Top Banner
Made by : Manika Arora
37
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: steganography

Made by :Manika Arora

Page 2: steganography

What is Steganography?

• Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

• The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing".

• “Steganography means hiding one piece of data within another”.

Page 3: steganography

Typical Scenario

Page 4: steganography

Example

Since everyone can read, encoding text

in neutral sentences is doubtfully effective

Since Everyone Can Read, Encoding Text

In Neutral Sentences Is Doubtfully Effective

‘Secret inside’

Page 5: steganography

History Of Steganography• Dates back to 400 BC when Histaeus sent a message, by

shaving the head of his most trusted slave, then tattooed a message on the slave's scalp, to his friend Aristagorus, urging revolt against the Persians.

• Demaratus tells Athens of Persia’s attack plans by writing the secret message on a tablet, & covers it with wax.

• Chinese wrote messages on silk and encased them in balls of wax. The wax ball, "la wan," could then be hidden in the messenger.

• A more subtle method, nearly as old, is to use invisible ink( lemon juice, milk, or urine, all of which turn dark when held over a flame).

• Special “inks” were important steganographic tools even during Second World War.

Page 6: steganography

Modern steganography• Hiding one message within another(“container”)• Most containers are rich media

Images, audio, video are very redundant, can be tweaked without affecting human eye/ear

US argued that Al_QAIDA implanted instructions within taped interviews.

• Copyright notices embedded in digital artProve ownership(Watermarking)Serial number embedded to prevent replicationSeek infringements on the web using spiders/crawlers

• Digital cameras EXIF(Exchangeable Image File Format) tagsNot secretive but hidden from the eyeEmbed info such as camera type, date, shutter speed, focal length..

• Similarly, possible to embed messages in invisible part of html pages

Page 7: steganography

Physical techniques

• Physical Techniques Hidden messages within wax tablets

a) Hidden messages on messenger's bodyb) Hidden messages on paper written in 

secret inksc) Messages written in Morse code on

knitting yarn and then knitted into a piece of clothing worn by a courier

d) Messages written on envelopes in the area covered by postage stamps.

Page 8: steganography

Digital technique

• Digital Techniquesa) Concealing messages within the lowest

bits of noisy images or sound files.b) Modifying the echo of a sound file (Echo

Steganography)c) Including data in ignored sections of a file,

such as after the logical end of the carrier file.

Page 9: steganography

Comparison Of Secret Communication Techniques

Page 10: steganography

Evolution

Cryptography

Steganography

Watermarking

Page 11: steganography

Steganography V/s Cryptography

Page 12: steganography

Steganography Terms• Carrier or Cover File - A Original message or a file in

which hidden information will be stored inside of it .

• Stego-Medium - The medium in which the information is hidden.

• Embedded or Payload - The information which is to be hidden or concealed.

• Steganalysis - The process of detecting hidden information inside a file.

Page 13: steganography

Basic Steganography Model

Page 14: steganography

Types of steganography

• Steganography In text/documents• Steganography In images• Steganography In audio• Steganography in video

Page 15: steganography

Text Steganography • Text steganography can be applied in the digital makeup

format such as PDF, digital watermark or information hiding• It is more difficult to realize the information hiding based on

text. The simplest method of information hiding is to select the cover first, adopt given rules to add the phraseological or spelling mistakes, or replace with synonymy words.

• E.g 1] Textto setups some sentence structure in advance, fills in the empty location by arranged words,

and then the text doesn’t have phraseological mistakes, but have some word changes or morphology mistakes.

2] TextHide hides the information in the manner of text overwriting and words’ selection.

Page 16: steganography

Examples of Text Steganography• An example of a message containing cipher text by

German Spy in World War II:

“Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit. Blockade issue affects Pretext for embargo on by products, ejecting suets and Vegetable oils. ”  

• Taking the second letter in each word the following message emerges:

Pershing sails from NY June 1.

Page 17: steganography

Examples of Text Steganography

• Minor changes to shapes of characters

Page 18: steganography

Examples of text Steganography

Page 19: steganography

Image Steganography• Using image files as hosts for steganographic messages

takes advantage of the limited capabilities of the human visual system

• Some of the more common method for embedding messages in image files can be categorized into two main groups, image domain methods and transform domain methods

Page 20: steganography

Image And Transform Domain• Image – also known as spatial – domain techniques

embed messages in the intensity of the pixels directly, while for transform – also known as frequency – domain, images are first transformed and then the message is embedded in the image

• Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation and are sometimes characterised as “simple systems”

• Steganography in the transform domain involves the manipulation of algorithms and image transforms

Page 21: steganography

Example of image Steganography

Fig:Image in hex editor

Page 22: steganography

Audio Steganography

• Embedding secret messages into digital sound is known as audio Steganography.

• Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files.

• The properties of the human auditory system (HAS) are exploited in the process of audio Steganography

Page 23: steganography

Flowchart Of Audio Steganography

Page 24: steganography

Example of LSB Method• The message 'HEY' is

encoded in a 16-bit CD quality sample using the LSB method.

• Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream.

• The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.

Page 25: steganography

Steganalysis• The art and science of steganalysis is intended to detect or estimate

hidden information based on observing some data transfer.• In some cases, just being caught sending a message can bring

suspicion, or give information to the 3rd party• Steganalysis techniques can be classified in a similar way as

cryptanalysis methods, largely based on how much prior information is known. Steganography-only attack: The steganography medium is the only

item available for analysis. Known-carrier attack: The carrier and steganography media are

both available for analysis

Page 26: steganography

Steganalysis Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and

algorithm are both known. Chosen-message attack: A known message and steganography

algorithm are used to create steganography media for future analysis and comparison.

Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known discipline with few articles appearing before the late 1990s.

Page 28: steganography

Advantages• Difficult to detect and Only receiver can detect.

• It can be done faster with large no. of software's.

Disadvantage

• The confidentiality of information is maintained by the algorithms,

and if the algorithms are known then this technique is of no use.

• Password leakage may occur and it leads to the unauthorized

access of data.

• If this technique is gone in the wrong hands like hackers can be

very much dangerous for all.

Page 29: steganography

Applications

• Confidential communication and secret data storing

• Steganography provides us with:

• Potential capability to hide the existence of

confidential data

• Hardness of detecting the hidden (i.e.Strengthening

of the secrecy of the encrypted data)• Protection of data alteration

Page 30: steganography

Applications• Usage in modern printers• Access control system for digital content distribution

• Alleged use by terrorists• Alleged use by intelligence services

Page 31: steganography

Who’s Using It?• Good question… nobody knows for sure. • The whole point to steganography is to disguise its use. • However, anybody can use it to hide data or to protect

anonymity• Likely users include:

a) Trade fraud

b) Industrial espionage

c) Organized crime

d) Narcotics traffickers

e) Child pornographers

f) Criminal gangs

g) Individuals concerned about perceived government “snooping”

h) Those who want to circumvent restrictive encryption export rules

i) Anyone who wants to communicate covertly and anonymously

Page 32: steganography

Detection• Can steganography be detected?• Sometimes…many of the simpler steganographic

techniques produce some discernable change in the file size, statistics, or both. For image files, these include:

• Color variations• Loss of resolution or exaggerated noise• Images larger in size than that to be expected• Characteristic signatures, e.g., distortions or patterns

• However, detection often requires a priori knowledge of what the image or file should look like

Page 33: steganography

Detection Challenges

• Lack of tools and techniques to recover the hidden data

• No commercial products exist for detection• Custom tools are analyst-intensive• Few methods beyond visual analysis of graphics files have been explored

• Usually, no a priori knowledge of existence• No access to stegokey• Use of unknown applications

Page 34: steganography

Need for Improved Detection• Growing awareness of data hiding techniques and uses• Availability and sophistication of shareware and freeware

data hiding software • Concerns over use to hide serious crimes, e.g., drug

trafficking, pedophilia, terrorism • Frees resources currently spent on investigating cases

with questionable/unknown payoff• Legislative calls

• US Bill H.R. 850, Security and Freedom through Encryption (SAFE) Act

• UK Revision of Interception of Communications Act 1985

Page 35: steganography

Future Scope• Steganography, though is still a fairly new idea. There are

constant advancements in the computer field, suggesting advancements in the field of steganography as well. It is likely that there will soon be more efficient and more advanced techniques for Steganalysis. A hopeful advancement is the improved sensitivity to small messages. Knowing how difficult it is to detect the presence of a fairly large text file within an image, imagine how difficult it is to detect even one or two sentences embedded in an image! It is like finding a microscopic needle in the ultimate haystack.

• What is scary is that such a small file of only one or two sentences may be all that is needed to commence a terrorist attack. In the future, it is hoped that the technique of Steganalysis will advance such that it will become much easier to detect even small messages within an image.

Page 36: steganography

Conclusion• Steganography & Steganalysis are still at an early stage of

research.• Although in principle secure schemes exist, practical ones with

reasonable capacity are known.• Notion for security & capacity for steganography needs to be

investigated.• Since it obvious that no system of data hiding is totally immune

to attacks. However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking for use in detection of unauthorized, illegally copied material is continually being realized and developed.

• The growing number of communication protocols, services and computing environments offers almost unlimited opportunities for displaying a whole spectrum of steganographic methods.

Page 37: steganography