23
Steganography Steganos Graphien  T. Deepa

Deepa T - Steganography

Embed Size (px)

Citation preview

Page 1: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 1/23

Steganography“Steganos Graphien ” 

T. Deepa

Page 2: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 2/23

Steganography Copyright (c) 2005, T. Deepa 2

Agenda

• Steganography: An Overview

• Steganography over the ages

• Digital Steganography – Text

 – Images

 – Audio

 – Video

• Applications and Trends

Page 3: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 3/23

Steganography Copyright (c) 2005, T. Deepa 3

Steganography: An Overview

• Steganos   – Covered + Graphien   – Writing• Art and Science of Information Hiding and

Transmission

• Goal: To conceal existence of message• A simple example:

 – Sure! Eat Truffles. Under pressure, that helpseveryone. Bread often makes brighter...

 – Sure! Eat Truffles. Under pressure, that helps

everyone. Bread often makes brighter...

Page 4: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 4/23

Steganography Copyright (c) 2005, T. Deepa 4

Agenda

Steganography: An Overview

Steganography over the ages

• Digital Steganography – Text

 – Images

 – Audio

 – Video

• Applications and Trends

Page 5: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 5/23

Steganography Copyright (c) 2005, T. Deepa 5

Steganography over the ages

• Ancient Times

 – Tattooed Heads

 – Wax-covered Tablets

 – Holed books

 – Hieroglyphics

 – Invisible inks

Page 6: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 6/23

Steganography Copyright (c) 2005, T. Deepa 6

• Middle Ages

 – Invisible inks

 – Steganographia 

 – Treatise by Bishop John Wilkins

 – Cardano Grille 

Steganography over the ages

Page 7: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 7/23

Steganography Copyright (c) 2005, T. Deepa 7

• Cardano Grille 

Steganography over the ages

Page 8: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 8/23

Steganography Copyright (c) 2005, T. Deepa 8

Steganography over the ages

• Modern Times

 – Invisible inks

 – Null Ciphers

• Jargon Codes

• Document Layouts 

 – Microdots

Microdot camera Mark IV 

Page 9: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 9/23

Steganography Copyright (c) 2005, T. Deepa 9

Agenda

Steganography: An Overview

Steganography over the ages

Digital Steganography – Text

 – Images

 – Audio

 – Video

• Applications and Trends

Page 10: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 10/23

Steganography Copyright (c) 2005, T. Deepa 10

Digital Steganography

Hide sensitive-information 

In cover-medium 

Combine with stego-system 

Result is stego- medium 

Page 11: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 11/23

Steganography Copyright (c) 2005, T. Deepa 11

Digital Steganography

• Text – Applying distortion techniques

• Image

 –  Manipulating the human mind’sperspective process

• Audio – Masking, Echo Hiding

• Video – Hiding data in “noise” from compression,

redundant data, or patterns in format

Page 12: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 12/23

Steganography Copyright (c) 2005, T. Deepa 12

Digital Steganography: Text

• Preexisting Text – Changing the formatting of an existing

text

 – Changing words within a text

• Generated Text

 – Generating random character sequences – Using context-free grammars to generate

readable texts

Page 13: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 13/23

Steganography Copyright (c) 2005, T. Deepa 13

Digital Steganography: Images

• Human brain cannot decipher nearlyidentical colors (Similarity)

• Missing portions are automatically

filled in (Closure)

(255,0,0)

(252,0,0)

(255,0,0)

(252,0,0)

Page 14: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 14/23

Steganography Copyright (c) 2005, T. Deepa 14

Digital Steganography: Images

• Lossless compression image stego-systems

 – BMP, GIF… 

• Binary Images

• Red Green Blue (RGB) Model – Least Significant Bit Insertion

• Lossy compression image stego-systems

 – JPEG

• Discrete cosine transformation

Page 15: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 15/23

Steganography Copyright (c) 2005, T. Deepa 15

Digital Steganography: Images

A 1k file embedded using F5 steganographytool Courtesy: LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS

by Krista Bennett 

Page 16: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 16/23

Steganography Copyright (c) 2005, T. Deepa 16

Digital Steganography: Images

Poor Cover-ImageGood Cover-Image

Courtesy: STEGANOGRAPHY PRIMER

By Computer Academic Background 

Page 17: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 17/23

Steganography Copyright (c) 2005, T. Deepa 17

Digital Steganography: Audio

• Techniques:

 – Masking

 – Adding noise to audible signal

 – Echo Hiding

• Relatively easier to detect

• Greater degradation in cover media

Page 18: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 18/23

Steganography Copyright (c) 2005, T. Deepa 18

Digital Steganography: Audio

Courtesy: LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS

by Krista Bennett 

A 13k audio file is embedded into a 168k .wavfile using Steganos 

Page 19: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 19/23

Steganography Copyright (c) 2005, T. Deepa 19

Digital Steganography: Video

• Visual Clues

 – Hand/Foot Positions

 – Eye-Blink Codes

• Digital data embedding

 – Video = Image + Audio

 – Large amounts of data can be hidden

Page 20: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 20/23

Steganography Copyright (c) 2005, T. Deepa 20

Agenda

Steganography: An Overview

Steganography over the ages

Digital Steganography

Text

Images

Audio

Video

Applications and Trends

Page 21: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 21/23

Page 22: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 22/23

Steganography Copyright (c) 2005, T. Deepa 22

Applications and Trends

• Steganography & Cryptography

 – Steganography  Cryptography

 – Cryptography: Make message unreadable

 – Steganography: Make message hidden

 – Cryptography + Steganography 

Page 23: Deepa T - Steganography

8/2/2019 Deepa T - Steganography

http://slidepdf.com/reader/full/deepa-t-steganography 23/23

Steganography Copyright (c) 2005, T. Deepa 23

Agenda

Steganography: An Overview

Steganography over the ages

Digital Steganography

Text

Images

Audio

Video

Applications and Trends