SlideShare a Scribd company logo
1 of 16
STEGANOGRAPHY
Presented by:
Prajwal Shrestha
1NC10EC053
Under Guidance of:
Mrs. Bhavya V,
Mrs. Roopa G
Dept. of ECE
Dept of ECE, NCET 1
Contents
What is STEGANOGRAPHY?
How it works?
Methodology
Merits and Demerits
Conclusion
Dept of ECE, NCET 2
What is STEGANOGRAPHY?
Greek words "steganos“ - covered/protected
"graphei“ - writing
the art or practice of concealing a message, image, or
file within another message, image, or file
Hiding a secret message within a cover-medium in such a
way that others can not discern the presence of the
hidden message
Dept of ECE, NCET 3
How it works?
Dept of ECE, NCET 4
Methodology
Traditional Method
 Hidden messages on messenger's body hair
 Using newspaper articles / want-ads
 Hidden messages within wax tablets
 Invisible Ink
Dept of ECE, NCET 5
Methodology (contd.)
Modern Method
 Digitally embedding messages in other media, such as:
• Text
• Image
• Audio
Dept of ECE, NCET 6
Text Steganography
today every citizen has naive idea calling a life simple, easy,
magnate, icky, narrow and racy, i say one nature that has right
equally essential as people's right is lifted.
Actual message ‘technical seminar is on third april’
Dept of ECE, NCET 7
Image Steganography
Dept of ECE, NCET 8
Using LSB [Least Significant Bit] Method
 Replaces least significant bits with the message to be
encoded
 Most popular technique when dealing with images
 It is best to use images with “noisy areas” – areas with
ample/enough color variation and without large areas of
solid color
Noisy Area’s Example
Dept of ECE, NCET 9
LSB Insertion’s Example
Dept of ECE, NCET 10
An image may have the following three pixels (9 bytes) in it somewhere:
(01010010, 10010110, 10100100)
(10110100, 10010001, 01001110)
(10110110, 00101110, 11010001)
If we wanted to hide [131 or 10000011], we would use/replace the least-
significant bits of each byte:
(01010011, 10010110, 10100100)
(10110100, 10010000, 01001110)
(10110111, 00101111, 11010001)
Image Steganography (contd.)
Simple image steganography by hiding one
image into another.
Dept of ECE, NCET 11
Audio Steganography
Slight changes in audio will be indistinguishable
from the original to the human ear
In Audio, you can use the least-significant bits of
each byte as redundant bits
Dept of ECE, NCET 12
Audio Steganography (contd.)
 Let’s assume an audio file had the following 8 bytes of data in it somewhere:
180, 229, 139, 172, 209, 151, 21, 104
 In binary, this would be:
10110100-11100101-10001011-10101100-11010001-10010111-00010101-01101000
 If we wanted to hide the byte value 214(11010110), we use the least significant bit from
each byte to hide our byte:
10110101-11100101-10001010-10101101-11010000-10010111-00010101- 01101000
 The changes result in the following bytes, which are so close to -the originals that the
difference will be inaudible:
Modified: 181, 229, 138, 173, 208, 151, 21, 104
Original: 180, 229, 139, 172, 209, 151, 21, 104
Dept of ECE, NCET 13
Merit and Demerit
Merit:
More secure.
Does not attract any focus.
Demerit:
Complex Process.
Increase in data size can arise suspension.
Dept. of CSE, NCET 14
Conclusion
 Hiding Information
 Secret among sender and receiver
 Has both good and bad aspects
Dept of ECE, NCET 15
References
 http://en.Wikipedia.org/wiki/Steganography
 http://slideshare.net
 http://google.co.uk
Dept of ECE, NCET 16

More Related Content

Viewers also liked

currículo vitae
currículo vitaecurrículo vitae
currículo vitaeVale Ayala
 
Imágenes para conectarce a internet
Imágenes para conectarce a internetImágenes para conectarce a internet
Imágenes para conectarce a internetedwinfreyle
 
Berbisnis ONLINE
Berbisnis ONLINEBerbisnis ONLINE
Berbisnis ONLINEMaxMedia
 
第二類電信開放之微整理
第二類電信開放之微整理第二類電信開放之微整理
第二類電信開放之微整理宗翰 蔡
 
Ravi namboori-cloud computing
Ravi namboori-cloud computingRavi namboori-cloud computing
Ravi namboori-cloud computingravi namboori
 
South Boston Busing Crisis Picture Edition
South Boston Busing Crisis Picture EditionSouth Boston Busing Crisis Picture Edition
South Boston Busing Crisis Picture EditionGablae
 
Perubahan
PerubahanPerubahan
Perubahanboyo17
 
презентация настроек яндекс директ
презентация настроек яндекс директпрезентация настроек яндекс директ
презентация настроек яндекс директУниверситет Жизни
 
12f743edf866f7a7ff81368543dcd1a1 original
12f743edf866f7a7ff81368543dcd1a1 original12f743edf866f7a7ff81368543dcd1a1 original
12f743edf866f7a7ff81368543dcd1a1 originalاميرة الحديد
 

Viewers also liked (17)

τα ζώα μου
τα ζώα μουτα ζώα μου
τα ζώα μου
 
currículo vitae
currículo vitaecurrículo vitae
currículo vitae
 
rahmat_2014
rahmat_2014rahmat_2014
rahmat_2014
 
RAMpresentation
RAMpresentationRAMpresentation
RAMpresentation
 
Imágenes para conectarce a internet
Imágenes para conectarce a internetImágenes para conectarce a internet
Imágenes para conectarce a internet
 
