Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems

Size: px
Start display at page:

Download "Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems"

Transcription

1 Steganography John Von Dollen Ron Lepper Coen 150: Information Security Systems May 17, 2004

2 Abstract: While technology increases, the amount of privacy provided by simply encrypting a message decreases. So, the need for a more secure and private form of communication arises. One method that comes forth to provide a solution to this problem is steganography. This paper will introduce basic concepts of steganography, while discussing its positive and negative attributes. I. Introduction to Steganography Steganography, in short, is hiding information in another medium so that the information is both undetectable as well as unrecognizable. In this way, it may be right in front of a person and they would never guess its presence. Steganography has become more common with the advancements of technology and has taken on many forms, increasing its effectiveness. This effectiveness, combined with modern encryption algorithms makes a perfectly undetectable, undecipherable means of communication. Steganography, literally meaning covered writing, comes from the Greek words steganos, meaning covered, and graphia, meaning to write. The Ancient Greeks employed the first recorded use of steganography in history. They were known to use two different methods to hide messages. One method that has been discovered was to shave the head of the messenger and tattoo the message on his scalp, hiding it when his

3 hair grew back in, only to be shaved again when the message was delivered. Another method was to carve the message on a wood backing of a wax tablet and cover the tablet with a fresh layer of wax, so that the tablet was seemingly blank. Another method of steganography that has been used in the past was invisible ink. Messages could be written with inks made from onion juice or ammonia salts which could not be seen under a normal light but would glow when held over a flame. Message hiding always seems important in times of war, and was so in WWII, as the Germans used microdots, taking pictures of a message and shrinking them to the size of a period. German spies also hid messages by encoding messages within messages. One message that was actually sent was: Apparently neutral s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetables oils. Taking the second letter of each word in the message reveals the hidden message: Pershing sails from NY June 1. Now, with the rise in technology, computers are able to conceal messages. Now, people are able to use computers to hide messages in anything from picture to music to video files. In today s methods, the information is hidden in the least significant bits of the files to contain some message. By changing these bits, the actual file does not appear as if it changed at all, but now there is extra information that can be extracted if its presence is known. Such a change would be difficult to detect with the naked eye, so it

4 can be seen as a blessing to those who value privacy and a problem to those whose job it is to find secrets for the protection of others. II. A Discussion on Steganography Steganography is a very powerful means of message hiding, which, given the worlds current demand for information while requiring the maximum privacy to any and all people, means that it is the most secure method for communications. The boom of the internet has created a new demand for steganography. With new technological means of communications, most importantly the internet and s, the public demand for both security and privacy has lead to increased efforts in finding a more secure method for communicating. This demand has lead to increased research into the development of better steganographic methods for these communication mediums. The internet provides an entry point to a global network of information and communication from nearly anywhere in the world. In this way, it is the cheapest, easiest, most desirable means of both long distance and local communication available. Someone on the other side of the world can send you a message that you will receive nearly instantaneously for a reasonable price, creating a highly popular and demanded communications system. As with all means of communications, the parties doing the communicating wish for total security and privacy of their transactions. With digital communications, it is nearly impossible to tell if your communications have been intercepted by another party. Therefore, more and more and communications companies are turning to higher levels of encryption for their customers in the hope that

5 if the communications are intercepted, the intercepting party will not be able to read the contents of the message. Cryptography itself has come a long ways recently, jumping from encryption algorithms that would take months to break to algorithms that would take millions of years to break. However, some government security organizations, such as the NSA, want companies to create backdoors into their encryption algorithms so that they would be able to read any message they thought was a possible threat to national security. These security measures will never be implemented since this violates the privacy of all online communications, and if companies decided to follow through with these backdoors, they would undoubtedly lose their customers. Because of this, cryptography has been able to grow in strength and efficiency to such an extent that no one has a chance at cracking them without the use of a supercomputer which could still take years to crack the code. However, encryption still leaves some information to help crackers in their job: the encrypted file. It is only logical that if a person is intent on cracking an encrypted file they have in their possession, then time is their only opposition. With technology continually advancing, the processing speed of computers keeps getting faster, thus decreasing the time needed to crack the file. However, if the person does not have the encrypted file and instead must find it first, then this adds another layer of security, for if the person does not have the file, then they have to spend more time looking for it. Because steganography is the act of hiding information so that no one will find it, the attacker does not even know where to begin looking; the message could be hidden anywhere: in

