You are on page 1of 27

Steganography

Security

Presented by:
Sharika shankar
1 Roll:no-25
Outline
1. What is steganography?
2. Comparison
3. Steganography model
4. Steganography security principle
5. Steganalysis
6. Steganalysis attack
7. Steganalysis techniques
8. Tools
9. Advantages
10. Applications
11. Limitations
12. Conclusion
2 13. Reference STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
What is Steganography?

 Technique of hiding the secret data within


an ordinary file to avoid detection.

3 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Data Hiding Techniques

watermarking
cryptography
steganography
4 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
Comparison

iin

5 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Steganography Terms
 Carrier/cover file(c)-file which has hidden
information inside of it.
 Stego-medium-Medium in which information is
hidden
 Stego-cover(c’)-The cover which is embedded
with the secret message.
 Secret message(m)-Information which is to be
hidden or concealed.
 Stego-key(k)-keys are required for data hiding
6 and recovering. STEGANOGRAPHY SECURITY: PRINCIPLE AND
Steganography Model

7 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Steganography Security
Principle
1. Indistinguishability-It deals with the human
inability to distinguish minor changes, which is
easy to make use in objects, that contain
redundant information.

2. Algorithm-secrecy/key-secrecy based
security-

8 STEGANOGRAPHY SECURITY: PRINCIPLE AND


1.Indistinguishability

 Abstract distance between cover


and stego-cover(D)
 D quantifies the differentiability
between different samples
Indisinguishable condition:
D( P(C ), P(C ' ))  0
Distinguishable condition:
D( P (C ), P (C ' ))  0
9 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
2.Algorithm/Key based security

 Key secrecy with algorithm open/closed.


 Kerckhoff’s principle relies on the secrecy of key.

Kerckhoff’s principle:
1.The embedding algorithm is know to be public.
2.By using embedding key in embedding process to
extract the embedded data by corresponding
extraction key.
10 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
Steganalysis

 Detecting and decoding the hidden data


within a given medium .

 It act as an effective way to judge the


security performance of steganographic
techniques.

11 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Objectives of steganalysis
 To detect the existence of secret message.
 To identify the type of steganographic method
used to create the stego image.
 To recover the data.
 Estimate the length of hidden message,and trace
the location bearing the hidden message.

12 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Steganalysis Attack
1.stego-cover only attack(SCOA)
 Primary level attack model
 Access to only the set of stegano-covers

2.Known cover attack(KCA)


 Attack model of steganalysis
 Pair of original cover and corresponding stego
13 version are known. STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
3.Chosen cover attack(CCA)

 Prior knowledge of KCA


 Embedding and extraction process (algorithm) are
known.
4.Adaptive chosen cover attack(ACCA)
 Challenging phase
 If the attack fails,after CCA, the attacker continue
to restart CCA until the attack succeeds

14 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Steganalysis techniques
Broadly divided into:
1.Targeted steganalysis: uses the knowledge
about steganographic technique to detect stego
objects.

2.Blind steganalysis: distinguishes a file that


has hidden information, with no information about
the steganographic technique
15 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
Targeted
steganalysis

Visual Statistical Structural


attacks attacks attacks

Visual attack:
 enable humans to distinguish between noise and
visual patterns.
 Most common attack is to display the lsb of an object.
 Random noise indicates the existence of a hidden
message.
STEGANOGRAPHY SECURITY: PRINCIPLE AND
16 PRACTICE
Statistical attack:
 methods that prove the existence of hidden data via
statistical approaches.
 It compares the frequency distribution of with the
theoretically expected distribution of the cover file.
 Chi-square analysis: | n 2i  n 2i  1 || n 2i * n 2i  1* |

 The frequency difference between adjacent color is


reduced by the embedding process.

STEGANOGRAPHY SECURITY: PRINCIPLE AND


17 PRACTICE
Structural attacks:
 It investigates the signs of embedding in an image.

RS analysis:Estimate the length of the embedded


message
 Used in spatial domain.
 Predict the level of Lsb embedding.
 Discrimination function is used to find the noisiness.
 The value of the function increases after embedding.

18 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Blind steganalysis

 No prior knowledge about embedding operation.

 It is capable of identifying the probability of


embedding operation.

 It is expected to work on all types of embedding


techniques and image formats.
STEGANOGRAPHY SECURITY: PRINCIPLE AND
19 PRACTICE
Methods of blind steganalysis

 Self calibration mechanism

 Features capturing cover memory

 Supervised learning based steganalysis

STEGANOGRAPHY SECURITY: PRINCIPLE AND


20 PRACTICE
Detecting Steganography
 The art of detecting steganography is referred
to as steganalysis.

 Using tools like send secret, steganography


8.1,stegdetect,hiderman,steganos,camouflage
etc.

21 STEGANOGRAPHY SECURITY: PRINCIPLE


AND PRACTICE
Advantages
 Securely hiding sensitive data.
 Difficult to detect.
 Can be applied differently in digital image, audio
and video file.
 It protect both message and communication
channel.
 It can be done faster with the softwares.

22 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Application
 Applied in digital watermarking.
 Modern printers.
 E-mail spam.
 Used by intelligence agencies.
 Used in military applications.

23 STEGANOGRAPHY SECURITY: PRINCIPLE AND


PRACTICE
Limitations
 If algorithm is known, then technique is of no use.

 key leakage may occur and leads to unauthorized


access of data.

 If the technique is gone in the wrong hands like


hackers, terrorist it can be very dangerous.

STEGANOGRAPHY SECURITY: PRINCIPLE AND


24 PRACTICE
Conclusion
 Hiding a message with steganography methods
prevents message being detected.

 Hampering the steganalysis ability to effectively


estimating the attack.
.
 Steganography will be reformatting the needs of
cyber security.
STEGANOGRAPHY SECURITY: PRINCIPLE AND
25 PRACTICE
Reference
[1].Yan Ke,Jia Liu,Min-Quing Zhang,Ting-Ting Su
and Yuan Yang,”Steganography Security:
Principles and Practice,”IEEE Access ,Digital
Object Identifier,volume 6,Year:2018.
[2].Shamim Ahmed Laskar and Kattamanchi
Hemachandran,”Image steganalysis techniques
for attacking Steganography”,IJERT,volume.3
Issue 1 ,pp3400-3410,January 2014.
STEGANOGRAPHY SECURITY: PRINCIPLE AND
26 PRACTICE
THANK YOU

27 STEGANOGRAPHY SECURITY: PRINCIPLE


AND PRACTICE

You might also like