際際滷

際際滷Share a Scribd company logo
1
241-427-SV-2-2553-COE-PSU 1
241-427 Computer Security
Chapter II: Steganography
Dr. Sangsuree Vasupongayya
241-427-SV-2-2553-COE-PSU 2
Outline
History
What is steganography
Steganography
Text
Image
Audio
Steganalysis
241-427-SV-2-2553-COE-PSU 3
Steganography
The art and science of communicating in a way
which hides the existence of the communication
Goal
to hide messages inside other harmless messages
in away that does not allow any enemy to even
detect that there is a second secret message
present
E.g.,
Watermarking
Fingerprinting
2
241-427-SV-2-2553-COE-PSU 4
Watermarking and Fingerprinting
Watermarking: hiding a trademark in a digital
object
Fingerprinting: hiding characteristics such as a
serial number within a digital object to distinguish it
from a similar digital object
Used to fight piracy
Watermarking is for detection
Fingerprinting is for prosecution
241-427-SV-2-2553-COE-PSU 5
Steganography in Text
Modern application is for detecting illegal document
distribution
Also detects document tampering
Words with document images or document format
files (postscript, TEX, etc.)
Alters specific features
Lines spacing coding
Word spacing coding
Feature-specific coding
241-427-SV-2-2553-COE-PSU 6
Line-Shift Coding
Subtle shifting of line spacing transmits information
Easy to implement with modern laser printers
Shift lines 1-2 dots/pixels up or down to convey a bit
of information
Easy to detect
More successful with handwritten documents on
unlined paper
3
241-427-SV-2-2553-COE-PSU 7
Word-Shift Coding
Harnesses variable spacing between words to
convey information
Fixed spacing systems cannot do this
Variable spacing in word processors can do this
Easily detected/ defeated if spacing algorithm is
known
Encoding needs to preserve overall line length and
content
Encoded lines should not be longer / shorter
Encoding should not introduce new line breaks
241-427-SV-2-2553-COE-PSU 8
Feature Coding
Features of individual characters are modified
Modifying height of endlines on letters: b, d, h, etc.
Modifying length of drop on letters: c, e, s, etc.
Syntax encoding (how we punctuate)
 bread, butter, and milk
bread, butter and milk
Semantic encoding (the words we use)
Alternating synonyms (big / large, etc.)
Synonym substitution
241-427-SV-2-2553-COE-PSU 9
Steganography in Images
Exploiting the limited powers of the human visual
system (HVS)
Humans are not very good at distinguishing subtle
changes in
Color
Brightness
Busy, gray-scale images are preferred
4
241-427-SV-2-2553-COE-PSU 10
Image Compression
Two main types
lossless
Lossy
Lossless
Preferred as hidden data remains unaffected
GIF, BMP
Lossy
Could have negative impact
Depends on the encoding algorithm
JPEG
241-427-SV-2-2553-COE-PSU 11
LSB Insertion
Common and simple
Fragile when lossy compression is used
Or when format is converted
We steal bits from the image in some way
From the pixels themselves
From the color table if one is in use
Different stealing: mechanisms have different
impacts on the resultant image
241-427-SV-2-2553-COE-PSU 12
Steganography in Audio
The human audio system (HAS) is more sensitive
than the HVS
The opportunity occurs in volume
Large sounds tend to drown out small sounds
In general, it is easy for HAS to detect added noise
Except where the noise is added to the backgraound,
smaller, sounds
Low-Bit Encoding
similar to image LBE
Steal the low order bit of each audio byte
In general, not a good technique
Introduces audible noise
Channel noise and other factors can destroy the
hidden signal
Phase coding, Spread spectrum, Echo data hiding
5
241-427-SV-2-2553-COE-PSU 13
Steganalysis
Steganography
Avoidance of suspicion to hidden messages in other
data
Steganalysis
Aims to discover and render useless such covert
messages
Methods: detection or destruction of the hidden messages
Examples
Watermark detector: degrading image until no
watermark can be found; random signals are added so
that the watermark cannot be detected
241-427-SV-2-2553-COE-PSU 14
References
Steganography Past, Present and Future
http://www.sans.org/reading_room/whitepapers/st
enganography/steganography-past-present-
future_552
http://www.lia.deis.unibo.it/Courses/RetiDiCalcolat
ori/Progetti98/Fortini/history.html
J. Brassil, S. Low, N. Maxemchuk, and L. O'
Garman. Electronic marking and identification
techniques to discourage document copying. In
IEEE Infocom 94, pages 1278-1287, 1994.
W.Bender, D. Gruhl, N. Morimoto, and A. Lu.
Techniques for data hiding. In IBM Systems
Journal, Vol. 35, No. 3-4, pages 313-336, February
1996.

