Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems
|
|
- Erica Barnett
- 6 years ago
- Views:
Transcription
1 Steganography John Von Dollen Ron Lepper Coen 150: Information Security Systems May 17, 2004
2 Abstract: While technology increases, the amount of privacy provided by simply encrypting a message decreases. So, the need for a more secure and private form of communication arises. One method that comes forth to provide a solution to this problem is steganography. This paper will introduce basic concepts of steganography, while discussing its positive and negative attributes. I. Introduction to Steganography Steganography, in short, is hiding information in another medium so that the information is both undetectable as well as unrecognizable. In this way, it may be right in front of a person and they would never guess its presence. Steganography has become more common with the advancements of technology and has taken on many forms, increasing its effectiveness. This effectiveness, combined with modern encryption algorithms makes a perfectly undetectable, undecipherable means of communication. Steganography, literally meaning covered writing, comes from the Greek words steganos, meaning covered, and graphia, meaning to write. The Ancient Greeks employed the first recorded use of steganography in history. They were known to use two different methods to hide messages. One method that has been discovered was to shave the head of the messenger and tattoo the message on his scalp, hiding it when his
3 hair grew back in, only to be shaved again when the message was delivered. Another method was to carve the message on a wood backing of a wax tablet and cover the tablet with a fresh layer of wax, so that the tablet was seemingly blank. Another method of steganography that has been used in the past was invisible ink. Messages could be written with inks made from onion juice or ammonia salts which could not be seen under a normal light but would glow when held over a flame. Message hiding always seems important in times of war, and was so in WWII, as the Germans used microdots, taking pictures of a message and shrinking them to the size of a period. German spies also hid messages by encoding messages within messages. One message that was actually sent was: Apparently neutral s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetables oils. Taking the second letter of each word in the message reveals the hidden message: Pershing sails from NY June 1. Now, with the rise in technology, computers are able to conceal messages. Now, people are able to use computers to hide messages in anything from picture to music to video files. In today s methods, the information is hidden in the least significant bits of the files to contain some message. By changing these bits, the actual file does not appear as if it changed at all, but now there is extra information that can be extracted if its presence is known. Such a change would be difficult to detect with the naked eye, so it
4 can be seen as a blessing to those who value privacy and a problem to those whose job it is to find secrets for the protection of others. II. A Discussion on Steganography Steganography is a very powerful means of message hiding, which, given the worlds current demand for information while requiring the maximum privacy to any and all people, means that it is the most secure method for communications. The boom of the internet has created a new demand for steganography. With new technological means of communications, most importantly the internet and s, the public demand for both security and privacy has lead to increased efforts in finding a more secure method for communicating. This demand has lead to increased research into the development of better steganographic methods for these communication mediums. The internet provides an entry point to a global network of information and communication from nearly anywhere in the world. In this way, it is the cheapest, easiest, most desirable means of both long distance and local communication available. Someone on the other side of the world can send you a message that you will receive nearly instantaneously for a reasonable price, creating a highly popular and demanded communications system. As with all means of communications, the parties doing the communicating wish for total security and privacy of their transactions. With digital communications, it is nearly impossible to tell if your communications have been intercepted by another party. Therefore, more and more and communications companies are turning to higher levels of encryption for their customers in the hope that
