0% found this document useful (0 votes)
3 views

Openpuff_lecture_Introduction_to_steganography

Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Openpuff_lecture_Introduction_to_steganography

Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

INTRODUCTION TO STEGANOGRAPHY

BSIT-7th
Instructor: Inam Ul Haq
[email protected]

Steganography, Network Security, University of Okara


TABLE OF CONTENT
Information Hiding
Steganography
History
Fields applied to Information Hiding
Basic Terminologies
Steganalysis
Some Applications
Some Tools
Steganography Techniques

Steganography, Network Security, University of Okara


INFORMATION HIDING

F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE,


special issue on protection of multimedia content, 87(7):1062-1078, July 1999

Steganography, Network Security, University of Okara


INFORMATION HIDING
Information Hiding is a branch of computer science that deals
with concealing the existence of a message
It is related to cryptography whose intent is to render messages
unreadable except by the intended recipients
It employs technologies from numerous science disciplines:
• Digital Signal Processing (Images, Audio, Video)
• Cryptography
• Information Theory\Coding Theory
• Data Compression
• Human Visual/Auditory perception
There are four primary sub-disciplines of Information Hiding
• Steganography
• Watermarking
• Covert Channels
• Anonymity

Steganography, Network Security, University of Okara


STEGANOGRAPHY
Steganography means “covered writing”
• A Greek word steganos means covered, protected or concealed
Definition: It is concealing any file, image, audio or video within
another file.
Most frequently, steganography is applied to images, but many
other data or file types are possible
• Audio
• Video
• Text
• Executable programs
• Links

Steganography, Network Security, University of Okara


HISTORY
The concept of message hiding is not new – it’s been around for
centuries
• A Greek shaved the head of a slave, wrote a message, then
waited for the hair to grow back before sending the slave to his
destination
• Steganography (in the form of invisible ink) was used by
Washington in the Revolutionary War
• Prior to the Civil War, quilts were sewn with special patterns to tell
escaping slaves which direction to go and what to do
• In the 1980’s, some of Margaret Thatcher’s cabinet documents
were leaked to the press. She ordered that the word processors
being used by government employees, encode their identity in the
word spacing of the documents

Steganography, Network Security, University of Okara


FIELDS APPLIED TO INFORMATION
HIDING
Information Theory/Coding Theory
Digital Signal Processing
• Discrete Fourier Transform/Discrete Cosine Transform
• Image/Audio/Video Processing
Data Compression
Cryptographic Principles
Discrete Math
Cryptographic Hashing
Data Networks
The Human Visual System/Human Auditory System
• Capabilities and limitations

Steganography, Network Security, University of Okara


BASIC TERMINOLOGY
The data to be hidden:
• Plaintext / Secret message / Stego-message / Embedded data
The data which will have a stego-message embedded in it:
• Covertext / Cover-Object /
• Cover-Image\Cover-Audio\Cover-Video
• Target file
The key used to make the stego-message secure
• Stego-Key / Secret Key / Key
The file with the steganography-message embedded
• Stegotext / Stego-Object /
• Stego-Image\Stego-Audio\Stego-Video

Steganography, Network Security, University of Okara


WATERMARKING
Watermarking is very similar to steganography in that one of its
goals is to not be detected
It’s primary goal is to not be able to be extracted or destroyed (at
least not without destroying the cover too)
Typically, watermarking is designed to protect intellectual property
rights for images, sounds, and video
• If it’s easily removed or destroyed, those rights cannot be protected
• There is a popular program called StirMark which does just that
• Make it tamper proof

ANONYMITY
Anonymity is about concealing the sender and receiver of messages
and this is the least studied sub-discipline of information hiding

Steganography, Network Security, University of Okara


STEGANALYSIS
Steganalysis is the detection of data that has been hidden
It is a cat and mouse game – as one group of researchers come
up with better ways to hide stuff, another group figures out how to
detect it or perhaps just destroy it

Steganography, Network Security, University of Okara


APPLICATIONS OF INFORMATION
HIDING
Covert military communications
Covert police communications
• Criminals have learned that police are nearby when they hear
encrypted communications, so they reduce their activity for the
moment
• A steganographic system would prevent this detection
Digital Rights Management – protecting intellectual property such
as images, music, electronic books, etc.
Embedding textual data in medical images would better ensure that
the picture belongs to a particular patient
• This technique could apply to personal pictures, sounds, and
movies
Tamper proofing – ensuring a data file has not been changed

Steganography, Network Security, University of Okara


STEGANOGRAPHY TOOLS
1. Anubis
2. BMP Secrets
3. DarkCryptTC
4. OpenPuff
5. OpenStego
6. StegFS
7. StegoShare
Other tools:
https://en.wikipedia.org/wiki/Steganography_tools
12 best steganography tools:
http://www.topbestalternatives.com/best-steganography-
software/

Steganography, Network Security, University of Okara


STEGANOGRAPHY TOOLS (CONTT.)

StegoShare allows embedding of large files into multiple images

Steganography, Network Security, University of Okara


STEGANOGRAPHY TOOLS (CONTT.)

Free tool that implements three layers of hidden data

Steganography, Network Security, University of Okara


STEGANOGRAPHIC TECHNIQUES -
SUBSTITUTION
The most common method is to replace the Least Significant Bit
(LSB) in substitution
RSA Algorithm
Hash LSB
DEF CON 16
See other techniques:
https://pdfs.semanticscholar.org/8946/d2ea49e2ca7c53c157bfe09c2b656fc841ce.p
df

Steganography, Network Security, University of Okara


EXERCISE
1- What is covert Channel?
2- Write a detail note on Anonymity.
3- Watermarking
4- Fingerprinting
5- Explore StirMark
6- What are different steganographic techniques?
7- Can you embed secret message into image?

Steganography, Network Security, University of Okara

You might also like