page 1 steganography paul krzyzanowski [email protected] [email protected] distributed systems except as...
TRANSCRIPT
![Page 1: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/1.jpg)
Page 1Page 1
Steganography
Paul [email protected]
Distributed Systems
Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.
![Page 2: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/2.jpg)
Page 2
cryptography
κρυπό ς
hidden
γραφία
writing
A secret manner of writing, … Generally, the art of writing or solving ciphers.
— Oxford English Dictionary
![Page 3: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/3.jpg)
Page 3
cryptology
κρυπός
hidden
λογια
speaking
1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them.
— Oxford English Dictionary
![Page 4: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/4.jpg)
Page 4
steganography
στεγανός
covered
γραφία
writing
The art of secret (hidden) writing
![Page 5: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/5.jpg)
Page 5
Steganography
Art and science of communicating in a way that hides the existence of a message
signal or pattern imposed on content
– persistent under transmission– not encryption
• original image/file is intact
– not fingerprinting• fingerprinting leaves separate file describing contents
![Page 6: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/6.jpg)
Page 6
Classic techniques
• Invisible ink (1st century AD - WW II)
• Tatoo message on head
• Overwrite select characters in printed type in pencil– look for the gloss
• Pin punctures in type
• Microdots (WW II)
• Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
![Page 7: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/7.jpg)
Page 7
Motivation
• Steganography received little attention in computing
• Renewed interest because of industry desire to protect copyrighted digital work– audio– images– video– Text
• Detect counterfeiter, unauthorized presentation, embed key, embed author ID
• Steganography ≠ Copy protection
![Page 8: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/8.jpg)
Page 8
Null Cipher
• Hide message among irrelevant data• Confuse the cryptoanalyst
![Page 9: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/9.jpg)
Page 9
Null Cipher
• Hide message among irrelevant data• Confuse the cryptoanalyst
Big rumble in New Guinea.The war oncelebrity acts should end soon.Over fourbig ecstatic elephants replicated.
![Page 10: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/10.jpg)
Page 10
Null Cipher
• Hide message among irrelevant data• Confuse the cryptoanalyst
Big rumble in New Guinea.The war oncelebrity acts should end soon.Over fourbig ecstatic elephants replicated.
Bring two cases of beer.
![Page 11: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/11.jpg)
Page 11
BBC News 27 April 2006
Judge creates own Da Vinci code
The judge who presided over the failed Da Vinci Code plagiarism case at London's High Court hid his own secret code in his written judgement.
Seemingly random italicised letters were included in the 71-page judgement given by Mr Justice Peter Smith, which apparently spell out a message.
Mr Justice Smith said he would confirm the code if someone broke it.
"I can't discuss the judgement, but I don't see why a judgement should not be a matter of fun," he said.
Italicised letters in the first few pages spell out "Smithy Code", while the following pages also contain marked out letters.
http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm
![Page 12: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/12.jpg)
Page 12
Chaffing & Winnowing
• Separate good messages from the bad ones• Stream of unencoded messages with signatures
– Some signatures are bogus– Need key to test
M0M3 M1M2 M0M3 M1M2
Alice Bob
M0M3 M1M2
Irene
? ? ? ?
× × ×OK
![Page 13: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/13.jpg)
Page 13
Image watermarking
• Spatial domain watermarking– bit flipping– color separation
• Frequency domain watermarking– embed signal in select frequency bands (e.g.
high frequency areas)– apply FFT/DCT transform first
– e.g. Digimarc– watermark should alter the least perceptible
bits• these are the same bits targeted by lossy image
compression software
![Page 14: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/14.jpg)
Page 14
UV Watermarking
![Page 15: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/15.jpg)
Page 15
Machine ID codes in laser printers
See http://www.eff.org/Privacy/printers/
![Page 16: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/16.jpg)
Page 16
Machine ID codes in laser printers
![Page 17: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/17.jpg)
Page 17
Machine ID codes in laser printers
![Page 18: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/18.jpg)
Page 18
Machine ID codes in laser printers
![Page 19: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/19.jpg)
Page 19
Text
• Text lines shifted up/down (40 lines text 240 codes)
• word space coding• character encoding - minor changes to
shapes of characters
![Page 20: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/20.jpg)
Page 20
Text
• Text lines shifted up/down (40 lines text 240 codes)
• word space coding• character encoding - minor changes to
shapes of characters
• works only on “images” of text e.g., PDF, postscript
![Page 21: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/21.jpg)
Page 21
Audio
Perceptual coding– inject signal into areas that will not be detected by
humans– may be obliterated by compression
Hardware with copy-protection– not true watermarking - metadata present on media– DAT– minidisc– presence of copy protection mechanisms often failed to
give the media wide-spread acceptance
![Page 22: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/22.jpg)
Page 22
Video
• Coding still frames - spatial or frequency
• data encoded during refresh– closed captioning
• visible watermarking– used by most networks (logo at bottom-right)
![Page 23: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/23.jpg)
Page 23
Watermarking vs. Steganography
Goal of steganography– Intruder cannot detect a message– Primarily 1:1 communication
Goal of watermarking– Intruder cannot remove or replace the message– Primarily 1:many communication
![Page 24: Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is](https://reader035.vdocuments.site/reader035/viewer/2022062421/56649e225503460f94b0ecbd/html5/thumbnails/24.jpg)
Page 24Page 24
The end.