1 / 35

STEGANOGRAPHY

STEGANOGRAPHY. Perry Fowler CSC 585 The University of Rhode Island.

jules
Download Presentation

STEGANOGRAPHY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STEGANOGRAPHY Perry Fowler CSC 585 The University of Rhode Island Perry Fowler

  2. [Tr note: The truncated Arabic text in the upper right-hand corner of this image reads: “a secret message from a secret soldier of al-Qaeda, Rakan Bin...to the General Command in Afghanistan and also to the…in Londonistan…about the operation…to strike nuclear stations…in the following cities that…planning…] The main Fear Perry Fowler

  3. In this lecture the following material will be covered: Introduction Camouflage Terminology History Some types of steganography Visual Writing (hand written and digital) Photographic Aural Voice and computer generated Computer based Tools to create steganography Algorithms employed in steganography Material to be covered Perry Fowler

  4. Steganography is the technique of hiding a message from detection. If it’s done properly, the message is never detected by those not intended to receive it. It differs from cryptography in that cryptographic techniques don’t deny the existence of the message, they just don’t want it to be readable. In some cases the steganographic hidden message may be in plain text. Introduction Perry Fowler

  5. Technical Steganography – the use of scientific Methods to hide a message. Examples are invisible ink, and size reduction methods like microdots. Linguistic Steganography – hides a message in a carrier some non-obvious way. Is also termed semagrams or open codes. Terminology Perry Fowler

  6. Semagrams – hide information by the use of symbols or signs Visual Semagrams - use ordinary visual objects like icons or doodles, or the positions of objects on say a workbench or a door. . Text Semagrams – hide a message by modifying the carrier text with changes in spacing, either horizontal or vertical or font size, or perhaps flourishes in hand written text. Linguistic Steganography Perry Fowler

  7. Open Codes – employ legitimate overt carrier messages to hide a covert message. Jargon Codes - these open codes use a language that is understood by a select group of people, but meaningless to others Covered Ciphers - hide a message openly in a carrier so that it can be recovered by anyone who knows the secret of how it was concealed. Null Cipher – hides the message according to some set of rules, like the first character of every other word is used to construct the message. OPEN CODES Perry Fowler

  8. Photographic Steganography Textural Steganography Audio Steganography So, let’s talk about…. Perry Fowler

  9. Watermarking II In this example, the watermark would, of course, be invisible Perry Fowler

  10. Picture Hiding The digital image of the cat on the right was imbedded steganographically in the left digital photo of the tree. If we consider a digital image to be made up of an array of columns, each column representing the bits that are used to represent the color density of a pixel, then, the tops of the columns would represent the most significant bits (MSBs as we all know), of color density, and the bottom bits the least significant bits or LSBs.All the bits at any particular level are considered to be in a BIT PLANE. Perry Fowler

  11. BIT PLANES These represent a column Think of a bit plane as a layer of bits, each layer representing one bit in a byte which represents the color of a pixel. Stacked vertically then, we see something like the left side of the above figure. The matrices represented are one small portion of a digital picture; say the lower right hand corner. Perry Fowler

  12. BIT PLANES II On the right hand side of the figure we see representations of three planes. The top one is the original LSB layer of this portion of the image. The middle plane is the data we wish to hide in the image, with the bottom plane being a representation of the LSB plane after the data is imbedded. Perry Fowler

  13. One Technique The technique employed in this example simply adds (binarily) the LSB Plane of the cover image and the embedded data. Perry Fowler

  14. Line Shift Encoding The spacing between these lines is different. Can you tell? It’s about +.01” in the top 2 lines, and - .01” in the bottom 2. This can be done in word – Format/Line spacing Line shift encoding Another Line to shift And another line still Perry Fowler

  15. Word Shift encoding The spacing between these words is different, can you tell which ones? Perry Fowler

  16. Character Spacing The spacing between these characters is different. Can you tell which ones? Two of the characters in the above text have been changed to a different font, which is narrower than the others. The “a” in spacing and the “w” in between Perry Fowler

  17. Hidden words or messages at fixed, geometrical positions on the page. E.G., captured WWII U-boat officers spelled out messages by adding a little space after significant letters. Cardan, or “grill” cipher, uses a careful pattern of fixed locations on the page to hide a message. Geometrical Open Code Perry Fowler

