+ All Categories
Home > Documents > Robert Krenn [email protected] January 21, 2004 Steganography Implementation & Detection.

Robert Krenn [email protected] January 21, 2004 Steganography Implementation & Detection.

Date post: 30-Jan-2016
Category:
Upload: peregrine-barnett
View: 216 times
Download: 0 times
Share this document with a friend
34
Robert Krenn [email protected] January 21, 2004 Steganography Implementation & Detection
Transcript
Page 1: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Robert Krenn

[email protected]

January 21, 2004

SteganographyImplementation & Detection

Page 2: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Overview

● What is steganography?

● Implementations● Detection● Defeating steganography● Conclusion● Questions

Page 3: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

Stega-covered, from the Greek “stegos” or roof

-nographywriting, from the Greek “graphia”

Page 4: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

● The art of hiding information inside information

Since everyone can read, encoding text

in neutral sentences is doubtfully effective

Page 5: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

● The art of hiding information inside information

Since everyone can read, encoding text

in neutral sentences is doubtfully effective

Since Everyone Can Read, Encoding Text

In Neutral Sentences Is Doubtfully Effective

⇒ Secret inside

Page 6: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

What is it used for?● Hiding the fact that you are sending messages● Hiding several messages inside data● Digital watermarking

Kerckhoffs' principle● Secure with knowlegde of the system● Message can only be read with secret key

Page 7: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

Hiding several messages● Deniable cryptography● Knowledge of encrypted data● No proof of how much information is stored● Rubberhose (http://www.rubberhose.org)

Page 8: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

What is steganography?

Digital watermarking● Not really hiding information● Important: not modificable● Uses the hiding-property of steganography● Recent: MPAA hides watermarks in movies

Page 9: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Hiding information● Text / Webpages● Images● Audio● Video

Page 10: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Text / Webpages● Use of a codebook● Layout of texts● Every Nth character● Use of whitespaces and newlines● Can be difficult to detect and decode

Page 11: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Text / Webpages

In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say

Page 12: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Text / Webpages

In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say

06081913030629170827 ⇒ meet at dawn

Page 13: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Images● Cover image● Identify redundant data● Replace (a subset of) redundant bits with data

Page 14: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Images● JPEG uses discrete cosine transformations (DCT)● Transform pixel blocks to DCT coefficients● Get least significant bit of each DCT coefficient● Replace LSB with secret message bit● Insert modified DCT into output image

Page 15: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Images

Original image Data embedded inside

Page 16: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Images● JPEG stegencryption

●Operates in transformation space●No visual changes

● GIF and BMP stegencryption●Operates in low bit planes●Subject to visual attacks

Page 17: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Images

Original image Data embedded inside

Page 18: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Audio

● Use frequencies inaudible to humans● Embed data using the LSB● Encoding musical tones

Page 19: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Implementation

Video

● Visible signals (gestures, movements)● Same techniques as with images● Same techniques as with audio

Page 20: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Text

● Look for (disturbings of) patterns● Odd use of language● Line heights and whitespaces

Page 21: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Images

● Examine color palette● Size of the image● Differences:

− Format

− Last modified date

Page 22: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Images

● Statistical analysis● Analyze frequency of DCT coefficients● Entropy of redundant data

− Hidden content »⇒ higher entropy

Page 23: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Images

● Apply filters to steganograms ● Visible representation of statistical data

Page 24: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Filtered

Original image Embedded data

Page 25: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Filtered

Original image Embedded data

Page 26: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Audio

● Statistical analysis● Analyze patterns in background noise● Distortions● Measure inaudible frequencies

Page 27: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Detection

Video

● Look for distinguishing movements● Same techniques as with images● Same techniques as with audio

Page 28: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Defeating steganography

Text

● Change spacing, interpunction● Modify line heights, layout● Add or remove words

Page 29: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Defeating steganography

Images

● Compress with lossy compression● Convert to different format● Resize the image● Modify colors

Page 30: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Defeating steganography

Audio

● Compress with lossy compression● Change bitrate● Alter / limit frequency spectrum

Page 31: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Defeating steganography

Video

● Same techniques as with images● Same techniques as with audio

Page 32: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Conclusion

● Hide data practically everywhere

● Detection of steganography

−Possible, but can be difficult

−Hard when valid to Kerckhoffs' principle● Defeating steganography is not hard

Page 33: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Steganography

● Questions?

Page 34: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection.

Steganography


Recommended