5 if the communications are intercepted, the intercepting party will not be able to read the contents of the message. Cryptography itself has come a long ways recently, jumping from encryption algorithms that would take months to break to algorithms that would take millions of years to break. However, some government security organizations, such as the NSA, want companies to create backdoors into their encryption algorithms so that they would be able to read any message they thought was a possible threat to national security. These security measures will never be implemented since this violates the privacy of all online communications, and if companies decided to follow through with these backdoors, they would undoubtedly lose their customers. Because of this, cryptography has been able to grow in strength and efficiency to such an extent that no one has a chance at cracking them without the use of a supercomputer which could still take years to crack the code. However, encryption still leaves some information to help crackers in their job: the encrypted file. It is only logical that if a person is intent on cracking an encrypted file they have in their possession, then time is their only opposition. With technology continually advancing, the processing speed of computers keeps getting faster, thus decreasing the time needed to crack the file. However, if the person does not have the encrypted file and instead must find it first, then this adds another layer of security, for if the person does not have the file, then they have to spend more time looking for it. Because steganography is the act of hiding information so that no one will find it, the attacker does not even know where to begin looking; the message could be hidden anywhere: in
6 another text document, in a picture, or even in a movie. This idea combined with the changing technology opens the doors for all sorts of hiding places for information. As previously stated, early forms of steganography were in physical form, meaning the information was hidden on some sort of tangible object such as a letter or even someone s head. Because of this, places to hide information were limited and, therefore, easy to check for. The digital age has generated a number of new areas in which to hide information, most of which are intangible and undetectable by the human eye, making it extremely hard to detect the presence of a piece of information hidden in digital media. For the people looking for a way to communicate secretly, especially on the internet, this method is perfect: not only can you encrypt your message using the best encryption algorithms available, but you can also hide the message in any number of files and formats. The need of detection of an actual file with extra information in it drastically decreases the probability that someone will be able to decrypt your communications. The advancement of the digital world has led to many new forms of mediums, and each medium requires a different algorithm to hide each file type inside of it. Most of the time, images are the desired files for hiding information. One reason for this is that not many people would expect to find any hidden information inside of a picture. Text is actually very easily hidden in a bitmap file because of the file format of bitmaps. The bitmap files actually contain the color of each pixel of the image in the form of a certain number of bits (depending on the compression and resolution desired of the image). So, if a pixel is white, its 8 byte representation would be FF FF FF FF FF FF 00 00, and black would be In this way, one could easily change the least significant bit of each pixel without changing the color noticeably. By changing each
7 pixel in succession this way to the binary representation of the message, one could successfully record a message in the pixels of the image without appearing to change the image or size of the file. Essentially, all digital files are made up of binary. It is no surprise that you could use an algorithm like the one in the previous example to hide a message in other digital mediums like videos or audio files. However, in order for the files to open and display properly in such a way that the file has not been altered, the algorithm needs to be changed. Altering the video file requires one to not noticeably change neither the audio nor the video quality. The most important part is to alter the file so that any normal human would not be able to notice the changes. This means that when hiding something in a video file, you must be certain that the changes do not affect the video quality enough to become noticeable to the human eye. In audio files, adding a message to the file sometimes creates a glitch in the sound. This is not a problem as long as the glitch is so minute that a human ear cannot detect the difference. These alterations are mostly performed in a method that will create the least amount of detection to increase their effectiveness. As soon as a newer, harder to detect algorithm is created, people try to figure out faster, cleverer ways of detecting these hidden files and messages, thus creating a continual demand for yet newer algorithms and methods of steganography. This demand, along with the demand for public privacy as we increase access to security products, has created many open source programs free to the public. As long as there is a demand for personal privacy, there will always be someone willing to create ways of obtaining it. Therefore, sites with steganographic knowledge and freeware will always be available to anyone with access to the internet.
