to the light and seeing a watermark

Hidden in images, video files, and audio filesConfidentiality of valuable information to

prevent theft

Page 8: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Cons

Unfortunately, steganography can also be used for illegal purposes:Concealing a plan for terroristic threats

It is believed that al-Qaeda used steganographic software to communicate plans with each other before the 9-11 attacks, this has not yet been confirmed

This is a huge threat to the gorvernment

Hiding harmful files Stealing data

http://youtube.com/watch?v=ySkhnqdptzs

Page 9: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Steganalysis

Steganalysis is a way to defeat steganographyStegdetect is a tool used for detecting the content in

images. The only con to steganalysis is that steganography

cannot always be detectedTechniques on attack approach is important

depending on what information is available: Steg-only attack: steganographic medium is available Known-carrier attack: the original cover and the medium are available Known message attack: when the hidden message is known Chosen message attack: when the steganalyst knows the message and has

access to the steganography tool and can embed and analyze messages

Page 10: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Applications for Steganalysis

EnCase, by Guidance Software Inc.

Ilook Investigator, by Electronic Crimes Program

This is an example of a file without embedded text

This is an example of a file with embedded text

Page 11: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Algorithms

Are step-by-step procedures in solving a problem

It is used by steganalysts in decoding messages from images where the focus is right now

Page 12: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Compare/contrast

Stenographydefined by dictionary.com, is “a person who

specializes in taking dictation in shorthand”

Cryptographytransforming information into an unreadable format

Digital WatermarkingWhen an image is embedded with copyright

information

Page 13: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Stenography

A stenographer should not be confused for a steganographer because they do not conceal messages they write in shorthand coding

For example, court reporters They use stenotype machines to type up what the people are

saying Type in codes, some reporters actually have a dictionary of

codes that consist of common words, phrases, etc. Type up to 300 words per minute, the average is 230 In heated court cases up to 250 words can be said

Page 14: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Cryptography

Cryptography is transforming information into an unreadable format

It is used to protect information such as credit card information, email messages, etc.

Unlike steganography, you can tell a message has been encrypted, but in order to decode it you need to have the proper key

Cryptanalysis is the code breaking method

Page 15: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Digital Watermarking

Digital watermarking is a pattern of bits inserted into a picture or file to identify the copyright information.

Like steganography, it is meant to be invisibleThe bits within the image have to be scattered so

that they cannot be tampered with or identifiedThe actual watermark also has to be robust

enough so that if the image is changed, the watermark is still there.

Examples

Page 16: December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Sources

http://www.securityfocus.com/infocus/1684http://www.braingle.com/brainteasers/codes/

steganography.phphttp://www.outguess.org/detection.phphttp://palisade.plynt.com/issues/2005May/steganalysis/http://www.strangehorizons.com/2001/20011008/

steganography.shtmlhttp://www.webopedia.com/TERM/C/cryptography.htmlhttp://www.jjtc.com/stegdoc/index2.html