SlideShare a Scribd company logo
1 of 25
DELHI TECHNOLOGICAL UNIVERSITY
SHAHBAD DAULTAPUR, BAWANA RD., DELHI-42
DEPARTMENT OF COMPUTER ENGINEERING
SELF-STUDY SEEMINAR REPORT ON
STEGANOGRAPHY
PRESENTED BY
CERTIFICATE
I Abhishek Singh, hereby solemnly affirm that the Self-Study Seminar Report entitled
“Steganography” being submitted by me in partial fulfillment of the requirements for the
award of the degree of Bachelor of Technology in Computer Engineering, to the Delhi
Technological University, is a record of bona fide work carried out by me under the
guidance of Ms. Indu Singh and Mr. Vinod Kumar___________
The work reported in this report in full or in part has not been submitted to any university
or Institute for the award of any other degree or diploma.
Place: DTU, Bawana Road, Delhi-11092
Date:
ACKNOWLEDGEMENT
I would like to express our greatest gratitude to the people who have helped &
support me throughout my Self-Study Seminar Report.
I are grateful to my guides, ____Ms. Indu Singh and Mr. Vinod Kumar ______ for
their continuous support for the project, from initial advice to contacts in the early stages of
conceptual inception & through ongoing advice & encouragement to this day.
I wish to thank them for their undivided support and interest, which inspired and
encouraged me to go the right way.
At last, but not the least, I want to thank my friends who appreciated me for my work and
motivated me; and finally to God who made all the things possible.
ABSTRACT
Steganography is the art and science of writing hidden messages in such a way
that no one apart from the sender and intended recipient even realizes there is a hidden
message.
This Report is primarily a reference resource on the Steganography. The material here is
designed to allow a student to learn and understand what Steganography is and how it
works. I do discuss quite a number of Practical Steganographic Methodology to achieve
Covert Communications, but I also focus on how these secrete communication using
Steganography can be busted, as well as how Steganography can used other than as method
to hide data. Also in this report you will find how Steganography does when compared to
the quite famous methodology of Securing Data i.e. Cryptology. If you want to really
understand about Steganography is and what makes it work, you’ve come to the right
place. If all you want is simple instructions on how to hide information in media files, this
probably isn’t the Guide for you. It tells you about Steganography and its deep study.
IMPORTANT KEYWORDS
 Steganography
 Cryptography
 Cover Media
 Plain Text
 Digital Watermarking
 Steganalysis
 Stego-Key
 Stego-Media
TABLE OF CONTENT
1. INTRODUCTION…………………………………………………………………1
WHAT EXACTLY IS STEGANOGRAPHY?…………………………......1
WHY IS STEGANOGRAPHY IMPORTANT?............................................1
2. LITERATURE SURVEY…………………………………………………………3
STEGANOGRAPHY IN TEXT FILES…………………………………….5
STEGANOGRAPHY IN AUDIO FILES…………………………………..6
STEGANOGRAPHY IN MAGES………………………………………….8
COVERT CHANNELS……………..……………………………………..10
STEGANOGRAPHY OVER NETWORKS………………………………11
3. DISCUSSION……………………………………………………………………..13
STEGANALYSIS…………………………………………………………13
APPLICATIONS………………………………………………………….15
STEGANOGRAPHY VS. CRYPTOGRAPHY………………………..…17
FUTURE SCOPE OF STEGANOGRAPHY……………………………..18
4. CONCLUSION…………………………………………………………………...19
5. REFERENCES…………………………………………………………………...20
CHAPTER 1:
INTRODUCTION
WHAT EXACTLY IS STEGANOGRAPHY?
The word Steganography is of Greek origin and means "covered, or hidden
writing".
Steganography is the art and science of communicating in a way which hides the
existence of the communication. Steganography boosts the concept of Information
Hiding without altering or recasting the Information.
Steganography has been widely used, including in recent historical times and the present
day, from using slaves’ shaven heads and patterns sewed into quilts in ancient time, to
using crossword puzzles and invisible ink in modern times, to relay messages which were
not meant for others to read.
However today, in the 21st Century, Steganography is most often associated with data
hidden with other data in an electronic file, including the concealment of information
within computer files such as a document file, image file, program and even protocol.
WHY IS STEGANOPGRAPHYIMPORTANT?
The Primary Goal of Steganography is to hide messages inside other harmless
messages in a way that does not allow any enemy to even detect that there is a second
secret message present. Only due to Steganography, Secret Communications can be
established which is presently required by an individual as well as any organization or the
Government.
