Top Banner
Steganography Hiding information in past, present and future. Alberto Villegas Erce [email protected] Cryptography University of Granada April 2010 Alberto V. E. (CRYP - UGR) Steganography April 2010 1 / 38
76

Steganography: Hiding information in past, present and future.

Dec 05, 2014

Download

Technology

50min talk for a Cryptography course I did during 2010/2011 year.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography: Hiding information in past, present and future.

SteganographyHiding information in past, present and future.

Alberto Villegas [email protected]

CryptographyUniversity of Granada

April 2010

Alberto V. E. (CRYP - UGR) Steganography April 2010 1 / 38

Page 2: Steganography: Hiding information in past, present and future.

Review

Concepts reviewPreviously in crypto-world...

Math background

Modular arithmetics give us the power

Factorization and Primality.

Finite fields.

Pseudo-random Sequences.

...

Cryptography History

From ancient greeks to Enigma machine.

Information Theory

Shannon’s theory for perfect crypto security.

Alberto V. E. (CRYP - UGR) Steganography April 2010 2 / 38

Page 3: Steganography: Hiding information in past, present and future.

Review

TodaySteganography

What is Steganography?We will review the topic through history

1 Past: historical examples.

2 Present: digital era.

3 Future: no-that-much science fictionideas.

Alberto V. E. (CRYP - UGR) Steganography April 2010 3 / 38

Page 4: Steganography: Hiding information in past, present and future.

Review

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 4 / 38

Page 5: Steganography: Hiding information in past, present and future.

Introduction

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 5 / 38

Page 6: Steganography: Hiding information in past, present and future.

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Page 7: Steganography: Hiding information in past, present and future.

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Page 8: Steganography: Hiding information in past, present and future.

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Page 9: Steganography: Hiding information in past, present and future.

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Page 10: Steganography: Hiding information in past, present and future.

Introduction

Stegano... what?

What is Steganography?

A word with 4 vowels...

... and 9 consonants.

Sounds like Cryptography.

Error!

You are doing it wrong!

Greek: “concealed writing”

Steganos: covered or protected.Graphein: to write.

Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38

Page 11: Steganography: Hiding information in past, present and future.

Introduction

SteganographyDefinition

Steganography

Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.

But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]

Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38

Page 12: Steganography: Hiding information in past, present and future.

Introduction

SteganographyDefinition

Steganography

Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.

But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]

Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38

Page 13: Steganography: Hiding information in past, present and future.

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Page 14: Steganography: Hiding information in past, present and future.

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Page 15: Steganography: Hiding information in past, present and future.

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Page 16: Steganography: Hiding information in past, present and future.

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Page 17: Steganography: Hiding information in past, present and future.

Introduction

SteganographyTerminology [1]

Embedded data (M): the message that one wishes to send secretly.

Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.

Stego-key (K ): used to control the hiding process.

Stego-object (M): the combination of the previous.

M × O × K → M

Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38

Page 18: Steganography: Hiding information in past, present and future.

Introduction

SteganographyModel (I)

Figure: Steganography abstract process

Alberto V. E. (CRYP - UGR) Steganography April 2010 9 / 38

Page 19: Steganography: Hiding information in past, present and future.

Introduction

SteganographyModel (II)

Pure versus secret key steganography

Pure steganographic systems:no prior exchange of secret information.

Secret key steganography system:embeds secret using a secret key.

Perfect Secure Stego-system

It exists. Apply the concepts we saw twoweeks ago.

Alberto V. E. (CRYP - UGR) Steganography April 2010 10 / 38

Page 20: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 21: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 22: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 23: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 24: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 25: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 26: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 27: Steganography: Hiding information in past, present and future.

Introduction

SteganographyWho is it for?

Who is using steganographynowadays?

Spies: intelligence andcounterintelligence agences.

Militaries: unobtrusivecommunications.

Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)

Copyright: watermarks andfingerprints.

SPAM: email forgery.

Only the good guys!(actually, is not that bad)

Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38

Page 28: Steganography: Hiding information in past, present and future.

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Page 29: Steganography: Hiding information in past, present and future.

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Page 30: Steganography: Hiding information in past, present and future.

Introduction

SteganographyExamples?

Stop!

Could someone give an example of Steganography right now?

My recommendation

Think before going deeperinto a topic.

Think about what happenedso far.

Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38

Page 31: Steganography: Hiding information in past, present and future.

Past

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 13 / 38

Page 32: Steganography: Hiding information in past, present and future.

Past

ChinaSilk passion

Paper masks: The sender and the receiver shared copies of a papermask with a number of holes cut at random locations (keep this inmind).

Wax balls: The also wrote messages on silk and encased them in ballsof wax. The wax ball could then be hidden in the messenger.

