The Computer and Information Systems Department

Download Report

Transcript The Computer and Information Systems Department

Steganography
“Hiding in Plain Sight”
Gary Alan Davis, D.Sc.
Department of Computer & Information Systems
Steganography – what is it?
• Covered Writing
(Berinato, 2003)
– from Greek “steganos” & “graphie”
• Earliest example (May, 1997)
– Greece, 500 B.C.
– Message tattooed on shaved head of slave
– Message sent when hair grew back
• Goal: Hide the fact that message even exists
(Glass, 2002)
Steganography in Technology
• Hiding messages within legitimate files
– Picture (.bmp, .jpeg, .gif)
– Audio (.wav, .mp3)
– Video (.mpeg, .avi)
• Messages could be . . .
(Fisher, 2004)
– Trademark/copyright information
– Communication to others
– Malicious code
Good Steganography
• Watermarks
– Identify copyrighted material
– Deter unlicensed use
– Deter piracy
• Digital Watermarks
(Glass, 2002)
– Robust Watermarks – use blocked if mark is detected
– Fragile Watermarks – use blocked if mark is corrupted
Bad Steganography
• Malicious code
(Fisher, 2004)
– Viruses
– Spyware
• Terrorist Communications
(Kolata, 2001)
– “Dead Drop” (e.g., eBay)
– No direct communication
– Difficult to detect hidden messages in files
Steganography Demo
Steganography 1.7.1
15 day free trial
$24.95 to purchase
SecureKit, Inc. (www.securekit.com)
84
84
84
Thank you!
Any Questions?
[email protected]