d888888o. 8888888 8888888888 8 8888888888       ,o888888o.          .8.          b.             8     ,o888888o.         ,o888888o.    8 888888888o.            .8.          8 888888888o   8 8888        8 `8.`8888.      ,8'   .`8888:' `88.     8 8888       8 8888            8888     `88.       .888.         888o.          8  . 8888     `88.      8888     `88.  8 8888    `88.          .888.         8 8888    `88. 8 8888        8  `8.`8888.    ,8'    8.`8888.   Y8     8 8888       8 8888         ,8 8888       `8.     :88888.        Y88888o.       8 ,8 8888       `8b  ,8 8888       `8. 8 8888     `88         :88888.        8 8888     `88 8 8888        8   `8.`8888.  ,8'     `8.`8888.         8 8888       8 8888         88 8888              . `88888.       .`Y888888o.    8 88 8888        `8b 88 8888           8 8888     ,88        . `88888.       8 8888     ,88 8 8888        8    `8.`8888.,8'       `8.`8888.        8 8888       8 888888888888 88 8888             .8. `88888.      8o. `Y888888o. 8 88 8888         88 88 8888           8 8888.   ,88'       .8. `88888.      8 8888.   ,88' 8 8888        8     `8.`88888'         `8.`8888.       8 8888       8 8888         88 8888            .8`8. `88888.     8`Y8o. `Y88888o8 88 8888         88 88 8888           8 888888888P'       .8`8. `88888.     8 888888888P'  8 8888        8      `8. 8888           `8.`8888.      8 8888       8 8888         88 8888   8888888 .8' `8. `88888.    8   `Y8o. `Y8888 88 8888        ,8P 88 8888   8888888 8 8888`8b          .8' `8. `88888.    8 8888         8 8888888888888       `8 8888       8b   `8.`8888.     8 8888       8 8888         `8 8888       .8'.8'   `8. `88888.   8      `Y8o. `Y8 `8 8888       ,8P  `8 8888       .8' 8 8888 `8b.       .8'   `8. `88888.   8 8888         8 8888        8        8 8888       `8b.  ;8.`8888     8 8888       8 8888            8888     ,88'.888888888. `88888.  8         `Y8o.`  ` 8888     ,88'      8888     ,88'  8 8888   `8b.    .888888888. `88888.  8 8888         8 8888        8        8 8888        `Y8888P ,88P'     8 8888       8 888888888888     `8888888P' .8'       `8. `88888. 8            `Yo     `8888888P'         `8888888P'    8 8888     `88. .8'       `8. `88888. 8 8888         8 8888        8        8 8888      



A quick review based on the article [1] A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 2011. By Jiwu Huang, Yun Qing Shi, Bin Li, Junhui He.



UFRJ - EEL840 - PEDRO BOUEKE - SEPTEMBER 2017
best at 1200x900px

Definition


As seen in [1]:

Steganography and steganalysis are important topics in information hiding. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography.

And on Wikipedia:

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos, meaning "covered, concealed, or protected," and graphein meaning "writing".

CRYPTOGRAPHY


Steganography focuses on the concealment of the fact that the message is beign sent as well as concealing its content.


Considering the example below, which would be more likely to be ignored in a monitored medium, the cipher text or the image?


Message:

HELLO WORLD
Ciphertext:

AYE4jnEpKaYsuDE=
Hidden text:

image containing the message HELLO WORLD

Modeling


Steganography can be modeled as the prisioner's problem. Two steganographers communicating covertly over a public channel take the hole of the prisoners as agent(s) monitor the channel.

basic steganography model diagram

Evaluating


What makes steganography good?


SECURITY
security icon
How easily the existence of steganography can be estimated
CAPACITY
capacity icon
How much information can be stored in a message
IMPERCEPTIBILITY
imperceptibility icon
How much perceptible distortion or noise was generated

Stego Objects


Steganography can be applied to any medium.


PHYSICAL
  • written text
  • hairstyles
  • clothing
  • body movements
  • ...
DIGITAL
  • digital text
  • media encoding
  • mimic functions
  • content manipulation
  • ...
OTHERS
  • puzzles
  • naming of things
  • networks
  • intentional mistakes
  • ...

There is a lot of research and interest in digital images. That's where we will be focusing on.

IMAGE STEGANOGRAPHY: LSB


One of the most well known methods of digital steganography, the LSB (least significant bit) method consists of using the last bit of each color channel of an image to store information.

It's easy to understand and implement, can be used with any image format and has high capacity, but is also easy to detect and the chances of failure are high.

lsb example

IMAGE STEGANOGRAPHY: MASKING AND FILTERING


Similar to the LSB method, but not so susceptible to failure due to the fact that image manipulations does not affect the hidden message.

As can be noted, this technique will only work on black and white pictures.

lsb example

IMAGE STEGANOGRAPHY: DOMAIN TRANSFORM


Such methods use domain manipulation to hide messages with high capacity, security and robustness.


cow drawing
arrow icon
frequency domain cow

The discrete cosine transform, for example, works by allowing us to reduce redudancy in the transformed domain of the image. This allows us to store our message without changing the most important aspects of the original image.

IMAGE STEGANOGRAPHY: MUCH MORE


We covered the basics of digital image staganography. Both steganography and steganalysis compete in an everlasting race with modern techniques, software and ongoing research.


LSB, BPCS, Stochastic Modulation, PVD, MBNS, QIM/DM, Jsteg, F5, OG, MB and YASS are all some of the steganographic methods developed and studied for steganography in JPEG images.

The image demonstrates random partioning of the image used by YASS(Yet Another Steganographic Scheme - that resists blind steganalysis) to promove imperceptibility.

yass diagram

FUN: THE MISTERY OF CICADA 3301



cicada mystery modified image
  • posted on an image board in 2012, it quickly got viral
  • examination of the image led to a series of very specific puzzles that had to be solved for advancing in the mistery
  • steganography and cryptography were broadly used
  • it ended suggesting that the organizers found the candidates they were looking for
  • similar challenges happened in the years that followed
  • the cicada 3301 remains as a very popular use of steganography on the web

8888888 8888888888 8 8888        8          .8.          b.             8 8 8888     ,88'   d888888o.   
      8 8888       8 8888        8         .888.         888o.          8 8 8888    ,88'  .`8888:' `88. 
      8 8888       8 8888        8        :88888.        Y88888o.       8 8 8888   ,88'   8.`8888.   Y8 
      8 8888       8 8888        8       . `88888.       .`Y888888o.    8 8 8888  ,88'    `8.`8888.     
      8 8888       8 8888        8      .8. `88888.      8o. `Y888888o. 8 8 8888 ,88'      `8.`8888.    
      8 8888       8 8888        8     .8`8. `88888.     8`Y8o. `Y88888o8 8 8888 88'        `8.`8888.   
      8 8888       8 8888888888888    .8' `8. `88888.    8   `Y8o. `Y8888 8 888888<          `8.`8888.  
      8 8888       8 8888        8   .8'   `8. `88888.   8      `Y8o. `Y8 8 8888 `Y8.    8b   `8.`8888. 
      8 8888       8 8888        8  .888888888. `88888.  8         `Y8o.` 8 8888   `Y8.  `8b.  ;8.`8888 
      8 8888       8 8888        8 .8'       `8. `88888. 8            `Yo 8 8888     `Y8. `Y8888P ,88P' 



Awesome! You made it to the end. Here are some links for you:




my ugly face
can you find the hidden message in this presentation?