Alberto V. E. (CRYP - UGR) Steganography April 2010 14 / 38

Page 33: Steganography: Hiding information in past, present and future.

Past

Greece#HerodotusFacts

Shaved slaves: messageswere written over slavesheads. Still in 20thcentury!

Wax tablet: a goodexample of camouflageover unsuspicious diaryobjects.

Alberto V. E. (CRYP - UGR) Steganography April 2010 15 / 38

Page 34: Steganography: Hiding information in past, present and future.

Past

MusicStego-heros

Gaspar Schott (17thcentury): music notescoding letters.

John Wilkings (17thcentury): talkingmusicians.

J. S. Bach (17th-18th century):embedded his name in the organchorale “Vor deinen Thron”using the rule: if the i-th note ofthe scale occurs k times, thenthe k-th letter of the alphabet isto be entered in the i-th place.

Alberto V. E. (CRYP - UGR) Steganography April 2010 16 / 38

Page 35: Steganography: Hiding information in past, present and future.

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Page 36: Steganography: Hiding information in past, present and future.

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Page 37: Steganography: Hiding information in past, present and future.

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Page 38: Steganography: Hiding information in past, present and future.

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Page 39: Steganography: Hiding information in past, present and future.

Past

WritingAcrostic, morse and more.

A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?

Acrostic: messages hidden intext using patterns.

Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.

Is Father Dead or Deceased?

Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38

Page 40: Steganography: Hiding information in past, present and future.

Past

Invisible Ink

Lemon, urine: after burnedreleased carbon shows up.

Refined with chemistry: saltammoniac dissolved in water.

Refined with biology: somenatural unique responses.

Wait a second...

Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38

Page 41: Steganography: Hiding information in past, present and future.

Past

Invisible Ink

Lemon, urine: after burnedreleased carbon shows up.

Refined with chemistry: saltammoniac dissolved in water.

Refined with biology: somenatural unique responses.

Wait a second...

Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38

Page 42: Steganography: Hiding information in past, present and future.

Past

Publishing

Not only for war

Steganography has protected copyright even when it did not exists.

Intended gaps: Falseintended data.

Microdots: imperceptibledots.

Line spacing: modernpublishing.

Alberto V. E. (CRYP - UGR) Steganography April 2010 19 / 38

Page 43: Steganography: Hiding information in past, present and future.

Present

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 20 / 38

Page 44: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 45: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 46: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 47: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 48: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 49: Steganography: Hiding information in past, present and future.

Present

Digital EraFollow the white rabbit

Digital era: how do wemanage data now?

Sound: bit streams.

Images: bit streams.

Video: bit streams.

Text: bit streams.

Noise

A weak spot to exploit.

Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38

Page 50: Steganography: Hiding information in past, present and future.

Present

A simple ideaTake a closer look

Alberto V. E. (CRYP - UGR) Steganography April 2010 22 / 38

Page 51: Steganography: Hiding information in past, present and future.

Present

A simple ideaA said CLOSER!

(a) #18657E (b) #19657E (c) #1A657E (d) #1B657E

Figure: LSB variations over R

Alberto V. E. (CRYP - UGR) Steganography April 2010 23 / 38

Page 52: Steganography: Hiding information in past, present and future.

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(a) #18667D

(b) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Page 53: Steganography: Hiding information in past, present and future.

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(c) #18667D

(d) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Page 54: Steganography: Hiding information in past, present and future.

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(e) #18667D

(f) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Page 55: Steganography: Hiding information in past, present and future.

Present

LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.

(g) #18667D

(h) #1B657E

LSB Steganography

LSB Variations are indiscernible.Even the two LSB!

Let’s check a poor 800× 600 image.

800× 600 = 48000pixels

480000pixels × 6 = 2880000bit

2880000bit

8bit/character= 360000characters

Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38

Page 56: Steganography: Hiding information in past, present and future.

Present

LSB Steganography

Pros

Easy to understand and code.

Pure steganographic (a priori).

Lot’s of coding chances. [3]

Cons

Weak against noise attack.

Requires good images.

Requires non-coded images.

Alberto V. E. (CRYP - UGR) Steganography April 2010 25 / 38

Page 57: Steganography: Hiding information in past, present and future.

Present

WattermarkingCopyrigthing

Problem

Lossy compression (JPEG,MGEP) destroys LSB variations.

Solution

Hide in other LSB.

Also indiscernible for human eye.

Alberto V. E. (CRYP - UGR) Steganography April 2010 26 / 38

Page 58: Steganography: Hiding information in past, present and future.

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Page 59: Steganography: Hiding information in past, present and future.

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Page 60: Steganography: Hiding information in past, present and future.

