Information Hiding Soldatov Nikolay St. Petersburg State University Joint Advanced Student School ’05

advertisement
Information Hiding
Soldatov Nikolay
St. Petersburg State University
Joint Advanced Student School ’05
The Introduction

What is that all
about?
Year
1992
1993
1994
1994
1996
1997
1998
Publications
2
2
4
13
29
64
103
7/15/2016
2
Use Cases





Copyright
Military and intelligence agencies
Law enforcement and counter intelligence
agencies
Anonymous communications on the Internet
Digital elections and digital cash
7/15/2016
3
Road-map





A basic theory of Steganography
Robust marking systems
Classification of information hiding techniques
Steganographic techniques
Known attacks
7/15/2016
4
A Basic Theory of Steganography
Steganography:=concealing the very existence of
information transfer

Early results
 Robust marking systems
7/15/2016
5
Early Results

‘Prisoners’ problem’ (G. J. Simmons in 1983)
The ‘subliminal channel’
B
A
W
7/15/2016
6
Robust Marking Systems

Not degrade the quality
 Detecting requires secret knowledge ( stegokey )
 Not to interfere
 Survive attacks
7/15/2016
7
Types of Robust Marking Systems

Private marking

Type l: Extract the mark
 Type ll: ‘YES’/’NO’

Public marking
 Asymmetric marking
7/15/2016
8
Steganographic Systems

JSteg (JSteg-shell), JPHide, OutGuess
 SecureEngine
 Stegdetect
 Stegbreak
7/15/2016
9
Classification Of Information Hiding Techniques
Information Hiding
Covet Channels
Steganography
Linguistic Steganography
Anonymity
Technical Steganography
Copyright Marking
Robust Copyright Marking
Fragile Watermarking
Watermarking
Imperceptible watermarking
Visible Watermarking
Fingerprinting
7/15/2016
10
Watermark Embedding Scheme
Mark
Stego
image
Marking
Algorithm
Marked image
Secret/public key
7/15/2016
11
Watermark Recovery Scheme
Mark and/or original
image
Test
image
Detection
Algorithm
Mark or
confident
message
Secret/public key
7/15/2016
12
One of The Oldest Watermark
Monograms figuring
TGE RG (Thomas
Goodrich Eliensis/
Remigius Guedon)
7/15/2016
13
Steganographic Techniques





Security through obscurity
Camouflage
Hiding the location
Spreading the information
Specific techniques
7/15/2016
14
Security Through Obscurity





Music scores (Gaspar Schott: Schola
Steganographica)
Geometric drawing (John Wilkins)
Acrostic (David Kahn. The Codebreakers)
Semagrams
Embed additional data in the last significant
bits
7/15/2016
15
Camouflage





Anamorphic images (‘Vexierbird’ by Shö)
‘Shaved slave’ (Histiaeus, around 440 B.C.,
but still was used in the 20th century!)
Needle or invisible ink dots (are in use in
document security)
Photographic reduction
Masking algorithms (MPEG, buried data
channels)
7/15/2016
16
Masking Algorithms (Scheme)
Key
Mark
Transform
space
Inverse
transform
space
Marked
signal
Perceptual
analysis
Signal
7/15/2016
Transform
space
17
Hiding The Location of Hidden Information
Paper mask (Ancient China – a British bank
(1992))
 Mathematical tables (XVII-XVIII)
 Format features of electronic published
documents
 Errors in randomly chosen last significant bits

7/15/2016
18
Spread The Hidden Information





Patchwork
Spread spectrum systems
Discrete cosine transform ( W·W´/ √(W´·W´) )
MP3Stego etc.
Echo hiding
7/15/2016
19
Information Hiding in JPEG Images (DCT)

Discrete cosine
transform (DCT)
7/15/2016
20
Techniques Specific to The Environment

Meteor burst communication
 Ultra-violet fluorescent inks
 Optical variable devices combined with hardreproducible overt marks
 Covert channels
7/15/2016
21
Known Attacks






Jitter attacks
Robustness attacks
Attack on echo hiding
The mosaic attack
Interpretation attacks
Implementation
7/15/2016
22
Jitter Attacks

Timing errors
 Change the length of a musical performance
(Hamdy et. al. “Timescale modifications of
audio signals with combined harmonic and
wavelet representations”)
7/15/2016
23
Robustness Attacks

Stir Mark. Applies a minor unnoticeable geometric distortion, like
low frequency deviation, small and smoothly distributed error in
all values, stretching, rotation etc.
General lesson: given a target marking scheme,
one can invent a distortion that will prevent
detection of the watermark leaving the
perceptual quality undiminished
7/15/2016
24
‘Lena’ Before (a) And After (b) Stir Mark
(a)
7/15/2016
(b)
25
Grid With The Same Distortion
7/15/2016
26
Attack on Echo Hiding

Blind echo cancellation (hard problem in
general case)
 Cepstrum analysis
Experiments on random signals show that there
is a method, which returns quite accurate
estimators of the delay, when an artificial echo
has been added to the signal
7/15/2016
27
The Mosaic Attack
Procedure: based on chopping an image into a
number of smaller subimages
Upgrades: mobile code, purchasing
7/15/2016
28
Interpretation Attacks

‘Protocol’ level attack (Crawler et al.)
D+W-W´
Counter-attack: time stamping, notarisation
7/15/2016
29
Implementation Considerations
Attacks, exploiting weaknesses in the
implementation rather than in underlying
marking algorithms
 Impersonate user (password search,
disassembling)
 Changing ID
 Bypass checking of previous watermark
(debugger)
7/15/2016
30
Statistical Analysis

Universal statistical
test for random bit
generators
 χ2-test
7/15/2016
31
Examples (Spammimic)
Dear Friend ; We know you are interested in receiving
cutting-edge news . If you are not interested in our
publications and wish to be removed from our lists,
simply do NOT respond and ignore this mail . This mail
is being sent in compliance with Senate bill 1626 ,
Title 3 ; Section 304 ! Thanks! Dear Friend , Especially for you –
this amazing news ! We will comply with all removal
requests . This mail is being sent in compliance with
Senate bill 1618 ; Title 2, Section 301 . This is not multi-level
marketing ! Best regards!
7/15/2016
32
Examples (base64)
Secret message
-----BEGIN PGP MESSAGE----Charset: ISO-8859-1
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird http://enigmail.mozdev.org
U2VjcmV0IG1lc3NhZ2U=
-----END PGP MESSAGE-----
7/15/2016
33
Examples (base64)
Man is distinguished, not only by his reason, but by this singular passion
from other animals, which is a lust of the mind, that by a perseverance
of delight in the continued and indefatigable generation of knowledge,
exceeds the short vehemence of any carnal pleasure.
TWFuIGlzIGRpc3Rpbmd1aXNoZWQsIG5vdCBvbmx5IGJ5IGhpcyByZWFz
b24sIGJ1dCBieSB0aGlzIHNpbmd1bGFyIHBhc3Npb24gZnJvbSBvdGhl
ciBhbmltYWxzLCB3aGljaCBpcyBhIGx1c3Qgb2YgdGhlIG1pbmQsIHRo
YXQgYnkgYSBwZXJzZXZlcmFuY2Ugb2YgZGVsaWdodCBpbiB0aGUg
Y29udGludWVkIGFuZCBpbmRlZmF0aWdhYmxlIGdlbmVyYXRpb24gb
2Yga25vd2xlZGdlLCBleGNlZWRzIHRoZSBzaG9ydCB2ZWhlbWVuY2
Ugb2YgYW55IGNhcm5hbCBwbGVhc3VyZS4=
7/15/2016
34
References

Niels Provos, Peter Honeyman. Detecting
steganographic content on the Internet
 Fabien A.P. Petitcolas, Ross J. Anderson,
Marcus G. Kuhn. Information hiding – a survey
 Stefan Katzenbeisser, Fabien A.P. Petitcolas
(editors). Information hiding techniques for
steganography and watermarking
 Special thanks to www.spammimic.com
7/15/2016
35
Download