Hacking and Watermarking
-
Upload
krishna-kumar-bohra -
Category
Technology
-
view
204 -
download
2
Transcript of Hacking and Watermarking
Watermarking and
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
HackingSecurity
Introduction
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
What and Where ?Human Being (Communication)
Store / Access / Transfer Information
Storage Media
Web Tech (N/W of N/Ws)(Lack of Security offered various THREATS)
Tool for Security (Watermarking i.e. Digital Watermarking)
Applications Areas
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
Wide range of applications Content (Audio/ Video/…) Protection Forensics Check Piracy Messaging (Steganography) Document and Image security (Hacking) Product Authentication
(Ownership/Copyright)
Issues Over Web
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
What to manage on Web? Issues over Web
Keeping OWNERSHIP of contents To HACK(SECURITY) Computer
Ownership ; managed by hidden data (Information Hiding)
Hacking (SECURITY); Hiding malicious code
It concern to Intellectual Property Right (IPR)
Ownership
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
Ownership … Watermarking … Watermarking; is to embed watermark information to
actual content.(Currency Note, Specs ‘Crizal’,…)
Tool for Securing Digital Content (Images, Audio, Video,…)
Courtesy : RBI Courtesy : Crizal (Essilor Ltd.)
VISIBLE WATERMARK INVISIBLE WATERMARK
Security
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
Security … Hiding… Hacking … Hiding
Hiding in plain sight
“YOU CAN’T STOP WHAT YOU CAN’TSEE”
Digital WatermarkOR
Exploit Code
Security … Hiding… Hacking … Images are INNOCENT, but Contents
are NOT!
Hacking; What it will do? Hacking with PICTURES!
A Malicious Code in PIXEL
PiXture ELement; Smallest element of Images
Warning ! This image can be AUTO Decode, Run, Triggered in ONE Image
How It Works ?
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
THE SECRET SAUCE
...00 12 01 15 12 52 55 52 52 15 25 52 Ws hS he ll .R un (“ c: /w in do ws /s ys te m3 2/ no te pa d. ex e“ ,1 , fa ls e) 00 25 25 52 54 19 52 55 ...
Is It only Image ?NO
It is Computer Program (Technically ; MATLAB)
YOU see IMAGE !
And I see IMAGE CODE!
01011111binary
To Take Care
Krishna Kumar Bohra, Assistant Professor, Lachoo Memorial College of Science & Technology
Academic Staff College, Jodhpur 12 June 2015
What should we do ?
Do not open images from mail of unknown Take these message boxes seriously
Message Boxes …
Message Boxes …
About MeKrishna Kumar Bohra `K.K`
Lerner and
Assistant Professor, Lachoo Memorial College of Science &
Technology
Twitter @BohraKumarGmail @saytokrishWhatsapp @9460551145
Thanks !