Steganography: Hiding information in past, present and future.
-
Upload
alberto-villegas -
Category
Technology
-
view
4.580 -
download
0
description
Transcript of Steganography: Hiding information in past, present and future.
![Page 1: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/1.jpg)
SteganographyHiding information in past, present and future.
Alberto Villegas [email protected]
CryptographyUniversity of Granada
April 2010
Alberto V. E. (CRYP - UGR) Steganography April 2010 1 / 38
![Page 2: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/2.jpg)
Review
Concepts reviewPreviously in crypto-world...
Math background
Modular arithmetics give us the power
Factorization and Primality.
Finite fields.
Pseudo-random Sequences.
...
Cryptography History
From ancient greeks to Enigma machine.
Information Theory
Shannon’s theory for perfect crypto security.
Alberto V. E. (CRYP - UGR) Steganography April 2010 2 / 38
![Page 3: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/3.jpg)
Review
TodaySteganography
What is Steganography?We will review the topic through history
1 Past: historical examples.
2 Present: digital era.
3 Future: no-that-much science fictionideas.
Alberto V. E. (CRYP - UGR) Steganography April 2010 3 / 38
![Page 4: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/4.jpg)
Review
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 4 / 38
![Page 5: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/5.jpg)
Introduction
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 5 / 38
![Page 6: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/6.jpg)
Introduction
Stegano... what?
What is Steganography?
A word with 4 vowels...
... and 9 consonants.
Sounds like Cryptography.
Error!
You are doing it wrong!
Greek: “concealed writing”
Steganos: covered or protected.Graphein: to write.
Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
![Page 7: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/7.jpg)
Introduction
Stegano... what?
What is Steganography?
A word with 4 vowels...
... and 9 consonants.
Sounds like Cryptography.
Error!
You are doing it wrong!
Greek: “concealed writing”
Steganos: covered or protected.Graphein: to write.
Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
![Page 8: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/8.jpg)
Introduction
Stegano... what?
What is Steganography?
A word with 4 vowels...
... and 9 consonants.
Sounds like Cryptography.
Error!
You are doing it wrong!
Greek: “concealed writing”
Steganos: covered or protected.Graphein: to write.
Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
![Page 9: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/9.jpg)
Introduction
Stegano... what?
What is Steganography?
A word with 4 vowels...
... and 9 consonants.
Sounds like Cryptography.
Error!
You are doing it wrong!
Greek: “concealed writing”
Steganos: covered or protected.Graphein: to write.
Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
![Page 10: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/10.jpg)
Introduction
Stegano... what?
What is Steganography?
A word with 4 vowels...
... and 9 consonants.
Sounds like Cryptography.
Error!
You are doing it wrong!
Greek: “concealed writing”
Steganos: covered or protected.Graphein: to write.
Alberto V. E. (CRYP - UGR) Steganography April 2010 6 / 38
![Page 11: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/11.jpg)
Introduction
SteganographyDefinition
Steganography
Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.
But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]
Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38
![Page 12: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/12.jpg)
Introduction
SteganographyDefinition
Steganography
Art and science of writing hidden messages in such a way that no onesuspects the existence of the message.
But, then, what is the difference withCryptography?“Cryptography is about protecting thecontent of messages, steganography isabout concealing their very existence” [1]
Alberto V. E. (CRYP - UGR) Steganography April 2010 7 / 38
![Page 13: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/13.jpg)
Introduction
SteganographyTerminology [1]
Embedded data (M): the message that one wishes to send secretly.
Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.
Stego-key (K ): used to control the hiding process.
Stego-object (M): the combination of the previous.
M × O × K → M
Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
![Page 14: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/14.jpg)
Introduction
SteganographyTerminology [1]
Embedded data (M): the message that one wishes to send secretly.
Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.
Stego-key (K ): used to control the hiding process.
Stego-object (M): the combination of the previous.
M × O × K → M
Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
![Page 15: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/15.jpg)
Introduction
SteganographyTerminology [1]
Embedded data (M): the message that one wishes to send secretly.
Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.
Stego-key (K ): used to control the hiding process.
Stego-object (M): the combination of the previous.
M × O × K → M
Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
![Page 16: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/16.jpg)
Introduction
SteganographyTerminology [1]
Embedded data (M): the message that one wishes to send secretly.
Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.
Stego-key (K ): used to control the hiding process.
Stego-object (M): the combination of the previous.
M × O × K → M
Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
![Page 17: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/17.jpg)
Introduction
SteganographyTerminology [1]
Embedded data (M): the message that one wishes to send secretly.
Cover-text (O): (covert-image or cover-audio) innocuous messageused to hide the embedded data.
Stego-key (K ): used to control the hiding process.
Stego-object (M): the combination of the previous.
M × O × K → M
Alberto V. E. (CRYP - UGR) Steganography April 2010 8 / 38
![Page 18: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/18.jpg)
Introduction
SteganographyModel (I)
Figure: Steganography abstract process
Alberto V. E. (CRYP - UGR) Steganography April 2010 9 / 38
![Page 19: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/19.jpg)
Introduction
SteganographyModel (II)
Pure versus secret key steganography
Pure steganographic systems:no prior exchange of secret information.
Secret key steganography system:embeds secret using a secret key.
Perfect Secure Stego-system
It exists. Apply the concepts we saw twoweeks ago.
Alberto V. E. (CRYP - UGR) Steganography April 2010 10 / 38
![Page 20: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/20.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 21: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/21.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 22: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/22.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 23: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/23.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 24: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/24.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 25: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/25.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 26: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/26.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 27: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/27.jpg)
Introduction
SteganographyWho is it for?
Who is using steganographynowadays?
Spies: intelligence andcounterintelligence agences.
Militaries: unobtrusivecommunications.
Terrorists: “it arouses lesssuspicion” - John Wilkins (1641)
Copyright: watermarks andfingerprints.
SPAM: email forgery.
Only the good guys!(actually, is not that bad)
Alberto V. E. (CRYP - UGR) Steganography April 2010 11 / 38
![Page 28: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/28.jpg)
Introduction
SteganographyExamples?
Stop!
Could someone give an example of Steganography right now?
My recommendation
Think before going deeperinto a topic.
Think about what happenedso far.
Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
![Page 29: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/29.jpg)
Introduction
SteganographyExamples?
Stop!
Could someone give an example of Steganography right now?
My recommendation
Think before going deeperinto a topic.
Think about what happenedso far.
Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
![Page 30: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/30.jpg)
Introduction
SteganographyExamples?
Stop!
Could someone give an example of Steganography right now?
My recommendation
Think before going deeperinto a topic.
Think about what happenedso far.
Alberto V. E. (CRYP - UGR) Steganography April 2010 12 / 38
![Page 31: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/31.jpg)
Past
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 13 / 38
![Page 32: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/32.jpg)
Past
ChinaSilk passion
Paper masks: The sender and the receiver shared copies of a papermask with a number of holes cut at random locations (keep this inmind).
Wax balls: The also wrote messages on silk and encased them in ballsof wax. The wax ball could then be hidden in the messenger.
Alberto V. E. (CRYP - UGR) Steganography April 2010 14 / 38
![Page 33: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/33.jpg)
Past
Greece#HerodotusFacts
Shaved slaves: messageswere written over slavesheads. Still in 20thcentury!
Wax tablet: a goodexample of camouflageover unsuspicious diaryobjects.
Alberto V. E. (CRYP - UGR) Steganography April 2010 15 / 38
![Page 34: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/34.jpg)
Past
MusicStego-heros
Gaspar Schott (17thcentury): music notescoding letters.
John Wilkings (17thcentury): talkingmusicians.
J. S. Bach (17th-18th century):embedded his name in the organchorale “Vor deinen Thron”using the rule: if the i-th note ofthe scale occurs k times, thenthe k-th letter of the alphabet isto be entered in the i-th place.
