Cryptographic Steganography
CSM25 Secure Information Hiding Dr Hans Georg Schaathun
University of Surrey
Spring 2007
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 1 / 27
Cryptographic Steganography CSM25 Secure Information Hiding Dr Hans - - PowerPoint PPT Presentation
Cryptographic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2007 Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 1 / 27 Learning Outcomes be able to apply cryptographic
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 1 / 27
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 2 / 27
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 3 / 27
The security model Overview and example
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 4 / 27
The security model Overview and example
1
2
3
4
5
6
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 5 / 27
The security model Overview and example
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 6 / 27
The security model Overview and example
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 7 / 27
The security model Overview and example
1
2
3
4
5
6
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 8 / 27
The security model Overview and example
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 9 / 27
The security model Overview and example
1
2
3
4
5
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 10 / 27
The security model Key features
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 11 / 27
The security model Key features
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 12 / 27
The security model Security definition
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 13 / 27
The security model Security definition
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 14 / 27
The security model Security definition
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 15 / 27
The security model Security definition
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 16 / 27
A cryptographic stego-system Overview
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 17 / 27
A cryptographic stego-system Overview
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 18 / 27
A cryptographic stego-system Overview
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 19 / 27
A cryptographic stego-system Algorithm
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 20 / 27
A cryptographic stego-system Algorithm
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 21 / 27
A cryptographic stego-system Algorithm
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 22 / 27
A cryptographic stego-system Algorithm
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 23 / 27
A cryptographic stego-system Potential issues
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 24 / 27
A cryptographic stego-system Potential issues
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 25 / 27
Exercises
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 26 / 27
Exercises
Dr Hans Georg Schaathun Cryptographic Steganography Spring 2007 27 / 27