6 another text document, in a picture, or even in a movie. This idea combined with the changing technology opens the doors for all sorts of hiding places for information. As previously stated, early forms of steganography were in physical form, meaning the information was hidden on some sort of tangible object such as a letter or even someone s head. Because of this, places to hide information were limited and, therefore, easy to check for. The digital age has generated a number of new areas in which to hide information, most of which are intangible and undetectable by the human eye, making it extremely hard to detect the presence of a piece of information hidden in digital media. For the people looking for a way to communicate secretly, especially on the internet, this method is perfect: not only can you encrypt your message using the best encryption algorithms available, but you can also hide the message in any number of files and formats. The need of detection of an actual file with extra information in it drastically decreases the probability that someone will be able to decrypt your communications. The advancement of the digital world has led to many new forms of mediums, and each medium requires a different algorithm to hide each file type inside of it. Most of the time, images are the desired files for hiding information. One reason for this is that not many people would expect to find any hidden information inside of a picture. Text is actually very easily hidden in a bitmap file because of the file format of bitmaps. The bitmap files actually contain the color of each pixel of the image in the form of a certain number of bits (depending on the compression and resolution desired of the image). So, if a pixel is white, its 8 byte representation would be FF FF FF FF FF FF 00 00, and black would be In this way, one could easily change the least significant bit of each pixel without changing the color noticeably. By changing each

7 pixel in succession this way to the binary representation of the message, one could successfully record a message in the pixels of the image without appearing to change the image or size of the file. Essentially, all digital files are made up of binary. It is no surprise that you could use an algorithm like the one in the previous example to hide a message in other digital mediums like videos or audio files. However, in order for the files to open and display properly in such a way that the file has not been altered, the algorithm needs to be changed. Altering the video file requires one to not noticeably change neither the audio nor the video quality. The most important part is to alter the file so that any normal human would not be able to notice the changes. This means that when hiding something in a video file, you must be certain that the changes do not affect the video quality enough to become noticeable to the human eye. In audio files, adding a message to the file sometimes creates a glitch in the sound. This is not a problem as long as the glitch is so minute that a human ear cannot detect the difference. These alterations are mostly performed in a method that will create the least amount of detection to increase their effectiveness. As soon as a newer, harder to detect algorithm is created, people try to figure out faster, cleverer ways of detecting these hidden files and messages, thus creating a continual demand for yet newer algorithms and methods of steganography. This demand, along with the demand for public privacy as we increase access to security products, has created many open source programs free to the public. As long as there is a demand for personal privacy, there will always be someone willing to create ways of obtaining it. Therefore, sites with steganographic knowledge and freeware will always be available to anyone with access to the internet.

8 While steganographic and cryptographic tools are available freely throughout the internet to the general public, it is also available to those with ill intentions. This creates a very dangerous threat since the communications method is nearly invisible as well as uncrackable given today s encryption and decryption methods. Not only can normal, upstanding citizens communicate privately without anyone knowing it, but so can criminals. The internet has created an endless galaxy of information and knowledge. Likewise, it has created an infinite amount of places to hide information, making it especially hard to trace any illegal communication. So, criminals of all sorts are able to utilize the internet to organize whatever type of criminal activity that they want. With steganography, they can do it with a small chance of being discovered. This can create a bit of a problem regarding national security. Those that desire to protect our country can tap phones and follow around suspicious characters, but, if people are able to hide secret messages out in the open, how are the authorities supposed to discover them or even attempt to stop the delivery of the message. Pictures or movie or audio files can all be posted on websites or message boards or in chat rooms. With this medium of communication, people can relay information covertly over public channels and have little chance of being detected. Government agencies cannot possibly scan all these public channels searching for hidden messages. First of all, there are probably not a high volume of hidden messages, so a lot of the searches would prove fruitless. Also, even if they were looking at the right sites, how would they know that they found a hidden message since they are undetectable by the naked eye? Even if they did find the message, how could they know who the message was going to since it was placed in a