8 While steganographic and cryptographic tools are available freely throughout the internet to the general public, it is also available to those with ill intentions. This creates a very dangerous threat since the communications method is nearly invisible as well as uncrackable given today s encryption and decryption methods. Not only can normal, upstanding citizens communicate privately without anyone knowing it, but so can criminals. The internet has created an endless galaxy of information and knowledge. Likewise, it has created an infinite amount of places to hide information, making it especially hard to trace any illegal communication. So, criminals of all sorts are able to utilize the internet to organize whatever type of criminal activity that they want. With steganography, they can do it with a small chance of being discovered. This can create a bit of a problem regarding national security. Those that desire to protect our country can tap phones and follow around suspicious characters, but, if people are able to hide secret messages out in the open, how are the authorities supposed to discover them or even attempt to stop the delivery of the message. Pictures or movie or audio files can all be posted on websites or message boards or in chat rooms. With this medium of communication, people can relay information covertly over public channels and have little chance of being detected. Government agencies cannot possibly scan all these public channels searching for hidden messages. First of all, there are probably not a high volume of hidden messages, so a lot of the searches would prove fruitless. Also, even if they were looking at the right sites, how would they know that they found a hidden message since they are undetectable by the naked eye? Even if they did find the message, how could they know who the message was going to since it was placed in a
9 public viewing area where everyone can see it? So, it seems that such a public display of confidential information would be an almost ideal method of communication. It seems though this might have already caused problems with national security. It is suspected that the terrorists involved with the terrorist attack on September 11 th were using steganographic methods to communicate blueprints and sensitive information to coordinate their attacks. The New York Time reported in October of 2001 that the Al Qaeda used steganographic techniques to encode messages in images and then sent via or placed in public sites, with ebay being one of the mentioned sites. The pictures would seem completely harmless on ebay, but, this article claimed that there were messages hidden in the bits of these images. These claims were never confirmed, but some feel that they were an attempt by U.S. politicians to have an excuse to restrict the use of encryption and steganographic software. The problem is that it is difficult to detect. If the government had a way to detect such messages, they feel that they could prevent such tragedies from occurring. But, how would they begin to look for such hidden messages? Steganalysis is the art of discovering such messages. If the original file and the embedded file are both known, then the discrepancy between the two is noticeable and can be studied to reveal patterns of certain steganographic software tools. Acquiring these patterns can help to detect the use of the software on other files and discover hidden messages. But, with the original and the embedded message, it is still not always easy to find the patterns or signatures that are left by certain software methods of steganography. The most popular form of steganography in pictures is to change the least significant bits (LSB). This method of hiding data can be easily detectable with a
10 program that analyzes the different colors that are present. In digital pictures, the number of unique colors is not nearly as high as the number of pixels in the picture. The ratio of unique colors to number of pixels can be anywhere from 1:2 in a high quality picture to 1:6 in lower quality pictures. Many true-color images would thus have a very small color palette. Knowing this and that steganographic methods normally change the least significant bits, an altered picture can be analyzed showing a number of close colors. The occurrence of too many close colors would indicate that least significant bit encoding in the image. While the difference may be detectable to the naked eye with a side by side of the two images, it would not be easy to detect without the original. Therefore, to discover such LSB encoding in pictures, the pictures could be analyzed in such a manner. But, since these pictures would be placed in public places, all pictures in all public sites and boards would be subject to investigation and it is just not realistically possible to examine all the pictures on the internet. But, the whole point of steganography is to be undetectable. Being able to find patterns would defeat the entire purpose of hiding the message in this manner. So, methods exist that make it extremely difficult to detect without having the original, unaltered file. Sometimes, though, the existence of a hidden message is known even if it is not known in what form the message is. In this case, rather than trying to find and uncover the message, it may be easier to just attempt to destroy the contents of the message. This can be done by compression techniques which could possibly render the hidden data useless. But, this would be a violation of the people s right of freedom of speech, destroying our lines of communication. So, this is where the dilemma arises.
11 What is more important: the privilege of freedom of speech or national security and the safety of the country? III. Summary So, it seems there are the good and bad of steganography. The clear positive aspect of message hiding is the increased privacy that such a device can provide. An encrypted message hidden is a picture is more secure and harder to uncover than simply encrypting a message. While the message will be difficult to decrypt, it is clearly encrypted and could contain some secrets that people may want to uncover. But, an encrypted message hidden in a picture or a song is difficult to detect and then also difficult to decrypt even if detected. So, it adds that extra layer of protection and privacy to those who take advantage of it. On the other hand, it is another way for people to carry on illegal endeavors. With such methods to pass on information, secret communication can occur between criminals or terrorist groups that could threaten people s safety. Should steganography software continue to be allowed or should such practices be restricted to allow for a possibly safer environment? First of all, restricting a person s right to privacy seems like a direct violation of the first amendment, freedom of speech. This strikes at what is considered a basic human right. But, is it worth our safety? Even without steganographic software to hide messages, people who would feel some need to communicate covertly will find a way. There always seems to be another way. So, if the authorities attempted to stop steganography, some other way to secretly exchange messages will be developed.
