SlideShare ist ein Scribd-Unternehmen logo
1 von 76
Downloaden Sie, um offline zu lesen
Steganography
                 Hiding information in past, present and future.


                              Alberto Villegas Erce
                             albvi@correo.ugr.es

                                 Cryptography
                                University of Granada


                                    April 2010




Alberto V. E. (CRYP - UGR)           Steganography                 April 2010   1 / 38
Review


Concepts review
Previously in crypto-world...


Math background
Modular arithmetics give us the power
       Factorization and Primality.
       Finite fields.
       Pseudo-random Sequences.
       ...

Cryptography History
From ancient greeks to Enigma machine.

Information Theory
Shannon’s theory for perfect crypto security.

   Alberto V. E. (CRYP - UGR)         Steganography   April 2010   2 / 38
Review


Today
Steganography




                               What is Steganography?
                               We will review the topic through history
                                 1   Past: historical examples.
                                 2   Present: digital era.
                                 3   Future: no-that-much science fiction
                                     ideas.




  Alberto V. E. (CRYP - UGR)           Steganography                April 2010   3 / 38
Review


Index




                                          1    Introduction
                                          2    Past
                                          3    Present
                                          4    Future
                                          5    Conclusions




 Alberto V. E. (CRYP - UGR)    Steganography                  April 2010   4 / 38
Introduction


Index




                                               1    Introduction
                                               2    Past
                                               3    Present
                                               4    Future
                                               5    Conclusions




 Alberto V. E. (CRYP - UGR)         Steganography                  April 2010   5 / 38
Introduction


Stegano... what?


                                         What is Steganography?
                                               A word with 4 vowels...
                                               ... and 9 consonants.
                                               Sounds like Cryptography.

                                         Error!
                                                    You are doing it wrong!

                                         Greek: “concealed writing”
                                         Steganos: covered or protected.
                                         Graphein: to write.



 Alberto V. E. (CRYP - UGR)         Steganography                      April 2010   6 / 38
Introduction


Stegano... what?


                                         What is Steganography?
                                               A word with 4 vowels...
                                               ... and 9 consonants.
                                               Sounds like Cryptography.

                                         Error!
                                                    You are doing it wrong!

                                         Greek: “concealed writing”
                                         Steganos: covered or protected.
                                         Graphein: to write.



 Alberto V. E. (CRYP - UGR)         Steganography                      April 2010   6 / 38
Introduction


Stegano... what?


                                         What is Steganography?
                                               A word with 4 vowels...
                                               ... and 9 consonants.
                                               Sounds like Cryptography.

                                         Error!
                                                    You are doing it wrong!

                                         Greek: “concealed writing”
                                         Steganos: covered or protected.
                                         Graphein: to write.



 Alberto V. E. (CRYP - UGR)         Steganography                      April 2010   6 / 38
Introduction


Stegano... what?


                                         What is Steganography?
                                               A word with 4 vowels...
                                               ... and 9 consonants.
                                               Sounds like Cryptography.

                                         Error!
                                                    You are doing it wrong!

                                         Greek: “concealed writing”
                                         Steganos: covered or protected.
                                         Graphein: to write.



 Alberto V. E. (CRYP - UGR)         Steganography                      April 2010   6 / 38
Introduction


Stegano... what?


                                         What is Steganography?
                                               A word with 4 vowels...
                                               ... and 9 consonants.
                                               Sounds like Cryptography.

                                         Error!
                                                    You are doing it wrong!

                                         Greek: “concealed writing”
                                         Steganos: covered or protected.
                                         Graphein: to write.



 Alberto V. E. (CRYP - UGR)         Steganography                      April 2010   6 / 38
Introduction


Steganography
Definition




Steganography
Art and science of writing hidden messages in such a way that no one
suspects the existence of the message.

   But, then, what is the difference with
   Cryptography?
   “Cryptography is about protecting the
   content of messages, steganography is
   about concealing their very existence” [1]




  Alberto V. E. (CRYP - UGR)         Steganography          April 2010   7 / 38
Introduction


Steganography
Definition




Steganography
Art and science of writing hidden messages in such a way that no one
suspects the existence of the message.

   But, then, what is the difference with
   Cryptography?
   “Cryptography is about protecting the
   content of messages, steganography is
   about concealing their very existence” [1]




  Alberto V. E. (CRYP - UGR)         Steganography          April 2010   7 / 38
Introduction


Steganography
Terminology [1]




      Embedded data (M): the message that one wishes to send secretly.
      Cover-text (O): (covert-image or cover-audio) innocuous message
      used to hide the embedded data.
      Stego-key (K ): used to control the hiding process.
                     ˜
      Stego-object (M): the combination of the previous.
                                          ˜
                                 M ×O ×K →M




  Alberto V. E. (CRYP - UGR)         Steganography           April 2010   8 / 38
Introduction


Steganography
Terminology [1]




      Embedded data (M): the message that one wishes to send secretly.
      Cover-text (O): (covert-image or cover-audio) innocuous message
      used to hide the embedded data.
      Stego-key (K ): used to control the hiding process.
                     ˜
      Stego-object (M): the combination of the previous.
                                          ˜
                                 M ×O ×K →M




  Alberto V. E. (CRYP - UGR)         Steganography           April 2010   8 / 38
Introduction


Steganography
Terminology [1]




      Embedded data (M): the message that one wishes to send secretly.
      Cover-text (O): (covert-image or cover-audio) innocuous message
      used to hide the embedded data.
      Stego-key (K ): used to control the hiding process.
                     ˜
      Stego-object (M): the combination of the previous.
                                          ˜
                                 M ×O ×K →M