9 public viewing area where everyone can see it? So, it seems that such a public display of confidential information would be an almost ideal method of communication. It seems though this might have already caused problems with national security. It is suspected that the terrorists involved with the terrorist attack on September 11 th were using steganographic methods to communicate blueprints and sensitive information to coordinate their attacks. The New York Time reported in October of 2001 that the Al Qaeda used steganographic techniques to encode messages in images and then sent via or placed in public sites, with ebay being one of the mentioned sites. The pictures would seem completely harmless on ebay, but, this article claimed that there were messages hidden in the bits of these images. These claims were never confirmed, but some feel that they were an attempt by U.S. politicians to have an excuse to restrict the use of encryption and steganographic software. The problem is that it is difficult to detect. If the government had a way to detect such messages, they feel that they could prevent such tragedies from occurring. But, how would they begin to look for such hidden messages? Steganalysis is the art of discovering such messages. If the original file and the embedded file are both known, then the discrepancy between the two is noticeable and can be studied to reveal patterns of certain steganographic software tools. Acquiring these patterns can help to detect the use of the software on other files and discover hidden messages. But, with the original and the embedded message, it is still not always easy to find the patterns or signatures that are left by certain software methods of steganography. The most popular form of steganography in pictures is to change the least significant bits (LSB). This method of hiding data can be easily detectable with a

10 program that analyzes the different colors that are present. In digital pictures, the number of unique colors is not nearly as high as the number of pixels in the picture. The ratio of unique colors to number of pixels can be anywhere from 1:2 in a high quality picture to 1:6 in lower quality pictures. Many true-color images would thus have a very small color palette. Knowing this and that steganographic methods normally change the least significant bits, an altered picture can be analyzed showing a number of close colors. The occurrence of too many close colors would indicate that least significant bit encoding in the image. While the difference may be detectable to the naked eye with a side by side of the two images, it would not be easy to detect without the original. Therefore, to discover such LSB encoding in pictures, the pictures could be analyzed in such a manner. But, since these pictures would be placed in public places, all pictures in all public sites and boards would be subject to investigation and it is just not realistically possible to examine all the pictures on the internet. But, the whole point of steganography is to be undetectable. Being able to find patterns would defeat the entire purpose of hiding the message in this manner. So, methods exist that make it extremely difficult to detect without having the original, unaltered file. Sometimes, though, the existence of a hidden message is known even if it is not known in what form the message is. In this case, rather than trying to find and uncover the message, it may be easier to just attempt to destroy the contents of the message. This can be done by compression techniques which could possibly render the hidden data useless. But, this would be a violation of the people s right of freedom of speech, destroying our lines of communication. So, this is where the dilemma arises.

11 What is more important: the privilege of freedom of speech or national security and the safety of the country? III. Summary So, it seems there are the good and bad of steganography. The clear positive aspect of message hiding is the increased privacy that such a device can provide. An encrypted message hidden is a picture is more secure and harder to uncover than simply encrypting a message. While the message will be difficult to decrypt, it is clearly encrypted and could contain some secrets that people may want to uncover. But, an encrypted message hidden in a picture or a song is difficult to detect and then also difficult to decrypt even if detected. So, it adds that extra layer of protection and privacy to those who take advantage of it. On the other hand, it is another way for people to carry on illegal endeavors. With such methods to pass on information, secret communication can occur between criminals or terrorist groups that could threaten people s safety. Should steganography software continue to be allowed or should such practices be restricted to allow for a possibly safer environment? First of all, restricting a person s right to privacy seems like a direct violation of the first amendment, freedom of speech. This strikes at what is considered a basic human right. But, is it worth our safety? Even without steganographic software to hide messages, people who would feel some need to communicate covertly will find a way. There always seems to be another way. So, if the authorities attempted to stop steganography, some other way to secretly exchange messages will be developed.

12 While this sounds threatening, it is the truth. There will always be a demand for means of private communication, and steganography so far has been the most secure and effective method. The United States Constitution was created with the idea that government s power should be limited. The government s attempt to monitor peoples communications by installing backdoors into encryption and steganographic programs is a direct violation of this limitation of power since it infringes upon peoples rights for personal privacy. Even if the U.S. limited or banned the research or usage of steganography and cryptography, it would be used elsewhere throughout the world. In fact, I think it s safe to presume that the U.S. would fall behind in its research and development in these areas, drastically hurting and limiting our national security. Leaving steganography and cryptography open to the public s research and scrutiny is a good idea as the fields will continually grow in complexity and efficiency, and this way, even the U.S. will be able to benefit by staying in the front lines of research and development.

