Steganography

490 views

Published on

Steganography is the art of secrecy. It is used in sending a file in secrecy.

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
490
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Steganography

  1. 1. STEGANOGRAPHY HassanAftab BITF10M043 Muneeb Akbar BITF10M018 Abdul Khaliq BITF10M011 ArslanAshraf BITF10M051 Fahad Shahid BITF10M029 M.Awais BITF10M032
  2. 2. What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. • This can be achieve by concealing the existence of information within seemingly harmless carriers or cover • Carrier: text, image, video, audio, etc.
  3. 3. Introduction • Steganography is the dark cousin of cryptography.While cryptography provides privacy, steganography is intended to provide secrecy. • Privacy is what you need when you use your credit card on the Internet -- you don't want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable, any hacker can look and see you've sent a message. • For true secrecy, you don't want anyone to know you're sending a message at all.
  4. 4. SteganographyTechniques Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. Since, it is adding an attribute to the cover image thus extending the amount of information presented. Algorithms andTransformations:This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients. Least Significant Bit Insertion:The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger then the message file and if the image is grayscale.
  5. 5. Basics of Steganography fE: steganography function "embedding" fE -1: steganography function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  6. 6. SteganographyTools
  7. 7. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. • Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. • Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding. • The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  8. 8. Example
  9. 9. Example: • Salutations, Mr. Robertson of CIS 5371.TheFlorida Society of Math and Cryptography is proud to present you with an small exam for qualification into our society. The key for passing is studying. Cryptography is rigorous and only those with patience in themselves pass. We have an exam PO Box inTallahassee. But please submit by 12/12.
  10. 10. Answer: • Salutations, Mr. Robertson of CIS 5371. TheFlorida Society of Math and Cryptography is proud to present you with an small exam for qualification into our society. The key for passing is studying. Cryptography is rigorous and only those with patience in themselves pass. We have an exam PO Box inTallahassee. But please submit by 12/12. The Cryptography exam key is in PO Box 1212.
  11. 11. Steganography SampleWebsite •Here is the link for Sample Steganographic tool Website: http://mozaiq.org/

×