Alberto V. E. (CRYP - UGR) Steganography April 2010 16 / 38
![Page 35: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/35.jpg)
Past
WritingAcrostic, morse and more.
A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?
Acrostic: messages hidden intext using patterns.
Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.
Is Father Dead or Deceased?
Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
![Page 36: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/36.jpg)
Past
WritingAcrostic, morse and more.
A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?
Acrostic: messages hidden intext using patterns.
Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.
Is Father Dead or Deceased?
Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
![Page 37: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/37.jpg)
Past
WritingAcrostic, morse and more.
A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?
Acrostic: messages hidden intext using patterns.
Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.
Is Father Dead or Deceased?
Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
![Page 38: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/38.jpg)
Past
WritingAcrostic, morse and more.
A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?
Acrostic: messages hidden intext using patterns.
Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.
Is Father Dead or Deceased?
Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
![Page 39: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/39.jpg)
Past
WritingAcrostic, morse and more.
A boat, beneath a sunny skyLingering onward dreamilyIn an evening of July -Children three that nestle near,Eager eye and willing ear,Pleased a simple tale to hear -Long has paled that sunny sky:Echoes fade and memories die:Autumn frosts have slain July.Still she haunts me, phantomwise,Alice moving under skiesNever seen by waking eyes.Children yet, the tale to hear,Eager eye and willing ear,Lovingly shall nestle near.In a Wonderland they lie,Dreaming as the days go by,Dreaming as the summers die:Ever drifting down the stream -Lingering in the golden gleam -Life, what is it but a dream?
Acrostic: messages hidden intext using patterns.
Morse Code with {i, j, f, t}:another good example ofcamouflage over unsuspiciousdiary objects.
Is Father Dead or Deceased?
Alberto V. E. (CRYP - UGR) Steganography April 2010 17 / 38
![Page 40: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/40.jpg)
Past
Invisible Ink
Lemon, urine: after burnedreleased carbon shows up.
Refined with chemistry: saltammoniac dissolved in water.
Refined with biology: somenatural unique responses.
Wait a second...
Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38
![Page 41: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/41.jpg)
Past
Invisible Ink
Lemon, urine: after burnedreleased carbon shows up.
Refined with chemistry: saltammoniac dissolved in water.
Refined with biology: somenatural unique responses.
Wait a second...
Alberto V. E. (CRYP - UGR) Steganography April 2010 18 / 38
![Page 42: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/42.jpg)
Past
Publishing
Not only for war
Steganography has protected copyright even when it did not exists.
Intended gaps: Falseintended data.
Microdots: imperceptibledots.
Line spacing: modernpublishing.
Alberto V. E. (CRYP - UGR) Steganography April 2010 19 / 38
![Page 43: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/43.jpg)
Present
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 20 / 38
![Page 44: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/44.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 45: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/45.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 46: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/46.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 47: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/47.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 48: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/48.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 49: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/49.jpg)
Present
Digital EraFollow the white rabbit
Digital era: how do wemanage data now?
Sound: bit streams.
Images: bit streams.
Video: bit streams.
Text: bit streams.
Noise
A weak spot to exploit.
Alberto V. E. (CRYP - UGR) Steganography April 2010 21 / 38
![Page 50: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/50.jpg)
Present
A simple ideaTake a closer look
Alberto V. E. (CRYP - UGR) Steganography April 2010 22 / 38
![Page 51: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/51.jpg)
Present
A simple ideaA said CLOSER!
(a) #18657E (b) #19657E (c) #1A657E (d) #1B657E
Figure: LSB variations over R
Alberto V. E. (CRYP - UGR) Steganography April 2010 23 / 38
![Page 52: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/52.jpg)
Present
LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.
(a) #18667D
(b) #1B657E
LSB Steganography
LSB Variations are indiscernible.Even the two LSB!
Let’s check a poor 800× 600 image.
