1 / 22

Dan DeBlasio and Brad Mundt University of Central Florida

An Enhanced Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. Dan DeBlasio and Brad Mundt University of Central Florida deblasio@cs.ucf.edu, bmundt@pegasus.cc.ucf.edu. Steganography. What is Steg?

zared
Download Presentation

Dan DeBlasio and Brad Mundt University of Central Florida

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Enhanced Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique Dan DeBlasio and Brad Mundt University of Central Florida deblasio@cs.ucf.edu, bmundt@pegasus.cc.ucf.edu

  2. Steganography • What is Steg? • The word steganography is of Greek origin and means "covered, or hidden writing". • Modern implementation is embedding secret information into something innocent • Pictures, audio, video

  3. Picture Steg Image of a tree. Image extracted from tree image. By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in the image to the right.

  4. Our selection • A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique by Tsung-Yuan Liu and Wen-Hsiang Tsai • A new steg method to hide information via MS Word change tracking • Collaborative document with corrections • Deleted words are struck through and new words are underlined

  5. Overview • Transform a regular document to one with misspellings or mistakes • Make changes, allow word to track them. • Using a Huffman tree on the original words in the file, create a binary string of the embedded message • Decode the binary string to get the secret message

  6. Original sentence The quick brown fox jumped over the lazy dog.

  7. Sentences with Misspellings The quick borwn fox jumped oevr the lazy dag.

  8. Sentence with changes tracked The quick borwnbrown fox jumped oevrover the lazy dagdog.

  9. Huffman Tree Created from the frequency of misspellings

  10. How to Decode The quick borwnbrown fox jumped oevrover the lazy dagdog. 1001000 01110010x72 0x105 Hi

  11. Our implementation • Recreated the method from scratch • Made improvements • Modular code for easy improvements • Encryption, simple XOR pad with key in the author field

  12. Example next,then a live demo

  13. A Word documentBefore steg encoding

  14. Encoding in Progress

  15. Encoding Complete

  16. The Word documentAfter steg encoding

  17. Decoding in Progress

  18. Decoding complete

  19. Live Demo

  20. Statistical Results

  21. Improvements • Due to the code being modular, improvements will be easy • More advanced or alternate encryption algorithms • Implement a Markov model instead of a Huffman tree for statistical attacks • Use synonyms instead of misspellings or a combination of both

  22. That’s all for now folks!

More Related