  Alberto V. E. (CRYP - UGR)         Steganography           April 2010   8 / 38
Introduction


Steganography
Terminology [1]




      Embedded data (M): the message that one wishes to send secretly.
      Cover-text (O): (covert-image or cover-audio) innocuous message
      used to hide the embedded data.
      Stego-key (K ): used to control the hiding process.
                     ˜
      Stego-object (M): the combination of the previous.
                                          ˜
                                 M ×O ×K →M




  Alberto V. E. (CRYP - UGR)         Steganography           April 2010   8 / 38
Introduction


Steganography
Terminology [1]




      Embedded data (M): the message that one wishes to send secretly.
      Cover-text (O): (covert-image or cover-audio) innocuous message
      used to hide the embedded data.
      Stego-key (K ): used to control the hiding process.
                     ˜
      Stego-object (M): the combination of the previous.
                                          ˜
                                 M ×O ×K →M




  Alberto V. E. (CRYP - UGR)         Steganography           April 2010   8 / 38
Introduction


Steganography
Model (I)




                           Figure: Steganography abstract process



  Alberto V. E. (CRYP - UGR)               Steganography            April 2010   9 / 38
Introduction


Steganography
Model (II)




  Pure versus secret key steganography
      Pure steganographic systems:
      no prior exchange of secret information.
         Secret key steganography system:
         embeds secret using a secret key.

  Perfect Secure Stego-system
  It exists. Apply the concepts we saw two
  weeks ago.



   Alberto V. E. (CRYP - UGR)         Steganography   April 2010   10 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Who is it for?

  Who is using steganography
  nowadays?
         Spies: intelligence and
         counterintelligence agences.
         Militaries: unobtrusive
         communications.
         Terrorists: “it arouses less
         suspicion” - John Wilkins (1641)
         Copyright: watermarks and
         fingerprints.
         SPAM: email forgery.

             Only the good guys!
           (actually, is not that bad)
   Alberto V. E. (CRYP - UGR)            Steganography   April 2010   11 / 38
Introduction


Steganography
Examples?




Stop!
        Could someone give an example of Steganography right now?


                                                My recommendation
                                                Think before going deeper
                                                into a topic.

                                                 Think about what happened
                                                           so far.



  Alberto V. E. (CRYP - UGR)         Steganography                  April 2010   12 / 38
Introduction


Steganography
Examples?




Stop!
        Could someone give an example of Steganography right now?


                                                My recommendation
                                                Think before going deeper
                                                into a topic.

                                                 Think about what happened
                                                           so far.



  Alberto V. E. (CRYP - UGR)         Steganography                  April 2010   12 / 38
Introduction


Steganography
Examples?




Stop!
        Could someone give an example of Steganography right now?


                                                My recommendation
                                                Think before going deeper
                                                into a topic.

                                                 Think about what happened
                                                           so far.



  Alberto V. E. (CRYP - UGR)         Steganography                  April 2010   12 / 38
Past


Index




                                         1    Introduction
                                         2    Past
                                         3    Present
                                         4    Future
                                         5    Conclusions




 Alberto V. E. (CRYP - UGR)   Steganography                  April 2010   13 / 38
Past


China
Silk passion


       Paper masks: The sender and the receiver shared copies of a paper
       mask with a number of holes cut at random locations (keep this in
       mind).
       Wax balls: The also wrote messages on silk and encased them in balls
       of wax. The wax ball could then be hidden in the messenger.




   Alberto V. E. (CRYP - UGR)     Steganography               April 2010   14 / 38
Past


Greece
#HerodotusFacts




                                               Shaved slaves: messages
                                               were written over slaves
                                               heads. Still in 20th
                                               century!
                                               Wax tablet: a good
                                               example of camouflage
                                               over unsuspicious diary
                                               objects.




  Alberto V. E. (CRYP - UGR)   Steganography                   April 2010   15 / 38
Past


Music
Stego-heros


        Gaspar Schott (17th
        century): music notes
        coding letters.
        John Wilkings (17th
        century): talking
        musicians.


                                           J. S. Bach (17th-18th century):
                                           embedded his name in the organ
                                           chorale “Vor deinen Thron”
                                           using the rule: if the i-th note of
                                           the scale occurs k times, then
                                           the k-th letter of the alphabet is
                                           to be entered in the i-th place.
  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   16 / 38
Past


Writing
Acrostic, morse and more.

  A boat, beneath a sunny sky
  Lingering onward dreamily
  In an evening of July -
  Children three that nestle near,
  Eager eye and willing ear,
  Pleased a simple tale to hear -
  Long has paled that sunny sky:
                                                 Acrostic: messages hidden in
  Echoes fade and memories die:                  text using patterns.
  Autumn frosts have slain July.
  Still she haunts me, phantomwise,              Morse Code with {i, j, f, t}:
  Alice moving under skies                       another good example of
  Never seen by waking eyes.
  Children yet, the tale to hear,
                                                 camouflage over unsuspicious
  Eager eye and willing ear,                     diary objects.
  Lovingly shall nestle near.
  In a Wonderland they lie,
  Dreaming as the days go by,                   Is Father Dead or Deceased?
  Dreaming as the summers die:
  Ever drifting down the stream -
  Lingering in the golden gleam -
  Life, what is it but a dream?

  Alberto V. E. (CRYP - UGR)          Steganography                   April 2010   17 / 38
Past


Writing
Acrostic, morse and more.

