Top Banner
STEGANOGRAPHY
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography

STEGANOGRAPHY

Page 2: Steganography

AGENDA Etymology What Is Steganography? History Evolution Live Cyber Case Study Some Terminologies Of Steganography Basic Principle in Steganography Live Demonstration Steganography Vs Crptography Steganography Tools Steganalysis Conclusion References

Page 3: Steganography

STEGANOGRAPHY

Etymology:

The word steganos means "covered or protected", and graphy means "writing“. Thus steganography means "concealed writing".

Page 4: Steganography

WHAT IS STEGANOGRAPHY?

Steganography is the art and science of hiding a message in a medium, such as a digital picture or audio file, so as to defy detection.

Messages are hidden in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

Page 5: Steganography

CONTD.. For an example, a message might be hidden within an image

by changing the least significant bits to be the message bits.

Page 6: Steganography

EVOLUTION

Cryptography

Steganography

Watermarking

Page 7: Steganography

STEGANOGRAPHY

History:

Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.

Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.

Invisible Ink is also a form of Steganography.

Page 8: Steganography

LIVE CYBER CASE STUDY

Page 9: Steganography

SOME TERMINOLOGIES

Cover medium (Example-Image)

Embedded message (Message to be hidden)

Stego-key (Key to extract hidden message)

Stego-Object (Seen by casual observer)

Therefore,

Cover-medium + embedded-message = stego-object

Page 10: Steganography

BASIC PRINCIPLE IN STEGANOGRAPHY

Encoder

Decoder

Secret MsgCover Image

Stego Object

Original Image

Secret Msg

Communication Channel

Key

Page 11: Steganography

LIVE DEMONSTRATION

Page 12: Steganography

CONTD…

Page 13: Steganography

STEGANOGRAPHY CARRIER FILES

Jpeg Bmp Gif Audio

Wav MP3

Other Types

+

Page 14: Steganography

STEGANOGRAPHY TOOLS

• Steganos• S-Tools • StegHide • Invisible Secrets • JPHide• Camouflage• Hiderman• Many others…

Page 15: Steganography

STEGANOGRAPHY VS CRYPTOGRAPHY

Steganography(hide existence of the secret

message, but do not use encryption)

Cryptography(encrypt the message,but do

not hide the message)

• Ideally nobody can see both parties are secretly communicating.

• Innocent.

• Anybody can see both parties are communicating in secret.

• Suspicious.

Page 16: Steganography

STEGANALYSIS

Identification of hidden files :

•Identifying the existence of a message.

•Not extracting the message.

•Technically, Steganography deals with the concealment of a message, not the encryption of it.

•Steganalysis essentially deals with the detection of hidden content.

•How is this meaningful???

Page 17: Steganography

HOW TO IDENTIFY? By identifying the existence of a hidden message, perhaps we

can identify the tools used to hide it.

If we identify the tool, perhaps we can use that tool to extract the original message.

Page 18: Steganography

STEGANALYSIS:METHODS OF DETECTION

• Visual Detection (JPEG, BMP, GIF, etc.)• Audible Detection (WAV, MPEG, etc.)• Statistical Detection (changes in patterns of the pixels

or LSB – Least Significant Bit) or Histogram Analysis• Structural Detection - View file properties/contents• Size difference• Date/time difference• Contents – modifications• Checksum

Page 19: Steganography

ANOMALY – VISUAL DETECTION

Detecting steganography by just viewing the Stego-object.

Can you see any difference between the two??

Page 20: Steganography

ANOMALY – KURTOSIS

Kurtosis The degree of flatness and peakedness of

describing a frequency distribution: Random house dictionary.

Page 21: Steganography

ANOMALY – HISTOGRAM ANALYSIS

Histogram analysis can be used to identify a file with a hidden message.

Histogram of Original file.

Page 22: Steganography

CONTD…

Histogram of file with embedded message.

Here it can be seen that this histogram has a noticeable repetitive trend unlike the original one.

Page 23: Steganography

ANOMALY ANALYSIS - COMPARE FILE PROPERTIES

• Compare the properties of the files• Checksum• C:\GNUTools>cksum a:\before\helmetprototype.jpg

3241690497 240759 a:\before\helmetprototype.jpg• C:\GNUTools>cksum a:\after\helmetprototype.jpg

3749290633 235750 a:\after\helmetprototype.jpg

• Properties 04/04/2003 05:25p 240,759 helmetprototype.jpg 04/04/2003 05:26p 235,750 helmetprototype.jpg

Page 24: Steganography

COMPARE THE PROPERTIES OF THE FILESCHECKSUM

C:\GNUTOOLS>CKSUM A:\BEFORE\HELMETPROTOTYPE.JPG3241690497 240759 A:\BEFORE\HELMETPROTOTYPE.JPGC:\GNUTOOLS>CKSUM A:\AFTER\HELMETPROTOTYPE.JPG3749290633 235750 A:\AFTER\HELMETPROTOTYPE.JPG

PROPERTIES04/04/2003 05:25P 240,759 HELMETPROTOTYPE.JPG04/04/2003 05:26P 235,750 HELMETPROTOTYPE.JPG

FILE EXTENSION:

Hex Signature File Extension ASCII Signature

Page 25: Steganography

SUMMERY Steganography is used for data hiding to provide security to

confidential infromation. Its a technique which is used to hide the message within

some medium. To further improve the security of the secret message in the

cover image, we have used encryption to encrypt the secret message before it is embedded.

While Steganography deals with hiding the message, Steganalysis deals with identifying the existence of any hidden message within file.

Using steganalysis if we identify the existence of any hidden message then we can easily identify how to extract it.

Page 27: Steganography
Page 28: Steganography

QUERIES