22
Steganogra phy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Embed Size (px)

Citation preview

Page 1: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

1

Steganography

By :Uday Deep Singh (IT-2 / 7th Sem)

“The Art Of Hiding Content In Images”

Page 2: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

2

Discussion

• What steganography essentially is ?• How it works ?• Feasibility and constraints.• Present day implementations.

Page 3: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

3

What is it ?

• Practice of hiding private or sensitive information within something that appears ordinary.

• Name derived from greek words• “steganos” meaning “cover”• “graphia” meaning “writing”

• Lesser known elder brother of cryptography

Page 4: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

4

Basic terms

• Carrier/ Cover File – File which has hidden information inside of it.

• Steganalysis – Process of detecting hidden information inside of a file.

• Redundant Bits – Information that can be expended

• Payload – Information which is to be concealed.

Page 5: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

5

Steganography Carrier files

• bmp• jpeg• gif• wav• mp3• mpeg• Amongst others…

Page 6: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

6

Basic Model of Steganography

Encoder

Decoder

Cover Image

Secret Data

Key

Stego Object

Original Cover

SecretData Communications

Channel

Page 7: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

7

Basic Types of steganography

• Substitutional Steganography • Elements of the redundant covering medium are

substituted by the elements of the stego medium.

• Selecting Steganography• Elements of the covering medium are selected to carry

the hidden information.• The relevant information is hidden in a narrow-band

region of a wide band noise.

• Constructional Steganography• The Stego message is made similar to the structure of the

covering medium.

Page 8: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

8

Techniques of steganography

• Altering LSB (most commonly used)• Masking• Filtering• Transformations

Page 9: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

9

Altering LSB

• Uses LSB of each pixel in the image• Neccessary to use a lossless

compression format• A 24 bit color image, 3 bits (one each

from RGB) available for each pixel• So, a 800 × 600 pixel image supports

180.000 bytes of secret data

Page 10: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

10

Altering LSB

For example, (00100111 11101001 11001000)(00100111 11001000 11101001)(11001000 00100111 11101001)

When the character A (10000001), is inserted, the followinggrid results:

(00100111 11101000 11001000)(00100110 11001000 11101000)(11001000 00100111 11101001)

Page 11: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

11

Masking and Filtering• Use luminence part of image• Suitable for compression• Robust and efficient

Transformations• Direct Cosine Transform is applied to

8x8 blocks• Complex to create and decode

Page 12: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

12

Feasibility and Constraints

• Visual percievable differences• Amount of data that can be hidden• Vulnerabilty

Page 13: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

13

Visual percievable differences

• Type of cover image e.g. grids• Size of hidden data• Type of hidden data and the bits it is

dedicated

Cover Image Hidden Image ( Originals )Cover Image Hidden Image

(7 bits) (1 bit)Cover Image Hidden Image

(4 bits) (4 bits)Cover Image Hidden Image

(1 bit) (7 bits)

5 % text 20 % text

Page 14: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

14

Amount of Hidden Data

• Depends on number of bits being distorted in the spatial domain

• Tradeoff between space available and visual difference• Proportional to the enclosed spaces availaible

Default1 Bit2 Bits3 Bits4 Bits5 Bits6 Bits7 Bits8 Bits

Page 15: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

15

LSB hiding in 24 bit bmp picture

• Sufficient space available for most purposes

After stegno ( contains 4862 hidden letters)Original

Original Containing hidden information

Bitmap 308 614 bytes 308 614 bytes

JPG 21 795 bytes 21 952 bytes

Page 16: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

16

Applications

• Security implementations• Digital Watermarking• Storing content metadata

Page 17: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

17

Security implementations

• Better than cryptography as it doesn’t attract any suspicion

• Posting secret communications on the Web to avoid transmission

• Hiding data on the network in case of a breach

Page 18: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

18

Digital Watermarking

• Copyright protection• Link to owner’s webite to buy product• Broadcast monitoring• Source tracking• Covert communication

Page 19: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

19

Storing content metadata

• Data can be stored as XML, Exif, XMP, PLUS etc

• Used to store date photo taken, location, camera info, exposure

• Keywords help in searching for images• Geotagging allows better sorting

Page 20: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

20

Threatening Implementations• Covert and subversive operations• Terrorism• Weapons and narcotics traffickers• Money laundering• Insider stock trading• People who want to circumvent

encryption export rules.

Page 21: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

21

Tools

• Steganos• S-Tools (GIF, JPEG)• StegHide (WAV, BMP)• Invisible Secrets (JPEG)• JPHide• Camouflage• Hiderman

Many others…

Page 22: Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1

Steganography

22

References

• http://www.computerworld.com/s/article/71726/Steganography_Hidden_Data

• Paper on Information hiding by Soldatov Nikolay• Paper on Steganography, Steganalysis, &

Cryptanalysis by Michael T. Raggo, CISSP, Principal Security Consultant, VeriSign

• Case Study: An Implementation of a Secure Steganographic System by Xuan-Hien Dang and Krishna C. S. Kota

• http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677