Steganography. ICS Lab.

Similar documents
Steganography is the idea of hiding private or sensitive data or information within

An Integrated Image Steganography System. with Improved Image Quality

STEGANOGRAPHY. Sergey Grabkovsky

Bitmap Steganography:

CSE 3482 Introduction to Computer Security.

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Study of 3D Barcode with Steganography for Data Hiding

Comparative Analysis of Hybrid Algorithms in Information Hiding

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Steganography and Steganalysis: An Overview

An Enhanced Least Significant Bit Steganography Technique

An Implementation of LSB Steganography Using DWT Technique

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

A Novel Implementation of Color Image Steganography Using PVD

Study of an Optical Chaotic Steganographic Free Space System

Steganography and Steganalysis: An Overview

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Enhancing the Least Significant Bit (LSB) Algorithm for Steganography

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Image Steganography with Cryptography using Multiple Key Patterns

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

ELTYEB E. ABED ELGABAR

Colored Digital Image Watermarking using the Wavelet Technique

Improved Quality of Image Steganography Using POLPA

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Implementation of Improved Steganographic Technique for 24-bit Bitmap Images in Communication

Efficiency of LSB and PVD Algorithms Used in Steganography Applications

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Dynamic Collage Steganography on Images

Information Hiding: Steganography & Steganalysis

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Analysis of Secure Text Embedding using Steganography

Digital Image Sharing using Encryption Processes

A Novel Approach for Hiding Huge Data in Image

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

ISSN International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 2 Web Based BPCS Steganography

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Image Steganography using Sudoku Puzzle for Secured Data Transmission

An Alternative Approach of Steganography using Reference Image

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Steganography using LSB bit Substitution for data hiding

A Study on Steganography to Hide Secret Message inside an Image

LSB Encoding. Technical Paper by Mark David Gan

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Data Hiding Using LSB with QR Code Data Pattern Image

FPGA implementation of LSB Steganography method

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

A New Steganographic Method for Palette-Based Images

Performance Improving LSB Audio Steganography Technique

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

A New Image Steganography Depending On Reference & LSB

Vernam Encypted Text in End of File Hiding Steganography Technique

A Proposed Technique For Hiding Data Into Video Files

A Comparable Study of Hiding Information in Images Using Least Significant Bit (LSB) Substitution and Pixel Value Differencing (PVD) Methods

Different Steganography Methods and Performance Analysis

An Improved LSB based Steganography Technique for RGB Color Images

Wavelets Transform Based Data Hiding Technique for Stegnography

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Steganography is the art of secret communication.

Principle and applications of BPCS-Steganography

Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Concealing Data for Secure Transmission and Storage

EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Compendium of Reversible Data Hiding

Secret Communication on Facebook Using Image Steganography: Experimental Study

Keywords Secret data, Host data, DWT, LSB substitution.

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

Blind Detection of Steganographic Content in Digital Images Using Cellular Automata

Investigation of Various Image Steganography Techniques in Spatial Domain

Biomedical Research 2017; Special Issue: ISSN X

CS101 Lecture 12: Digital Images. What You ll Learn Today

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

IJESRT: 7(10), October, 2018 ISSN:

International Journal of Computer Techniques - Volume 3 Issue 5, Sep - Oct 2016

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

Sterilization of Stego-images through Histogram Normalization

Colored Image Ciphering with Key Image

A Comprehensive Review on Secure Image Steganography

HSI Color Space Conversion Steganography using Elliptic Curve

Chapter 4 MASK Encryption: Results with Image Analysis

Uncompressed Image Steganography using BPCS: Survey and Analysis

Detection of Stego Images by principle of Suspicion Value for Distributing Stego Algorithms

Meta-data based secret image sharing application for different sized biomedical

Design and Implementation of Game Based Security Model to Secure the Information Contents

Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies

A marathon is a race that lasts for 26.2 miles. It has been a very popular race

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information

Image Steganography based on a Parameterized Canny Edge Detection Algorithm

Transcription:

Steganography ICS Lab.