12 While this sounds threatening, it is the truth. There will always be a demand for means of private communication, and steganography so far has been the most secure and effective method. The United States Constitution was created with the idea that government s power should be limited. The government s attempt to monitor peoples communications by installing backdoors into encryption and steganographic programs is a direct violation of this limitation of power since it infringes upon peoples rights for personal privacy. Even if the U.S. limited or banned the research or usage of steganography and cryptography, it would be used elsewhere throughout the world. In fact, I think it s safe to presume that the U.S. would fall behind in its research and development in these areas, drastically hurting and limiting our national security. Leaving steganography and cryptography open to the public s research and scrutiny is a good idea as the fields will continually grow in complexity and efficiency, and this way, even the U.S. will be able to benefit by staying in the front lines of research and development.
13 References Fridrich, J., R. Du and M. Long, "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City, July 31-August 2, New York, USA, Johnson, Neil F. ; Steganalysis - Attacks against Steganography and Watermarking Countermeasures ; Johnson, N. F. and S. Jajodia, "Steganalysis: The investigation of Hidden Information", IEEE Information Technology Conference, Syracuse, NY, USA, 1-3 September Petitcolas, Fabien A.P. ; the information hiding homepage digital watermarking & steganography; Radcliff, Deborah; Steganography: Hidden Data, Steganography. Symantec ; Steganography: High-Tech Hidden Messages ; April 30, 2002 ; Article 1314; Tran, Tu ; Steganography : The Art of Hiding Data ;
Steganography and Steganalysis
Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and
More informationDIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography
More informationIntroduction to Steganography
POLYTECHNIC UNIVERSITY Department of Computer and Information Science Introduction to Steganography K. Ming Leung Abstract: This material deals with the history and an introduction to the art and science
More informationA Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University
A Study Of Steganography 1 STEGANOGRAPHY STUDY A Study Of Steganography And The Art Of Hiding Information Alain C. Brainos II East Carolina University A Study Of Steganography 2 Abstract The recently created
More informationClemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu
Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information
More informationSTEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?
Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationSteganography Workshop
Steganography Workshop About the Speaker 2 20 books (Including 3 on forensics, 5 on computer security, 1 on cryptology) 40 industry certifications Member of the American College of Forensic Examiners Diplomat
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationSTEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE
STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE Joseph Dedy Irawan Informatics Engineering, Industrial Technology Faculty, Institut Teknologi Nasional Malang Jalan Raya Karangploso KM 2 Malang Email: joseph_dedy@yahoo.co.id
More informationSteganography: A Security Model for Open Communication
Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationAnalysis of Steganography as a Security Technique
Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationInformation Hiding in BMP image Implementation, Analysis and Evaluation
Èíôîðìàöèîííûå ïðîöåññû, Òîì 6, 1, 2006, ñòð. 110 c 2006 Alkhraisat Habes. INFORMATION TRANSMISSIONS IN COMPUTER NETWORKS Information Hiding in BMP image Implementation, Analysis and Evaluation Alkhraisat
More informationSeminar report Steganography
A Seminar report on Steganography Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationImage Analysis for Online Dynamic Steganography Detection
Vol. 1, No. 3 Computer and Information Science Image Analysis for Online Dynamic Steganography Detection Kevin Curran & Joanne Mc Devitt Intelligent Systems Research Centre Faculty of Engineering University
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationCLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment
CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which
More informationTopics. Number Theory Review. Public Key Cryptography
Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review
More informationOutline More Security Protocols CS 239 Computer Security February 4, 2004
Outline More Security Protocols CS 239 Computer Security February 4, 2004 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication
More informationSecured Way of Ciphering Text Using Audio Steganography
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationOutline Basics of Data Encryption CS 239 Computer Security January 24, 2005
Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data
More informationChapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change
Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationONLINE SAFETY. Messaging, , Vlogging and Sexting
ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.
