robert krenn [email protected] january 21, 2004 steganography implementation & detection

34
Robert Krenn [email protected] January 21, 2004 Steganography Implementation & Detection

Upload: peregrine-barnett

Post on 30-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Robert Krenn

[email protected]

January 21, 2004

SteganographyImplementation & Detection

Page 2: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Overview

● What is steganography?

● Implementations● Detection● Defeating steganography● Conclusion● Questions

Page 3: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

Stega-covered, from the Greek “stegos” or roof

-nographywriting, from the Greek “graphia”

Page 4: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

● The art of hiding information inside information

Since everyone can read, encoding text

in neutral sentences is doubtfully effective

Page 5: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

● The art of hiding information inside information

Since everyone can read, encoding text

in neutral sentences is doubtfully effective

Since Everyone Can Read, Encoding Text

In Neutral Sentences Is Doubtfully Effective

⇒ Secret inside

Page 6: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

What is it used for?● Hiding the fact that you are sending messages● Hiding several messages inside data● Digital watermarking

Kerckhoffs' principle● Secure with knowlegde of the system● Message can only be read with secret key

Page 7: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

Hiding several messages● Deniable cryptography● Knowledge of encrypted data● No proof of how much information is stored● Rubberhose (http://www.rubberhose.org)

Page 8: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

What is steganography?

Digital watermarking● Not really hiding information● Important: not modificable● Uses the hiding-property of steganography● Recent: MPAA hides watermarks in movies

Page 9: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Hiding information● Text / Webpages● Images● Audio● Video

Page 10: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Text / Webpages● Use of a codebook● Layout of texts● Every Nth character● Use of whitespaces and newlines● Can be difficult to detect and decode

Page 11: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Text / Webpages

In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say

Page 12: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Text / Webpages

In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say

06081913030629170827 ⇒ meet at dawn

Page 13: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Images● Cover image● Identify redundant data● Replace (a subset of) redundant bits with data

Page 14: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Images● JPEG uses discrete cosine transformations (DCT)● Transform pixel blocks to DCT coefficients● Get least significant bit of each DCT coefficient● Replace LSB with secret message bit● Insert modified DCT into output image

Page 15: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Images

Original image Data embedded inside

Page 16: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Images● JPEG stegencryption

●Operates in transformation space●No visual changes

● GIF and BMP stegencryption●Operates in low bit planes●Subject to visual attacks

Page 17: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Images

Original image Data embedded inside

Page 18: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Audio

● Use frequencies inaudible to humans● Embed data using the LSB● Encoding musical tones

Page 19: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Implementation

Video

● Visible signals (gestures, movements)● Same techniques as with images● Same techniques as with audio

Page 20: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Text

● Look for (disturbings of) patterns● Odd use of language● Line heights and whitespaces

Page 21: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Images

● Examine color palette● Size of the image● Differences:

− Format

− Last modified date

Page 22: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Images

● Statistical analysis● Analyze frequency of DCT coefficients● Entropy of redundant data

− Hidden content »⇒ higher entropy

Page 23: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Images

● Apply filters to steganograms ● Visible representation of statistical data

Page 24: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Filtered

Original image Embedded data

Page 25: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Filtered

Original image Embedded data

Page 26: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Audio

● Statistical analysis● Analyze patterns in background noise● Distortions● Measure inaudible frequencies

Page 27: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Detection

Video

● Look for distinguishing movements● Same techniques as with images● Same techniques as with audio

Page 28: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Defeating steganography

Text

● Change spacing, interpunction● Modify line heights, layout● Add or remove words

Page 29: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Defeating steganography

Images

● Compress with lossy compression● Convert to different format● Resize the image● Modify colors

Page 30: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Defeating steganography

Audio

● Compress with lossy compression● Change bitrate● Alter / limit frequency spectrum

Page 31: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Defeating steganography

Video

● Same techniques as with images● Same techniques as with audio

Page 32: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Conclusion

● Hide data practically everywhere

● Detection of steganography

−Possible, but can be difficult

−Hard when valid to Kerckhoffs' principle● Defeating steganography is not hard

Page 33: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Steganography

● Questions?

Page 34: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection

Steganography