  A boat, beneath a sunny sky
  Lingering onward dreamily
  In an evening of July -
  Children three that nestle near,
  Eager eye and willing ear,
  Pleased a simple tale to hear -
  Long has paled that sunny sky:
                                                 Acrostic: messages hidden in
  Echoes fade and memories die:                  text using patterns.
  Autumn frosts have slain July.
  Still she haunts me, phantomwise,              Morse Code with {i, j, f, t}:
  Alice moving under skies                       another good example of
  Never seen by waking eyes.
  Children yet, the tale to hear,
                                                 camouflage over unsuspicious
  Eager eye and willing ear,                     diary objects.
  Lovingly shall nestle near.
  In a Wonderland they lie,
  Dreaming as the days go by,                   Is Father Dead or Deceased?
  Dreaming as the summers die:
  Ever drifting down the stream -
  Lingering in the golden gleam -
  Life, what is it but a dream?

  Alberto V. E. (CRYP - UGR)          Steganography                   April 2010   17 / 38
Past


Writing
Acrostic, morse and more.

  A boat, beneath a sunny sky
  Lingering onward dreamily
  In an evening of July -
  Children three that nestle near,
  Eager eye and willing ear,
  Pleased a simple tale to hear -
  Long has paled that sunny sky:
                                                 Acrostic: messages hidden in
  Echoes fade and memories die:                  text using patterns.
  Autumn frosts have slain July.
  Still she haunts me, phantomwise,              Morse Code with {i, j, f, t}:
  Alice moving under skies                       another good example of
  Never seen by waking eyes.
  Children yet, the tale to hear,
                                                 camouflage over unsuspicious
  Eager eye and willing ear,                     diary objects.
  Lovingly shall nestle near.
  In a Wonderland they lie,
  Dreaming as the days go by,                   Is Father Dead or Deceased?
  Dreaming as the summers die:
  Ever drifting down the stream -
  Lingering in the golden gleam -
  Life, what is it but a dream?

  Alberto V. E. (CRYP - UGR)          Steganography                   April 2010   17 / 38
Past


Writing
Acrostic, morse and more.

  A boat, beneath a sunny sky
  Lingering onward dreamily
  In an evening of July -
  Children three that nestle near,
  Eager eye and willing ear,
  Pleased a simple tale to hear -
  Long has paled that sunny sky:
                                                 Acrostic: messages hidden in
  Echoes fade and memories die:                  text using patterns.
  Autumn frosts have slain July.
  Still she haunts me, phantomwise,              Morse Code with {i, j, f, t}:
  Alice moving under skies                       another good example of
  Never seen by waking eyes.
  Children yet, the tale to hear,
                                                 camouflage over unsuspicious
  Eager eye and willing ear,                     diary objects.
  Lovingly shall nestle near.
  In a Wonderland they lie,
  Dreaming as the days go by,                   Is Father Dead or Deceased?
  Dreaming as the summers die:
  Ever drifting down the stream -
  Lingering in the golden gleam -
  Life, what is it but a dream?

  Alberto V. E. (CRYP - UGR)          Steganography                   April 2010   17 / 38
Past


Writing
Acrostic, morse and more.

  A boat, beneath a sunny sky
  Lingering onward dreamily
  In an evening of July -
  Children three that nestle near,
  Eager eye and willing ear,
  Pleased a simple tale to hear -
  Long has paled that sunny sky:
                                                 Acrostic: messages hidden in
  Echoes fade and memories die:                  text using patterns.
  Autumn frosts have slain July.
  Still she haunts me, phantomwise,              Morse Code with {i, j, f, t}:
  Alice moving under skies                       another good example of
  Never seen by waking eyes.
  Children yet, the tale to hear,
                                                 camouflage over unsuspicious
  Eager eye and willing ear,                     diary objects.
  Lovingly shall nestle near.
  In a Wonderland they lie,
  Dreaming as the days go by,                   Is Father Dead or Deceased?
  Dreaming as the summers die:
  Ever drifting down the stream -
  Lingering in the golden gleam -
  Life, what is it but a dream?

  Alberto V. E. (CRYP - UGR)          Steganography                   April 2010   17 / 38
Past


Invisible Ink




                                          Lemon, urine: after burned
                                          released carbon shows up.
                                          Refined with chemistry: salt
                                          ammoniac dissolved in water.
                                          Refined with biology: some
                                          natural unique responses.

                                               Wait a second...




  Alberto V. E. (CRYP - UGR)   Steganography                   April 2010   18 / 38
Past


Invisible Ink




                                          Lemon, urine: after burned
                                          released carbon shows up.
                                          Refined with chemistry: salt
                                          ammoniac dissolved in water.
                                          Refined with biology: some
                                          natural unique responses.

                                               Wait a second...




  Alberto V. E. (CRYP - UGR)   Steganography                   April 2010   18 / 38
Past


Publishing


Not only for war
   Steganography has protected copyright even when it did not exists.


            Intended gaps: False
            intended data.
            Microdots: imperceptible
            dots.
            Line spacing: modern
            publishing.




  Alberto V. E. (CRYP - UGR)       Steganography            April 2010   19 / 38
Present


Index




                                          1    Introduction
                                          2    Past
                                          3    Present
                                          4    Future
                                          5    Conclusions




 Alberto V. E. (CRYP - UGR)    Steganography                  April 2010   20 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


Digital Era
Follow the white rabbit




     Digital era: how do we
     manage data now?
            Sound: bit streams.
            Images: bit streams.
            Video: bit streams.
            Text: bit streams.
     Noise
        A weak spot to exploit.




  Alberto V. E. (CRYP - UGR)        Steganography   April 2010   21 / 38
Present


A simple idea
Take a closer look




   Alberto V. E. (CRYP - UGR)    Steganography   April 2010   22 / 38
Present


A simple idea
A said CLOSER!