More Related Content

Similar to Ch02-Computer Security (11)

83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
Prashant Shukla
A New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio FileA New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio File
CSCJournals
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
F017253244
F017253244F017253244
F017253244
IOSR Journals
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
Pbl1
Pbl1Pbl1
Pbl1
Pijo Jonas
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
IOSR Journals
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
9905234521
Stegnography final
Stegnography finalStegnography final
Stegnography final
Heena Bohra
dokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptxdokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptx
ShubhamPancheshwar1
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
Prashant Shukla
A New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio FileA New Steganographic Method for Embedded Image In Audio File
A New Steganographic Method for Embedded Image In Audio File
CSCJournals
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
IOSR Journals
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
9905234521
Stegnography final
Stegnography finalStegnography final
Stegnography final
Heena Bohra
dokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptxdokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptx
ShubhamPancheshwar1

More from Attaporn Ninsuwan (20)

J query fundamentals
J query fundamentalsJ query fundamentals
J query fundamentals
Attaporn Ninsuwan
Jquery enlightenment
Jquery enlightenmentJquery enlightenment
Jquery enlightenment
Attaporn Ninsuwan
Jquery-Begining
Jquery-BeginingJquery-Begining
Jquery-Begining
Attaporn Ninsuwan
Br ainfocom94
Br ainfocom94Br ainfocom94
Br ainfocom94
Attaporn Ninsuwan
Chapter 12 - Computer Forensics
Chapter 12 - Computer ForensicsChapter 12 - Computer Forensics
Chapter 12 - Computer Forensics
Attaporn Ninsuwan
Techniques for data hiding p
Techniques for data hiding pTechniques for data hiding p
Techniques for data hiding p
Attaporn Ninsuwan
Stop badware infected_sites_report_062408
Stop badware infected_sites_report_062408Stop badware infected_sites_report_062408
Stop badware infected_sites_report_062408
Attaporn Ninsuwan
Steganography past-present-future 552
Steganography past-present-future 552Steganography past-present-future 552
Steganography past-present-future 552
Attaporn Ninsuwan
Ch03-Computer Security
Ch03-Computer SecurityCh03-Computer Security
Ch03-Computer Security
Attaporn Ninsuwan
Ch01-Computer Security
Ch01-Computer SecurityCh01-Computer Security
Ch01-Computer Security
Attaporn Ninsuwan
Ch8-Computer Security
Ch8-Computer SecurityCh8-Computer Security
Ch8-Computer Security
Attaporn Ninsuwan
Ch7-Computer Security
Ch7-Computer SecurityCh7-Computer Security
Ch7-Computer Security
Attaporn Ninsuwan
Ch6-Computer Security
Ch6-Computer SecurityCh6-Computer Security
Ch6-Computer Security
Attaporn Ninsuwan
Ch06b-Computer Security
Ch06b-Computer SecurityCh06b-Computer Security
Ch06b-Computer Security
Attaporn Ninsuwan
Ch5-Computer Security
Ch5-Computer SecurityCh5-Computer Security
Ch5-Computer Security
Attaporn Ninsuwan
Ch04-Computer Security
Ch04-Computer SecurityCh04-Computer Security
Ch04-Computer Security
Attaporn Ninsuwan
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier Transform
Attaporn Ninsuwan
Chapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformChapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier Transform
Attaporn Ninsuwan
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsChapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic Signals
Attaporn Ninsuwan
Chapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant SystemChapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant System
Attaporn Ninsuwan
Chapter 12 - Computer Forensics
Chapter 12 - Computer ForensicsChapter 12 - Computer Forensics
Chapter 12 - Computer Forensics
Attaporn Ninsuwan
Techniques for data hiding p
Techniques for data hiding pTechniques for data hiding p
Techniques for data hiding p
Attaporn Ninsuwan
Stop badware infected_sites_report_062408
Stop badware infected_sites_report_062408Stop badware infected_sites_report_062408
Stop badware infected_sites_report_062408
Attaporn Ninsuwan
Steganography past-present-future 552
Steganography past-present-future 552Steganography past-present-future 552
Steganography past-present-future 552
Attaporn Ninsuwan
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier Transform
Attaporn Ninsuwan
Chapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier TransformChapter4 - The Continuous-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier Transform
Attaporn Ninsuwan
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic SignalsChapter3 - Fourier Series Representation of Periodic Signals
Chapter3 - Fourier Series Representation of Periodic Signals
Attaporn Ninsuwan
Chapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant SystemChapter2 - Linear Time-Invariant System
Chapter2 - Linear Time-Invariant System
Attaporn Ninsuwan

