100 likes | 595 Views
Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin . Steganography. Project Description . Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis Use knowledge gained from online research
E N D
Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin Steganography
Project Description • Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis • Use knowledge gained from online research • Computer steganography is hard to detect and the more one knows about it the better the chance of detecting it
History • In ancient times messages would be written on wood or stone tablets then covered in wax • Messages would be tattooed on slaves heads, covered by hair, hair shaved off to read. • Invisible ink
Example • Haha you cant • See this
Facts • Steganography is closely related to cryptography • Used by artists/developers to insert digital watermarks into their work • There are tools that allow steg to be used with almost any file type: audio, graphics, text, video, executable, ect • Steg used in graphics hides data by inserting it piece by piece into the last couple of bits that make up pixels
Steganalysis • Steganalysis is the detection of steganography • Many tools available to detect/decode/destroy steganography
Tools • Puff: Italian program, hides files in bmp, jpg, pcx, png, tga, aiff, mp3, next/sun, wav, and Win pe. Provides 16 different encryption algorithms • Invisible Secrets: hides in hpeg, png, bmp, html, and wav. Encryption + other fun tools • TextHide: Scrambles text to hide data within any text file • Stegdetect: Detects steganography In jpeg images
Bad: Procrastination Writers block Did not meet my own expectations Outcomes • Good: • Fun to research • Good sources of data (FBI website) • Understanding of something most people do not know
Lessons Learned • Do not procrastinate • Steganography is interesting
Resources • http://home.comcast.net/~ebm.md/stego/softwarewindows.html • http://www.securityfocus.com/infocus/1684 • http://home.comcast.net/~ebm.md/stego/softwarewindows.html • http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm