by robert summitt and jiten patel l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Steganography PowerPoint Presentation
Download Presentation
Steganography

Loading in 2 Seconds...

play fullscreen
1 / 15

Steganography - PowerPoint PPT Presentation


  • 240 Views
  • Uploaded on

By Robert Summitt and Jiten Patel. Steganography. What is Steganography. It is the art and science of writing a message in a way to where the only the recipient knows of its existence. The word Steganography is of Greek origin and means “covered, or hidden writing.”

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Steganography


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
what is steganography
What is Steganography

It is the art and science of writing a message in a way to where the only the recipient knows of its existence.

The word Steganography is of Greek origin and means “covered, or hidden writing.”

Steganographic messages will generally appear as something else such as a picture or a text file.

Provide security over insecure channel

history of steganography
History of Steganography

Dates back to 440 BC

Heredotus and wax tablets

Histiaeus and his tattooed slave

Later in the 1500’s Johannes Trithemius

Steganographia

World War II

Micro Dots

Doll Woman

Pueblo Incident in 1968

Sign Language Photos

how does it work now
How does it work now?

Encrypt

Plaintext

Cyphertext

Stegotext

Covertext

steganography examples
Steganography Examples
  • This first photo is that of a tree (obviously)
  • By making this image 85% brighter the result is the image of the cat below
steganography examples6
Steganography Examples

M1 = Steganographyis the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present

other uses
Other Uses

Hidden messages can also be implemented into audio files using the LSB method.

Sounds and noises at the LSB level can not typically be heard by the human ear.

Therefore when playing the original file it sounds just like a normal .wav or .mp3 file

However it can be decrypted to reveal another sound file or any file for that matter.

File must be big enough to hold hidden message.

steganography in the news
Steganography In The News

Bin Laden: Steganography master?

USA Today reported that Bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say."

popular programs
Popular Programs

Steghide

.bmp

.wav

.au

MP3Stego

.mp3

Snow

Text files

E-Mail

s tools
S-Tools

One of the most reliable tools for steganography is S-tools

This program was created in 1994 by Andy Brown

There has been no updates since then because of its encryption algorithm.

Nearly impossible to break

why s tools is so good for this
Why S-tools is so good for this!

4 different types of encryptions to choose from

IDEA, DES, Triple DES, MDC

The password is entered and confirmed by the user and then is encrypted using the desired algorithm

To reveal any image one must know the password along with the encryption algorithm

This makes it extremely difficult to break even using a brute force attack.

winbatch attempt
WinBatch attempt

Using a script designed for winbatch an attempt was made to brute force a few files that supposedly had hidden files

Script was designed to brute force using a dictionary file

The script also tried every possible encryption method

Dated machines didn’t have enough virtual memory to conduct this test but if they had it would have taken a LONG time!

more modern day uses
More Modern day uses

KFC Ad

Digital Watermarking

references
References

http://en.wikipedia.org/wiki/Steganography

Including the history, modern uses, and KFC refrences

http://www.winbatch.com/download.html

Site where Winbatch was found

http://www.phrack.org/archives/52/P52-08

Site explaining LSB and provides script used for Winbatch

http://www.jjtc.com/Security/stegtools.htm

Site where S-tools comes from