![Page 1: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/1.jpg)
Esteganografia
“A good steganographic technique should provide secrecy even if
everyone knows it's being used.” – Francis Bacon
Thiago Castelló Fonseca – 105029327
Otto Carlos Muniz Bandeira DuarteLuís Henrique Maciel Kosmalski Costa
Universidade Federal do Rio de Janeiro - UFRJRedes de Computadores II
![Page 2: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/2.jpg)
Redes de Computadores II - Esteganografia 2
Índice
Introdução
História
Métodos
Aplicações
Criptografia X Esteganografia
Estegoanálise
Conclusão
Bibliografia
Perguntas
![Page 3: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/3.jpg)
Redes de Computadores II - Esteganografia 3
Introdução
Definição:
É saber como o nada deve estabelecer relações.
WTF ?!?
![Page 4: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/4.jpg)
Redes de Computadores II - Esteganografia 4
Introdução
Vamos analisar a frase anterior:
“É saber como o nada deve estabelecer
relações.”
Pegamos a primeira letra de cada palavra
Esconder
![Page 5: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/5.jpg)
Redes de Computadores II - Esteganografia 5
História
440 ac – A História de Herodotus
![Page 6: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/6.jpg)
Redes de Computadores II - Esteganografia 6
História
Histiaeus
![Page 7: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/7.jpg)
Redes de Computadores II - Esteganografia 7
História
![Page 8: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/8.jpg)
Redes de Computadores II - Esteganografia 8
Métodos
Tinta Invisível ativadas por:
Calor
Luz Ultravioleta
Reações Químicas
Cifra Nula
Esteganografia BPCS
![Page 9: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/9.jpg)
Redes de Computadores II - Esteganografia 9
Métodos
Bit Menos Significativo + Compressão de Huffman
Representação de Três Pixels de Uma Figura
0 1 1 0 0 1 0 0 1 0 1 0 0 0 1 1 1 0 1 1 0 1 1 1
1 0 0 1 1 0 1 1 0 1 0 1 1 1 0 0 0 1 0 0 1 0 0 01 1 0 0 1 1 1 0 1 1 1 1 1 0 0 1 1 1 1 0 0 0 1 1
Representação do Caracter "M" em ASCII0 1 0 0 1 1 0 1
Pixels após a codificação da letra "M"
0 1 1 0 0 1 0 0 1 0 1 0 0 0 1 1 1 0 1 1 0 1 1 0
1 0 0 1 1 0 1 0 0 1 0 1 1 1 0 1 0 1 0 0 1 0 0 1
1 1 0 0 1 1 1 0 1 1 1 1 1 0 0 1 1 1 1 0 0 0 1 1
![Page 10: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/10.jpg)
Redes de Computadores II - Esteganografia 10
Aplicações
Impressoras Modernas
Fotos Digitais
Terrorismo
![Page 11: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/11.jpg)
Redes de Computadores II - Esteganografia 11
Criptografia X Esteganografia
Esteganografia
Não levanta suspeita
Fácil aplicação
“Facilidade de quebrar”
![Page 12: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/12.jpg)
Redes de Computadores II - Esteganografia 12
Estegoanálise
Detecção de esteganografia
Detecção de mudança + comparação com original = “carga útil”
![Page 13: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/13.jpg)
Redes de Computadores II - Esteganografia 13
Conclusão
Simples de ser usado
Difícil de ser detectado
Inúmeros métodos diferentes
![Page 14: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/14.jpg)
Redes de Computadores II - Esteganografia 14
Bibliografia
Clube do Hardware. <http://www.clubedohardware.com.br/artigos/545>.
UFRGS – Universidade Federal do Rio Grande do Sul.
<http://www.inf.ufrgs.br/~lkunz/cpd/>.
Marcelo Erigson. <http://www.inf.ufrgs.br/~mierigson/cpd/>.
Criptografia NumaBoa. <http://www.numaboa.com/content/view/614/102/>.
UCB – Brasília. <http://www.lyfreitas.com/artigos_mba/esteganografia.pdf>.
Security Focus. < http://www.securityfocus.com/infocus/1684>.
Strange Horizons.
<http://www.strangehorizons.com/2001/20011008/steganography.shtml>.
Gary Kessler. <http://www.garykessler.net/library/steganography.html>.
![Page 15: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/15.jpg)
Redes de Computadores II - Esteganografia 15
Perguntas
Cite 3 métodos de esteganografia.
Dentre os métodos, qual o mais em uso
atualmente ? Porque ?
Como a técnica de Huffman ajuda no método
do Bit Menos Significativo ?
Qual a principal diferença entre Esteganografia
e Criptografia ?
O que é “Carga Útil” ?
![Page 16: A good steganographic technique should provide secrecy even if everyone knows it's being used. – Francis Bacon Thiago Castelló Fonseca – 105029327 Otto](https://reader035.vdocuments.net/reader035/viewer/2022062700/552fc130497959413d8d4bcb/html5/thumbnails/16.jpg)
Redes de Computadores II - Esteganografia 16
Fim
Foi Impossível MelhorarFoi Impossível Melhorar