        (a) #18657E            (b) #19657E        (c) #1A657E   (d) #1B657E

                               Figure: LSB variations over R




  Alberto V. E. (CRYP - UGR)            Steganography                April 2010   23 / 38
Present


LSB Steganography
I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.



                                             LSB Steganography
                                             LSB Variations are indiscernible.
                                             Even the two LSB!

                                             Let’s check a poor 800 × 600 image.
                (a) #18667D
                                                         800 × 600 = 48000pixels


                                                  480000pixels × 6 = 2880000bit

                                                  2880000bit
                                                                = 360000characters
                                                 8bit/character
               (b) #1B657E
   Alberto V. E. (CRYP - UGR)            Steganography                       April 2010   24 / 38
Present


LSB Steganography
I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.



                                             LSB Steganography
                                             LSB Variations are indiscernible.
                                             Even the two LSB!

                                             Let’s check a poor 800 × 600 image.
                (c) #18667D
                                                         800 × 600 = 48000pixels


                                                  480000pixels × 6 = 2880000bit

                                                  2880000bit
                                                                = 360000characters
                                                 8bit/character
               (d) #1B657E
   Alberto V. E. (CRYP - UGR)            Steganography                       April 2010   24 / 38
Present


LSB Steganography
I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.



                                             LSB Steganography
                                             LSB Variations are indiscernible.
                                             Even the two LSB!

                                             Let’s check a poor 800 × 600 image.
                (e) #18667D
                                                         800 × 600 = 48000pixels


                                                  480000pixels × 6 = 2880000bit

                                                  2880000bit
                                                                = 360000characters
                                                 8bit/character
                (f) #1B657E
   Alberto V. E. (CRYP - UGR)            Steganography                       April 2010   24 / 38
Present


LSB Steganography
I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.



                                             LSB Steganography
                                             LSB Variations are indiscernible.
                                             Even the two LSB!

                                             Let’s check a poor 800 × 600 image.
               (g) #18667D
                                                         800 × 600 = 48000pixels


                                                  480000pixels × 6 = 2880000bit

                                                  2880000bit
                                                                = 360000characters
                                                 8bit/character
               (h) #1B657E
   Alberto V. E. (CRYP - UGR)            Steganography                       April 2010   24 / 38
Present


LSB Steganography




 Pros                                           Cons
        Easy to understand and code.                   Weak against noise attack.
        Pure steganographic (a priori).                Requires good images.
        Lot’s of coding chances. [3]                   Requires non-coded images.


 Alberto V. E. (CRYP - UGR)            Steganography                      April 2010   25 / 38
Present


Wattermarking
Copyrigthing




  Problem
  Lossy compression (JPEG,
  MGEP) destroys LSB variations.

  Solution
         Hide in other LSB.

  Also indiscernible for human eye.




  Alberto V. E. (CRYP - UGR)     Steganography   April 2010   26 / 38
Present


Wattermarking
Copyrigthing




                                         Concepts
                                             Visible watermarking.
                                                Invisible watermarking.

                                                 Requires redundancy!

                                          Also valid for video compression.




  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   27 / 38
Present


Wattermarking
Copyrigthing




                                         Concepts
                                             Visible watermarking.
                                                Invisible watermarking.

                                                 Requires redundancy!

                                          Also valid for video compression.




  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   27 / 38
Present


Wattermarking
Copyrigthing




                                         Concepts
                                             Visible watermarking.
                                                Invisible watermarking.

                                                 Requires redundancy!

                                          Also valid for video compression.




  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   27 / 38
Future


Index




                                          1    Introduction
                                          2    Past
                                          3    Present
                                          4    Future
                                          5    Conclusions




 Alberto V. E. (CRYP - UGR)    Steganography                  April 2010   28 / 38
Future


Science fiction?
Keep your mind open




                                                Where are the limits?

                                           Science and engineering develop
                                           fast.
                                           Multiple fields merge and split
                                           continuously.

                                    What can we learn from other fields?

                                                Keep your mind open!



  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   29 / 38
Future


Science fiction?
Keep your mind open




                                                Where are the limits?

                                           Science and engineering develop
                                           fast.
                                           Multiple fields merge and split
                                           continuously.

                                    What can we learn from other fields?

                                                Keep your mind open!



  Alberto V. E. (CRYP - UGR)    Steganography                     April 2010   29 / 38
Future


Messages through light
Quantum physics killed the cryptography stars


              Idea: Polarized photons cryptosystem... in 1984! [4]




  Alberto V. E. (CRYP - UGR)          Steganography             April 2010   30 / 38
Future


Messages through light
Quantum physics killed the cryptography stars


              Idea: Polarized photons cryptosystem... in 1984! [4]




  Alberto V. E. (CRYP - UGR)          Steganography             April 2010   30 / 38
Future


DNA Coding
Limits?




     DNA and RNA have coded
     life of living things in a pretty
     good way for years.

           Let’s use copyright it!

     4 nucleic acids:
                                                 How?
            A: 00
                                                      Innocuous sequences.
            C: 01
                                                      Redundant sequences.
            G: 10
                                                      Add sequences.
            T: 11
  Alberto V. E. (CRYP - UGR)          Steganography                    April 2010   31 / 38
Future


DNA Coding
Limits?




     DNA and RNA have coded
     life of living things in a pretty
     good way for years.

           Let’s use copyright it!

     4 nucleic acids:
                                                 How?
            A: 00
                                                      Innocuous sequences.
            C: 01
                                                      Redundant sequences.
            G: 10
                                                      Add sequences.
            T: 11
  Alberto V. E. (CRYP - UGR)          Steganography                    April 2010   31 / 38
Future


DNA Coding
Limits?




     DNA and RNA have coded
     life of living things in a pretty
     good way for years.

           Let’s use copyright it!