13 References Fridrich, J., R. Du and M. Long, "Steganalysis of LSB Encoding in Color Images", ICME 2000, New York City, July 31-August 2, New York, USA, Johnson, Neil F. ; Steganalysis - Attacks against Steganography and Watermarking Countermeasures ; Johnson, N. F. and S. Jajodia, "Steganalysis: The investigation of Hidden Information", IEEE Information Technology Conference, Syracuse, NY, USA, 1-3 September Petitcolas, Fabien A.P. ; the information hiding homepage digital watermarking & steganography; Radcliff, Deborah; Steganography: Hidden Data, Steganography. Symantec ; Steganography: High-Tech Hidden Messages ; April 30, 2002 ; Article 1314; Tran, Tu ; Steganography : The Art of Hiding Data ;

Steganography and Steganalysis

Steganography and Steganalysis Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

Introduction to Steganography

Introduction to Steganography POLYTECHNIC UNIVERSITY Department of Computer and Information Science Introduction to Steganography K. Ming Leung Abstract: This material deals with the history and an introduction to the art and science

More information

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University A Study Of Steganography 1 STEGANOGRAPHY STUDY A Study Of Steganography And The Art Of Hiding Information Alain C. Brainos II East Carolina University A Study Of Steganography 2 Abstract The recently created

More information

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information

More information

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information? Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Steganography Workshop

Steganography Workshop Steganography Workshop About the Speaker 2 20 books (Including 3 on forensics, 5 on computer security, 1 on cryptology) 40 industry certifications Member of the American College of Forensic Examiners Diplomat

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE Joseph Dedy Irawan Informatics Engineering, Industrial Technology Faculty, Institut Teknologi Nasional Malang Jalan Raya Karangploso KM 2 Malang Email: joseph_dedy@yahoo.co.id

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Analysis of Steganography as a Security Technique

Analysis of Steganography as a Security Technique Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application

More information

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

Information Hiding in BMP image Implementation, Analysis and Evaluation

Information Hiding in BMP image Implementation, Analysis and Evaluation Èíôîðìàöèîííûå ïðîöåññû, Òîì 6, 1, 2006, ñòð. 110 c 2006 Alkhraisat Habes. INFORMATION TRANSMISSIONS IN COMPUTER NETWORKS Information Hiding in BMP image Implementation, Analysis and Evaluation Alkhraisat

More information

Seminar report Steganography

Seminar report Steganography A Seminar report on Steganography Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Image Analysis for Online Dynamic Steganography Detection

Image Analysis for Online Dynamic Steganography Detection Vol. 1, No. 3 Computer and Information Science Image Analysis for Online Dynamic Steganography Detection Kevin Curran & Joanne Mc Devitt Intelligent Systems Research Centre Faculty of Engineering University

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

Outline More Security Protocols CS 239 Computer Security February 4, 2004

Outline More Security Protocols CS 239 Computer Security February 4, 2004 Outline More Security Protocols CS 239 Computer Security February 4, 2004 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

Secured Way of Ciphering Text Using Audio Steganography

Secured Way of Ciphering Text Using Audio Steganography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data

More information

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004

More information

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Steganography: Hiding Data In Plain Sight. Ryan Gibson Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos

More information

ONLINE SAFETY. Messaging, , Vlogging and Sexting

ONLINE SAFETY. Messaging,  , Vlogging and Sexting ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk Contents WhatsApp & Messaging Email Vlogging Sexting THE RISKS People online are not necessarily who they say they are or seem to be.

