24
STEGANOGRAPHY IN IMAGES NIKHIL TRIPATHI 12MCMB10 M.Tech (IT)

Steganography in images

Embed Size (px)

DESCRIPTION

This presentation is based on the steganography techniques used with images.

Citation preview

Page 1: Steganography in images

STEGANOGRAPHY IN IMAGES

NIKHIL TRIPATHI12MCMB10M.Tech (IT)

Page 2: Steganography in images

OVERVIEWoSteganography DefinedoExamples in HistoryoDigital ApproachesoReasons For Using Digital ImagesoImage AttributesoPopular Techniques That Use ImagesoSteganalysisoAdvancements in image steganographyoTechnical limitations

Page 3: Steganography in images

STEGANOGRAPHY DEFINED

oGreek for “covered writing”.

o“The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”

Page 4: Steganography in images

EXAMPLES IN HISTORY

oTattoos on shaved headsoWax-covered tabletsoInvisible Inks - milk, fruit juice

Page 5: Steganography in images

STEGANOGRAPHY V/S CRYPTOGRAPHY

oSteganography involves the hiding of the data while Cryptography involves the encryption and decryption of data.

oSteganalysis involves finding out whether there is really a hidden message or not while Cryptanalysis involves breaking of the encrypted into decrypted message.

Page 6: Steganography in images

STEGANOGRAPHY with CRYPTOGRAPHY

oVery very strong when combined.

oA message sent in secret (steganography) in an encrypted form (cryptography) is much more secure than a "plain text" message sent by secret means or a clearly sent encrypted message.

Page 7: Steganography in images

DIGITAL APPROACHES

oToday, it often exists within digital formats.oIt makes use of seemingly innocent cover files such as text, audio, and image files.oThe embedded message may be anything that can be encoded in binary.

Page 8: Steganography in images

REASONS FOR USING DIGITAL

IMAGESoIt is the most widely used medium being used today.oTakes advantage of our limited visual perception of colors.oThis field is expected to continually grow as computer graphics power also grows.oMany programs are available to apply steganography.

Page 9: Steganography in images

IMAGE ATTRIBUTES

oDigital images are made up of pixels.o8-bit and 24-bit images are common.oThe larger the image size, the more information you can hide. However, larger images may require compression to avoid detection.

Page 10: Steganography in images

IMAGE-BASED TECHNIQUES

oLeast Significant Bit InsertionoMasking and Filtering

Page 11: Steganography in images

LSB INSERTIONoReplaces least significant bits with the message to be encoded.oMost popular technique when dealing with images.oSimple, but susceptible to lossy compression and image manipulation.

Page 12: Steganography in images

LSB - ExampleA sample raster data for 3 pixels (9 bytes)may be:

00100111 11101001 1100100000100111 11001000 1110100111001000 00100111 11101011

Inserting the binaryvalue for

A (10000001)

changes 4 bits

00100111 11101000 1100100000100110 11001000 1110100011001000 00100110 11101011

Page 13: Steganography in images

LSB Continued…

oBest to use a grayscale palette or one with gradual changes in shades.oOtherwise, it is best to use images with “noisy areas” – areas with ample color variation.

Page 14: Steganography in images

LSB - Uses

oStoring passwords and/or other confidential information.oCovert communication of sensitive data.

oSpeculated uses in terrorist activities.oBeing widely used to hide and/or transfer illegal content.

Page 15: Steganography in images

MASKING & FILTERING

oMasks secret data over the original data by changing the luminance of particular areas.oDuring masking, it embed the message within significant bits of the cover image.oNot susceptible to lossy techniques because image manipulation does not affect the secret message.

Page 16: Steganography in images

MASKING & FILTERING - Uses

oDigital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information.

o Fingerprinting – provides identification of the user; used to identify and track illegal use of content.

Page 17: Steganography in images

Visible Watermark - Example

Page 18: Steganography in images

STEGANALYSISFive classes of steganalysis: o Stego-onlyo Known-covero Known-messageo Chosen-stego ando Chosen-message

Page 19: Steganography in images

ADVANCEMENTSoUse of steganography for malwares to embed it in crafted HTML and JPEG files.e.g. Duqu worm (2011)oAccording to recent report(30th Jan, 2012), it will be used in android applications to send premium rates messages.oSelecting multiplayers’ games to use as a covert channel.oUse of private chat rooms as a carrier.oResearch are being done to practice steganography using a key not by using a method.

Page 20: Steganography in images

TECHNICAL CHALLENGES

Limitations due to these three properties which work in opposition to each other:-

oCAPACITY of the cover object.oUNDETECTABILITY of the stego-object.oROBUSTNESS of the stego-object.oStrength often depends on attackers not knowing how data could be hidden.

Page 21: Steganography in images

SUMMARYoSteganography as a whole has existed in many forms throughout much of history.oLossless compression of images with a great deal of color variation work best as a cover image to embed a message.oSteganography can be used as beneficial tool for privacy.oSteganography will work best if combined with cryptography.

Page 22: Steganography in images

REFERENCEShttp://www.youtube.com/watch?v=O

OY-lbDEmNM for techniques of steganographyCERIAS Steganography by John Oritz youtube videos.http://www.garykessler.net/library/st

eganography.htmlhttp://en.wikipedia.org/wiki/Digital_w

atermarkinghttp://www.youtube.com/watch?v=C

0T1MbrST5U for watermarking techniques.http://stegano.net

Page 23: Steganography in images

QUERIES ?

Page 24: Steganography in images

<THANK YOU>