     4 nucleic acids:
                                                 How?
            A: 00
                                                      Innocuous sequences.
            C: 01
                                                      Redundant sequences.
            G: 10
                                                      Add sequences.
            T: 11
  Alberto V. E. (CRYP - UGR)          Steganography                    April 2010   31 / 38
Conclusions


Index




                                              1    Introduction
                                              2    Past
                                              3    Present
                                              4    Future
                                              5    Conclusions




 Alberto V. E. (CRYP - UGR)        Steganography                  April 2010   32 / 38
Conclusions


Conclusions




                                        Benefits
                                            Secrecy and confusion.
                                              Variety of combinations.
                                              Can be combined with
                                              cryptography.

                                            Only few pros but strong ones.




 Alberto V. E. (CRYP - UGR)        Steganography                   April 2010   33 / 38
Conclusions


Conclusions


                                        Cons
                                            Not suitable for massive
                                            transmissions.
                                              Requires more effort than
                                              regular cryptography.
                                              Weak against transformation.
                                              Specific solutions for specific
                                              problems.

                                             Always trade security against
                                                      robustness.


 Alberto V. E. (CRYP - UGR)        Steganography                    April 2010   34 / 38
References


References I


     Information Hiding - A Survey
     Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn
     Proceedings of the IEEE, special issue on protection of multimedia
     content, 87(7):1062-1078, July 1999
     Exploring Steganography: Seeing the Unseen
     Neil F. Johnson and Sushil Jajodia.
     IEEE Computer, February 1998: 26-34.
     Reliable Dectection of LSB Steganography in Color and Grayscale
     Images.
     Jessica Fridrich, Miroslav Goljan and Rui Du
     Multimedia, IEEE, 2001



  Alberto V. E. (CRYP - UGR)       Steganography              April 2010   35 / 38
References


References II


     Quantum cryptography: Public-key distribution and coin tossing
     Bennett, C. H. and Brassard, G.
     Proceedings of IEEE International Conference on Computers,
     December 1984.
     Hiding Data in DNA
     Boris Shimanovsky, Jessica Feng and Miodrag Potkonjak
     Information Hiding, 2003 - Springer
     Disappearing Cryptography. Information Hiding: Steganography &
     Watermarking. (3rd ed.)
     Peter Wayner.
     Elsevier, 2009.



  Alberto V. E. (CRYP - UGR)       Steganography             April 2010   36 / 38
References


References III

     Matem´ticos, esp´ y piratas inform´ticos. Codificaci´n y
            a        ıas               a                o
     Criptograf´
               ıa.
     Joan G´mez
            o
     RBA, 2010.
     Wikipedia: Steganography
     http://en.wikipedia.org/wiki/Steganography
     Kriptopolis (in Spanish)
     http://www.kriptopolis.org/articulos/esteganografia
     Steganography: How to Send a Secret Message
     http://www.strangehorizons.com/2001/20011008/
     steganography.shtml
     Johnson & Johnson Technology Consultants (Neil F. Johnson)
     http://www.jjtc.com/Steganography/ (software)
  Alberto V. E. (CRYP - UGR)       Steganography               April 2010   37 / 38
The end




            Thank you.
            Questions?
                                    Please be nice




                      Just one more thing!




Alberto V. E. (CRYP - UGR)             Steganography   April 2010   38 / 38
The end




            Thank you.
            Questions?
                                    Please be nice




                      Just one more thing!




Alberto V. E. (CRYP - UGR)             Steganography   April 2010   38 / 38

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachDeloitte United States
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Steganography
SteganographySteganography
SteganographySonam M
 

Was ist angesagt? (20)

Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Network security
Network securityNetwork security
Network security
 
Steganography
SteganographySteganography
Steganography
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
steganography
steganographysteganography
steganography
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approachThe Internet of Things (IoT) and cybersecurity: A secure-by-design approach
The Internet of Things (IoT) and cybersecurity: A secure-by-design approach
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Steganography
SteganographySteganography
Steganography
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 

Andere mochten auch

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret dataVema Reddy
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationLaili Aidi
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 

Andere mochten auch (20)

Steganography
Steganography Steganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 

Kürzlich hochgeladen

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Steganography: Hiding information in past, present and future.

