SlideShare a Scribd company logo
1
241-427-SV-2-2553-COE-PSU 1
241-427 Computer Security
Chapter II: Steganography
Dr. Sangsuree Vasupongayya
241-427-SV-2-2553-COE-PSU 2
Outline
History
What is steganography
Steganography
Text
Image
Audio
Steganalysis
241-427-SV-2-2553-COE-PSU 3
Steganography
The art and science of communicating in a way
which hides the existence of the communication
Goal
to hide messages inside other harmless messages
in away that does not allow any enemy to even
detect that there is a second secret message
present
E.g.,
Watermarking
Fingerprinting
2
241-427-SV-2-2553-COE-PSU 4
Watermarking and Fingerprinting
Watermarking: hiding a trademark in a digital
object
Fingerprinting: hiding characteristics such as a
serial number within a digital object to distinguish it
from a similar digital object
Used to fight piracy
Watermarking is for detection
Fingerprinting is for prosecution
241-427-SV-2-2553-COE-PSU 5
Steganography in Text
Modern application is for detecting illegal document
distribution
Also detects document tampering
Words with document images or document format
files (postscript, TEX, etc.)
Alters specific features
Lines spacing coding
Word spacing coding
Feature-specific coding
241-427-SV-2-2553-COE-PSU 6
Line-Shift Coding
Subtle shifting of line spacing transmits information
Easy to implement with modern laser printers
Shift lines 1-2 dots/pixels up or down to convey a bit
of information
Easy to detect
More successful with handwritten documents on
unlined paper
3
241-427-SV-2-2553-COE-PSU 7
Word-Shift Coding
Harnesses variable spacing between words to
convey information
Fixed spacing systems cannot do this
Variable spacing in word processors can do this
Easily detected/ defeated if spacing algorithm is
known
Encoding needs to preserve overall line length and
content
Encoded lines should not be longer / shorter
Encoding should not introduce new line breaks
241-427-SV-2-2553-COE-PSU 8
Feature Coding
Features of individual characters are modified
Modifying height of endlines on letters: b, d, h, etc.
Modifying length of drop on letters: c, e, s, etc.
Syntax encoding (how we punctuate)
… bread, butter, and milk
…bread, butter and milk
Semantic encoding (the words we use)
Alternating synonyms (big / large, etc.)
Synonym substitution
241-427-SV-2-2553-COE-PSU 9
Steganography in Images
Exploiting the limited powers of the human visual
system (HVS)
Humans are not very good at distinguishing subtle
changes in
Color
Brightness
Busy, gray-scale images are preferred
4
241-427-SV-2-2553-COE-PSU 10
Image Compression
Two main types
lossless
Lossy
Lossless
Preferred as hidden data remains unaffected
GIF, BMP
Lossy
Could have negative impact
Depends on the encoding algorithm
JPEG
241-427-SV-2-2553-COE-PSU 11
LSB Insertion
Common and simple
Fragile when lossy compression is used
Or when format is converted
We “steal” bits from the image in some way
From the pixels themselves
From the color table if one is in use
Different “stealing: mechanisms have different
impacts on the resultant image
241-427-SV-2-2553-COE-PSU 12
Steganography in Audio
The human audio system (HAS) is more sensitive
than the HVS
The opportunity occurs in volume
Large sounds tend to drown out small sounds
In general, it is easy for HAS to detect added noise
Except where the noise is added to the backgraound,
smaller, sounds
Low-Bit Encoding
similar to image LBE
Steal the low order bit of each audio byte
In general, not a good technique
Introduces audible noise
Channel noise and other factors can destroy the
hidden signal
Phase coding, Spread spectrum, Echo data hiding
5
241-427-SV-2-2553-COE-PSU 13
Steganalysis
Steganography
Avoidance of suspicion to hidden messages in other
data
Steganalysis
Aims to discover and render useless such covert
messages
Methods: detection or destruction of the hidden messages
Examples
Watermark detector: degrading image until no
watermark can be found; random signals are added so
that the watermark cannot be detected
241-427-SV-2-2553-COE-PSU 14
References
Steganography Past, Present and Future
http://www.sans.org/reading_room/whitepapers/st
enganography/steganography-past-present-
future_552
http://www.lia.deis.unibo.it/Courses/RetiDiCalcolat
ori/Progetti98/Fortini/history.html
J. Brassil, S. Low, N. Maxemchuk, and L. O'
Garman. Electronic marking and identification
techniques to discourage document copying. In
IEEE Infocom 94, pages 1278-1287, 1994.
W.Bender, D. Gruhl, N. Morimoto, and A. Lu.
Techniques for data hiding. In IBM Systems
Journal, Vol. 35, No. 3-4, pages 313-336, February
1996.

