The role of steganography in secure information solutions (Prathepan yogarajah)
-
Upload
campone -
Category
Technology
-
view
394 -
download
0
description
Transcript of The role of steganography in secure information solutions (Prathepan yogarajah)
http://isrc.ulster.ac.uk
9th May 2013
www.hidinimage.co.uk
Pratheepan Yogarajah
The role of Steganography in Secure Information solutions
http://isrc.ulster.ac.uk
Securing Digital Information
2
http://isrc.ulster.ac.uk
Securing Digital Information
Paper documentDigital document Server
http://isrc.ulster.ac.uk4
Securing Digital Information
Closed System Open System
http://isrc.ulster.ac.uk5
If we don’t secure information…
Scenario 1:
http://isrc.ulster.ac.uk6
http://isrc.ulster.ac.uk7
http://isrc.ulster.ac.uk8
http://isrc.ulster.ac.uk9
Integrity—How do we know if the supporting documents have been altered?
Client logs into ABC Insurance portal and fills in a claim application and submits along with supporting documents.
Approved or rejected application sent back to Client
Scenario 2:
If we don’t secure information…
http://isrc.ulster.ac.uk10
Scenario 3:
If we don’t secure information…
http://isrc.ulster.ac.uk
Steganography
11
http://isrc.ulster.ac.uk12
Steganography
Key
Encoder
Cover Image
Secret Data
Stego Object
Decoder
Secret Data
Communications Channel
http://isrc.ulster.ac.uk
HidInImage
HidInImage enables the encryption and hiding of secret information (text or images) inside images using Steganography techniques.
Secret information is hidden imperceptibly in that it cannot be detected by the human eye.
Our innovative Steganograpy-based hiding solution plays a vital role in securing digital media content.
http://isrc.ulster.ac.uk
Why HidInImage is Unique?
Revolutionary software algorithm for encryption
Novel technique for embedding of data in images using Steganography technique
Patented Encryption SoftwarePatented Embedding Software
http://isrc.ulster.ac.uk15
Cover ImageProtected Image
What does HidInImage do?
+ Key =>
Secret Data
http://isrc.ulster.ac.uk
HidInImage Video
16
http://isrc.ulster.ac.uk 17
Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with her information details, (b) encrypted secret data (payload) of (a), a clean image showing nature in which the encrypted data will be embedded to and finally (d) shows the stego-image carrying the encrypted patient data
Secret Communication
http://isrc.ulster.ac.uk18
Secret Data Cover Image Stego Object
Document authentication
http://isrc.ulster.ac.uk19
How to detect alterations
Altered Document Recovered Document
Grayscale image of Altered Document
Final Result
http://isrc.ulster.ac.uk
Received Document Extracted original content from received Document
Document authentication
http://isrc.ulster.ac.uk
Anti-Counterfeit & Track and Trace Solution
http://isrc.ulster.ac.uk
Solutions for Digital Images
images used by creative individuals, enterprises, governments and law enforcement
• Copyright Communication– Identifies content owner and rights
• Copy Protection– Controls copying of content
• Classification– Classifies content so it is used appropriately;
• Authentication– Verifies that content is genuine, from an authorized source and has not been altered
http://isrc.ulster.ac.uk23
Thank You