Recently uploaded (20)

URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
Prabhakar Singh Patel
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptxO SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
Literature Hero
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷sPurchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Celine George
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
Nguyen Thanh Tu Collection
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean ExpressionsIntroduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
GS Virdi
How to process Interwarehouse and Intrawarehouse transfers in Odoo
How to process Interwarehouse and Intrawarehouse transfers in OdooHow to process Interwarehouse and Intrawarehouse transfers in Odoo
How to process Interwarehouse and Intrawarehouse transfers in Odoo
Celine George
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. DabhadeSynthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
LITERATURE QUIZ | THE QUIZ CLUB OF PSGCAS | 11 MARCH 2025 .pdf
LITERATURE QUIZ | THE QUIZ CLUB OF PSGCAS | 11 MARCH 2025 .pdfLITERATURE QUIZ | THE QUIZ CLUB OF PSGCAS | 11 MARCH 2025 .pdf
LITERATURE QUIZ | THE QUIZ CLUB OF PSGCAS | 11 MARCH 2025 .pdf
Quiz Club of PSG College of Arts & Science
Using GenAI for Universal Design for Learning
Using GenAI for Universal Design for LearningUsing GenAI for Universal Design for Learning
Using GenAI for Universal Design for Learning
Damian T. Gordon
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptxBUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
Quiz Club of PSG College of Arts & Science
PUBH1000 際際滷s - Module 7: Ecological Health
PUBH1000 際際滷s - Module 7: Ecological HealthPUBH1000 際際滷s - Module 7: Ecological Health
PUBH1000 際際滷s - Module 7: Ecological Health
Jonathan Hallett
Strategic Corporate Social Responsibility: Sustainable Value Creation Fourth
Strategic Corporate Social Responsibility: Sustainable Value Creation FourthStrategic Corporate Social Responsibility: Sustainable Value Creation Fourth
Strategic Corporate Social Responsibility: Sustainable Value Creation Fourth
keileyrazawi
NC Advisory Council on Student Safety and Well-Being
NC Advisory Council on Student Safety and Well-BeingNC Advisory Council on Student Safety and Well-Being
NC Advisory Council on Student Safety and Well-Being
Mebane Rash
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. VirdiDigital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
GS Virdi
Anthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Anthelmintic Agent.pptx by Mrs. Manjushri P. DabhadeAnthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Anthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
The Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptxThe Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptx
SamarHosni3
Pushyabhuti Dynesty Vardhan Vamsha Early Rulers.pptx
Pushyabhuti Dynesty Vardhan Vamsha Early Rulers.pptxPushyabhuti Dynesty Vardhan Vamsha Early Rulers.pptx
Pushyabhuti Dynesty Vardhan Vamsha Early Rulers.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
PSD-I Exam Dumps: Your Key to Passing on the First Try
PSD-I Exam Dumps: Your Key to Passing on the First TryPSD-I Exam Dumps: Your Key to Passing on the First Try
PSD-I Exam Dumps: Your Key to Passing on the First Try
lethamcmullen
Test Bank Pharmacology 3rd Edition Brenner Stevens
Test Bank Pharmacology 3rd Edition Brenner  StevensTest Bank Pharmacology 3rd Edition Brenner  Stevens
