DOC PREVIEW
MASON ECE 646 - Steganography

This preview shows page 1-2-22-23 out of 23 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

SteganographyWhat is SteganographyUsage of Steganography vs CryptographySteganographic AlgorithmsAttacks on Steganography, SteganalysisSteganalysis AttacksAttacks Against Steganography Vs Attacks Against CryptographyEzStegoAttacking EzStegoPoV FrequencySimilarity to Monoalphabetic CrackShared Key SteganographyF5 AlgorithmAttacking F5Ideal Steganographic AlgorithmWatermarkingWatermarking vs Digital SignatureDefending Against SteganographyConclusionQuestions ?SteganographySteganographyBrent McClainBrent McClainRob CareyRob CareyWhat is SteganographyWhat is SteganographyGreek Origin Greek Origin ““SteganosSteganos” means covered” means covered“Graph” means writing“Graph” means writingHiding information in plain sightHiding information in plain sightCover ImageAnother image hidden in the pictureCreated with InfoStegUsage of Steganography Usage of Steganography vsvsCryptographyCryptographySteganographySteganographyCovert ChannelCovert ChannelOnly useful for low Only useful for low volume of datavolume of dataWatermarking is used Watermarking is used for verificationfor verificationCryptographyCryptographyCovert MessageCovert MessageUseful for any given Useful for any given volume of datavolume of dataDigital Signatures are Digital Signatures are used for verificationused for verificationSteganographicSteganographicAlgorithmsAlgorithmsNo published standardNo published standardAlgorithms are hidden until cracked Algorithms are hidden until cracked Security through obscurity Security through obscurity Types of AlgorithmsTypes of AlgorithmsLSBLSBDCTDCTAttacks on Steganography, Attacks on Steganography, SteganalysisSteganalysisSteganalysisSteganalysisis the detection and analysis is the detection and analysis of data that has been hidden using of data that has been hidden using Steganography. Steganography. SteganalyisSteganalyisprimarily uses statistics to primarily uses statistics to detect and attack Steganographydetect and attack SteganographySteganalysisSteganalysisAttacksAttacksStegoStegoonly attackonly attack––StegoStegoObject availableObject availableKnown cover attackKnown cover attack--Original Cover and Original Cover and StegoStegoObjects Objects are availableare availableKnown message attackKnown message attack--Hidden Message and Hidden Message and StegoStegoObject are availableObject are availableChosen Chosen stegostegoattackattack--The The StegoStegoAlgorithm and Algorithm and StegoStegoObject are availableObject are availableChosen message attackChosen message attack--Takes a chosen message Takes a chosen message and generates a and generates a StegoStegoObject for comparisonObject for comparisonKnown Known stegostegoattackattack--the the StegoStegoAlgorithm, the Cover Algorithm, the Cover Object and the Object and the StegoStegoObject are availableObject are availableAttacks Against Attacks Against Steganography Vs Attacks Steganography Vs Attacks Against CryptographyAgainst CryptographySteganalyisSteganalyisCryptanalysisCryptanalysisStegoStegoonly attackonly attackCiphertextCiphertextonly attackonly attackKnown message attackKnown message attackKnown plaintext attackKnown plaintext attackChosen message attackChosen message attackChosen plaintext attackChosen plaintext attackChosen Chosen stegostegoattackattackChosen Chosen ciphertextciphertextattackattackEzStegoEzStegoHides data in the LSBHides data in the LSBSorts the color palette of a GIFSorts the color palette of a GIFChanges pixel color based on data being Changes pixel color based on data being hiddenhiddenBefore EzStego Before EzStego SortingSortingAfter EzStego SortingAfter EzStego SortingOriginal Image50% EmbeddedOriginal Image Filtered 50% Embedded FilteredAttacking EzStegoAttacking EzStegoFrequency Based DeterminationFrequency Based Determinationχχ² (Chi² (Chi--Squared) AttackSquared) AttackUses Pairs of Values Uses Pairs of Values Values which only differ by the LSBValues which only differ by the LSBNormal ImageNormal ImageEzStego ImageEzStego ImagePoVPoVFrequencyFrequencySimilarity to Similarity to MonoalphabeticMonoalphabeticCrack Crack Character Frequency in a long English plain textCharacter Frequency in the corresponding cipher text for a shift cipherShared Key Shared Key SteganographySteganographyAdvanced Advanced SteganographicSteganographicAlgorithmsAlgorithmsDistribution Behaviors changes base on Distribution Behaviors changes base on the private keythe private keyLack of preordained distribution set Lack of preordained distribution set decreases probability of detectiondecreases probability of detectionF5 AlgorithmF5 AlgorithmThe private key acts as seed for the pseudo The private key acts as seed for the pseudo random number generation schemerandom number generation schemePseudoPseudo--Random walk through image to Random walk through image to randomize distribution signaturerandomize distribution signatureMatrixMatrix--based embedding schemebased embedding schemeDecrements DCT coefficient instead of just Decrements DCT coefficient instead of just setting LSBsetting LSBImmune to Immune to χχ² Attack² AttackAttacking F5Attacking F5Still a Frequency Based attackStill a Frequency Based attackEstimated cover image is recreated by Estimated cover image is recreated by decompressing, manipulating, and decompressing, manipulating, and recompressingrecompressingDeviation of the Deviation of the DCT’sDCT’sfrom the value 0 from the value 0 are compared in the histograms of the are compared in the histograms of the observed image and the estimated cover observed image and the estimated cover imageimageIdeal Ideal SteganographicSteganographicAlgorithmAlgorithmAvoids detection when Avoids detection when SteganographicSteganographicAlgorithm is knownAlgorithm is knownGood ratio between Cover Object and Good ratio between Cover Object and Hidden Object sizeHidden Object sizeWatermarkingWatermarkingWatermarking is a subset of Watermarking is a subset of SteganographySteganographyUsed for document tracking and rights Used for document tracking and rights managementmanagementMovies distributed for review carry Movies distributed for review carry watermarks to identify who they were sent watermarks to identify who they were sent


View Full Document

MASON ECE 646 - Steganography

Documents in this Course
Load more
Download Steganography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Steganography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Steganography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?