Nathanaël COTTIN
Transcript of Nathanaël COTTIN
![Page 1: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/1.jpg)
Nathanaël COTTIN
www.hidereveal.org
14/05/2010
Hide secret information within
innocuous carriers
![Page 2: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/2.jpg)
www.hidereveal.org
Introduction to steganography
org.steganography library principles
Hide & Reveal screenshots
14/05/2010 Steganography made easy using Hide & Reveal 2
![Page 3: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/3.jpg)
www.hidereveal.org
“What does not look ciphered has no meaning
for being decrypted”
– Anonymous
14/05/2010 Steganography made easy using Hide & Reveal 3
![Page 4: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/4.jpg)
www.hidereveal.org
Science of invisible communications
Consists in hiding messages so that any
unauthorized observer cannot guess a
secret information is present
Steganography made easy using Hide & Reveal14/05/2010 4
![Page 5: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/5.jpg)
www.hidereveal.org
Information exchange in a supervised
environment
Proof of ownership
Overcome cryptography legal limitations
Steganography made easy using Hide & Reveal14/05/2010 5
![Page 6: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/6.jpg)
www.hidereveal.org
Uncompressed images (BMP, PNG)
Compressed images (JPEG)
Videos (MPEG, AVI)
Uncompressed sounds (WAV)
Compressed sounds (MP3)
Other formatted formats (HTML, XML)
…
14/05/2010 Steganography made easy using Hide & Reveal 6
![Page 7: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/7.jpg)
www.hidereveal.org
Open-source library written in Java, available at www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 7
![Page 8: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/8.jpg)
www.hidereveal.org
14/05/2010 8Steganography made easy using Hide & Reveal
Secret
information
01001
10110
Modulation
rules
Modulated
secret information
Carrier (cover)
file (semagram)Access
rules
Hiding
rules
Stego file
(contains hidden
secret information)
![Page 9: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/9.jpg)
www.hidereveal.org
14/05/2010 9Steganography made easy using Hide & Reveal
Secret
information
01001
10110
Inverted
modulation
rules
Modulated
secret information
Access
rules
Inverted
hiding rules
Stego file
(contains hidden
secret information)
![Page 10: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/10.jpg)
www.hidereveal.org
Extensive documentation (javadoc)
Many carriers and secret content types
Defines 3 dissimulation schemes :
Secret information modulation schemes
Carrier access rules schemes
Hiding schemes
Designed for reseachers
Customizable: interfaces, abstract
classes
14/05/2010 Steganography made easy using Hide & Reveal 10
![Page 11: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/11.jpg)
www.hidereveal.org
None: no modification of the secret data
Negation of the secret information:
Of all secret information bytes
One byte out of two
Depending on the previous byte
Exclusive OR based on a password
14/05/2010 Steganography made easy using Hide & Reveal 11
![Page 12: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/12.jpg)
www.hidereveal.org
Sequential: one pixel after another, from
the beginning to the end of the image
Inverted sequential: from the end to the
beginning of the carrier image
Uniform: pixels section is uniform, from
the beginning to the end of the image
Inverted uniform: from the end to the
beginning of the carrierimage
14/05/2010 Steganography made easy using Hide & Reveal 12
![Page 13: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/13.jpg)
www.hidereveal.org
Double LSB:
Each secret byte coded using 2 pixels of 32
bits
Pixel 1 codes 6 bits of the secret byte
Pixel 2 codes the 2 remaining bits
Minimum carrier size is (t refers to the size
of the secret information):
14/05/2010 Steganography made easy using Hide & Reveal 13
min 32 4 2 8 4T t t
![Page 14: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/14.jpg)
www.hidereveal.org
Triple LSB :
Each secret byte is coded using a single
pixel
Minimum carrier size is (t refers to the size
of the secret information):
14/05/2010 Steganography made easy using Hide & Reveal 14
min 16 4 4 4T t t
![Page 15: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/15.jpg)
www.hidereveal.org
Make steganography available for all people
Provide a research framework for validating
new schemes and steganalysis techniques
14/05/2010 Steganography made easy using Hide & Reveal 15
![Page 16: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/16.jpg)
www.hidereveal.org
Hide & Reveal : Pure Java
Current version: 1.4.1
Supported carrier type = BMP, PNG, TIF images
Hides any file type within carriers
All schemes from org.steganography made available
Executable and downloadable from www.hidereveal.org
Based on org.steganography library
14/05/2010 Steganography made easy using Hide & Reveal 16
![Page 17: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/17.jpg)
www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 17
Hide
Reveal
![Page 18: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/18.jpg)
www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 18
Select carrier
(cover)
32 bits color-
depth BMP,
PNG and TIF
file types
supported
Select
secret
file to
hide
Select
stego file to
be created
Add a
textual note
![Page 19: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/19.jpg)
www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 19
Select
modulation
scheme
Select
access
scheme
Select
hiding
scheme
Access and hiding schemes will depend on the carrier file type
![Page 20: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/20.jpg)
www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 20
Select
stego
file
Indicate
secret
file to
reveal
(file will be
created)
![Page 21: Nathanaël COTTIN](https://reader035.fdocuments.in/reader035/viewer/2022070300/6156fdb6a097e25c764fce06/html5/thumbnails/21.jpg)
www.hidereveal.org
14/05/2010 Steganography made easy using Hide & Reveal 21
Select
modulation
scheme
Select
access
scheme
Select
hiding
scheme
(to reveal
the secret)
Schemes must be identical to the ones used during the dissimulation process