Test Bank Pharmacology 3rd Edition Brenner Stevens
evakimworwa38
How to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of SaleHow to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of Sale
Celine George
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
Prabhakar Singh Patel
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptxO SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
Literature Hero
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷sPurchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Celine George
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
Nguyen Thanh Tu Collection
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean ExpressionsIntroduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
Introduction to Karnaugh Maps (K-Maps) for Simplifying Boolean Expressions
GS Virdi
How to process Interwarehouse and Intrawarehouse transfers in Odoo
How to process Interwarehouse and Intrawarehouse transfers in OdooHow to process Interwarehouse and Intrawarehouse transfers in Odoo
How to process Interwarehouse and Intrawarehouse transfers in Odoo
Celine George
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. DabhadeSynthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Synthesis for VIth SEM 21-2-25.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
Using GenAI for Universal Design for Learning
Using GenAI for Universal Design for LearningUsing GenAI for Universal Design for Learning
Using GenAI for Universal Design for Learning
Damian T. Gordon
PUBH1000 際際滷s - Module 7: Ecological Health
PUBH1000 際際滷s - Module 7: Ecological HealthPUBH1000 際際滷s - Module 7: Ecological Health
PUBH1000 際際滷s - Module 7: Ecological Health
Jonathan Hallett
Strategic Corporate Social Responsibility: Sustainable Value Creation Fourth
Strategic Corporate Social Responsibility: Sustainable Value Creation FourthStrategic Corporate Social Responsibility: Sustainable Value Creation Fourth
Strategic Corporate Social Responsibility: Sustainable Value Creation Fourth
keileyrazawi
NC Advisory Council on Student Safety and Well-Being
NC Advisory Council on Student Safety and Well-BeingNC Advisory Council on Student Safety and Well-Being
NC Advisory Council on Student Safety and Well-Being
Mebane Rash
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. VirdiDigital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
Digital Electronics - Boolean Algebra (Module 2) - Dr. G.S. Virdi
GS Virdi
Anthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Anthelmintic Agent.pptx by Mrs. Manjushri P. DabhadeAnthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Anthelmintic Agent.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
The Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptxThe Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptx
SamarHosni3
PSD-I Exam Dumps: Your Key to Passing on the First Try
PSD-I Exam Dumps: Your Key to Passing on the First TryPSD-I Exam Dumps: Your Key to Passing on the First Try
PSD-I Exam Dumps: Your Key to Passing on the First Try
lethamcmullen
Test Bank Pharmacology 3rd Edition Brenner Stevens
Test Bank Pharmacology 3rd Edition Brenner  StevensTest Bank Pharmacology 3rd Edition Brenner  Stevens
Test Bank Pharmacology 3rd Edition Brenner Stevens
evakimworwa38
How to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of SaleHow to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of Sale
Celine George