Introduction What is Steganography? Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. Origin of the word The word steganography combines the Ancient Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"

The first Steganography Ancient Greece, 440BC Wax Covered Tablet (Exactly, Wax Covered the messages) The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples in his Histories. Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Herodotus Demaratus

Old Steganography(Physical) Hidden messages within wax tablets Hidden messages on messenger's body In Ancient Greece, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. Invisible ink (Secret ink) During World War II, the French Resistance sent some messages written on the backs of couriers using invisible ink. Messages written on envelopes in the area covered by postage stamps.

Modern Steganography (Digital) Modern Steganography Modern steganography entered the world in 1985 with the advent of the personal computers being applied to classical steganography problems. Examples Concealing messages within the lowest bits of noisy images or sound files. Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set. Making text the same color as the background in word processor documents, e-mails, and forum posts.

How to conceal the datas? Steganography using LSB(Least Significant Bit) Conceal the binary datas to LSB of each bytes of Target Image. We can embed the secet binary data of BMP file easily. Because, after we change the LSB, Human cannot recognize the difference of colors. The Left side and Right side are seems to shown same color, but the value of G(green) is different. But it is very small change for color. So, the secret datas can hide in the pixels.

How to conceal the datas? Steganography using LSB(Least Significant Bit) Can you recognize the difference of Two images?

Using Tools There are a lot of tools for Steganography S-Tools Windows-based Steganography tool Key Support with IDEA, DES, Triple-DES Encryption OpenStego Need JRE(java runtime environment)

Using Tools : S-tools Example Drag-Drop the original target file This program supports GIF, BMP, WAV only. This Imagefile can hold up to 26,208 bytes. Because this program will embed the secret data to original pixels bit. (not using additional space)

Using Tools : S-tools Example Then, It makes image with hidden data Human cannot found out the difference of that images. Then, right-click on the hidden image, and use save as.

Using Tools : S-tools Example Now, we try to get secret data from image Drag-Drop the hidden image to the program. Right-click on that image, and use Reveal

Using Tools : S-tools Example Input the passphrase and Select Encryption

Using Tools : S-tools Example Then, the secret data will shown on Revealed Archive Right-click on secret file name Secret.txt. Then Use Save as We can get the secret files from Image.

Case Study Terrorist attack of 9/11 In 2001, Osama Bin Laden and terrorist cells use steganography techniques for sent the secret messages. The airplane s structure(boeing 757 Map) was hidden into the Mona Lisa. For Secret Agent Communication In 2010, the eleven secret agent s of Foreign Intelligence Service(Russia) sent the secret messages to hometown while they live in local area with very friendly for neighbors. Finally they arrested by Federal Bureau of Investigation(FBI).

Cryptography Contest in Korea Problem There is secret account numbers in 3 image files. Find hidden message(12-digit account numbers) using 3 image files.

Cryptography Contest in Korea Solution 1 LSB(Least Significant Bit) method is typical way to hiding information in bmp file 0 1 0 1 1 0 0 0 Check bmp header! pixel offset(start of pixel) : 0x436 1 pixel = 8bit

Cryptography Contest in Korea Solution 2 Enhancing the pixel by lsb if lsb is 1, pixel : 0xff else, pixel : 0x00 ex) 54 = 01010100 => 00000000 = 00 37 = 00110111 => 11111111 = ff

Cryptography Contest in Korea Solution 3 Result of enhancing IMG_2257.bmp IMG_2119.bmp IMG_1972.bmp 원본 변환

Cryptography Contest in Korea Solution 4 bit operation 2257 xor 2119 xor 1972 2257 or 2119 xor 1972 2257 xor 2119 and 1972 2257 and 1972 2257 or 2119 2257 and 2119

References Steganography: A New Age of Terrorism, SANS 2004, http://www.giac.org/paper/gsec/3494/steganography-age-terrorism/102620 Wikipedia, http://en.wikipedia.org/wiki/steganography Steganography: Why it Matters in a "Post 911" World, SANS 2002, http://www.sans.org/reading-room/whitepapers/covert/steganography-matters-post-911- world-676