More informationComparative Analysis of Different Transformation Techniques in Image Steganography
Comparative Analysis of Different Transformation Techniques in Image Steganography Sourav Kumar Kamila (111CS0127) Department of Computer Science and Engineering National Institute of Technology Rourkela
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING
More informationOutline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange
Outline More Security Protocols CS 239 Security for System Software April 22, 2002 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and
More informationCS 595: Cryptography Final Project
CS 595: Cryptography Final Project Tim Wylie December 7, 2009 Project Overview I have implemented a basic covert multi-party communication instant messaging program. The users can communicate with any
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationCollege of Engineering, Pune Shivajinagar, Pune
College of Engineering, Pune Shivajinagar, Pune 411005 Department of Computer Engineering and Information Technology SEMINAR REPORT ON GUIDED BY Prof. S. U. Ghumbre Presented By Tumma Ashwin 30808010 T.
More informationProf.(Dr.) J. K. Mandal
Information Security Prof.(Dr.) J. K. Mandal Ex-Dean, Faculty of Engineering, Technology & Management Professor & Head, Department of Computer Science & Engineering University of Kalyani Kalyani, Nadia,
More informationImage Steganography by Mapping Pixels to Letters
Journal of Computer Science 5 (1): 33-38, 2009 ISSN 1549-3636 2009 Science Publications Image Steganography by Mapping Pixels to Letters Mohammed A.F. Al-Husainy Department of Computer Science, Faculty
More informationOutline More Security Protocols CS 239 Computer Security February 6, 2006
Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationCryptography. What is Cryptography?
Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used
More informationSteganalysis Techniques: A Comparative Study
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationSE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction
SE 4C03 Winter 2004 Steganography Derek Lunn (9943193) Last Revised: April 6th 2004 Introduction Steganography is a means of hiding information in a carrier medium. Although the concept itself is not new,
More informationPrinciple of Graph Theoretic Approach to Digital Steganography
Computing For Nation Development, February 26 27, 2009 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Principle of Graph Theoretic Approach to Digital Steganography Vinay
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationCryptography Lesson Plan
Cryptography Lesson Plan Overview - Cryptography Summary There is a large amount of sensitive information being stored on computers and transmitted between computers today, including account passwords,
More informationActivity Guide - Public Key Cryptography
Unit 2 Lesson 19 Name(s) Period Date Activity Guide - Public Key Cryptography Introduction This activity is similar to the cups and beans encryption we did in a previous lesson. However, instead of using
More informationCryptography: Matrices and Encryption
Cryptography: Matrices and Encryption By: Joseph Pugliano and Brandon Sehestedt Abstract The focus of this project is investigating how to generate keys in order to encrypt words using Hill Cyphers. Other
More informationSecurity Using Digital Signatures & Encryption
Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right
More informationNetwork Working Group Request for Comments: 1984 Category: Informational August 1996
Network Working Group IAB Request for Comments: 1984 IESG Category: Informational August 1996 IAB and IESG Statement on Cryptographic Technology and the Internet Status of This Memo This memo provides
More informationInformation Flow Control and Privacy. Dennis Chen Ming Chow
Information Flow Control and Privacy Dennis Chen Dennis.Chen@tufts.edu Ming Chow Abstract With the rise of technology and the worry of protecting private user information, a new security practice must
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationSmart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5
More informationLecture Notes 20 : Smartcards, side channel attacks
6.857 Computer and Network Security November 14, 2002 Lecture Notes 20 : Smartcards, side channel attacks Lecturer: Ron Rivest Scribe: Giffin/Greenstadt/Plitwack/Tibbetts [These notes come from Fall 2001.
