220 likes | 311 Views
An Enhanced Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. Dan DeBlasio and Brad Mundt University of Central Florida deblasio@cs.ucf.edu, bmundt@pegasus.cc.ucf.edu. Steganography. What is Steg?
E N D
An Enhanced Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique Dan DeBlasio and Brad Mundt University of Central Florida deblasio@cs.ucf.edu, bmundt@pegasus.cc.ucf.edu
Steganography • What is Steg? • The word steganography is of Greek origin and means "covered, or hidden writing". • Modern implementation is embedding secret information into something innocent • Pictures, audio, video
Picture Steg Image of a tree. Image extracted from tree image. By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in the image to the right.
Our selection • A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique by Tsung-Yuan Liu and Wen-Hsiang Tsai • A new steg method to hide information via MS Word change tracking • Collaborative document with corrections • Deleted words are struck through and new words are underlined
Overview • Transform a regular document to one with misspellings or mistakes • Make changes, allow word to track them. • Using a Huffman tree on the original words in the file, create a binary string of the embedded message • Decode the binary string to get the secret message
Original sentence The quick brown fox jumped over the lazy dog.
Sentences with Misspellings The quick borwn fox jumped oevr the lazy dag.
Sentence with changes tracked The quick borwnbrown fox jumped oevrover the lazy dagdog.
Huffman Tree Created from the frequency of misspellings
How to Decode The quick borwnbrown fox jumped oevrover the lazy dagdog. 1001000 01110010x72 0x105 Hi
Our implementation • Recreated the method from scratch • Made improvements • Modular code for easy improvements • Encryption, simple XOR pad with key in the author field
Improvements • Due to the code being modular, improvements will be easy • More advanced or alternate encryption algorithms • Implement a Markov model instead of a Huffman tree for statistical attacks • Use synonyms instead of misspellings or a combination of both