  18. A Null CipherThe Envelope Here is an example of a covered cipher, specifically a NULL cipher. Consider the following message from a prisoner in a Japanese POW camp in WWII The original was hand written: FRANK G. JONELIS, 1st LT. USA GARBLED WAR PRISONERS CAMP NIPPON MR. F. B. IERS %Federal BLDG. Company ROOM 1619 100 MAIN ST. LOS ANGELES, CALIFORNIA USA Perry Fowler

  19. A Null Cipherand now the letter AUGUST 29, 1943 DEAR IERS: AFTER SURRENDER, HEALTH IMPROVED ~ FIFTY PERCENT. BETTER FOOD ETC. AMERICANS LOST CONFIDENCE IN PHILLIPINES. AM COMFORTABLE IN NIPPON. MOTHER: INVEST 30%, SALARY, IN BUSINESS. LOVE Frank g. Jonelis Perry Fowler

  20. A Null Cipherand now the intrepretation AUGUST 29, 1943 DEAR IERS: AFTER SURRENDER, HEALTH IMPROVED ~ FIFTY PERCENT. BETTER FOOD ETC. AMERICANS LOST CONFIDENCE IN PHILLIPINES. AM COMFORTABLE IN NIPPON. MOTHER: INVEST 30 %, SALARY, IN BUSINESS. LOVE Frank g. Jonelis Perry Fowler

  21. S-Tools This is the Carrier Perry Fowler

  22. S-Tools This is the imbedded image Perry Fowler

  23. S-Tools And this is the carrier after insertion. I can notice granularity in the front fender, the fairing and the front disk brake. Perry Fowler

  24. Do a web search for jphs05.zip or JPHide and Seek Download jphs05.zip Unzip it and find jphide.exe, jpseek.exe and jphswin.exe Double click on jphswin.exe and you will see what’s on the next slide: JPHide and Seek Perry Fowler

  25. JPHide To make things easy, put all files in one folder. Double-click on JPHSWIN Click on open JPEG, this will be the carrier Then the HIDE button becomes active, so click it. You will be asked to enter a Password After you do that, then a window will appear asking for you to select the file to be imbedded Perry Fowler

  26. Carrier Image Perry Fowler

  27. The file to be Inserted THIS IS A TEST FILE These programs are available for test purposes only. Please send me any useful comments for improvements. In particular if you discover ways to detect the presence of the hidden data (even if you can't extract it) I would like to hear about it. This excludes the case where both the original and the modified jpeg are available (in which case it is a trivial task!) Remember they are FREE and BETA test versions. They may not work as you expect. I offer no warranty and accept to liability for their use. They are incompatible with earlier versions of similar products I have written. JPHIDE.EXE is a DOS program to hide a data file in a jpeg file. JPSEEK.EXE is a DOS program to recover a file hidden with JPHIDE.EXE JPHSWIN.EXE is a Windows-95 program which performs the same functions as the two programs above. The programs are free standing and require no special installation. Allan Latham <alatham@flexsys-group.com> 7th January 1999. Perry Fowler

  28. The Carrier with the Hidden File Inserted Perry Fowler

  29. This tool works, with restrictions The file to be imbedded in the carrier can’t be too large. However, it can be extracted and saved somewhere. It does use a password to protect the data, I like that. In looking at the carrier before and after, I can’t tell the difference, as I could with some other tools. Results Perry Fowler

  30. Perry Fowler

  31. JPEG is important to consider when discussing steganography, because it employs a technique, called DCT, that can be both a help and a hindrance to the process. On the surface, JEPG is an image compression technique used to reduce the size of pictures transmitted over the internet. JPEG Perry Fowler

  32. Quantization (Rounding) As a mono-dimentional visual example, here is a curve, the red one, made by a sum of two sine waves. One with a low frequency, one with a high frequency. After DCT quantization, you will be left only with the low frequency component, the blue one. It's intuitively simple to understand: you're going to keep the main variations, or the most significant information (low frequency), and eliminate the less important details (high frequency). Perry Fowler

  33. So, What’s it look like? What does JPEG look like? How far can one compress an image and have it look identical to the original? presentable? merely recognizable? The pictures below illustrate this point. Perry Fowler

  34. Quantization (Rounding) Now, lets consider this curve as representative of an audio signal. Considering the high frequency component (the red curve). This can be represented by the LSBs of the signal and replaced by using some of the before mentioned techniques for photographic steganography, like pattern matching, or random substitution. Perry Fowler

  35. Quantization (Rounding) These techniques when applied at the higher frequencies, outside of the boundary of human audio perception, can result in undetectable signal imbedding in the carrier. Perry Fowler

More Related