SSS - PowerPoint PPT Presentation

slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
SSS PowerPoint Presentation
play fullscreen
1 / 40
SSS
279 Views
Download Presentation
chloe
Download Presentation

SSS

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. SSS

  2. Steganography Information Hiding Using By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43

  3. “Three people can keep the secret only if two of them are dead !” • -Benjamin Franklin

  4. What is the secret message? secret Harshada Kshirsagar.

  5. Confidential Data On Internet Harshada Kshirsagar.

  6. HACKERS / ATTACKERS Harshada Kshirsagar.

  7. Some Suspicions in Senders mind … Will somebody else receive my msg? Will somebody alter my msg? Will somebody read my msg? Use Confidential data from my msg? Will somebody delete my msg?

  8. stegein tocover stegein STEGANOGRAPHY

  9. grafein STEGANOGRAPHY grafein to write

  10. Evolution of Steganography

  11. Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in A BLOCK OF WOOD, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.

  12. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire! You can try steganography at home by writing on a piece of paper with LEMON JUICE. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message.

  13. Message on head scalp… • In ancient Greece, they used to select messengers and shave their head, they would then write a message on their scalp. • Then the hair was allowed to grow back. • After the hair grew back, the messenger was sent to deliver the message. • The recipient shave off the messengers hair to see the secret msg…

  14. The Basic Steganography Model

  15. The Basic Steganography Model

  16. Steps in Sending a Steganographic message

  17. Select Carrier File Choose a regular medium to transfer the file Choose a method of steganography Email, disk or upload to website or blog Softwares like: steghide,Jsteg etc. Text,Image, HTML, audio,video Append,Inject, LSB modification Choose a program to hide msg in carrier file Embed msg in carrier file,and if possible encrypt it Communicate the chosen method to receive via a different channel

  18. Steganography Techniques

  19. Steganography InTEXT

  20. p e r s h i n g s a i r l s f o m y n u n e j i Spy Game Null ciphers Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

  21. p e r s h i n g s a i r l s f o y n m u n e j i

  22. Word Shift Coding /Line Shift Coding

  23. Feature Coding Vertical end line top of letters is altered Harshada Kshirsagar.

  24. Steganography InHTML pages or Soft wares

  25. Time For A Demo Of Stego in HTML • Illusions1.htm • Illusions2.html

  26. Steganography InIMAGE Methods Of Steganography Injection Substitution Harshada Kshirsagar.

  27. Steganography Technique:Adding Bytes to End-of-Image FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 60 ......JFIF.....` 00 60 00 00 FF E1 00 94 45 78 69 66 00 00 49 49 .`......Exif..II 2A 00 08 00 00 00 0A 00 FE 00 04 00 01 00 00 00 *............... 00 00 00 00 00 01 03 00 01 00 00 00 00 02 1A 01 ................ 01 01 03 00 01 00 00 00 00 02 00 00 02 01 03 00 ................ ... 73 4E 85 03 7D B6 D4 60 FF 00 CF 45 CF F3 AB BF sN..}..`...E.... 72 D4 7A 9B 2F 13 3E D4 57 C0 E3 9E 4F BE 2A B5 r.z./.>.W...O.*. CD B7 92 57 3C F1 D8 7B FB 7F 9F C2 A8 CF AF D9 ...W<..{........ 96 DF 1E A1 68 0F 27 1E 6A F2 7F 3A 9E 5D 73 4C ....h.'.j..:.]sL 96 DD 44 97 F6 AC 79 CF EF 17 F2 A4 3D 51 FF D9 ..D...y.....=Q.. 50 4B 03 04 14 00 02 00 08 00 72 76 D6 30 1B A9 PK........rv.0.. 83 F2 F8 3F 00 00 27 D9 00 00 13 00 11 00 75 73 ...?..'.......us 20 63 6F 6E 73 74 69 74 75 74 69 6F 6E 2E 74 78 constitution.tx 74 55 54 0D 00 07 C7 8D D8 40 63 D7 F2 40 C6 E0 tUT......@c..@.. ED 40 D5 7D 5B 73 DC 46 B2 E6 3B 23 F8 1F 10 7E .@.}[s.F..;#...~ ... 21 00 00 81 00 00 00 00 75 73 20 63 6F 6E 73 74 !.......us const 69 74 75 74 69 6F 6E 2E 74 78 74 55 54 05 00 07 itution.txtUT... C7 8D D8 40 50 4B 05 06 00 00 00 00 01 00 01 00 ...@PK.......... 4A 00 00 00 3A 40 00 00 00 00 48 49 1200 9A 40 J...:@....HI...@ 00 00 64 34 31 64 38 63 64 39 38 66 30 30 62 32 ..d41d8cd98f00b2 30 34 00 27 DD 73 04.'.s baboon_stego.jpg • baboon.jpg • JPEG file withend-of-image bytes FF D9. • Application appends hidden data within a zip file, its signature, and user-specified password.

  28. Harshada Kshirsagar.

  29. Takes benefit of limitation in perception in human vision

  30. Harshada Kshirsagar. 2,94,912 chars

  31. Time For A Demo Of Stego in IMAGES

  32. Applications • Barcodes • Hides Personal Communication • Military Information Exchange • Personal Information Sending • Credit card no • E- commerce Harshada Kshirsagar.

  33. Harshada Kshirsagar.

  34. Harshada Kshirsagar.

  35. Harshada Kshirsagar.

  36. Steganalysis The goal of steganalysis is to identify suspected information streams,determine whether or not they have messages encoded into them ,and if possible,recover the hidden information. DETECT DEFEAT . Harshada Kshirsagar.

  37. Steganalysis • Text • Image • Audio Harshada Kshirsagar.

  38. Steganalysis:Detecting steganography • Text -Odd use of language • Images -Size of image -Cross check with the other copies of image on the net. Harshada Kshirsagar.

  39. Steganalysis …Defeatingsteganography • Text -Change the order of the words -Add or remove words • Images -Compress Image using Lossy compression -Resize image -Convert to other format -Modify colors

  40. Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult ● Defeating steganography is not hard Harshada Kshirsagar.