Ch02-Computer Security

  • 1. 1 241-427-SV-2-2553-COE-PSU 1 241-427 Computer Security Chapter II: Steganography Dr. Sangsuree Vasupongayya 241-427-SV-2-2553-COE-PSU 2 Outline History What is steganography Steganography Text Image Audio Steganalysis 241-427-SV-2-2553-COE-PSU 3 Steganography The art and science of communicating in a way which hides the existence of the communication Goal to hide messages inside other harmless messages in away that does not allow any enemy to even detect that there is a second secret message present E.g., Watermarking Fingerprinting
  • 2. 2 241-427-SV-2-2553-COE-PSU 4 Watermarking and Fingerprinting Watermarking: hiding a trademark in a digital object Fingerprinting: hiding characteristics such as a serial number within a digital object to distinguish it from a similar digital object Used to fight piracy Watermarking is for detection Fingerprinting is for prosecution 241-427-SV-2-2553-COE-PSU 5 Steganography in Text Modern application is for detecting illegal document distribution Also detects document tampering Words with document images or document format files (postscript, TEX, etc.) Alters specific features Lines spacing coding Word spacing coding Feature-specific coding 241-427-SV-2-2553-COE-PSU 6 Line-Shift Coding Subtle shifting of line spacing transmits information Easy to implement with modern laser printers Shift lines 1-2 dots/pixels up or down to convey a bit of information Easy to detect More successful with handwritten documents on unlined paper
  • 3. 3 241-427-SV-2-2553-COE-PSU 7 Word-Shift Coding Harnesses variable spacing between words to convey information Fixed spacing systems cannot do this Variable spacing in word processors can do this Easily detected/ defeated if spacing algorithm is known Encoding needs to preserve overall line length and content Encoded lines should not be longer / shorter Encoding should not introduce new line breaks 241-427-SV-2-2553-COE-PSU 8 Feature Coding Features of individual characters are modified Modifying height of endlines on letters: b, d, h, etc. Modifying length of drop on letters: c, e, s, etc. Syntax encoding (how we punctuate) bread, butter, and milk bread, butter and milk Semantic encoding (the words we use) Alternating synonyms (big / large, etc.) Synonym substitution 241-427-SV-2-2553-COE-PSU 9 Steganography in Images Exploiting the limited powers of the human visual system (HVS) Humans are not very good at distinguishing subtle changes in Color Brightness Busy, gray-scale images are preferred
  • 4. 4 241-427-SV-2-2553-COE-PSU 10 Image Compression Two main types lossless Lossy Lossless Preferred as hidden data remains unaffected GIF, BMP Lossy Could have negative impact Depends on the encoding algorithm JPEG 241-427-SV-2-2553-COE-PSU 11 LSB Insertion Common and simple Fragile when lossy compression is used Or when format is converted We steal bits from the image in some way From the pixels themselves From the color table if one is in use Different stealing: mechanisms have different impacts on the resultant image 241-427-SV-2-2553-COE-PSU 12 Steganography in Audio The human audio system (HAS) is more sensitive than the HVS The opportunity occurs in volume Large sounds tend to drown out small sounds In general, it is easy for HAS to detect added noise Except where the noise is added to the backgraound, smaller, sounds Low-Bit Encoding similar to image LBE Steal the low order bit of each audio byte In general, not a good technique Introduces audible noise Channel noise and other factors can destroy the hidden signal Phase coding, Spread spectrum, Echo data hiding
  • 5. 5 241-427-SV-2-2553-COE-PSU 13 Steganalysis Steganography Avoidance of suspicion to hidden messages in other data Steganalysis Aims to discover and render useless such covert messages Methods: detection or destruction of the hidden messages Examples Watermark detector: degrading image until no watermark can be found; random signals are added so that the watermark cannot be detected 241-427-SV-2-2553-COE-PSU 14 References Steganography Past, Present and Future http://www.sans.org/reading_room/whitepapers/st enganography/steganography-past-present- future_552 http://www.lia.deis.unibo.it/Courses/RetiDiCalcolat ori/Progetti98/Fortini/history.html J. Brassil, S. Low, N. Maxemchuk, and L. O' Garman. Electronic marking and identification techniques to discourage document copying. In IEEE Infocom 94, pages 1278-1287, 1994. W.Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. In IBM Systems Journal, Vol. 35, No. 3-4, pages 313-336, February 1996.