Top Banner
Steganography a GREEK word it means covered or secret writing Stegan -- o -- graphy Covered Writing What is Steganography
29

Steganography flooding

Feb 11, 2017

Download

Education

HENI BHUNGALIA
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography flooding

Steganography a GREEK word it means covered or secret writing

Stegan -- o -- graphy

Covered Writing

What is Steganography ?

Page 2: Steganography flooding

“The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”

STEGANOGRAPHY UNDER VARIOUS MEDIA

Steganography in “TEXT”

Steganography in “IMAGES”

Steganography in “AUDIO”

Page 3: Steganography flooding

A steganography software tool allows a user to embedded hidden data inside a carrier file, such as an image or video and later extract that data.

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.

Page 4: Steganography flooding

Example of Text Steganography

An example of message containing cipher text by German Spy in World War ||

“Apparently neutral’s protest is thoroughly discounted and ignored . Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oi/s”

Taking the second letter in each word the following message emerges:

Pershing sails from NY June 1

Page 5: Steganography flooding

Minor Change To Shapes of Character

Page 6: Steganography flooding

Steganography in Image

Using image files as hosts for steganography messages takes advantage of the limited capabilities of the human visual system

Example Of image steganography

Original ImageSize 56.1KB

Encoded ImageSize 544KB

Hidden Message Is Cyber security Welcomes You

Page 7: Steganography flooding

Steps to Hide text in image

1. Open S-tools.2. Select image in which we have to hide

text with .bmp extension.

3. Drag the text file over the image.4. Alert will come to enter the password

this same password we have to enter when end person wants to reveal the message.

Page 8: Steganography flooding

When user wants to reveal the text.1. Open the hidden data file.2. Right click. Select reveal

enter the same password that was used to hide the text.

3. A prompt will be display. With list of file hidden.

4. Save that file(Stegano.txt)

Page 9: Steganography flooding

Steganography in Audio

To embed data secretly onto digital audio file there are few techniques introduced :– LSB Coding– Phase Coding– Parity Coding– Spread Spectrum

Page 10: Steganography flooding

Flowchart Of Audio Steganography

Page 11: Steganography flooding

Example of LSB Method

The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method.

Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream.

The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.

Page 12: Steganography flooding

Case On Real Life

Terrorist organizations have mastered the art of combining steganography with encryption.

Presently most terrorist instructions are also carried out this same way, but there has been an increase in the use of photographic images used for steganography.

Others are hiding maps and photographs of terrorist target and posting instruction for terrorist activities .

Page 13: Steganography flooding

Combined Crypto Steganography

EncryptionPlain Text Crypto Text Cover Image

Stegano Image

Cipher TextDecryptionPlain Text

Covered medium + Hidden data + Stego key = Stego Medium

Page 14: Steganography flooding

Who Is He ?

Discussion Of Attack 9/11

According to U.S. officials, in early 2001 Osama bin Laden posted steganographic material in sports chat rooms and some other web sites with instructions for terrorist activities.

US officials and expert say its the latest method of communication being used by Osama Bin Laden and his associates to outbox law enforcement.

Dr Robert Koontz claimed that “CODED IMAGES” shows plans for massive germs attack on US killing millions.

Page 15: Steganography flooding

Study of 9/11 attack

Says Ankit Fadia a 16 year old boy he was called in to help decrypt message from Osama Bin Laden shortly after 9/11.

Boy stunned to see the kind of technology they used to communicate.

After 9/11 attack agencies had tracked some emails where few peoples were frequently exchanging photographs of Canadian rockstar Avril Lavigne.

Steganography-hidden messages that used three customized encryption algorithm

They used technography [sic]to send messages

Page 16: Steganography flooding

Digital Watermarking

A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity.

Visible Watermarking is used to indicate ownership and for copyright protection.

Digital Watermarking can be considered as special technique of steganography.

Page 17: Steganography flooding

Life Cycle of Water Marking

Page 18: Steganography flooding

Watermarking classification

Page 19: Steganography flooding

Original Image

Our Watermark

Watermarked Image

Visible & Invisible Watermarking

Page 20: Steganography flooding

Robust & Fragile watermarking

In Robust watermarking modification of watermarked content will not affect watermark.

In Fragile watermarking watermark get destroyed when watermarked content is modified or tampered.

Public & Private watermarking

In public watermarking users of content are authorized to detect watermark.

In private watermarking users not authorized to detect watermark.

Page 21: Steganography flooding

Asymmetric & Symmetric watermarking

In Asymmetric watermarking different keys used for embedding and detecting watermark.

In Symmetric watermarking same keys are used for embedding and detecting watermarks.

Steganographic & Non steganographic watermarking

In Steganographic watermarking user unaware of the presence of a watermark.

In non steganographic watermarking user aware of the presence of a watermark

Page 22: Steganography flooding

Steganography v/s Watermarking

The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d’ , practically indistinguishable from d, by people in such a way that an eavesdropper cannot detect the presence of m in d’.

The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d’, practically indistinguishable from d , by people in such a way that an eavesdropper cannot remove or replace m in d’.

Page 23: Steganography flooding

Scenario of Steganography

Modern computer printers use steganography includes HP & Xerox brand color laser printers.

These printers add tiny yellow dots to each page.

The dots contain encoded printer serial numbers & date & time stamps.

Page 24: Steganography flooding

E-mail Spoofing

A spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authored by someone else.

Commonly, the sender’s name/address and the body of the message are formatted to appear from a legitimate source, as though the email came from a bank or a newspaper or legitimate company on the Web.

Sometimes, the spoofer will make the email appear to come from a private citizen somewhere.

Page 25: Steganography flooding

E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication  mechanism.

If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages.

To send spoofed e-mail, senders insert commands in headers that will alter message information.

It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.

For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes.

Page 26: Steganography flooding

What is main goal of Email Spoofing

Page 27: Steganography flooding

Be aware of

1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure

2. Watch for Spoofed Email Addresses

Changing the name of the sender so that it does not match the sender’s email address

3. Don’t Give Out Personal Information

4. Avoid Strange Attachments or Unfamiliar Links

5. Seem Too Good To Be True? It is.

Page 28: Steganography flooding

Zmail open source software used to send fake mails

https://emkei.cz/

Page 29: Steganography flooding

Thank You..!!