Steganography: Santosh Kumar 1ve03ec053
Steganography: Santosh Kumar 1ve03ec053
Presented by
Outline
What is steganography? Traces in history. Modern day applications. Basic Principle of steganography. Steganography techniques. Steganalysis & its Tools. Conclusion & References.
What is Steganography ?
Steganography is the practice of hiding a secret message into another message in a manner such that to the casual observer it is unseen. The word Steganography in Greek steganos , meaning covered or secret, and graptos , meaning writing.
HISTORY
Usage of Steganography can be traced back to around 440 B.C Existed in different forms and media Tatoos on scalp Dots on top of i and j Deliberate misspellings or Error
Steganography
technical
Open codes
linguistic
Semagrams
An example of an semagrams
Hiding copyright info: digital watermarks fingerprinting (growing due to web piracy)
Key
Key
Cover
Cover *
emb
Stego
emb*
Recipient
The Stegosystem
STEGANOGRAPHIC TECHNIQUES
Steganography In Images
Steganography In Documents
Steganography In Audio Steganography In Video
Steganography in images
Way images are stored:
Digital image are stored in either 24-bit or 8bit pixel files 24-bit image are large & not ideal for internet uses
Stored in image ?
There are 8 bits in each pixel
The four bits to the left are the most significant bits (MSB)
Embedding a
00100110
00100110 11001000
11101001
11001000 00100111
11001001
11101000 11101001
Red
Green
Blue
The Stegosystem
Changes to the MSB will result in a drastic change in the color and image quality
Steganography In Documents
Adding white space and tabs to the ends of the lines of a document. Within these spaces and tabs lie the pieces that make up the secret message. This type of Steganography is extremely effective
SOFTWARE
The most popular piece of software used to perform this type of Steganography is piece called SNOW.
(Steganographic nature of Whitespace) A unique steganographic tool that it relies on whitespace and tabs.
SNOW
Example of Snow: For this example the following files will be used: insnow.txt = this is the secret file to conceal hide.txt = this is the infile (cover file) outsnow.txt = this is the outfile (cover file + secret file) Miss = this is the password used for encryption/decryption.
To hide insnow.txt within hide.txt using encryption with the output of outsnow.txt: snow p Miss f insnow.txt hide.txt outsnow.txt
MISS
MISS
Steganalysis
The art of detecting Steganography
Steganalysis involves detecting the use of Steganography inside of a file & reading the embedded message The hidden message may be extracted or the image is modified in a way so that the message is destroyed but image quality is unaffected
carriers
Steganalysis Tools
S-Tools
Ability to hide files within BMP, GIF files
http://members.tripod.com/steganography/stego/software.html
Conclusion
Steganography detection very difficult.
Steganography has its place in the security. On its own, it wont serve much but when used as a layer of cryptography, it would lead to a greater security The question you really should be asking is, is it used by Terrorists?
References
Information Security Website http://www.infosyssec.com/infosyssec/stendig1.htm Steganography Tools http://www.infoanarchy.org/wiki/index.php/Stenogra phy Digital Steganography http://www.cc.gatech.edu/classes/AY2003/cs6262_f all/digital_steganography.pdf