More information

Comparative Analysis of Different Transformation Techniques in Image Steganography

Comparative Analysis of Different Transformation Techniques in Image Steganography Comparative Analysis of Different Transformation Techniques in Image Steganography Sourav Kumar Kamila (111CS0127) Department of Computer Science and Engineering National Institute of Technology Rourkela

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING

More information

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange

Outline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange Outline More Security Protocols CS 239 Security for System Software April 22, 2002 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and

More information

CS 595: Cryptography Final Project

CS 595: Cryptography Final Project CS 595: Cryptography Final Project Tim Wylie December 7, 2009 Project Overview I have implemented a basic covert multi-party communication instant messaging program. The users can communicate with any

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

College of Engineering, Pune Shivajinagar, Pune

College of Engineering, Pune Shivajinagar, Pune College of Engineering, Pune Shivajinagar, Pune 411005 Department of Computer Engineering and Information Technology SEMINAR REPORT ON GUIDED BY Prof. S. U. Ghumbre Presented By Tumma Ashwin 30808010 T.

More information

Prof.(Dr.) J. K. Mandal

Prof.(Dr.) J. K. Mandal Information Security Prof.(Dr.) J. K. Mandal Ex-Dean, Faculty of Engineering, Technology & Management Professor & Head, Department of Computer Science & Engineering University of Kalyani Kalyani, Nadia,

More information

Image Steganography by Mapping Pixels to Letters

Image Steganography by Mapping Pixels to Letters Journal of Computer Science 5 (1): 33-38, 2009 ISSN 1549-3636 2009 Science Publications Image Steganography by Mapping Pixels to Letters Mohammed A.F. Al-Husainy Department of Computer Science, Faculty

More information

Outline More Security Protocols CS 239 Computer Security February 6, 2006

Outline More Security Protocols CS 239 Computer Security February 6, 2006 Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

Cryptography. What is Cryptography?

Cryptography. What is Cryptography? Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used

More information

Steganalysis Techniques: A Comparative Study

Steganalysis Techniques: A Comparative Study University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-18-2007 Steganalysis Techniques: A Comparative Study Swaroop Kumar Pedda Reddy University

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction SE 4C03 Winter 2004 Steganography Derek Lunn (9943193) Last Revised: April 6th 2004 Introduction Steganography is a means of hiding information in a carrier medium. Although the concept itself is not new,

More information

Principle of Graph Theoretic Approach to Digital Steganography

Principle of Graph Theoretic Approach to Digital Steganography Computing For Nation Development, February 26 27, 2009 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Principle of Graph Theoretic Approach to Digital Steganography Vinay

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Cryptography Lesson Plan

Cryptography Lesson Plan Cryptography Lesson Plan Overview - Cryptography Summary There is a large amount of sensitive information being stored on computers and transmitted between computers today, including account passwords,

More information

Activity Guide - Public Key Cryptography

Activity Guide - Public Key Cryptography Unit 2 Lesson 19 Name(s) Period Date Activity Guide - Public Key Cryptography Introduction This activity is similar to the cups and beans encryption we did in a previous lesson. However, instead of using

More information

Cryptography: Matrices and Encryption

Cryptography: Matrices and Encryption Cryptography: Matrices and Encryption By: Joseph Pugliano and Brandon Sehestedt Abstract The focus of this project is investigating how to generate keys in order to encrypt words using Hill Cyphers. Other

More information

Security Using Digital Signatures & Encryption

Security Using Digital Signatures & Encryption Email Security Using Digital Signatures & Encryption CONTENTS. Introduction The Need for Email Security Digital Signatures & Encryption 101 Digital Signatures & Encryption in Action Selecting the Right

More information

Network Working Group Request for Comments: 1984 Category: Informational August 1996

Network Working Group Request for Comments: 1984 Category: Informational August 1996 Network Working Group IAB Request for Comments: 1984 IESG Category: Informational August 1996 IAB and IESG Statement on Cryptographic Technology and the Internet Status of This Memo This memo provides

More information

Information Flow Control and Privacy. Dennis Chen Ming Chow

Information Flow Control and Privacy. Dennis Chen Ming Chow Information Flow Control and Privacy Dennis Chen Dennis.Chen@tufts.edu Ming Chow Abstract With the rise of technology and the worry of protecting private user information, a new security practice must

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

Lecture Notes 20 : Smartcards, side channel attacks

Lecture Notes 20 : Smartcards, side channel attacks 6.857 Computer and Network Security November 14, 2002 Lecture Notes 20 : Smartcards, side channel attacks Lecturer: Ron Rivest Scribe: Giffin/Greenstadt/Plitwack/Tibbetts [These notes come from Fall 2001.

