Published on

Stegnography, an advanced Encryption Technique.

Published in: Technology, Art & Photos
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. A Security technology By – Mayank Garg M. e. eMBedded SySteM (2013h140040h)
  2. 2. Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing Message Security Main Techniques: Cryptography Watermarking Steganography
  3. 3. Watermarking: •Communication in watermarking is the host signal, with the embedded data providing copyright protection. •The existence of a watermark is often declared openly. •Any attempt to remove or invalidate the embedded content renders the host useless. Cryptography: •Doesn’t conceal the communication. •Scrambles the data to prevent eavesdroppers understanding the content. •Cryptography involves various methods and implementations. •May be considered complementary and orthogonal (unrelated). Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
  4. 4. Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover. Carrier: text, image, video, audio, pdf etc.
  5. 5. Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. The purpose is different from traditional steganography since it is adding an attribute to the cover image thus extending the amount of information presented. Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients.
  6. 6. Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger then the message file and if the image is grayscale.
  7. 7. fE: steganographic function "embedding" fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  8. 8. Username and Passsword Top Secret Secret Key Cover Image A novel design Steganography Algorithm
  9. 9. A novel design Steganography Algorithm Stego Image Secret key Top secret
  10. 10.  Security of the hidden communication  size of the payload  Robustness against malicious and unintentional attacks
  11. 11. The detection of steganographically encoded packages is called Steganalysis.  Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.  Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  12. 12.  Begin  Input: Cover_Image, Secret_Message, Secret_Key;  Transfer Secret_Message into Text_File;  Zip Text_File;  Convert Zip_Text_File to Binary_Codes;  Convert Secret_Key into Binary_Codes;  Set BitsPerUnit to Zero;  Encode Message to Binary_Codes;  Add by 2 unit for bitsPerUnit;  Output:  END
  13. 13.  Begin  Input: Stego_Image, Secret_Key;  Compare Secret_Key;  Calculate BitsPerUnit;  Decode All_Binary_Codes;  Shift by 2 unit for bitsPerUnit;  Convert Binary_Codes to Text_File;  Unzip Text_File;  Output Secret_Message;  End
  14. 14. Stego image C Stego Image A Stego Image B Stego Data Multi Layer Dteganography Encoding Decoding
  15. 15. Now we can use This file for any purpose We can use it as network or one computer also. We can rename also that will not affect our data. By visualization we can not get to know that this file have some hidden information. Password also required for decryption.
  16. 16. Like: Text(Important data)+ Images+Password=Encrypted file(IMAGE1) IMAGE1+password=Data(Impo rtant)
  17. 17. QuestionQuestion $$ THANK YOU ….THANK YOU ….