  • 1. Steganography Hiding information in past, present and future. Alberto Villegas Erce albvi@correo.ugr.es Cryptography University of Granada April 2010 Alberto V. E. (CRYP - UGR) Steganography April 2010 1 / 38
  • 2. Review Concepts review Previously in crypto-world... Math background Modular arithmetics give us the power Factorization and Primality. Finite fields. Pseudo-random Sequences. ... Cryptography History From ancient greeks to Enigma machine. Information Theory Shannon’s theory for perfect crypto security. Alberto V. E. (CRYP - UGR) Steganography April 2010 2 / 38
  • 3. Review Today Steganography What is Steganography? We will review the topic through history 1 Past: historical examples. 2 Present: digital era. 3 Future: no-that-much science fiction ideas. Alberto V. E. (CRYP - UGR) Steganography April 2010 3 / 38
  • 4. Review Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 4 / 38
  • 5. Introduction Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 5 / 38
  • 6. Introduction Stegano... what? What is Steganography? A word with 4 vowels... ... and 9 consonants. Sounds like Cryptography. Error! You are doing it wrong! Greek: “concealed writing” Steganos: covered or protected. Graphein: to write. Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
  • 7. Introduction Stegano... what? What is Steganography? A word with 4 vowels... ... and 9 consonants. Sounds like Cryptography. Error! You are doing it wrong! Greek: “concealed writing” Steganos: covered or protected. Graphein: to write. Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
  • 8. Introduction Stegano... what? What is Steganography? A word with 4 vowels... ... and 9 consonants. Sounds like Cryptography. Error! You are doing it wrong! Greek: “concealed writing” Steganos: covered or protected. Graphein: to write. Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
  • 9. Introduction Stegano... what? What is Steganography? A word with 4 vowels... ... and 9 consonants. Sounds like Cryptography. Error! You are doing it wrong! Greek: “concealed writing” Steganos: covered or protected. Graphein: to write. Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
  • 10. Introduction Stegano... what? What is Steganography? A word with 4 vowels... ... and 9 consonants. Sounds like Cryptography. Error! You are doing it wrong! Greek: “concealed writing” Steganos: covered or protected. Graphein: to write. Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
  • 11. Introduction Steganography Definition Steganography Art and science of writing hidden messages in such a way that no one suspects the existence of the message. But, then, what is the difference with Cryptography? “Cryptography is about protecting the content of messages, steganography is about concealing their very existence” [1] Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38
  • 12. Introduction Steganography Definition Steganography Art and science of writing hidden messages in such a way that no one suspects the existence of the message. But, then, what is the difference with Cryptography? “Cryptography is about protecting the content of messages, steganography is about concealing their very existence” [1] Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38
  • 13. Introduction Steganography Terminology [1] Embedded data (M): the message that one wishes to send secretly. Cover-text (O): (covert-image or cover-audio) innocuous message used to hide the embedded data. Stego-key (K ): used to control the hiding process. ˜ Stego-object (M): the combination of the previous. ˜ M ×O ×K →M Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
  • 14. Introduction Steganography Terminology [1] Embedded data (M): the message that one wishes to send secretly. Cover-text (O): (covert-image or cover-audio) innocuous message used to hide the embedded data. Stego-key (K ): used to control the hiding process. ˜ Stego-object (M): the combination of the previous. ˜ M ×O ×K →M Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
  • 15. Introduction Steganography Terminology [1] Embedded data (M): the message that one wishes to send secretly. Cover-text (O): (covert-image or cover-audio) innocuous message used to hide the embedded data. Stego-key (K ): used to control the hiding process. ˜ Stego-object (M): the combination of the previous. ˜ M ×O ×K →M Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
  • 16. Introduction Steganography Terminology [1] Embedded data (M): the message that one wishes to send secretly. Cover-text (O): (covert-image or cover-audio) innocuous message used to hide the embedded data. Stego-key (K ): used to control the hiding process. ˜ Stego-object (M): the combination of the previous. ˜ M ×O ×K →M Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
  • 17. Introduction Steganography Terminology [1] Embedded data (M): the message that one wishes to send secretly. Cover-text (O): (covert-image or cover-audio) innocuous message used to hide the embedded data. Stego-key (K ): used to control the hiding process. ˜ Stego-object (M): the combination of the previous. ˜ M ×O ×K →M Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
  • 18. Introduction Steganography Model (I) Figure: Steganography abstract process Alberto V. E. (CRYP - UGR) Steganography April 2010 9 / 38
  • 19. Introduction Steganography Model (II) Pure versus secret key steganography Pure steganographic systems: no prior exchange of secret information. Secret key steganography system: embeds secret using a secret key. Perfect Secure Stego-system It exists. Apply the concepts we saw two weeks ago. Alberto V. E. (CRYP - UGR) Steganography April 2010 10 / 38
  • 20. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 21. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 22. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 23. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 24. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 25. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 26. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 27. Introduction Steganography Who is it for? Who is using steganography nowadays? Spies: intelligence and counterintelligence agences. Militaries: unobtrusive communications. Terrorists: “it arouses less suspicion” - John Wilkins (1641) Copyright: watermarks and fingerprints. SPAM: email forgery. Only the good guys! (actually, is not that bad) Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
  • 28. Introduction Steganography Examples? Stop! Could someone give an example of Steganography right now? My recommendation Think before going deeper into a topic. Think about what happened so far. Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
  • 29. Introduction Steganography Examples? Stop! Could someone give an example of Steganography right now? My recommendation Think before going deeper into a topic. Think about what happened so far. Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
  • 30. Introduction Steganography Examples? Stop! Could someone give an example of Steganography right now? My recommendation Think before going deeper into a topic. Think about what happened so far. Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
