1 / 13

STEGANOGRAPHY

Security by obscurity. STEGANOGRAPHY. What is Steganography ?. Greek “ Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that a message exists. TERMS: Payload – message to be hidden and sent

margie
Download Presentation

STEGANOGRAPHY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security by obscurity STEGANOGRAPHY

  2. What is Steganography? Greek “Concealed Writing” Steganography– the science of hiding a message so that only the recipient and sender are aware that a message exists. TERMS: Payload – message to be hidden and sent Carrier – overlying message to conceal the payload Channel – type of message the carrier is (i.e. slave, JPEG, WAV) Package – carrier containing payload Suspect – intercepted message which is thought to have a payload

  3. Physical Steganography Wax tablets print message on underlying wood, cover in wax and write false message Shaved Slaves Shave a slave, tattoo a message, send him out once hair grows back Invisible Ink Write a message in lemon juice in between lines of a phony message, recipient heats to reveal the secret message. Morse Code Yarn Create a length of yarn such that there is a Morse code message in the colors of the yarn, weave it into some booties and send them as a gift.

  4. Digital Noise When an analog signal is converted into digital, there can be “noise” which causes a small corruption of some data. Think of a tape player hissing when no noise had been recorded. When a camera takes a picture, there are minute variations in the data after being converted even if all variables of the picture being taken were the same. What if we took this random, corrupted data and replaced it with something meaningful? As long as an interceptor does not know where to look, and assumes this noise is just noise, our message is kept secret.

  5. Digital Steganography List 1. Hiding in pictures and video 2. Watermarking 3. Blog Steganography 4. CAPTCHA 5. Bacon’s Cipher

  6. Hiding in Pictures Pictures are represented in your computer as a header and zounds of RGB values. -24 bit color means 2^8 shades of each color. -Human eye cannot tell the difference between shade of 11111111 and 11111110, so why not omit this last bit of information, and insert something sneaky? -ASCII is represented by numbers 0-127, or 8 bits. If we drop each low order bit for each of the three colors every pixel, we can insert an ASCII character every 3 pixels! -To insert a message like “Sneaky Hello World!” we would only need a picture 19x3 or 57 pixels. The bigger the picture, the bigger the message you can hide without it being noticeable! - Note that it does not have to be an ASCII message! We can hide anything that can be represented in binary (which, according to Claude Shannon, is everything) inside of a picture.

  7. Hiding in Pictures Example This is a normal cake picture. This is a cake picture that has “SNEAKY HELLO WORLD” embedded in it. Can you tell the difference? A computer could, if it knew where to look.

  8. Hiding in Video A video is simply a rapid succession of pictures being displayed. If we can hide long messages in a picture, imagine what we could hide in a two hour long movie with ~30 frames per second! -OR - Subliminal Message – pictures inserted into a frame of video. Your brain recognizes the image, but you are not consciously aware of it. If the video were slowed down, you would have the time to recognize this image consciously. As long as the video remains at normal speed, the message remains hidden. You can also retrieve information by speeding up the video, if it was hidden for such purpose. Think of flip books where each page has a small amount of information, and they converge into a full picture when viewed rapidly.

  9. Watermarks Watermark – embedded message containing the source of the object Currency – if you hold a $50 bill to the light, you can see bands of text that appear to be *inside* the paper. These bands make it extremely difficult to counterfeit the bills. Printers – tiny yellow dots are printed on the bottom of pages. They can contain anything including the serial number of the printer, the user who printed the page, and a timestamp. Dots seen through a microscope:

  10. CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Why is this Steganography? It hides information from computers, but not from (most) humans.

  11. Bacon Cipher Translate payload into As and Bs using Baconian Alphabet Two typefaces (fonts) much be chosen Construct a carrier message with the same length as the payload Use typeface1 for A and typeface2 for B Transmit

  12. Bacon Cipher Example Payload = “ATTACK AT DAWN” Font1 (A) = Bold Font2 (B) = Regular Translated payload = “AAAAA BAABA BAABAAAAAA AAABA ABAAB AAAAA BAABA AAABB AAAAA BABAA ABBAA”, length = 12x5 = 60 characters Carrier: “Hello Mr. Honeydew, how are you holding up after your operation? Let me know.” Package: “HelloMr. Honeydew, how are you holding up after your operation? Let me know.”

  13. Bibliography "Baconian Cipher." Purple Hell. Web. 07 Oct. 2009. <http://www.purplehell.com/riddletools/bacon.htm>. "Bacon's cipher -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009. <http://en.wikipedia.org/wiki/Bacon%27s_cipher>. "CAPTCHA -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009. <http://en.wikipedia.org/wiki/CAPTCHA>. "Portal-cake." Armchair Generalist. Web. 07 Oct. 2009. <http://armchairgeneralist.typepad.com/.a/6a00d83451b39369e20105362b61b9970b-popup>. "Steganography -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009. <http://en.wikipedia.org/wiki/Steganography#Digital_steganography>. "Steganography_Encode - Utility Mill - Utility." Utility Mill - Makes Utilities. Web. 07 Oct. 2009. <http://utilitymill.com/utility/Steganography_Encode>.

More Related