STEGANOGRAPHY. Sergey Grabkovsky

Similar documents
Information Hiding: Steganography & Steganalysis

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

An Integrated Image Steganography System. with Improved Image Quality

A Study on Steganography to Hide Secret Message inside an Image

Colored Digital Image Watermarking using the Wavelet Technique

A Novel Implementation of Color Image Steganography Using PVD

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

A New Steganographic Method for Palette-Based Images

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

LSB Encoding. Technical Paper by Mark David Gan

Steganography. ICS Lab.

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Different Steganography Methods and Performance Analysis

Digital Media. Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr.

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

An Enhanced Least Significant Bit Steganography Technique

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

Implementation of Improved Steganographic Technique for 24-bit Bitmap Images in Communication

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Chapter 9 Image Compression Standards

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Detection of Steganography using Metadata in Jpeg Files

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

Unit 4.4 Representing Images

Assistant Lecturer Sama S. Samaan

15110 Principles of Computing, Carnegie Mellon University

Guide to Computer Forensics and Investigations Third Edition. Chapter 10 Chapter 10 Recovering Graphics Files

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

A New Representation of Image Through Numbering Pixel Combinations

LECTURE 03 BITMAP IMAGE FORMATS

15110 Principles of Computing, Carnegie Mellon University

Steganography is the idea of hiding private or sensitive data or information within

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Ch. 3: Image Compression Multimedia Systems

Analysis of Secure Text Embedding using Steganography

Digital Asset Management 2. Introduction to Digital Media Format

Image Size Variation Influence on Corrupted and Non-viewable BMP Image

An Improved LSB based Steganography Technique for RGB Color Images

CS101 Lecture 12: Digital Images. What You ll Learn Today

Steganography and Steganalysis: An Overview

Social Issues. CS Concepts. How does a printed document differ from a digital document? WYSI(not)WYG. What s in the model?

UNIT 7B Data Representa1on: Images and Sound. Pixels. An image is stored in a computer as a sequence of pixels, picture elements.

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

UNIT 7C Data Representation: Images and Sound

Comparative Analysis of Hybrid Algorithms in Information Hiding

Social Issues. spam espionage cheating forgery access to your data years from today destroying old records/ data

Steganography and Steganalysis: An Overview

A Study on Image Steganography Approaches in Digital Images

CSE 3482 Introduction to Computer Security.

The Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson

ELTYEB E. ABED ELGABAR

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

The BIOS in many personal computers stores the date and time in BCD. M-Mushtaq Hussain

A New Image Steganography Depending On Reference & LSB

Steganography using LSB bit Substitution for data hiding

Byte = More common: 8 bits = 1 byte Abbreviation:

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

The Need for Data Compression. Data Compression (for Images) -Compressing Graphical Data. Lossy vs Lossless compression

3. Image Formats. Figure1:Example of bitmap and Vector representation images

Bitmap Image Formats

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Fundamentals of Multimedia

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Factors to Consider When Choosing a File Type

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Adding some light to computing. Lawrence Snyder University of Washington, Seattle

Dynamic Collage Steganography on Images

A Proposed Technique For Hiding Data Into Video Files

my bank account number and sort code the bank account number and sort code for the cheque paid in the amount of the cheque.

Principle and applications of BPCS-Steganography

Images and Colour COSC342. Lecture 2 2 March 2015

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Images, Pixels, ART!! Natural Language and Dialogue Systems Lab

Module 4 Build a Game

UNIT 7C Data Representation: Images and Sound Principles of Computing, Carnegie Mellon University CORTINA/GUNA

JPEG Encoder Using Digital Image Processing

Photoshop CS6. Table of Contents. Image Formats! 3. GIF (Graphics Interchange Format)! 3. JPEG or JPG (Joint Photographic Experts Group)!

ISSN International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 2 Web Based BPCS Steganography

Computer Programming

Digital Investigation

Compression and Image Formats

CGT 511. Image. Image. Digital Image. 2D intensity light function z=f(x,y) defined over a square 0 x,y 1. the value of z can be:

Unit 1.1: Information representation

Hybrid Coding (JPEG) Image Color Transform Preparation

Steganography- A Sin qua non for Disguised Communication

Prof. Feng Liu. Fall /02/2018

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Chapter 3 Graphics and Image Data Representations

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Huffman Coding For Digital Photography

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Transform Domain Technique in Image Steganography for Hiding Secret Information

Transcription:

STEGANOGRAPHY Sergey Grabkovsky

WHICH OF THESE HAS A HIDDEN MESSAGE? Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. We explore new steganographic and cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet. Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils.