  • 31. Past Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 13 / 38
  • 32. Past China Silk passion Paper masks: The sender and the receiver shared copies of a paper mask with a number of holes cut at random locations (keep this in mind). Wax balls: The also wrote messages on silk and encased them in balls of wax. The wax ball could then be hidden in the messenger. Alberto V. E. (CRYP - UGR) Steganography April 2010 14 / 38
  • 33. Past Greece #HerodotusFacts Shaved slaves: messages were written over slaves heads. Still in 20th century! Wax tablet: a good example of camouflage over unsuspicious diary objects. Alberto V. E. (CRYP - UGR) Steganography April 2010 15 / 38
  • 34. Past Music Stego-heros Gaspar Schott (17th century): music notes coding letters. John Wilkings (17th century): talking musicians. J. S. Bach (17th-18th century): embedded his name in the organ chorale “Vor deinen Thron” using the rule: if the i-th note of the scale occurs k times, then the k-th letter of the alphabet is to be entered in the i-th place. Alberto V. E. (CRYP - UGR) Steganography April 2010 16 / 38
  • 35. Past Writing Acrostic, morse and more. A boat, beneath a sunny sky Lingering onward dreamily In an evening of July - Children three that nestle near, Eager eye and willing ear, Pleased a simple tale to hear - Long has paled that sunny sky: Acrostic: messages hidden in Echoes fade and memories die: text using patterns. Autumn frosts have slain July. Still she haunts me, phantomwise, Morse Code with {i, j, f, t}: Alice moving under skies another good example of Never seen by waking eyes. Children yet, the tale to hear, camouflage over unsuspicious Eager eye and willing ear, diary objects. Lovingly shall nestle near. In a Wonderland they lie, Dreaming as the days go by, Is Father Dead or Deceased? Dreaming as the summers die: Ever drifting down the stream - Lingering in the golden gleam - Life, what is it but a dream? Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
  • 36. Past Writing Acrostic, morse and more. A boat, beneath a sunny sky Lingering onward dreamily In an evening of July - Children three that nestle near, Eager eye and willing ear, Pleased a simple tale to hear - Long has paled that sunny sky: Acrostic: messages hidden in Echoes fade and memories die: text using patterns. Autumn frosts have slain July. Still she haunts me, phantomwise, Morse Code with {i, j, f, t}: Alice moving under skies another good example of Never seen by waking eyes. Children yet, the tale to hear, camouflage over unsuspicious Eager eye and willing ear, diary objects. Lovingly shall nestle near. In a Wonderland they lie, Dreaming as the days go by, Is Father Dead or Deceased? Dreaming as the summers die: Ever drifting down the stream - Lingering in the golden gleam - Life, what is it but a dream? Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
  • 37. Past Writing Acrostic, morse and more. A boat, beneath a sunny sky Lingering onward dreamily In an evening of July - Children three that nestle near, Eager eye and willing ear, Pleased a simple tale to hear - Long has paled that sunny sky: Acrostic: messages hidden in Echoes fade and memories die: text using patterns. Autumn frosts have slain July. Still she haunts me, phantomwise, Morse Code with {i, j, f, t}: Alice moving under skies another good example of Never seen by waking eyes. Children yet, the tale to hear, camouflage over unsuspicious Eager eye and willing ear, diary objects. Lovingly shall nestle near. In a Wonderland they lie, Dreaming as the days go by, Is Father Dead or Deceased? Dreaming as the summers die: Ever drifting down the stream - Lingering in the golden gleam - Life, what is it but a dream? Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
  • 38. Past Writing Acrostic, morse and more. A boat, beneath a sunny sky Lingering onward dreamily In an evening of July - Children three that nestle near, Eager eye and willing ear, Pleased a simple tale to hear - Long has paled that sunny sky: Acrostic: messages hidden in Echoes fade and memories die: text using patterns. Autumn frosts have slain July. Still she haunts me, phantomwise, Morse Code with {i, j, f, t}: Alice moving under skies another good example of Never seen by waking eyes. Children yet, the tale to hear, camouflage over unsuspicious Eager eye and willing ear, diary objects. Lovingly shall nestle near. In a Wonderland they lie, Dreaming as the days go by, Is Father Dead or Deceased? Dreaming as the summers die: Ever drifting down the stream - Lingering in the golden gleam - Life, what is it but a dream? Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
  • 39. Past Writing Acrostic, morse and more. A boat, beneath a sunny sky Lingering onward dreamily In an evening of July - Children three that nestle near, Eager eye and willing ear, Pleased a simple tale to hear - Long has paled that sunny sky: Acrostic: messages hidden in Echoes fade and memories die: text using patterns. Autumn frosts have slain July. Still she haunts me, phantomwise, Morse Code with {i, j, f, t}: Alice moving under skies another good example of Never seen by waking eyes. Children yet, the tale to hear, camouflage over unsuspicious Eager eye and willing ear, diary objects. Lovingly shall nestle near. In a Wonderland they lie, Dreaming as the days go by, Is Father Dead or Deceased? Dreaming as the summers die: Ever drifting down the stream - Lingering in the golden gleam - Life, what is it but a dream? Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
  • 40. Past Invisible Ink Lemon, urine: after burned released carbon shows up. Refined with chemistry: salt ammoniac dissolved in water. Refined with biology: some natural unique responses. Wait a second... Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38
  • 41. Past Invisible Ink Lemon, urine: after burned released carbon shows up. Refined with chemistry: salt ammoniac dissolved in water. Refined with biology: some natural unique responses. Wait a second... Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38
  • 42. Past Publishing Not only for war Steganography has protected copyright even when it did not exists. Intended gaps: False intended data. Microdots: imperceptible dots. Line spacing: modern publishing. Alberto V. E. (CRYP - UGR) Steganography April 2010 19 / 38
  • 43. Present Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 20 / 38
  • 44. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 45. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 46. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 47. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 48. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 49. Present Digital Era Follow the white rabbit Digital era: how do we manage data now? Sound: bit streams. Images: bit streams. Video: bit streams. Text: bit streams. Noise A weak spot to exploit. Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
  • 50. Present A simple idea Take a closer look Alberto V. E. (CRYP - UGR) Steganography April 2010 22 / 38