More informationOverview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks
Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationWaiter! There s a Message in My Soup! Uncovering Steganography. Adventures in Supercomputing Challenge Final Report April 2, 2003
Waiter! There s a Message in My Soup! Uncovering Steganography Adventures in Supercomputing Challenge Final Report April 2, 2003 Team #022 Bosque School Team Members Samuel R. Ashmore Jessica E. Behles
More informationIntroduction to Cryptography in Blockchain Technology. December 23, 2018
Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography
More informationEADS up. stop think connect
EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through
More informationPerformance Evaluation of LSB based Steganography for optimization of PSNR and MSE
Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationSecret Communication through Audio for Defense Application
Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in
More information[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-
Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating
More informationA GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING
A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at
More informationOnline Payment System Using Steganography and Visual Cryptography
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 391-402 Online Payment System Using Steganography and Visual Cryptography T. Venu Gopal Associate
More informationCS61A Lecture #39: Cryptography
Announcements: CS61A Lecture #39: Cryptography Homework 13 is up: due Monday. Homework 14 will be judging the contest. HKN surveys on Friday: 7.5 bonus points for filling out their survey on Friday (yes,
More informationFACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:
FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,
More informationLecture 1: Perfect Security
CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave
More informationCCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and
More informationSteganalysis of Hydan
Steganalysis of Hydan Jorge Blasco 1, Julio C. Hernandez-Castro 1, Juan M.E. Tapiador 1 Arturo Ribagorda 1 and Miguel A. Orellana-Quiros 2 1 {jbalis, jcesar, jestevez, arturo}@inf.uc3m.es 2 mangel.orellana@meh.es
More informationOPEN THE HOTLINE CLIENT
OPEN THE HOTLINE CLIENT Everything in the Hotline universe starts with the Client Toolbar; it launches all of the Client s major functions. 1 Double-click the Hotline icon on your desktop. The Hotline
More informationYammer Product Manager Homework: LinkedІn Endorsements
BACKGROUND: Location: Mountain View, CA Industry: Social Networking Users: 300 Million PART 1 In September 2012, LinkedIn introduced the endorsements feature, which gives its users the ability to give
More informationImproved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal
Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Abstract- Computer Technology and the Internet have made a breakthrough in the existence of data communication.
More informationEXERCISE 3: THE CIPHER
CSCE 230 - Computer Organization EXERCISE 3: THE CIPHER Assigned: Saturday, October 3, 2015 Due: Fridays, October 9 and 16 OBJECTIVES The objectives of this exercise: Computational: o Learning about the
More informationINSPIRE and SPIRES Log File Analysis
INSPIRE and SPIRES Log File Analysis Cole Adams Science Undergraduate Laboratory Internship Program Wheaton College SLAC National Accelerator Laboratory August 5, 2011 Prepared in partial fulfillment of
More informationSending secret messages with cryptography. An activity by the Australian Computing Academy
Sending secret messages with cryptography An activity by the Australian Computing Academy The activity uses ciphers to encode and decode secret messages. Activity overview What s it all about? By following
More informationFirewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003
Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationEXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE
EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE Why you need to use sandboxing as well as signatures and heuristics Abstract Next-gen firewalls leverage signatures and heuristics
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationIn 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.
Statistical Steganalysis CHAPTER. INTRODUCTION. Steganography Steganography is an art of secret communications. Its main purpose is to hide the occurrence of communication over a public channel. In contrast
More informationIntroduction to Cryptography and Security Mechanisms. Abdul Hameed
Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationNew Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)
New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -
More informationWHITEPAPER. Vulnerability Analysis of Certificate Validation Systems
WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationOutline Key Management CS 239 Computer Security February 9, 2004
Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationIntroducing Image Steganography in Bangla Language Communication
Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,
More informationViability of Cryptography FINAL PROJECT
Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The
More informationComparision in cover media under Stegnography Digital media by Hide and Seek Approach
Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India Abstract:-Although every people have secrets
More informationThe Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science
The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.
More information