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005 Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...

More information

Waiter! There s a Message in My Soup! Uncovering Steganography. Adventures in Supercomputing Challenge Final Report April 2, 2003

Waiter! There s a Message in My Soup! Uncovering Steganography. Adventures in Supercomputing Challenge Final Report April 2, 2003 Waiter! There s a Message in My Soup! Uncovering Steganography Adventures in Supercomputing Challenge Final Report April 2, 2003 Team #022 Bosque School Team Members Samuel R. Ashmore Jessica E. Behles

More information

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Introduction to Cryptography in Blockchain Technology. December 23, 2018 Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,

More information

Worksheet - Reading Guide for Keys and Passwords

Worksheet - Reading Guide for Keys and Passwords Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By- Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating

More information

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at

More information

Online Payment System Using Steganography and Visual Cryptography

Online Payment System Using Steganography and Visual Cryptography Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 391-402 Online Payment System Using Steganography and Visual Cryptography T. Venu Gopal Associate

More information

CS61A Lecture #39: Cryptography

CS61A Lecture #39: Cryptography Announcements: CS61A Lecture #39: Cryptography Homework 13 is up: due Monday. Homework 14 will be judging the contest. HKN surveys on Friday: 7.5 bonus points for filling out their survey on Friday (yes,

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

Lecture 1: Perfect Security

Lecture 1: Perfect Security CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

Steganalysis of Hydan

Steganalysis of Hydan Steganalysis of Hydan Jorge Blasco 1, Julio C. Hernandez-Castro 1, Juan M.E. Tapiador 1 Arturo Ribagorda 1 and Miguel A. Orellana-Quiros 2 1 {jbalis, jcesar, jestevez, arturo}@inf.uc3m.es 2 mangel.orellana@meh.es

More information

OPEN THE HOTLINE CLIENT

OPEN THE HOTLINE CLIENT OPEN THE HOTLINE CLIENT Everything in the Hotline universe starts with the Client Toolbar; it launches all of the Client s major functions. 1 Double-click the Hotline icon on your desktop. The Hotline

More information

Yammer Product Manager Homework: LinkedІn Endorsements

Yammer Product Manager Homework: LinkedІn Endorsements BACKGROUND: Location: Mountain View, CA Industry: Social Networking Users: 300 Million PART 1 In September 2012, LinkedIn introduced the endorsements feature, which gives its users the ability to give

More information

Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal

Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Abstract- Computer Technology and the Internet have made a breakthrough in the existence of data communication.

More information

EXERCISE 3: THE CIPHER

EXERCISE 3: THE CIPHER CSCE 230 - Computer Organization EXERCISE 3: THE CIPHER Assigned: Saturday, October 3, 2015 Due: Fridays, October 9 and 16 OBJECTIVES The objectives of this exercise: Computational: o Learning about the

More information

INSPIRE and SPIRES Log File Analysis

INSPIRE and SPIRES Log File Analysis INSPIRE and SPIRES Log File Analysis Cole Adams Science Undergraduate Laboratory Internship Program Wheaton College SLAC National Accelerator Laboratory August 5, 2011 Prepared in partial fulfillment of

More information

Sending secret messages with cryptography. An activity by the Australian Computing Academy

Sending secret messages with cryptography. An activity by the Australian Computing Academy Sending secret messages with cryptography An activity by the Australian Computing Academy The activity uses ciphers to encode and decode secret messages. Activity overview What s it all about? By following

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE

EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE Why you need to use sandboxing as well as signatures and heuristics Abstract Next-gen firewalls leverage signatures and heuristics

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet. Statistical Steganalysis CHAPTER. INTRODUCTION. Steganography Steganography is an art of secret communications. Its main purpose is to hide the occurrence of communication over a public channel. In contrast

More information

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Introduction to Cryptography and Security Mechanisms. Abdul Hameed Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

Introducing Image Steganography in Bangla Language Communication

Introducing Image Steganography in Bangla Language Communication Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,

More information

Viability of Cryptography FINAL PROJECT

Viability of Cryptography FINAL PROJECT Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The

More information

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India Abstract:-Although every people have secrets

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information