steganography
play

Steganography Implementation & Detection Robert Krenn - PowerPoint PPT Presentation

Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography?


  1. Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004

  2. Overview ● What is steganography? ● Implementations ● Detection ● Defeating steganography ● Conclusion ● Questions

  3. What is steganography? Stega- covered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia”

  4. What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective

  5. What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ⇒ Secret inside

  6. What is steganography? What is it used for? ● Hiding the fact that you are sending messages ● Hiding several messages inside data ● Digital watermarking Kerckhoffs' principle ● Secure with knowlegde of the system ● Message can only be read with secret key

  7. What is steganography? Hiding several messages ● Deniable cryptography ● Knowledge of encrypted data ● No proof of how much information is stored ● Rubberhose (http://www.rubberhose.org)

  8. What is steganography? Digital watermarking ● Not really hiding information ● Important: not modificable ● Uses the hiding-property of steganography ● Recent: MPAA hides watermarks in movies

  9. Implementation Hiding information ● Text / Webpages ● Images ● Audio ● Video

  10. Implementation Text / Webpages ● Use of a codebook ● Layout of texts ● Every Nth character ● Use of whitespaces and newlines ● Can be difficult to detect and decode

  11. Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say

  12. Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say 06081913030629170827 ⇒ meet at dawn

  13. Implementation Images ● Cover image ● Identify redundant data ● Replace (a subset of) redundant bits with data

  14. Implementation Images ● JPEG uses discrete cosine transformations (DCT) ● Transform pixel blocks to DCT coefficients ● Get least significant bit of each DCT coefficient ● Replace LSB with secret message bit ● Insert modified DCT into output image

  15. Implementation Images Original image Data embedded inside

  16. Implementation Images ● JPEG stegencryption ● Operates in transformation space ● No visual changes ● GIF and BMP stegencryption ● Operates in low bit planes ● Subject to visual attacks

  17. Implementation Images Original image Data embedded inside

  18. Implementation Audio ● Use frequencies inaudible to humans ● Embed data using the LSB ● Encoding musical tones

  19. Implementation Video ● Visible signals (gestures, movements) ● Same techniques as with images ● Same techniques as with audio

  20. Detection Text ● Look for (disturbings of) patterns ● Odd use of language ● Line heights and whitespaces

  21. Detection Images ● Examine color palette ● Size of the image ● Differences: − Format − Last modified date

  22. Detection Images ● Statistical analysis ● Analyze frequency of DCT coefficients ● Entropy of redundant data − Hidden content ⇒ higher entropy

  23. Detection Images ● Apply filters to steganograms ● Visible representation of statistical data

  24. Detection Filtered Original image Embedded data

  25. Detection Filtered Original image Embedded data

  26. Detection Audio ● Statistical analysis ● Analyze patterns in background noise ● Distortions ● Measure inaudible frequencies

  27. Detection Video ● Look for distinguishing movements ● Same techniques as with images ● Same techniques as with audio

  28. Defeating steganography Text ● Change spacing, interpunction ● Modify line heights, layout ● Add or remove words

  29. Defeating steganography Images ● Compress with lossy compression ● Convert to different format ● Resize the image ● Modify colors

  30. Defeating steganography Audio ● Compress with lossy compression ● Change bitrate ● Alter / limit frequency spectrum

  31. Defeating steganography Video ● Same techniques as with images ● Same techniques as with audio

  32. Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult − Hard when valid to Kerckhoffs' principle ● Defeating steganography is not hard

  33. Steganography ● Questions?

  34. Steganography

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend