Professional Documents
Culture Documents
Steganography
What is Steganography?
The word steganography comes from the Greek steganos , meaning covered or secret, and graphy , meaning writing or drawing.
Steganography means covered writing.
of
Contd
The files can then be exchanged without anyone knowing what really lies inside of them An image of the space shuttle landing might contains a hidden message. Nowadays Steganography is used for hiding copy rights and other commercial information.
Steganography Terms
A file which has hidden information inside of it. Stego-Medium The medium in which the information is hidden Message The data to be hidden (can be a plain text or encrypted one) Redundant Bits Pieces of information inside a file which can be overwritten or altered without any damage Carrier File
Steganography Process
The data to be concealed is compressed and hidden within another file. The first step is to find a file which will be used to hide the message (also called a carrier or a container.) The next step is to embed the message one wants to hide within the carrier using a steganographic technique
Steganography Methods
The two most common methods are:
Usually files contains some bytes which are not really required/important. These areas can be replaced with hidden information without damaging the file. LSB method works best in picture files with high resolution LSB works with audio files having many different sounds of high bit rate. LSB method usually does not increase the file size but if hidden info. is large, file may be distorted. The covering media should be at least 8 to 10 times more than message size so that it will be non detectable.
Injection
Injection is quite a simple method which simply involves directly injecting the secret information into the carrier file. The main problem with this method is that it can significantly increase the size of the carrier file.
Example Susan eats truffles. Under pressure, that Helps everything before 0wning Major Bullwinkle.
Example Susan eats truffles. Under pressure, that helps everything before owning Major Bullwinkle.
Steganography In Hypertext
Steganography with Hypertext can be done in following ways:
Similar methods as Plain Text Hypertext comment notation (viewsource) Arrangement of content on a given page Presence or absence of content elements (images, phrases, etc.)
Steganography In Images
In images data will be hided in visual itself. Some methods include are:
Using slightly different colors to hide a message Digital watermarking Digitally embedding a message into an image file
LSB method is used for hiding information in images An image of high quality and resolution is best for hiding data. ex. 24 Bit bitmap image file
If we wanted to hide the byte value 131 (10000011), we use the least significant bit from each byte to hide our byte:
(01010011, 10010110, 10100100) (10110100, 10010000, 01001110) (10110111, 00101111, 11010001)
Steganography In Audio
Messages can be hidden in common audio formatted files or the audio itself. Some methods include:
Transmitting a message in the human-inaudible audio spectrum Digitally embedding a message into an audio file
Digitally Embedding
Generally, redundant bits are likely to be the least-significant bits of each byte of the cover-medium
Audio is a very inaccurate data format Slight changes will be indistinguishable from the original to the human ear In Audio, you can use the leastsignificant bits of each byte as redundant bits Use the redundant bits to minimize the impact of changes
Steganography In Video
Like Audio, messages can be hidden in common video formatted files or the video itself. Some methods include:
The presence or absence of objects in the recorded environment Visual Clues such as:
Steganography Tool
Steganography Tool
Hiding messages
Extracting messages
8. 9.
Steganalysis
The process utilized to detect and/or estimate potentially hidden information from observed data with little or no knowledge about the steganography algorithm and/or its parameters.
Cryptography
What is Cryptography?
Cryptography is the art and science of writing secret codes The term is derived from the Greek language krytos - secret graphos - writing Its an art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free. Cryptography is math oriented and uses patterns and algorithms to encrypt messages, text, words, signals and other forms of communication.
Contd.
Two main areas of cryptography are
Cipher Code
Symmetric Cryptosystem!
The sender and receiver know and use the same secret key. The sender uses the secret key to encrypt the message. The receiver uses the same secret key to decrypt the message.
Symmetric Challenges!
Agreeing on the key while maintaining secrecy. Trusting a phone system or some transmission medium. The interceptor can read, modify, an forge all messages
Key Management!!!
The generation, transmission, and storage of a key. All cryptosystems must deal with key management issues. Because all keys must remain secret there is often difficulty providing secure key management.
ASymmetric Cryptosystem!
Created to solve key management problems. Created by Whitfield Diffie and Martin Hellman in 1976. Encryption key: Public Key Decryption key: Private Key The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Software's are available in the market for generating pairs of Public and Private key. After generating public and private key from software, send the public key to the person from whom you want encrypted message. The recipient will send the message encrypted with Public key to you and you can decrypt that message using corresponding Private key. It is virtually impossible to find the private key if you know the public key.
Hash functions
Cryptographic hash functions are designed to take a string of any length as input and produce a fixed length hash value Cryptography can be used for user authentication also, that is, providing the recipient with assurance that the encrypted message originated from a trusted source Hash functions are used instead of private key or public key cryptography The value derived from applying the hash function can be re-calculated at the receiving end, to ensure that the message has not been tampered with during transit
Hash functions
A cryptographic hash function at work. Note that even small changes in the source input drastically change the resulting output,
Steganography goal is to keep the presence of a message secret, or hide the fact that communication is taking place Cryptography goal is to obscure a message or communication so that it cannot be understood Steganography and Cryptography make great partners. It is common practice to use cryptography with steganography
Thank You