DOC PREVIEW
SJSU CS 265 - Steganography

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

SteganographyOutlineWhat is Steganography?Historical ExamplesShaved head StegNull cipherLSB Embedding - TerminologyLSB - ConceptLSB 24-bit BitmapsLSB 24-bit Bitmaps ExampleMy Own ImplementationThe Message8-bitApproach 1 - EzStegoApproach 2 – S-ToolsLSB – Analysis – The GoodLSB – Analysis – The BadLSB – Analysis – The UglyLSB – Analysis - ConclusionSteganographyLeo LeeCS 265, Section 2Dr. StampApril 5, 2004OutlineWhat is Steganography?Historical ExamplesLSB EmbeddingConceptImplementationAnalysisWhat is Steganography?Literally means “covered writing”Goals:Hide a secret message within some other objectDo so in such a way that the presence of the message is not discernableHistorical ExamplesInvisible Ink used in WWIIMicrodot: A page of information, the size of a printed period.Waxed TabletsA person’s head!Null-ciphers (unencrypted messages)Shaved head Stegmm…Beer…Null cipherMessage sent by German spy in WWIIApparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.Pershing sails from NY June 1Pershing was an American generalLSB Embedding - TerminologyMessage = the secret information we want to hideCover image = image used to hide the message inStego-image = the cover image with the message embeddedLSB - ConceptWhich color is different? In (R,G,B) left and right are (0,255,0) Center one is (0,254,0) We can use the LSB to hold info, since it looks the same either way!LSB 24-bit BitmapsIn 24-bit bmps, each pixel represented by 3 bytes (RGB)Use lsb of each byte to hold a bit of messageLSB 24-bit Bitmaps ExampleMessage = ‘f’ = 0110 01102Cover Image: FF FF FF 00 00 00 FF FF …Stego-image: FE FF FF 00 00 01 FF FE …My Own ImplementationWhich is the stego-image and which the cover?Cover Image Stego-ImageThe Message8-bit Don’t hold direct color valuesDo hold offsets into a paletteCan’t just change lsb, because adjacent colors in palette may not be similarApproach 1 - EzStegoUse cover image with similar colorsExperts recommend gray-scale imagesArrange palette so adjacent colors are similarApproach 2 – S-ToolsUse only x bits for unique color information.8 – x bits are for secret messageExample (x = 7):Can only have 128 unique colorsFor each unique color, there’re two similar colors xxxx xxx0 & xxxx xxx1LSB – Analysis – The GoodSimple to implementAllows for large payloadMax. payload = b * p where;b = number of bytes per pixelp = number of pixels of cover imageLSB – Analysis – The BadEasy for attacker to figure out message if he knows the message is thereBut the images look the same, so can’t tell it’s a stego-image… right?Human vision can’t tell but vulnerable to statistical analysisLSB – Analysis – The UglyIt’s even easier if the attacker just wants to corrupt the message.Just randomize the lsbs himselfEven vulnerable to unintentional corruption: image cropping, conversion to jpeg and back, etc.Integrity is extremely frailLSB – Analysis - ConclusionGood for cases where only low security is desired, but not necessary.Added security when coupled with cryptographyFoundation for many variations, which are more secure e.g. not vulnerable to statistical analysis


View Full Document

SJSU CS 265 - Steganography

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Steganography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Steganography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Steganography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?