cs 5888c5 8s a production jonathan erdmanhead trojan mann warm pill snotportman wills ethnic...

40

Upload: hilary-allen

Post on 24-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

CS 5888C5 8SA PRODUCTION

JONATHAN ERDMANHEAD TROJAN MANN

WARM PILL SNOTPORTMAN WILLS

ETHNIC URCHINSERIC HUTCHINS

STEPHEN LIANGA PENIS LENGTH

PATS A HORNY EGGSTEGANOGRAPHY

stegeinto cover

STEGANOGRAPHY

to writegrafein

STEGANOGRAPHY

STEGANOGRAPHY

cover * message * stego

STEGANOGRAPHY

“Words, Words, Words”

• English is redundant.

• Relative message lengths:– Important Message: 13 Bytes– Spam Mail: 1,108 Bytes

Dear Friend , Your email address has been submitted to us indicating your interest in our newsletter . If you no longer wish to receive our publications simply reply with a Subject: of "REMOVE" and you will immediately be removed from our club . This mail is being sent in compliance with Senate bill 2116 , Title 7 , Section 301 ! Do NOT confuse us with Internet scam artists . Why work for somebody else when you can become rich within 13 DAYS ! Have you ever noticed the baby boomers are more demanding than their parents and nobody is getting any younger ! Well, now is your chance to capitalize on this . WE will help YOU process your orders within seconds plus deliver goods right to the customer's doorstep . The best thing about our system is that it is absolutely risk free for you ! But don't believe us ! Mr Ames who resides in Delaware tried us and says "My only problem now is where to park all my cars" ! This offer is 100% legal ! If not for you then for your LOVED ONES - act now ! Sign up a friend and you'll get a discount of 50% . Thank-you for your serious consideration of our offer !

Dear Friend , Your email address has been submitted to us indicating your interest in our newsletter . If you no longer wish to receive our publications simply reply with a Subject: of "REMOVE" and you will immediately be removed from our club . This mail is being sent in compliance with Senate bill 2116 , Title 7 , Section 301 ! Do NOT confuse us with Internet scam artists . Why work for somebody else when you can become rich within 13 DAYS ! Have you ever noticed the baby boomers are more demanding than their parents and nobody is getting any younger ! Well, now is your chance to capitalize on this . WE will help YOU process your orders within seconds plus deliver goods right to the customer's doorstep . The best thing about our system is that it is absolutely risk free for you ! But don't believe us ! Mr Ames who resides in Delaware tried us and says "My only problem now is where to park all my cars" ! This offer is 100% legal ! If not for you then for your loved ones - act now ! Sign up a friend and you'll get a discount of 50% . Thank-you for your serious consideration of our offer !

www.spammimic.com

Give us an A+Give us an A-

loved ones LOVED ONES

The auto drives fast on a slippery road over the hill

Meeting: 9 o’clock at my home

Over the slope the car travels

quickly on an ice-covered street

http://www.texthide.com/

1’s and 0’s

• Commas in lists– Guns, butter, and brownies– Guns, butter and brownies

• Carriage return vs. Line feed (newline)– Carriage return: ASCII 015– Line feed: ASCII 012

Ones and Zeros

1’s and 0’s Spy Game

• Intercepted communication from German Spy in WWII

phgloji

m

ei

ss

un

afyn e

i

r sn

r

Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

phgloji

m

ei

ss

un

afyn e

i

r sn

r

A Picture is Worth 1,024 Words

• Images have a lot of data:– Spam Mail: 1,108 Bytes– Picture of Dave: 152 KB

• Ways to hide information– Least significant bit (BMP)– Palette Shifts (GIF)– Discrete Cosine Transforms (JPG)

What’s lurking behind

this pretty face?

Another pretty face.

(And quite a body.)

Another pretty face.

(And quite a body.)

Oops! We did it again…

• Audio files contain even more data:– Spam Mail: 1,108 Bytes– Picture of Dave: 152 KB– Sneaker’s Theme: 3,466 KB

• Ways to hide information– Least significant bit (RAW)– Complicated stuff we don’t understand (MP3)

Detecting Steganography

• Statistical properties of – Text– Music– Images– Videos

• Concentrate on hiding data in a JPEG

Jay-Pehg

• JPEG : Joint Photographic Expert Group• Compression Algorithm

8x8 Pixel Block

Discrete Cosine Transformation Quantizer

Binary Encoder 100100…

Discrete WHAT?!

• Discrete Cosine Transform

• Transforms 8x8 blocks into 64 DCT coefficients• FIRST coefficient is the most important

8x8 Pixel Block

122

cos122

cos),(4),(2

21

0

1

0 1

121

1 2

jN

ki

N

kjiAkkB

N

i

N

j

41 30

1826

98 -6

24

Quantize THIS!

• “Lossy” Compression• Values increase as you move down

• Quantized value = Round ( DCT / QUA )• JPEG = Discard zeros

98 -6

24

3 11

179

DCT QUA

33 -1

00

VALUE

33 -1

JPG

Binary me!

• Convert to binary in a zigzag

33 -1

0 0

0100001000000010000010000000

Hide and go seek

• Where do you hide the message?

Detecting Steganography

http://www.citi.umich.edu/u/provos/cv.html

J-Steg vs. Masker

• StegDetect can find stego created in JSteg

• Cannot detect stego created in Masker

• StegDetect knows what to look for…– J-Steg– JPHide– Outguess– … not Masker (or anything else)

The Verdict

• Detecting steganographic content in any cover is hard.

• Only one documented case of uncovering a “wild” stego.

Secret Number 1

• Binary gesture

1000011 C 1010011 S 0110101 5 0111000 8 0111000 8

Secret Number 2

Policy-Directed Code Safety by David E. Evans S.B. Massachusetts Institute of Technology (1994) S.M. Massachusetts Institute of Technology (1994) Submitted to the Department of Electrical Engineering and Computer Sciencein partial fulfillment of the requirements for the degree of Doctor of Philosophy at the Massachusetts Institute of Technology February 2000 (C) Massachusetts Institute of Technology 1999. All rights reserved. Author...................................................... David Evans Department of Electrical Engineering and Computer Science October 19, 1999

Remember the music from the

introduction?

Secret Number 3

• What the heck is up with the cups?

• Absolutely nothing.

setec astronomy

The Verdict

• Too many images, MP3’s, spams, pictures of David Evans on the Internet.

• Too many possible algorithms.

• In conlusion:

too many secrets

Casting byDavid Evans, C.S.A.

SOUNDTRACK LISTING

“Main Title”Sneakers: Original Motion Picture Soundtrack

James Horner, Branford Marsalis

“1812 Overture”Pytor Il’yich Tchaikovsky

The London Symphony OrchestraRoyal Albert Hall, 1993

SPECIAL THANKS TO:

Dave Evans

The guys who did Sneakers

The guys who made Microsoft Powerpoint

The guys who produce Coca-Cola and Mountain Dew

Very few, if any, animals were harmed in the making of this presentation

© 2001 || MMI || 11111010001 || 7D1

STARRING (in alphabetical order):

Jonathan ErdmanEric HutchinsStephen LiangPortman Wills

GUEST APPEARANCES BY:

David EvansDavid E. Evans’ faceBritney Spears’ Body

Special assistants to Mr. ErdmanWhitfield Diffie Maartin Hellman

Special assistants to Mr. HutchinsCharles BabbageAlan Turing

Special assistants to Mr. LiangRon Rivest Adi Shamir

Leonard Adleman

Special assistants to Mr. WillsClaude ShannonMartin Bishop

“Mother”