Present

WattermarkingCopyrigthing

Concepts

Visible watermarking.

Invisible watermarking.

Requires redundancy!

Also valid for video compression.

Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38

Page 61: Steganography: Hiding information in past, present and future.

Future

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 28 / 38

Page 62: Steganography: Hiding information in past, present and future.

Future

Science fiction?Keep your mind open

Where are the limits?

Science and engineering developfast.

Multiple fields merge and splitcontinuously.

What can we learn from other fields?

Keep your mind open!

Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38

Page 63: Steganography: Hiding information in past, present and future.

Future

Science fiction?Keep your mind open

Where are the limits?

Science and engineering developfast.

Multiple fields merge and splitcontinuously.

What can we learn from other fields?

Keep your mind open!

Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38

Page 64: Steganography: Hiding information in past, present and future.

Future

Messages through lightQuantum physics killed the cryptography stars

Idea: Polarized photons cryptosystem... in 1984! [4]

Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38

Page 65: Steganography: Hiding information in past, present and future.

Future

Messages through lightQuantum physics killed the cryptography stars

Idea: Polarized photons cryptosystem... in 1984! [4]

Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38

Page 66: Steganography: Hiding information in past, present and future.

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Page 67: Steganography: Hiding information in past, present and future.

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Page 68: Steganography: Hiding information in past, present and future.

Future

DNA CodingLimits?

DNA and RNA have codedlife of living things in a prettygood way for years.

Let’s use copyright it!

4 nucleic acids:

A: 00

C: 01

G: 10

T: 11

How?

Innocuous sequences.

Redundant sequences.

Add sequences.

Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38

Page 69: Steganography: Hiding information in past, present and future.

Conclusions

Index

1 Introduction2 Past3 Present4 Future5 Conclusions

Alberto V. E. (CRYP - UGR) Steganography April 2010 32 / 38

Page 70: Steganography: Hiding information in past, present and future.

Conclusions

Conclusions

Benefits

Secrecy and confusion.

Variety of combinations.

Can be combined withcryptography.

Only few pros but strong ones.

Alberto V. E. (CRYP - UGR) Steganography April 2010 33 / 38

Page 71: Steganography: Hiding information in past, present and future.

Conclusions

Conclusions

Cons

Not suitable for massivetransmissions.

Requires more effort thanregular cryptography.

Weak against transformation.

Specific solutions for specificproblems.

Always trade security againstrobustness.

Alberto V. E. (CRYP - UGR) Steganography April 2010 34 / 38

Page 72: Steganography: Hiding information in past, present and future.

References

References I

Information Hiding - A SurveyFabien A. P. Petitcolas, Ross J. Anderson and Markus G. KuhnProceedings of the IEEE, special issue on protection of multimediacontent, 87(7):1062-1078, July 1999

Exploring Steganography: Seeing the UnseenNeil F. Johnson and Sushil Jajodia.IEEE Computer, February 1998: 26-34.

Reliable Dectection of LSB Steganography in Color and GrayscaleImages.Jessica Fridrich, Miroslav Goljan and Rui DuMultimedia, IEEE, 2001

Alberto V. E. (CRYP - UGR) Steganography April 2010 35 / 38

Page 73: Steganography: Hiding information in past, present and future.

References

References II

Quantum cryptography: Public-key distribution and coin tossingBennett, C. H. and Brassard, G.Proceedings of IEEE International Conference on Computers,December 1984.

Hiding Data in DNABoris Shimanovsky, Jessica Feng and Miodrag PotkonjakInformation Hiding, 2003 - Springer

Disappearing Cryptography. Information Hiding: Steganography &Watermarking. (3rd ed.)Peter Wayner.Elsevier, 2009.

Alberto V. E. (CRYP - UGR) Steganography April 2010 36 / 38

Page 74: Steganography: Hiding information in past, present and future.

References

References III

Matematicos, espıas y piratas informaticos. Codificacion yCriptografıa.Joan GomezRBA, 2010.

Wikipedia: Steganographyhttp://en.wikipedia.org/wiki/Steganography

Kriptopolis (in Spanish)http://www.kriptopolis.org/articulos/esteganografia

Steganography: How to Send a Secret Messagehttp://www.strangehorizons.com/2001/20011008/steganography.shtml

Johnson & Johnson Technology Consultants (Neil F. Johnson)http://www.jjtc.com/Steganography/ (software)

Alberto V. E. (CRYP - UGR) Steganography April 2010 37 / 38

Page 75: Steganography: Hiding information in past, present and future.

The end

Thank you.

Questions?Please be nice

Just one more thing!

Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38

Page 76: Steganography: Hiding information in past, present and future.

The end

Thank you.

Questions?Please be nice

Just one more thing!

Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38