Berbisnis ONLINE
Berbisnis ONLINEBerbisnis ONLINE
Berbisnis ONLINE
 
ravi namboori-Iaas
 ravi namboori-Iaas ravi namboori-Iaas
ravi namboori-Iaas
 
第二類電信開放之微整理
第二類電信開放之微整理第二類電信開放之微整理
第二類電信開放之微整理
 
Ravi namboori-cloud computing
Ravi namboori-cloud computingRavi namboori-cloud computing
Ravi namboori-cloud computing
 
South Boston Busing Crisis Picture Edition
South Boston Busing Crisis Picture EditionSouth Boston Busing Crisis Picture Edition
South Boston Busing Crisis Picture Edition
 
Perubahan
PerubahanPerubahan
Perubahan
 
brand guide_v3
brand guide_v3brand guide_v3
brand guide_v3
 
презентация настроек яндекс директ
презентация настроек яндекс директпрезентация настроек яндекс директ
презентация настроек яндекс директ
 
Paccarpresentation
PaccarpresentationPaccarpresentation
Paccarpresentation
 
Подбор ключевых слов
Подбор ключевых словПодбор ключевых слов
Подбор ключевых слов
 
12f743edf866f7a7ff81368543dcd1a1 original
12f743edf866f7a7ff81368543dcd1a1 original12f743edf866f7a7ff81368543dcd1a1 original
12f743edf866f7a7ff81368543dcd1a1 original
 
Roof Replacement
Roof ReplacementRoof Replacement
Roof Replacement
 

Similar to Steganography Presented By Prajwal Shrestha

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
SILENT SOUND TECHNOLOGY
SILENT SOUND TECHNOLOGYSILENT SOUND TECHNOLOGY
SILENT SOUND TECHNOLOGYNagma Parween
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
B03208016
B03208016B03208016
B03208016inventy
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentationRaj Niranjan
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audioinventy
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccPrabhu Prabhu
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 

Similar to Steganography Presented By Prajwal Shrestha (20)

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
SILENT SOUND TECHNOLOGY
SILENT SOUND TECHNOLOGYSILENT SOUND TECHNOLOGY
SILENT SOUND TECHNOLOGY
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Steganography
SteganographySteganography
Steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
D010312230
D010312230D010312230
D010312230
 
Steganography
SteganographySteganography
Steganography
 
B03208016
B03208016B03208016
B03208016
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Steganography
SteganographySteganography
Steganography
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentation
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 

Recently uploaded

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Steganography Presented By Prajwal Shrestha

  • 1. STEGANOGRAPHY Presented by: Prajwal Shrestha 1NC10EC053 Under Guidance of: Mrs. Bhavya V, Mrs. Roopa G Dept. of ECE Dept of ECE, NCET 1
  • 2. Contents What is STEGANOGRAPHY? How it works? Methodology Merits and Demerits Conclusion Dept of ECE, NCET 2
  • 3. What is STEGANOGRAPHY? Greek words "steganos“ - covered/protected "graphei“ - writing the art or practice of concealing a message, image, or file within another message, image, or file Hiding a secret message within a cover-medium in such a way that others can not discern the presence of the hidden message Dept of ECE, NCET 3
  • 4. How it works? Dept of ECE, NCET 4
  • 5. Methodology Traditional Method  Hidden messages on messenger's body hair  Using newspaper articles / want-ads  Hidden messages within wax tablets  Invisible Ink Dept of ECE, NCET 5
  • 6. Methodology (contd.) Modern Method  Digitally embedding messages in other media, such as: • Text • Image • Audio Dept of ECE, NCET 6
  • 7. Text Steganography today every citizen has naive idea calling a life simple, easy, magnate, icky, narrow and racy, i say one nature that has right equally essential as people's right is lifted. Actual message ‘technical seminar is on third april’ Dept of ECE, NCET 7
  • 8. Image Steganography Dept of ECE, NCET 8 Using LSB [Least Significant Bit] Method  Replaces least significant bits with the message to be encoded  Most popular technique when dealing with images  It is best to use images with “noisy areas” – areas with ample/enough color variation and without large areas of solid color
  • 10. LSB Insertion’s Example Dept of ECE, NCET 10 An image may have the following three pixels (9 bytes) in it somewhere: (01010010, 10010110, 10100100) (10110100, 10010001, 01001110) (10110110, 00101110, 11010001) If we wanted to hide [131 or 10000011], we would use/replace the least- significant bits of each byte: (01010011, 10010110, 10100100) (10110100, 10010000, 01001110) (10110111, 00101111, 11010001)
  • 11. Image Steganography (contd.) Simple image steganography by hiding one image into another. Dept of ECE, NCET 11
  • 12. Audio Steganography Slight changes in audio will be indistinguishable from the original to the human ear In Audio, you can use the least-significant bits of each byte as redundant bits Dept of ECE, NCET 12
  • 13. Audio Steganography (contd.)  Let’s assume an audio file had the following 8 bytes of data in it somewhere: 180, 229, 139, 172, 209, 151, 21, 104  In binary, this would be: 10110100-11100101-10001011-10101100-11010001-10010111-00010101-01101000  If we wanted to hide the byte value 214(11010110), we use the least significant bit from each byte to hide our byte: 10110101-11100101-10001010-10101101-11010000-10010111-00010101- 01101000  The changes result in the following bytes, which are so close to -the originals that the difference will be inaudible: Modified: 181, 229, 138, 173, 208, 151, 21, 104 Original: 180, 229, 139, 172, 209, 151, 21, 104 Dept of ECE, NCET 13
  • 14. Merit and Demerit Merit: More secure. Does not attract any focus. Demerit: Complex Process. Increase in data size can arise suspension. Dept. of CSE, NCET 14
  • 15. Conclusion  Hiding Information  Secret among sender and receiver  Has both good and bad aspects Dept of ECE, NCET 15