  • 51. Present A simple idea A said CLOSER! (a) #18657E (b) #19657E (c) #1A657E (d) #1B657E Figure: LSB variations over R Alberto V. E. (CRYP - UGR) Steganography April 2010 23 / 38
  • 52. Present LSB Steganography I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain. LSB Steganography LSB Variations are indiscernible. Even the two LSB! Let’s check a poor 800 × 600 image. (a) #18667D 800 × 600 = 48000pixels 480000pixels × 6 = 2880000bit 2880000bit = 360000characters 8bit/character (b) #1B657E Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
  • 53. Present LSB Steganography I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain. LSB Steganography LSB Variations are indiscernible. Even the two LSB! Let’s check a poor 800 × 600 image. (c) #18667D 800 × 600 = 48000pixels 480000pixels × 6 = 2880000bit 2880000bit = 360000characters 8bit/character (d) #1B657E Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
  • 54. Present LSB Steganography I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain. LSB Steganography LSB Variations are indiscernible. Even the two LSB! Let’s check a poor 800 × 600 image. (e) #18667D 800 × 600 = 48000pixels 480000pixels × 6 = 2880000bit 2880000bit = 360000characters 8bit/character (f) #1B657E Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
  • 55. Present LSB Steganography I have discovered a truly marvelous proof of this, which this pixel is too narrow to contain. LSB Steganography LSB Variations are indiscernible. Even the two LSB! Let’s check a poor 800 × 600 image. (g) #18667D 800 × 600 = 48000pixels 480000pixels × 6 = 2880000bit 2880000bit = 360000characters 8bit/character (h) #1B657E Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
  • 56. Present LSB Steganography Pros Cons Easy to understand and code. Weak against noise attack. Pure steganographic (a priori). Requires good images. Lot’s of coding chances. [3] Requires non-coded images. Alberto V. E. (CRYP - UGR) Steganography April 2010 25 / 38
  • 57. Present Wattermarking Copyrigthing Problem Lossy compression (JPEG, MGEP) destroys LSB variations. Solution Hide in other LSB. Also indiscernible for human eye. Alberto V. E. (CRYP - UGR) Steganography April 2010 26 / 38
  • 58. Present Wattermarking Copyrigthing Concepts Visible watermarking. Invisible watermarking. Requires redundancy! Also valid for video compression. Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
  • 59. Present Wattermarking Copyrigthing Concepts Visible watermarking. Invisible watermarking. Requires redundancy! Also valid for video compression. Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
  • 60. Present Wattermarking Copyrigthing Concepts Visible watermarking. Invisible watermarking. Requires redundancy! Also valid for video compression. Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
  • 61. Future Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 28 / 38
  • 62. Future Science fiction? Keep your mind open Where are the limits? Science and engineering develop fast. Multiple fields merge and split continuously. What can we learn from other fields? Keep your mind open! Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38
  • 63. Future Science fiction? Keep your mind open Where are the limits? Science and engineering develop fast. Multiple fields merge and split continuously. What can we learn from other fields? Keep your mind open! Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38
  • 64. Future Messages through light Quantum physics killed the cryptography stars Idea: Polarized photons cryptosystem... in 1984! [4] Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38
  • 65. Future Messages through light Quantum physics killed the cryptography stars Idea: Polarized photons cryptosystem... in 1984! [4] Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38
  • 66. Future DNA Coding Limits? DNA and RNA have coded life of living things in a pretty good way for years. Let’s use copyright it! 4 nucleic acids: How? A: 00 Innocuous sequences. C: 01 Redundant sequences. G: 10 Add sequences. T: 11 Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
  • 67. Future DNA Coding Limits? DNA and RNA have coded life of living things in a pretty good way for years. Let’s use copyright it! 4 nucleic acids: How? A: 00 Innocuous sequences. C: 01 Redundant sequences. G: 10 Add sequences. T: 11 Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
  • 68. Future DNA Coding Limits? DNA and RNA have coded life of living things in a pretty good way for years. Let’s use copyright it! 4 nucleic acids: How? A: 00 Innocuous sequences. C: 01 Redundant sequences. G: 10 Add sequences. T: 11 Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
  • 69. Conclusions Index 1 Introduction 2 Past 3 Present 4 Future 5 Conclusions Alberto V. E. (CRYP - UGR) Steganography April 2010 32 / 38
  • 70. Conclusions Conclusions Benefits Secrecy and confusion. Variety of combinations. Can be combined with cryptography. Only few pros but strong ones. Alberto V. E. (CRYP - UGR) Steganography April 2010 33 / 38
  • 71. Conclusions Conclusions Cons Not suitable for massive transmissions. Requires more effort than regular cryptography. Weak against transformation. Specific solutions for specific problems. Always trade security against robustness. Alberto V. E. (CRYP - UGR) Steganography April 2010 34 / 38
  • 72. References References I Information Hiding - A Survey Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999 Exploring Steganography: Seeing the Unseen Neil F. Johnson and Sushil Jajodia. IEEE Computer, February 1998: 26-34. Reliable Dectection of LSB Steganography in Color and Grayscale Images. Jessica Fridrich, Miroslav Goljan and Rui Du Multimedia, IEEE, 2001 Alberto V. E. (CRYP - UGR) Steganography April 2010 35 / 38
  • 73. References References II Quantum cryptography: Public-key distribution and coin tossing Bennett, C. H. and Brassard, G. Proceedings of IEEE International Conference on Computers, December 1984. Hiding Data in DNA Boris Shimanovsky, Jessica Feng and Miodrag Potkonjak Information Hiding, 2003 - Springer Disappearing Cryptography. Information Hiding: Steganography & Watermarking. (3rd ed.) Peter Wayner. Elsevier, 2009. Alberto V. E. (CRYP - UGR) Steganography April 2010 36 / 38
  • 74. References References III Matem´ticos, esp´ y piratas inform´ticos. Codificaci´n y a ıas a o Criptograf´ ıa. Joan G´mez o RBA, 2010. Wikipedia: Steganography http://en.wikipedia.org/wiki/Steganography Kriptopolis (in Spanish) http://www.kriptopolis.org/articulos/esteganografia Steganography: How to Send a Secret Message http://www.strangehorizons.com/2001/20011008/ steganography.shtml Johnson & Johnson Technology Consultants (Neil F. Johnson) http://www.jjtc.com/Steganography/ (software) Alberto V. E. (CRYP - UGR) Steganography April 2010 37 / 38
  • 75. The end Thank you. Questions? Please be nice Just one more thing! Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38
  • 76. The end Thank you. Questions? Please be nice Just one more thing! Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38