More Related Content

Similar to Ch02-Computer Security (10)

PDF
A New Steganographic Method for Embedded Image In Audio File
CSCJournals
 
PDF
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
PDF
F017253244
IOSR Journals
 
PPTX
PPT steganography
parvez Sharaf
 
PPTX
Pbl1
Pijo Jonas
 
PDF
Hiding text in audio using lsb based steganography
Alexander Decker
 
PDF
Uncompressed Image Steganography using BPCS: Survey and Analysis
IOSR Journals
 
PPTX
Steganography.pptx
9905234521
 
PPTX
Stegnography final
Heena Bohra
 
PPTX
dokumen.tips_video-steganography-ppt.pptx
ShubhamPancheshwar1
 
A New Steganographic Method for Embedded Image In Audio File
CSCJournals
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
F017253244
IOSR Journals
 
PPT steganography
parvez Sharaf
 
Hiding text in audio using lsb based steganography
Alexander Decker
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
IOSR Journals
 
Steganography.pptx
9905234521
 
Stegnography final
Heena Bohra
 
dokumen.tips_video-steganography-ppt.pptx
ShubhamPancheshwar1
 

More from Attaporn Ninsuwan (20)

PDF
J query fundamentals
Attaporn Ninsuwan
 
PDF
Jquery enlightenment
Attaporn Ninsuwan
 
PDF
Jquery-Begining
Attaporn Ninsuwan
 
PDF
Br ainfocom94
Attaporn Ninsuwan
 
PDF
Chapter 12 - Computer Forensics
Attaporn Ninsuwan
 
PDF
Techniques for data hiding p
Attaporn Ninsuwan
 
PDF
Stop badware infected_sites_report_062408
Attaporn Ninsuwan
 
PDF
Steganography past-present-future 552
Attaporn Ninsuwan
 
PDF
Ch03-Computer Security
Attaporn Ninsuwan
 
PDF
Ch01-Computer Security
Attaporn Ninsuwan
 
PDF
Ch8-Computer Security
Attaporn Ninsuwan
 
PDF
Ch7-Computer Security
Attaporn Ninsuwan
 
PDF
Ch6-Computer Security
Attaporn Ninsuwan
 
PDF
Ch06b-Computer Security
Attaporn Ninsuwan
 
PDF
Ch5-Computer Security
Attaporn Ninsuwan
 
PDF
Ch04-Computer Security
Attaporn Ninsuwan
 
PDF
Chapter5 - The Discrete-Time Fourier Transform
Attaporn Ninsuwan
 
PDF
Chapter4 - The Continuous-Time Fourier Transform
Attaporn Ninsuwan
 
PDF
Chapter3 - Fourier Series Representation of Periodic Signals
Attaporn Ninsuwan
 
PDF
Chapter2 - Linear Time-Invariant System
Attaporn Ninsuwan
 
J query fundamentals
Attaporn Ninsuwan
 
Jquery enlightenment
Attaporn Ninsuwan
 
Jquery-Begining
Attaporn Ninsuwan
 
Br ainfocom94
Attaporn Ninsuwan
 
Chapter 12 - Computer Forensics
Attaporn Ninsuwan
 
Techniques for data hiding p
Attaporn Ninsuwan
 
Stop badware infected_sites_report_062408
Attaporn Ninsuwan
 
Steganography past-present-future 552
Attaporn Ninsuwan
 
Ch03-Computer Security
Attaporn Ninsuwan
 
Ch01-Computer Security
Attaporn Ninsuwan
 
Ch8-Computer Security
Attaporn Ninsuwan
 
Ch7-Computer Security
Attaporn Ninsuwan
 
Ch6-Computer Security
Attaporn Ninsuwan
 
Ch06b-Computer Security
Attaporn Ninsuwan
 
Ch5-Computer Security
Attaporn Ninsuwan
 
Ch04-Computer Security
Attaporn Ninsuwan
 
Chapter5 - The Discrete-Time Fourier Transform
Attaporn Ninsuwan
 
Chapter4 - The Continuous-Time Fourier Transform
Attaporn Ninsuwan
 
Chapter3 - Fourier Series Representation of Periodic Signals
Attaporn Ninsuwan
 
Chapter2 - Linear Time-Invariant System
Attaporn Ninsuwan
 
Ad

Recently uploaded (20)

PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PPTX
Mathematics 5 - Time Measurement: Time Zone
menchreo
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PPTX
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
Mathematics 5 - Time Measurement: Time Zone
menchreo
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Ad

Ch02-Computer Security

  • 1. 1 241-427-SV-2-2553-COE-PSU 1 241-427 Computer Security Chapter II: Steganography Dr. Sangsuree Vasupongayya 241-427-SV-2-2553-COE-PSU 2 Outline History What is steganography Steganography Text Image Audio Steganalysis 241-427-SV-2-2553-COE-PSU 3 Steganography The art and science of communicating in a way which hides the existence of the communication Goal to hide messages inside other harmless messages in away that does not allow any enemy to even detect that there is a second secret message present E.g., Watermarking Fingerprinting
  • 2. 2 241-427-SV-2-2553-COE-PSU 4 Watermarking and Fingerprinting Watermarking: hiding a trademark in a digital object Fingerprinting: hiding characteristics such as a serial number within a digital object to distinguish it from a similar digital object Used to fight piracy Watermarking is for detection Fingerprinting is for prosecution 241-427-SV-2-2553-COE-PSU 5 Steganography in Text Modern application is for detecting illegal document distribution Also detects document tampering Words with document images or document format files (postscript, TEX, etc.) Alters specific features Lines spacing coding Word spacing coding Feature-specific coding 241-427-SV-2-2553-COE-PSU 6 Line-Shift Coding Subtle shifting of line spacing transmits information Easy to implement with modern laser printers Shift lines 1-2 dots/pixels up or down to convey a bit of information Easy to detect More successful with handwritten documents on unlined paper
  • 3. 3 241-427-SV-2-2553-COE-PSU 7 Word-Shift Coding Harnesses variable spacing between words to convey information Fixed spacing systems cannot do this Variable spacing in word processors can do this Easily detected/ defeated if spacing algorithm is known Encoding needs to preserve overall line length and content Encoded lines should not be longer / shorter Encoding should not introduce new line breaks 241-427-SV-2-2553-COE-PSU 8 Feature Coding Features of individual characters are modified Modifying height of endlines on letters: b, d, h, etc. Modifying length of drop on letters: c, e, s, etc. Syntax encoding (how we punctuate) … bread, butter, and milk …bread, butter and milk Semantic encoding (the words we use) Alternating synonyms (big / large, etc.) Synonym substitution 241-427-SV-2-2553-COE-PSU 9 Steganography in Images Exploiting the limited powers of the human visual system (HVS) Humans are not very good at distinguishing subtle changes in Color Brightness Busy, gray-scale images are preferred
  • 4. 4 241-427-SV-2-2553-COE-PSU 10 Image Compression Two main types lossless Lossy Lossless Preferred as hidden data remains unaffected GIF, BMP Lossy Could have negative impact Depends on the encoding algorithm JPEG 241-427-SV-2-2553-COE-PSU 11 LSB Insertion Common and simple Fragile when lossy compression is used Or when format is converted We “steal” bits from the image in some way From the pixels themselves From the color table if one is in use Different “stealing: mechanisms have different impacts on the resultant image 241-427-SV-2-2553-COE-PSU 12 Steganography in Audio The human audio system (HAS) is more sensitive than the HVS The opportunity occurs in volume Large sounds tend to drown out small sounds In general, it is easy for HAS to detect added noise Except where the noise is added to the backgraound, smaller, sounds Low-Bit Encoding similar to image LBE Steal the low order bit of each audio byte In general, not a good technique Introduces audible noise Channel noise and other factors can destroy the hidden signal Phase coding, Spread spectrum, Echo data hiding
  • 5. 5 241-427-SV-2-2553-COE-PSU 13 Steganalysis Steganography Avoidance of suspicion to hidden messages in other data Steganalysis Aims to discover and render useless such covert messages Methods: detection or destruction of the hidden messages Examples Watermark detector: degrading image until no watermark can be found; random signals are added so that the watermark cannot be detected 241-427-SV-2-2553-COE-PSU 14 References Steganography Past, Present and Future http://www.sans.org/reading_room/whitepapers/st enganography/steganography-past-present- future_552 http://www.lia.deis.unibo.it/Courses/RetiDiCalcolat ori/Progetti98/Fortini/history.html J. Brassil, S. Low, N. Maxemchuk, and L. O' Garman. Electronic marking and identification techniques to discourage document copying. In IEEE Infocom 94, pages 1278-1287, 1994. W.Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. In IBM Systems Journal, Vol. 35, No. 3-4, pages 313-336, February 1996.