Top Banner

Click here to load reader

Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future

Dec 24, 2015

ReportDownload

Documents

  • Slide 1
  • Steganography Ryan Sacksteder
  • Slide 2
  • Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganographys Future
  • Slide 3
  • What is Steganography? Comes from Greek ("Wikipedia: The Free Encyclopedia") steganos = covered graphei = writing The practice of writing hidden messages in such a way that no one but the sender/receiver suspect the existence of the message. Steganography vs. Cryptography (Morgan) Hiding vs. Altering Obscuring Means of Communication vs. Obscuring Data Deterring Attacks vs. Defending Attacks
  • Slide 4
  • History of Steganography Term 15 th Century Concept 2500 years (Greene) Lets take a look at two early instances of steganography
  • Slide 5
  • Early Instances of Steganography Ancient Greek Histiaeus and His Slave Planning Revolt Against King of Persia Same Trick Repeated with a Rabbit (Greene) We must revolt against the King of Persia. Are you with me? Image Source: http://www.groomingguys.com/grooming-tips/the-bald-truth/
  • Slide 6
  • Early Instances of Steganography 5 th Century B.C. Exiled Greek Demaratus Warned Sparta of Persians Planned Attack Wax Tablet Concealed Message 300! (Greene)
  • Slide 7
  • Steganography Past and Current Uses (Trapani) Hiding Personal Private Data Embedding Copyright Information Exchanging Passwords/Confidential Information Misuses (Marcus) Terrorist Interaction September 11, 2011 Child Pornography
  • Slide 8
  • Forms of Steganography Physical Printed Network Digital Etc.
  • Slide 9
  • Physical Steganography Secret Inks on Paper Concealing Messages Under Postage Stamps Morse Code on Clothing ("Wikipedia: The Free Encyclopedia") Image Source: http://media.photobucket.com/image/recent/kneesocky/morsecode.jpg
  • Slide 10
  • Printed Steganography Subset Technique - Ex: last word of every line Null Cipher - 1 st Letter (Morgan) Image Source: http://homepage.smc.edu/morgan_david/linux/a24-steganography.pdf
  • Slide 11
  • Network Steganography Unused Bits in Packet Headers/Payload IP Identification Field TCP Sequence Number Field Port Knocking (Morgan) Ex: port 83, 69, 67, 85, 82, 73, 84, 89 ASCII > SECURITY
  • Slide 12
  • Digital Steganography Altering File Headers/Footers (Villinger) Echo Steganography Audio/Image-Based Steganography (Wikipedia) Normally Hiding a Text File Makes Use of LSB(s) Images Source: http://en.wikipedia.org/wiki/Steganography#Digital
  • Slide 13
  • LSB Image-Based Steganography Each pixel is a combination of 24 bits ("Under Your Hat Security") 1 byte (8 bits) for each of the RGB values 00010100 11100101 01111101 20 229 125 Image Source: http://www.colorspire.com/rgb-color-wheel/
  • Slide 14
  • LSB Image-Based Steganography Modifying LSB Results in Minor RGB Change Unnoticeable Change? 0001010 0 1 1110010 1 0 1 0 0111110 1 0 21 228 124 x x x OriginalLSB Modified Image Source: http://www.colorspire.com/rgb-color-wheel/
  • Slide 15
  • LSB Image-Based Steganography (Under Your Hat Security) Hide the Word Hi Convert Hi to Binary using ASCII (72 105) 0100 1000 0110 1001 Using LSB, Requires 16 bytes of Existing Data xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1
  • Slide 16
  • LSB Image-Based Steganography Advantages (Morgan) No File Size Change Hard to Detect Disadvantages Hiding/Revealing Must be Done Same Requires Use of Same Program/Method Image Format Conversion Size of Carrier Required to Hide Data
  • Slide 17
  • LSB Image-Based Steganography Which Image Uses Steganography?
  • Slide 18
  • Steganalysis The Process of Detecting Steganography ("Wikipedia: The Free Encyclopedia) Visual Detection Rare (Marcus) Statistical Analysis More Common ("Wikipedia: The Free Encyclopedia") Examining file size/Checksum Requires Knowledge of Original Size Pixel Pairs
  • Slide 19
  • Tools/Programs Steganography (Under Your Hat Security) Stepic Outguess Steghide Steganalysis Stegdetect StegSecret (Munoz) VSL ("sourceforge.net")
  • Slide 20
  • The Future of Stegonagraphy Still Pretty New Stronger, Harder to Detect Constant Advancements Hopeful Advancement: Easier Detection of Small Files
  • Slide 21
  • Recap Overview History Forms/Examples LSB Image-Based Steganography Steganalysis Tools/Programs Steganographys Future
  • Slide 22
  • Questions?
  • Slide 23
  • Works Cited "Steganography." Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc., 2012. Web. 21 Nov 2012.. Morgan, David. "Steganography." David Morgan, Computer Science Department, Santa Monica College. Santa Monica College. Web. 21 Nov 2012.. Greene, Tim. "The history of steganography." Network World. Network World, Inc., 2012. Web. 21 Nov 2012.. Villinger, Sandro. "Crash course: Digital steganography. itworld.com. ITworld, 2011. Web. 23 Nov 2012.. "Tutorial: What Is Steganography? How Does It Work?."Under Your Hat Security. underurhat.com, 2012. Web. 23 Nov 2012.. Marcus, Ilana. "Steganography Detection.". University of Rhode Island, 2003. Web. 24 Nov 2012.. Munoz, Alfonso. "StegSecret. A simple steganalysis tool ;)."sourceforge.net. SourceForge, 2007. Web. 24 Nov 2012.. "Virtual Steganographic Laboratory for Digital Images (VSL): Free tool for steganography and steganalysis." sourceforge.net. SourceForge, 2011. Web. 24 Nov 2012.. Trapani, Gina. "Geek to Live: Hide data in files with easy steganography tools." Lifehacker. Lifehacker, 2007. Web. 24 Nov 2012..