Introduction to Steganography · "Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
•Why is this Important?•Steganography Definition•Steganography vs Encryption•Problem of Steganography•Applications•Steganalysis•Null Cipher Example•Word Shifting Example•LSB Modification Example•Software•Steganography and Business•Conclusion
Introduction to Steganography
Outline
Steganography, like encryption,has been practiced since ancient times
• Pornographers (Hide/Transfer Illegal Pornography)• Terrorists* • Others wishing to hide information in plain view
“Bad” Applications
Introduction to Steganography
*It is believed that Osama Bin Laden may have usedsteganography to hide plans for the attack on WorldTrade Center and Pentagon. It has been proventhat his co-conspirators did.
Introduction to SteganographySimple Example (null cipher)
Would this sample scriptmake it past the censors?
Bob: Oh please! End Roger and Tom’s indecisionover Nana! Oh, Nana!
Tom: Hal is determined, even though he event-ually gets under Nana’s skin in normal times! His eventual picking at Roger knew no end! Even during a moment amongst people!
Now look at the first letter of eachword of dialog for the hidden message.
Bob: Oh please! End Roger and Tom’s indecisionover Nana! Oh, Nana!
Tom: Hal is determined, even though he event-ually gets under Nana’s skin in normaltimes! His eventual picking at Roger knewno end! Even during a moment amongst people!
He had a heart attack. Living with them was difficult. In the morning, at 8:00 am, he would eat breakfast and leave. No doubt it was he who took out the trash and walked the dog before he went to work.
A small spacing change is madebefore and after message words.
He had a heart attack . Living with them was difficult.In the morning, at 8:00 am , he would eat breakfast and leave. No doubt it was he who took out the trash and walked the dog before he went to work.
When the two documents are combined,this is the result.
He had a heart attack . Living with themwas difficult.In the morning, at 8:00 am , he would eat breakfast and leave. No doubt it was he who took out the trash and walked the dog before he went to work.
Freeware / SharewareHide and Seek, LSB of GIF FilesStegoDos, Embeds data in LSB of screen imagesWhite Noise Storm, embeds data in LSB of screen imagesS-Tools, variety of file types (GIF, WAV, BMP) plus encryptionJPEG-JSTEG4, uses JPG files to hide contentOthers
Used to Hide Information in Plain ViewThere are “good”, “bad” and “neutral” applicationsUsed on Many Common File TypesComplimentary to CrytographyUsed for Copy protection as well as sending terrorist messagesA MAJOR problem for Law EnforcementTake Action:
Don’t be an unknowing accomplice to terrorismCheck your own file systemsDecide which multimedia file types are neededBlock / delete / question unusual files