Beruflich Dokumente
Kultur Dokumente
Jaderick P. Pabico Institute of Computer Science, College of Arts and Sciences University of the Philippines Los Baos, College 4031, Laguna
11th Philippine Computing Science Congress (PCSC 2011) Ateneo de Naga University, Naga City, 4-5 March 2011.
Outline
?
There is a hidden image in the ADNU logo?
DEFINITION OF TERMS
Terms!
Terms!
Terms!
Steganography
Greek words steganos + graphein Concealed writing A form of communication such that no one, except the sender and the receiver of the message, suspects that a message exists. Both a science and an art of secured communication through obscurity
Steganalysis
Parameters
Formalization/Abstraction
c1
Mc
c2
Past Techniques
History!
Historical account
A book on cryptography and steganography disquised as a book on magic. Conceal messages in long invocations of the names of angels Ave Maria cipher
Historical account
Example
M = prymus apex
Historical account
Example
M = prymus apex
Do a perfect shuffle on the array of words ... concatenate all words into an array of letters ... and then do a perfect shuffle on it.
Historical account
padiel aporsy mesarpon omeuas peludyn malpreaxo
Historical account
padiel aporsy mesarpon omeuas peludyn malpreaxo padiel mesarpon peludyn aporsy omeuas malpreaxo
Historical account
padiel aporsy mesarpon omeuas peludyn malpreaxo padiel mesarpon peludyn aporsy omeuas malpreaxo aporsy omeuas malpreaxo
Historical account
padiel aporsy mesarpon omeuas peludyn malpreaxo padiel mesarpon peludyn aporsy omeuas malpreaxo aporsy omeuas malpreaxo aporsyomeuasmalpreaxo
Historical account
padiel aporsy mesarpon omeuas peludyn malpreaxo padiel mesarpon peludyn aporsy omeuas malpreaxo aporsy omeuas malpreaxo aporsyomeuasmalpreaxo aosoeamlraoprymusapex
Do a perfect shuffle on the array of words ... concatenate all words into an array of letters ... and then do a perfect shuffle on it.
Historical account
Another example:
Apparently neutral's protest is thoroughly discounted and Mc = Ignored. Isman hard hit. Blockade issue affects pretext for embargo on By-products, ejecting suets and vegetable oils.
M=
Historical account
Apparently neutral's protest is thoroughly discounted and Mc = Ignored. Isman hard hit. Blockade issue affects pretext for embargo on By-products, ejecting suets and vegetable oils.
M=
Historical account
Apparently neutral's protest is thoroughly discounted and Mc = Ignored. Isman hard hit. Blockade issue affects pretext for embargo on By-products, ejecting suets and vegetable oils.
M=
Historical account
Greek tyrant Histiaeus shaved the head of the messenger, tattoo the message, and wait for the hair to grow.
Historical account
Example:
Mc
Historical account
Simple Steps
Message M is tattoed on the scalp of the messenger C M is hidden by the growth of C's hair M is exposed by shaving the head of C Delayed transmission while waiting for hair to grow Low storage capacity (scalp is too small for long M)
Drawbacks
Historical account
Founder of Scouting Movement Was a spy for the British military against the Boer infantry His simple job was to mark the positions of Boer artillery He concealed the maps of artillery location (M) within drawings of butterflies (Mc) Certain markings on butterfly wings were actually the positions of the artillery installations
Previous Techniques
Wax tablet
Write M on wood c1 Cover c1 with wax c2 Write the cover message Mc on c2 The Mc must be innocent looking
M is exposed when c2 melts.
Requirement:
Drawback
Previous Techniques
M is written on back of C using invisible inks C does not know M M might be erased/contaminated when C's body becomes wet due to rain or perspiration
Advantage
Drawback
Previous Techniques
Innovation 1
M is translated to Morse code (or any other code that uses binary translation) The Morse pattern Mc is knitted as a clothing c1 c1 is worn by the courier c2
Previous Techniques
Innovation 2
Mc is written on paper c1 using a regular ink M is written on c1 using invisible ink either on
Example: UV light
Previous Techniques
Drawback:
Previous Techniques
Drawback:
Previous Techniques
Using Microdots
Less than the size of a period produced by a typewritter, or the tittle of a lowercase i or j. Image M is taken by a microdot camera. The microdot images act as periods in a sentence, or in the small letter i or j of Mc.
Watch out for the dots. Lots and lots of little dots.
Current Algorithms
What is up?
What is new?!
Mc = image of a tree
M = image of a cat
Source: wikipedia
How to extract?
Remove all except the last two LSB of each RGB value of each pixel (this produces a very dark image) Make the resulting image 85 times brighter
Mc = Image of a tree
M = Image of a cat
Source: wikipedia
Reduce the brightness of M 85 times For each RGB component of each pixel of Mc, replace the last 2 LSB with the corresponding in M.
Mc = Image of a tree
M = Image of a cat
Source: wikipedia
Basic idea:
Basic idea:
R: 255 G: 0 B: 0
R: 254 G: 0 B: 0
R: 253 G: 0 B: 0
R: 252 G: 0 B: 0
Basic idea:
R: 255 G: 0 B: 0
R: 254 G: 0 B: 0
R: 253 G: 0 B: 0
R: 252 G: 0 B: 0
11111111
11111110
11111101
11111100
Basic idea:
R: 255 G: 0 B: 0
R: 254 G: 0 B: 0
R: 253 G: 0 B: 0
R: 252 G: 0 B: 0
11111111
11111110
11111101
11111100
Basic idea:
R: 255 R: 254 R: 253 To a naked human G: 0 G: 0 But to a computer,0 G: eye, these rectangles these shapes are B: the same color B: 0 colored differently. 0 B: 0 have
11111111
11111110
11111101
11111100
Basic idea:
The same technique can also be used R: 255 R: 254audio R: 253 R: 252 in files
G: 0 But to a computer,0 G: these shapes are B: 0 colored differently. B: 0
11111111
11111110
11111101
11111100
Noise (static noise or background noise) Echo Accompanying instruments for music files
Trivial: a hidden disk partition where M is stored In Linux, sfpatch is a kernel patch which is the OS's modular support for steganography
Sfpatch in linux
In FAT16 file system, the file allocation table allots 32KB of disk space to each file. If the file size is a few KB, the rest of the space is used to hide information.
FAT16 FS
In FAT16, deleted files are not really erased from the system Only the file allocation table entry is deleted, the whole file is still stored on the file system
the first letter of the filename is replaced by a nonprinting character Creative users use deleted files in FAT16 as Mc
Other Techniques
Mimic: convert a file to have the statistical profile of another Tampered executable/object files (as in virus infection of the old) Blog-steganography: usually, steganography keys are burried in the comments or in orphaned blogs. Steganophony: steganography in VoIP systems Using sudoku puzzle (recall: Mercury Rising)
Prospects
What can we do?!
Can we do something?
Prospects
Automated steganalysis
Difficult to do as current techniques require human intervention Can AI techniques be used? Application of parallel processes to apply to a given set (say all images in a website) all known steganalysis techniques.
Acknowledgements
ICS-GF#2326103 CAS-TF#8217300
Questions?
Soft computing and machine learning HPC/scheduling and dynamic load balancing Wireless adhoc networks Computer security and forensics Information visualization
http://www.ics.uplb.edu.ph/jppabico