800× 600 = 48000pixels
480000pixels × 6 = 2880000bit
2880000bit
8bit/character= 360000characters
Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
![Page 53: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/53.jpg)
Present
LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.
(c) #18667D
(d) #1B657E
LSB Steganography
LSB Variations are indiscernible.Even the two LSB!
Let’s check a poor 800× 600 image.
800× 600 = 48000pixels
480000pixels × 6 = 2880000bit
2880000bit
8bit/character= 360000characters
Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
![Page 54: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/54.jpg)
Present
LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.
(e) #18667D
(f) #1B657E
LSB Steganography
LSB Variations are indiscernible.Even the two LSB!
Let’s check a poor 800× 600 image.
800× 600 = 48000pixels
480000pixels × 6 = 2880000bit
2880000bit
8bit/character= 360000characters
Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
![Page 55: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/55.jpg)
Present
LSB SteganographyI have discovered a truly marvelous proof of this, which this pixel is too narrow to contain.
(g) #18667D
(h) #1B657E
LSB Steganography
LSB Variations are indiscernible.Even the two LSB!
Let’s check a poor 800× 600 image.
800× 600 = 48000pixels
480000pixels × 6 = 2880000bit
2880000bit
8bit/character= 360000characters
Alberto V. E. (CRYP - UGR) Steganography April 2010 24 / 38
![Page 56: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/56.jpg)
Present
LSB Steganography
Pros
Easy to understand and code.
Pure steganographic (a priori).
Lot’s of coding chances. [3]
Cons
Weak against noise attack.
Requires good images.
Requires non-coded images.
Alberto V. E. (CRYP - UGR) Steganography April 2010 25 / 38
![Page 57: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/57.jpg)
Present
WattermarkingCopyrigthing
Problem
Lossy compression (JPEG,MGEP) destroys LSB variations.
Solution
Hide in other LSB.
Also indiscernible for human eye.
Alberto V. E. (CRYP - UGR) Steganography April 2010 26 / 38
![Page 58: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/58.jpg)
Present
WattermarkingCopyrigthing
Concepts
Visible watermarking.
Invisible watermarking.
Requires redundancy!
Also valid for video compression.
Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
![Page 59: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/59.jpg)
Present
WattermarkingCopyrigthing
Concepts
Visible watermarking.
Invisible watermarking.
Requires redundancy!
Also valid for video compression.
Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
![Page 60: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/60.jpg)
Present
WattermarkingCopyrigthing
Concepts
Visible watermarking.
Invisible watermarking.
Requires redundancy!
Also valid for video compression.
Alberto V. E. (CRYP - UGR) Steganography April 2010 27 / 38
![Page 61: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/61.jpg)
Future
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 28 / 38
![Page 62: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/62.jpg)
Future
Science fiction?Keep your mind open
Where are the limits?
Science and engineering developfast.
Multiple fields merge and splitcontinuously.
What can we learn from other fields?
Keep your mind open!
Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38
![Page 63: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/63.jpg)
Future
Science fiction?Keep your mind open
Where are the limits?
Science and engineering developfast.
Multiple fields merge and splitcontinuously.
What can we learn from other fields?
Keep your mind open!
Alberto V. E. (CRYP - UGR) Steganography April 2010 29 / 38
![Page 64: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/64.jpg)
Future
Messages through lightQuantum physics killed the cryptography stars
Idea: Polarized photons cryptosystem... in 1984! [4]
Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38
![Page 65: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/65.jpg)
Future
Messages through lightQuantum physics killed the cryptography stars
Idea: Polarized photons cryptosystem... in 1984! [4]
Alberto V. E. (CRYP - UGR) Steganography April 2010 30 / 38
![Page 66: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/66.jpg)
Future
DNA CodingLimits?
DNA and RNA have codedlife of living things in a prettygood way for years.
Let’s use copyright it!
4 nucleic acids:
A: 00
C: 01
G: 10
T: 11
How?
Innocuous sequences.
Redundant sequences.
Add sequences.
Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
![Page 67: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/67.jpg)
Future
DNA CodingLimits?
DNA and RNA have codedlife of living things in a prettygood way for years.
Let’s use copyright it!
4 nucleic acids:
A: 00
C: 01
G: 10
T: 11
How?
Innocuous sequences.
Redundant sequences.
Add sequences.
Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
![Page 68: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/68.jpg)
Future
DNA CodingLimits?
DNA and RNA have codedlife of living things in a prettygood way for years.
Let’s use copyright it!
4 nucleic acids:
A: 00
C: 01
G: 10
T: 11
How?
Innocuous sequences.
Redundant sequences.
Add sequences.
Alberto V. E. (CRYP - UGR) Steganography April 2010 31 / 38
![Page 69: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/69.jpg)
Conclusions
Index
1 Introduction2 Past3 Present4 Future5 Conclusions
Alberto V. E. (CRYP - UGR) Steganography April 2010 32 / 38
![Page 70: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/70.jpg)
Conclusions
Conclusions
Benefits
Secrecy and confusion.
Variety of combinations.
Can be combined withcryptography.
Only few pros but strong ones.
Alberto V. E. (CRYP - UGR) Steganography April 2010 33 / 38
![Page 71: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/71.jpg)
Conclusions
Conclusions
Cons
Not suitable for massivetransmissions.
Requires more effort thanregular cryptography.
Weak against transformation.
Specific solutions for specificproblems.
Always trade security againstrobustness.
Alberto V. E. (CRYP - UGR) Steganography April 2010 34 / 38
![Page 72: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/72.jpg)
References
References I
Information Hiding - A SurveyFabien A. P. Petitcolas, Ross J. Anderson and Markus G. KuhnProceedings of the IEEE, special issue on protection of multimediacontent, 87(7):1062-1078, July 1999
Exploring Steganography: Seeing the UnseenNeil F. Johnson and Sushil Jajodia.IEEE Computer, February 1998: 26-34.
Reliable Dectection of LSB Steganography in Color and GrayscaleImages.Jessica Fridrich, Miroslav Goljan and Rui DuMultimedia, IEEE, 2001
Alberto V. E. (CRYP - UGR) Steganography April 2010 35 / 38
![Page 73: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/73.jpg)
References
References II
Quantum cryptography: Public-key distribution and coin tossingBennett, C. H. and Brassard, G.Proceedings of IEEE International Conference on Computers,December 1984.
Hiding Data in DNABoris Shimanovsky, Jessica Feng and Miodrag PotkonjakInformation Hiding, 2003 - Springer
Disappearing Cryptography. Information Hiding: Steganography &Watermarking. (3rd ed.)Peter Wayner.Elsevier, 2009.
Alberto V. E. (CRYP - UGR) Steganography April 2010 36 / 38
![Page 74: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/74.jpg)
References
References III
Matematicos, espıas y piratas informaticos. Codificacion yCriptografıa.Joan GomezRBA, 2010.
Wikipedia: Steganographyhttp://en.wikipedia.org/wiki/Steganography
Kriptopolis (in Spanish)http://www.kriptopolis.org/articulos/esteganografia
Steganography: How to Send a Secret Messagehttp://www.strangehorizons.com/2001/20011008/steganography.shtml
Johnson & Johnson Technology Consultants (Neil F. Johnson)http://www.jjtc.com/Steganography/ (software)
Alberto V. E. (CRYP - UGR) Steganography April 2010 37 / 38
![Page 75: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/75.jpg)
The end
Thank you.
Questions?Please be nice
Just one more thing!
Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38
![Page 76: Steganography: Hiding information in past, present and future.](https://reader034.fdocuments.in/reader034/viewer/2022042623/548097ff5906b5ff6c8b456c/html5/thumbnails/76.jpg)
The end
Thank you.
Questions?Please be nice
Just one more thing!
Alberto V. E. (CRYP - UGR) Steganography April 2010 38 / 38