1 / 10

Steganography

Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin . Steganography. Project Description . Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis Use knowledge gained from online research

nolcha
Download Presentation

Steganography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin Steganography

  2. Project Description • Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis • Use knowledge gained from online research • Computer steganography is hard to detect and the more one knows about it the better the chance of detecting it

  3. History • In ancient times messages would be written on wood or stone tablets then covered in wax • Messages would be tattooed on slaves heads, covered by hair, hair shaved off to read. • Invisible ink

  4. Example • Haha you cant • See this

  5. Facts • Steganography is closely related to cryptography • Used by artists/developers to insert digital watermarks into their work • There are tools that allow steg to be used with almost any file type: audio, graphics, text, video, executable, ect • Steg used in graphics hides data by inserting it piece by piece into the last couple of bits that make up pixels

  6. Steganalysis • Steganalysis is the detection of steganography • Many tools available to detect/decode/destroy steganography

  7. Tools • Puff: Italian program, hides files in bmp, jpg, pcx, png, tga, aiff, mp3, next/sun, wav, and Win pe. Provides 16 different encryption algorithms • Invisible Secrets: hides in hpeg, png, bmp, html, and wav. Encryption + other fun tools • TextHide: Scrambles text to hide data within any text file • Stegdetect: Detects steganography In jpeg images

  8. Bad: Procrastination Writers block Did not meet my own expectations Outcomes • Good: • Fun to research • Good sources of data (FBI website)‏ • Understanding of something most people do not know‏

  9. Lessons Learned • Do not procrastinate • Steganography is interesting

  10. Resources • http://home.comcast.net/~ebm.md/stego/softwarewindows.html • http://www.securityfocus.com/infocus/1684 • http://home.comcast.net/~ebm.md/stego/softwarewindows.html • http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm

More Related