YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: DATA64-steganography

STEGANOGRAPHY

To understand the concept behind hiding Information.

Page 2: DATA64-steganography

WHAT IS STEGANOGRAPHY ?? Steganography

from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing”

Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination.

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.

Anyone else viewing the message will fail to know it contains hidden/encrypted data

Page 3: DATA64-steganography

MODERN DIGITAL STEGANOGRAPHY

Data is encrypted

Then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file.

This technique may simply append the data to the file, or disperse it throughout.

Carefully crafted programs apply the encrypted data such that patterns appear normal.

Page 4: DATA64-steganography

TECHNIQUES USED FOR STEGANOGRAPHY

Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses.

Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms.

Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information.

Page 5: DATA64-steganography

GENERAL CONCEPT BEHING STEGANOGRAPHY

Secret Message

Carrier Filejpg,bmp , mp3 ,wav

Carrier File with Hidden Message

Page 6: DATA64-steganography

STEGANOGRAPHY - TOOLS

Steganography Tools Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) Snow JPHide Camouflage Hiderman Many others…

Page 7: DATA64-steganography

CAMOUFLAGE Camouflage allows you to hide files by

scrambling them and then attaching them to the file of our choice.

Append it to the carrier File.

For additional security you can password our camouflaged file.

We can even camouflage files within camouflaged files.

Page 8: DATA64-steganography

HOW TO CAMOUFLAGE ANY FILE

Select a file to be camouflage

Page 9: DATA64-steganography

Select the carrier File

Select the destination

Page 10: DATA64-steganography

Add passcode

Uncamouflage a camouflage file

Page 11: DATA64-steganography

SNOW Steganographic Nature Of Whitespace.

Hide messages in ASCII text by appending whitespace to the end of line.

It uses the ICE encryption algorithm.

Block Size – 64-bit.

It runs in 1-bit cipher-feedback (CFB) mode. each output bit is 64-bit Encrypted.

Page 12: DATA64-steganography

Common encryption algorithms used in steganography programs.

XOR

DES

3DES

IDEA

AES

Page 13: DATA64-steganography

DES Data Encryption Standard. Design by IBM in 1977 It is also a symmetric key block cipher. Key size – 64 bit. [8 bits are used for parity

check] , 56-bi are used. Block Size - 64 bit. 16 rounds of operations. There are 2^56 keys Triple DES and AES are the successor of DES.

Page 14: DATA64-steganography

DES ALGORITHM Fractioning of the text in 64-bit Blocks.

Initial Permutation of Blocks.

Breakdown of the blocks into two parts: left and right, named L and R.

Permutation and substitution steps repeated 16 times (called rounds).

Re-joining of the left and right parts then inverse initial permutation.

Page 15: DATA64-steganography

IDEA International Data Encryption

Algorithm. Symmetric key Block Cipher. It was intended as a replacement of DES. It is used in PGP [Pretty good Encryption]. Key Size - 128 bits. Block Size - 64 bits. Rounds - 8.5 The process of encryption and Decryption is

similar. But the order of round keys are inverted.


Related Documents