Steganography. Brent McClain Rob Carey

Similar documents
Breaking the OutGuess

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Jeff Hinson CS525, Spring 2010

Information and Communications Security: Encryption and Information Hiding

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

In 2001, US officials stated that they have suspicions that terrorists communicate using steganography in the internet.

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Image Steganography (cont.)

A Novel Information Security Scheme using Cryptic Steganography

1. What images contain hidden messages? 15pts Tools Used: Simple Steganalysis Suite Awarded Points:

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Encryption and Forensics/Data Hiding

Steganalysis Techniques: A Comparative Study

Appendix A. Definition of Terms

International Journal of Advance Research in Engineering, Science & Technology

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

LSB Based Audio Steganography Using Pattern Matching

F5 A Steganographic Algorithm

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Architectural Design of Multi Level Steganography System for Data Transmission

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

A New Approach to Compressed Image Steganography Using Wavelet Transform

Steganography Process- A Review

Steganalysis of Hydan

STEGANALYSIS OF STEGOSTORAGE SYSTEM

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

A General Framework for the Structural Steganalysis of LSB Replacement

Topics. Number Theory Review. Public Key Cryptography

Random Image Embedded in Videos using LSB Insertion Algorithm

Robust DWT Based Technique for Digital Watermarking

An Improved Steganalysis Approach for Breaking the F5 Algorithm

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Study on Different JPEG Steganograhic Schemes

Image Analysis for Online Dynamic Steganography Detection

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

Quality based JPEG Steganography using balanced Embedding Technique

Steganalysis of Hydan

A Survey on Digital Image Steganography and Steganalysis

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

STEGANOGRAPHY: HIDDEN IN PLAIN SIGHT BY: KEVIN R. MEDINA SANTIAGO

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Introduction to Cryptology. Lecture 2

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

A Review of Approaches for Steganography

Cryptography MIS

Part II Authentication Techniques

The DCT domain and JPEG

AN AUTHENTICATED BSS METHODOLOGY FOR DATA SECURITY USING STEGANOGRAPHY JPEG- BMP

Detecting Hidden Information in Images: A Comparative Study

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Improved Qualitative Color Image Steganography Based on DWT

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

Searching For Hidden Messages: Automatic Detection of Steganography

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Defending Against Statistical Steganalysis

Overview Of Techniques Of Stegnography On Various Media

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Application of Data Hiding in Audio-Video Using Advance Algorithm

Public key Steganography Using Discrete Cross- Coupled Chaotic Maps

Introducing Image Steganography in Bangla Language Communication

A NOVEL METHOD FOR HIDING INFORMATION

Message Security over Image Communication

Data Hiding in Audio-Video using Anti Forensics Technique for Secret Message and Data in MP4 Container

Principle of Graph Theoretic Approach to Digital Steganography

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

Multimedia Security: So What s the Big Deal?

Copyright Warning & Restrictions

Comparative Analysis of Different Transformation Techniques in Image Steganography

A DWT and DCT based Hybrid Approach for Audio Watermarking

WLAN Security Overview

Optimizing Image Steganography using Genetic Algorithm

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE APPLICATIONS OF STEGANOGRAPHY

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

A Secure Steganography Technique using DCT and Modified RC4

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

DETECTING STEGANOGRAPHY USING MULTI-CLASS CLASSIFICATION

BLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM

Webpage: Volume 4, Issue V, May 2016 ISSN

Transcription:

Steganography Brent McClain Rob Carey

What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight

Cover Image Another image hidden in the picture Created with InfoSteg

Usage of Steganography vs Cryptography Steganography Covert Channel Only useful for low volume of data Watermarking is used for verification Cryptography Covert Message Useful for any given volume of data Digital Signatures are used for verification

Steganographic Algorithms No published standard Algorithms are hidden until cracked Security through obscurity Types of Algorithms LSB DCT

Attacks on Steganography, Steganalysis Steganalysis is the detection and analysis of data that has been hidden using Steganography. Steganalyis primarily uses statistics to detect and attack Steganography

Steganalysis Attacks Stego only attack Stego Object available Known cover attack - Original Cover and Stego Objects are available Known message attack - Hidden Message and Stego Object are available Chosen stego attack - The Stego Algorithm and Stego Object are available Chosen message attack - Takes a chosen message and generates a Stego Object for comparison Known stego attack - the Stego Algorithm, the Cover Object and the Stego Object are available

Attacks Against Steganography Vs Attacks Against Cryptography Steganalyis Stego only attack Known message attack Chosen message attack Chosen stego attack Cryptanalysis Ciphertext only attack Known plaintext attack Chosen plaintext attack Chosen ciphertext attack

EzStego Hides data in the LSB Sorts the color palette of a GIF Changes pixel color based on data being hidden

Before EzStego Sorting After EzStego Sorting

Original Image 50% Embedded Original Image Filtered 50% Embedded Filtered

Attacking EzStego Frequency Based Determination χ² ² (Chi-Squared) Attack Uses Pairs of Values Values which only differ by the LSB

PoV Frequency Normal Image EzStego Image

Similarity to Monoalphabetic Crack Character Frequency in a long English plain text Character Frequency in the corresponding cipher text for a shift cipher

Shared Key Steganography Advanced Steganographic Algorithms Distribution Behaviors changes base on the private key Lack of preordained distribution set decreases probability of detection

F5 Algorithm The private key acts as seed for the pseudo random number generation scheme Pseudo-Random walk through image to randomize distribution signature Matrix-based embedding scheme Decrements DCT coefficient instead of just setting LSB Immune to χ² ² Attack

Attacking F5 Still a Frequency Based attack Estimated cover image is recreated by decompressing, manipulating, and recompressing Deviation of the DCT s from the value 0 are compared in the histograms of the observed image and the estimated cover image

Ideal Steganographic Algorithm Avoids detection when Steganographic Algorithm is known Good ratio between Cover Object and Hidden Object size

Watermarking Watermarking is a subset of Steganography Used for document tracking and rights management Movies distributed for review carry watermarks to identify who they were sent to. Primary goal is to prevent the removal of a watermark.

Watermarking vs Digital Signature Both are used for Verification and Authentication Watermarking is designed for robustness Digital Signature is designed to be fragile for increased security Both are designed to be tamper resistant

Defending Against Steganography 1. Control the medium used to send the messages, i.e. a corporate network 2. Save and analyze suspected Stego objects 3. Reformat Stego objects and continue sending. i.e. Recompress or reformat a JPEG image to eliminate any possible chance of a covert message.

Conclusion Steganography is far behind Cryptography The best historical steganographic algorithms were not public at their time of use Lack of public collaboration has hinder development of better steganographic algorithms.

Questions?