Steganography Implementation & Detection Robert Krenn - - PowerPoint PPT Presentation

steganography
SMART_READER_LITE
LIVE PREVIEW

Steganography Implementation & Detection Robert Krenn - - PowerPoint PPT Presentation

Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography?


slide-1
SLIDE 1

Robert Krenn rkrenn@xidc.nl January 21, 2004

Steganography

Implementation & Detection

slide-2
SLIDE 2

Overview

  • What is steganography?
  • Implementations
  • Detection
  • Defeating steganography
  • Conclusion
  • Questions
slide-3
SLIDE 3

What is steganography?

Stega-

covered, from the Greek “stegos” or roof

  • nography

writing, from the Greek “graphia”

slide-4
SLIDE 4

What is steganography?

  • The art of hiding information inside information

Since everyone can read, encoding text in neutral sentences is doubtfully effective

slide-5
SLIDE 5

What is steganography?

  • The art of hiding information inside information

Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective

⇒ Secret inside

slide-6
SLIDE 6

What is steganography?

What is it used for?

  • Hiding the fact that you are sending messages
  • Hiding several messages inside data
  • Digital watermarking

Kerckhoffs' principle

  • Secure with knowlegde of the system
  • Message can only be read with secret key
slide-7
SLIDE 7

What is steganography?

Hiding several messages

  • Deniable cryptography
  • Knowledge of encrypted data
  • No proof of how much information is stored
  • Rubberhose (http://www.rubberhose.org)
slide-8
SLIDE 8

What is steganography?

Digital watermarking

  • Not really hiding information
  • Important: not modificable
  • Uses the hiding-property of steganography
  • Recent: MPAA hides watermarks in movies
slide-9
SLIDE 9

Implementation

Hiding information

  • Text / Webpages
  • Images
  • Audio
  • Video
slide-10
SLIDE 10

Implementation

Text / Webpages

  • Use of a codebook
  • Layout of texts
  • Every Nth character
  • Use of whitespaces and newlines
  • Can be difficult to detect and decode
slide-11
SLIDE 11

Implementation

Text / Webpages

In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say

slide-12
SLIDE 12

Implementation

Text / Webpages

In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say 06081913030629170827 ⇒ meet at dawn

slide-13
SLIDE 13

Implementation

Images

  • Cover image
  • Identify redundant data
  • Replace (a subset of) redundant bits with data
slide-14
SLIDE 14

Implementation

Images

  • JPEG uses discrete cosine transformations (DCT)
  • Transform pixel blocks to DCT coefficients
  • Get least significant bit of each DCT coefficient
  • Replace LSB with secret message bit
  • Insert modified DCT into output image
slide-15
SLIDE 15

Implementation

Images

Original image Data embedded inside

slide-16
SLIDE 16

Implementation

Images

  • JPEG stegencryption
  • Operates in transformation space
  • No visual changes
  • GIF and BMP stegencryption
  • Operates in low bit planes
  • Subject to visual attacks
slide-17
SLIDE 17

Implementation

Images

Original image Data embedded inside

slide-18
SLIDE 18

Implementation

Audio

  • Use frequencies inaudible to humans
  • Embed data using the LSB
  • Encoding musical tones
slide-19
SLIDE 19

Implementation

Video

  • Visible signals (gestures, movements)
  • Same techniques as with images
  • Same techniques as with audio
slide-20
SLIDE 20

Detection

Text

  • Look for (disturbings of) patterns
  • Odd use of language
  • Line heights and whitespaces
slide-21
SLIDE 21

Detection

Images

  • Examine color palette
  • Size of the image
  • Differences:

− Format − Last modified date

slide-22
SLIDE 22

Detection

Images

  • Statistical analysis
  • Analyze frequency of DCT coefficients
  • Entropy of redundant data

− Hidden content ⇒ higher entropy

slide-23
SLIDE 23

Detection

Images

  • Apply filters to steganograms
  • Visible representation of statistical data
slide-24
SLIDE 24

Detection

Filtered

Original image Embedded data

slide-25
SLIDE 25

Detection

Filtered

Original image Embedded data

slide-26
SLIDE 26

Detection

Audio

  • Statistical analysis
  • Analyze patterns in background noise
  • Distortions
  • Measure inaudible frequencies
slide-27
SLIDE 27

Detection

Video

  • Look for distinguishing movements
  • Same techniques as with images
  • Same techniques as with audio
slide-28
SLIDE 28

Defeating steganography

Text

  • Change spacing, interpunction
  • Modify line heights, layout
  • Add or remove words
slide-29
SLIDE 29

Defeating steganography

Images

  • Compress with lossy compression
  • Convert to different format
  • Resize the image
  • Modify colors
slide-30
SLIDE 30

Defeating steganography

Audio

  • Compress with lossy compression
  • Change bitrate
  • Alter / limit frequency spectrum
slide-31
SLIDE 31

Defeating steganography

Video

  • Same techniques as with images
  • Same techniques as with audio
slide-32
SLIDE 32

Conclusion

  • Hide data practically everywhere
  • Detection of steganography

− Possible, but can be difficult − Hard when valid to Kerckhoffs' principle

  • Defeating steganography is not hard
slide-33
SLIDE 33

Steganography

  • Questions?
slide-34
SLIDE 34

Steganography