Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah

  • Slides: 10
Download presentation
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers

Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers

Motivation u u Data Security is one of the largest issues that we are

Motivation u u Data Security is one of the largest issues that we are faced with in today’s world. Spread Spectrum Stegaonography is a relatively new technology that can address data security

Spread Spectrum Steganography • A method of hiding data in a transmitted signal such

Spread Spectrum Steganography • A method of hiding data in a transmitted signal such that no one except the sender and intended recipient knows of the existence of the message. • Data sent using spread spectrum is intentionally spread over a wide frequency range.

Spread Spectrum Steganography • Appears as noise, so it is difficult to detect and

Spread Spectrum Steganography • Appears as noise, so it is difficult to detect and jam. • Resistant to noise and interference thus increasing the probability that the signal will be received correctly. • Unlikely to interfere with other signals even if they are transmitted on the same frequency. • The data can be transmitted without additional hiding or to provide added security may be embedded in another medium (images, articles, music).

Spread Spectrum Techniques u Direct Sequence Spread Spectrum (DSSS) Data to be transmitted is

Spread Spectrum Techniques u Direct Sequence Spread Spectrum (DSSS) Data to be transmitted is divided into small pieces and each piece is allocated to a frequency channel across the spectrum. Transmitter utilizes a phase varying modulation technique to modulate each piece of data with a higher data rate bit sequence.

Spread Spectrum Techniques u Frequency Hopped Spread Spectrum (FHSS) Data carrier frequency is periodically

Spread Spectrum Techniques u Frequency Hopped Spread Spectrum (FHSS) Data carrier frequency is periodically modified (hopped) across a specific range of frequencies (spreading). The shifting pattern is determined by the chosen code sequence (FSK – Frequency Shift Key).

Spread Spectrum Techniques u Time Hopped Spread Spectrum Short information burst (chirp ) transmitted

Spread Spectrum Techniques u Time Hopped Spread Spectrum Short information burst (chirp ) transmitted with pseudorandom pulse duration, or transmitted in a random position. Method 1: The chirp interval is determined by the PN code generator.

Time Hopped Spread Spectrum Method 2: Chirp goes at the same time in each

Time Hopped Spread Spectrum Method 2: Chirp goes at the same time in each bit period, the PN code generator changes its duration.

Audio Steganography u u u Audio Steganography takes advantages in failings in the Human

Audio Steganography u u u Audio Steganography takes advantages in failings in the Human Auditory System Careful selection of audio files allow hiding of data Transmission through air – signal prone to changes in phase, amplitude and drift of different frequency components – spread spectrum can help

Conclusion u u Spread Spectrum Steganography has significant potential in secure communications – commercial

Conclusion u u Spread Spectrum Steganography has significant potential in secure communications – commercial and military Audio Steganography in conjunction with Spread Spectrum may provide added layers of security