Top Banner
SELF STUDY SEMINAR Steganography By
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganoghraphy

SELF STUDY SEMINAR

SteganographyBy

Page 2: Steganoghraphy

ABTRACT

To learn and understand what Steganography is and

about its importance.

How Steganography works.

Steganographic Methodologies to achieve Covert

Communications.

Techniques to detect the use of Steganography.

Comparison with other famous methodology of securing

data like Cryptology.

Page 3: Steganoghraphy

INTRODUCTION

What exactly is Steganography?

“Steganography” “Covered or Hidden Writing”

The art &science of communicating in a way which

hides the existence of the communication.

Boosts the Concept of Information hiding without altering

or recasting the Information.

Practiced in data hiding in digital files like document files, multimedia files and even protocols.

Page 4: Steganoghraphy

Importance:

Primary Goal is to hide messages inside other harmless messages.

Doesn’t allow any other person to detect a secrete message is

being passed.

Required by an individual as well as Governments and

organizations.

Protects Intellectual Property Rights of Copyright Owners done via

Watermarking.

Page 5: Steganoghraphy

The Basic Steganographic Model

Any Steganographic

Methodology will follow the same

model using following :

Carrier Media

Encoding

process/Steganographic

Algorithm

Payload

Unique Key

Stego-Media

The Recovering Process

Page 6: Steganoghraphy

Steganography In Text Files

Text Steganography is the trickiest due to the deficiency of

redundant information . However the are some methods to achieve it:

Line Shift Coding

Vertical shifting of text line position to hide data.

Word Shift Coding

Horizontal shifting of words

Feature Coding

Alteration of one or more features of the text.

Page 7: Steganoghraphy

Steganography in Audio Files

Changing of Individual bits that make up the digital

Audio file.

A precise control allows the changes to be made to the

binary sequence which are not discernible to human

ears.

Some of pre-established and effective methods are:

Page 8: Steganoghraphy

Steganography in Audio Files

Least Significant Bit Coding

Replaces the least

significant bit in some

bytes of the cover file to

hide a sequence of byte

containing the hidden

data.

Doesn’t cause quality

degradation.

Page 9: Steganoghraphy

Steganography in Audio Files

Least Significant Bit Coding

Echo Hiding

Introduces Echoes into

discrete signals.

Each block of signal holds

one bit data.

Page 10: Steganoghraphy

Steganography in Audio Files

Least Significant Bit Coding

Echo Coding

Phase Coding

Replacing the phase of an initial audio segment with

a reference phase to represent data.

Page 11: Steganoghraphy

Steganography in Images

8-bit or higher color mages are more preferable than other images.

In these images each pixel is represented as a single byte, with

pixel value of 0-255.

Recommended Images are ones using 256 shades of grey as

Palette.

Shades change very gradually between pixel value.

Images having large area of solid color should be avoided.

Page 12: Steganoghraphy

Steganography in Images

Insertion Technique

The LSB of the cover image are altered.

Pixels: (00100111 11101001 11001000)

(00100111 11001000 11101001)

(11001000 00100111 11101001)

The Code for letter ‘A’ which is to be hidden: 10000001

After the Insertion technique:

Resultant Pixels: (00100111 11101000 11001000)

(00100110 11001000 11101000)

(11001000 00100111 11101001)

Page 13: Steganoghraphy

Steganography over Networks

Methods to implement Steganography over a network are:

Hiding in an attachment

Hiding in a Transmission

Hiding in Overt Protocol

Data Camouflaging

You take data, put it in normal network traffic, and

modify the data in such a way it looks like a overt

protocol.

Making a text file like a HTML file.

Page 14: Steganoghraphy

Covert Channels

Communications paths not designed for transferring

information.

But these are used for covert communications.

TCP/IP Headers.

In IP header, the IP identification number field can be

changed as the protocols keeps working properly.

In the TCP headers, the sequence and

acknowledgement number fields are used to hide data.

Page 15: Steganoghraphy

Steganalysis

Steganography also poses threat.

Misuse by anti-social elements to send messages without

being detected.

There is a need to Detect Stego-Media.

Steganalysis is the study of detecting messages hidden

using steganography.

The goal of Steganalysis is to identify suspected

packages, determine whether or not they have a

payload encoded into them, and, if possible, recover

that payload.

Page 16: Steganoghraphy

Steganalysis

Correlation Technique:

A set of unmodified files from same source are inspected with

message file for various statistics.

The unmodified carrier and the message files are compared in

respect of these statistics.

If the message file is indeed a Stego-File, the differences will be

seen in the statistics as payload encoded into the file causes

these differences.

However not every time the unmodified carrier is available.

Page 17: Steganoghraphy

Steganalysis

Randomness Technique:

Using concept of randomness.

A unmodified carrier will have

no randomness, so its histogram

shows peaks & valleys

A stego-file will have randomness and its histogram

shows flatness.

There is no need for a

unmodified carrier to detect

stego-files.

Page 18: Steganoghraphy

Applications of Steganography

Page 19: Steganoghraphy

Digital Watermarking:

A Digital Watermark is a marker embedded in a noise tolerant multimedia file.

Uses Steganography techniques to embed data into the carrier media, with one

exception.

Aims for the robustness of the payload(watermark), even if it results in being

visible or noticeable.

Can be embedded as long as carrier media doesn’t get distorted.

Digital watermarking helps in

Copyright Protection

Source tracking

Distribution Monitoring

Authentication of Media

Page 20: Steganoghraphy

Tamper Proofing

To counter the risk of a files being transmitted to be tampered or altered to false

information.

Just like a Watermark, data can be embedded onto the carrier as a check for tampering.

If the file undergoes some tampering, the embedded data will reflect the

changes also.

Removal of the embedded data is also not a option as the removal will result in

the destruction of the carrier file itself.

Page 21: Steganoghraphy

In Modern Printers:

Printers use Steganographic

techniques to embed information

about the document being printed

in every print.

In Biometrics:

Avoid unauthorized use of

genetically engineered material.

Hiding secrete messages in DNA

sequences for identification.

Page 22: Steganoghraphy

Steganography

Only Sender & Receiver knows the existence of the message.

Prevents Discovery of the very existence of Communications.

Does not Alter the structure & content of the message.

Cryptography

The Existence of Message is Known to all..

Prevents Unauthorized party to discover the contents of

Communications.

Alters the structure of the Message.

Steganography is more Advantageous!

vs.

Page 23: Steganoghraphy

Future of Steganography

Improved Resistance to Analysis

Presently, Stego-Media are more prone to be detected.

Once detected, it will be easy to extract the hidden message.

Making Stegos undetectable, irretrievable for those not intended

to.

Higher Encoding Density

Ability to hide more amount of data.

Presently encoding density is limited without degrading the

carrier.

Page 24: Steganoghraphy

CONCLUSION Steganography is interesting subject, different than Cryptology and

System Administration.

Based on the dilemma “YOU NEVER KNOW IF A MESSAGE IS HIDDEN”.

Not only limited to Data Hiding, but can be put to a more Versatile use.

Both Steganography and Cryptography together can achieve Data Hiding.

Expectation of more advancement in technology & efficiency

While keeping a check on its illicit use by others.

Page 25: Steganoghraphy