ALL OF THEM Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. Send lawyers, guns, and money. We explore new steganographic and cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet. Explore the world wide web Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oils. Pershing sails from N.Y June I

A DEFINITION Steganography is the art of hiding a message within a cover. The purpose of steganography is so that if anyone looks, they won t know that anything is hidden. You should only be able to extract a message if you know how it was hidden.

A LITTLE HISTORY One of the first documents describing steganography comes from Greece, from the Histories of Herodotus. In ancient Greece text was written on wax covered tablets. In one story Demeratus wanted to notify Sparta that Xerxes intended to invade Greece. He scraped the wax off of the tablets, and wrote the message on the underlying wood.

A LITTLE (MORE) HISTORY Invisible Ink Used as recently as World War II. Almost exclusively at the beginning. Common sources include: milk, vinegar, fruit juices, and urine. Improved with the development of technology. Inks that can react to various chemicals were developed. Some messages have to be developed much like photographs.

DIGITAL STEGANOGRAPHY Encodes messages in digital files. Formats that could potentially contain hidden messages: AVI, GIF, JPG, BMP, EXE,.NET Assemblies, MIDI files, ZIP, and WAV. Commonly messages are encoded in either audio or image files.

A SIMPLE TECHNIQUE Append data that is to be hidden to the end of the file. Format-independent Quick & dirty Doesn t affect the file content.

A SIMPLE TECHNIQUE Append data that is to be hidden to the end of the file. Format-independent Quick & dirty Doesn t affect the file content. Or does it?

A PROBLEM Consider MP3 files. They have ID tags at the end of the file. Appending extra information to MP3 s would corrupt this information.

A DETECTION This method is very easy to detect if the file format has its size in the header, like BMP s. This method is still easy to detect if the size is not in the header, since the message has to store its own size somehow at the end of the file.

A CHOICE OF FORMATS Image and audio files are an obvious choice. Let s focus on images.

A REPRESENTATION OF IMAGES How are images represented in memory? RGB: A byte for red, a byte for green, and a byte for blue. Depending on the underlying system, it might be ordered BGR or RGB.

A BETTER METHOD Change the least significant bit to the data s bit. Example: we are hiding the letter a. Its ASCII representation is 97, its binary would be 01100001. If we were using the naive approach, we would store the data in a linear manner. Starting from the first byte, we would change the least significant bit to 0, change the LSB of the second byte to 1, and so on.

A REALITY This method is very insecure, as it leaves a clear pattern and changes statistical properties of the image. Need to change stride either pseudo-randomly or depending on a password.

AN INTERESTING IDEA Another way to improve this technique is to have the software that is encoding the hidden message change the statistical properties of the image. This way there is no statistical difference between an image with a hidden message and a normal image.

A VARIATION This technique can be extended to image files with a palette, such as GIF. Images with a palette only store color information in the palette entries. That way they can use 1 byte per pixel instead of 3. We would simply have to change the least significant bit of each palette entry to comply with our encoding.

A PALETTE PROBLEM This introduces many duplicate entries into the palette.

A VARIATION AGAIN This technique could also be extended to JPEG images. The conversion process to a JPEG is a bit long, but here s the basics: An image is converted to JPEG s color space. Color subsampling - average out multiple adjacent pixels to one wherever possible. Discrete Cosine Transform - represent 8x8 parts as coefficients. Quantization - smooth out the curve. Reordering - reorder the pixels into a zig-zag order. Lossless Compression - Use Run Length Encoding and Differential Pulse Code Modulation to lower the size.

A TRICK OF QUANTIZATION With JPEG s, we don t actually store the message in the image data. Instead, we store the message in the quantization step. In order to store data, we use LSB again. Store in coefficients.

AN UNFORTUNATE TURN OF EVENTS Unfortunately, all of the methods described above are detectable. There is currently no steganographically secure way to store a hidden message. Even changing the statistics of the image isn t secure. A program called stegdetect supports detection of all existing techniques on images, as well as automated detection of new steganographic messages.

A CONCLUSION Modern steganography techniques are nowhere near steganographically secure. Any existing method can be detected (at least for images). It is not ready for use for anything extremely important. With any steganographic technique, data should be encrypted first.

A REFERENCE PAGE Neil F Johnson. Steganography. Technical Report. November 1995. Gary C Kessler. An Overview of Steganography for the Computer Forensics Examiner. Forensic Science Communications. July 2004. Guillermito. http://www.guillermito2.net/stegano/. 2002-2004. Corinna John. http://www.binary-universe.net/. Niels Provos. http://www.outguess.org/. September 2004. Niels Provos. http://www.outguess.org/detection.php. September 2004.