Another purpose Steganography serves is to protect the Intellectual Property Rights of
Copyright Owners over their digital media. Information about the owner, recipient and
access level can be embedded within the media through Steganographic Methods. This
allows no one to claim their rights over someone else’s copyrighted media as long as the
“Watermark” hidden in the media is present. Steganography also makes the removal of the
“Watermark” without destroying the media itself.
CHAPTER 2
LITERATURE SURVEY
The purpose of this Literature Review is the state and explain the how
Steganography actually helps in strengthening the security of any sensitive information. It
will take a look at how the technology and encoding systems have developed today to
sophisticatedly embed data over different types of files such that the embedded data is not
even perceptible to anyone not only at first look but also when the file undergoes scrutiny.
Furthermore, the use of mediums, which were not intended for communications, are being
used to transmit stego-media are also mentioned in this section. Also explaining how the
networking today helps in Steganography.
Steganography involves hiding data in an overt message and doing it in such a way
that it is difficult for an adversary to detect and difficult for an adversary to remove. Based
on this goal, the basic Steganographic Model is shown below:
 Carrier Media (cover-media) is an original unaltered message into which the
message meant to be hidden is to be embedded into the media.
 Encoding process/Steganographic Algorithm in which the sender tries to hide a
message by embedding it into a cover-text, usually using a key, to obtain a stego-
media.
 The Payload (or the Secrete Message) is taken along with Carrier Media which are
worked in the Steganographic Technique/Algorithm to embed the payload into
carrier.
 The unique key in the Encoding System/Algorithm known as Stego-Key decides
how the process of alteration of carrier media is to be done in order to
accommodate the payload without revealing the payload to others.
 The final incorporated media obtained from the Algorithm is called the Stego-
Media. It is this media which holds the secrete message and is ready to be
transmitted without being detected for holding any covert information!
 Recovering process in which the receiver tries to get, using the key only, the hidden
message in the stego-media.
 Security requirement is that a third person watching such a communication should
not be able to find out whether the sender has been active, and when, in the sense
that he really embedded a message in the carrier media. In other words, stego-
media should be indistinguishable from Carrier media.
Depending upon the type of carrier media, suitable technique can be applied to bring about
the maximum encoding density i.e. the degree of alteration of carrier media to encode the
payload.
Steganography can be classified into image, text, audio steganography depending on
the cover media used to embed secret data
STEGANOGRAPHYIN TEXT FILES
Text steganography can involve anything from changing the formatting of an
existing text, to changing words within a text, to generating random character sequences or
using context-free grammars to generate readable texts. Text steganography is believed to
be the trickiest due to deficiency of redundant information which is present in image, audio
or a video file. However, in text documents, we can hide information by introducing
changes in the structure of the document without making a notable change in the concerned
output. The Payload can be embedded in a text through 3 pre-established techniques:
1. Line-Shift Coding
In this method, secret message is hidden by vertically shifting the text lines to some
degree. Vertically shift the positions of the locations of text lines in order to hide
the secret information in the document.
The user can chose an arbitrary number between 0 and 127, which is converted into
an 8 bit sequence. According to this bit sequence every second line is shifted one
pixel down if there is a 1 whereas a 0 keeps the line in the normal position.
2. Word-Shift Coding
In this method, secret message is hidden by shifting the words horizontally, i.e. left
or right to represent bit 0 or 1 respectively. Words shift can only be detected using
correlation method. The scheme is based on the fact that most documents use
variable word spacing to distribute white space when justifying a document. If the
space between adjacent words were not different, word-shift coding would not
make sense at all.
3. Feature Coding
In feature coding, secret message is hidden by altering one or more features of the
text. A parser examines a document and picks out all the features that it can use to
hide the information.
For example, point in letters i and j can be displaced, length of strike in letters f and
t can be changed, or by extending or shortening height of letters b, d, h, etc.
STEGANOGRAPHYIN AUDIO FILES
Today most of the Audio Files are available in Digital form. Digital audio is
discrete rather than continuous signal as found in analog audio. A discrete signal is created
by sampling a continuous analog signal at a specified rate. Digital audio is stored in a
computer as a sequence of 0's and 1's. With the right tools, it is possible to change the
individual bits that make up a digital audio file. Such precise control allows changes to be
made to the binary sequence that are not discernible to the human ear. There have been
many techniques for hiding information or messages in audio in such a manner that the
alterations made to the audio file are perceptually indiscernible. Some of the pre-
established and prominent methods of Audio Steganography are:
1. Least Significant Bit Coding
A very popular methodology is the LSB (Least Significant Bit) algorithm, which
replaces the least significant bit in some bytes of the cover file to hide a sequence
of bytes containing the hidden data. That's usually an effective technique in cases
where the LSB substitution doesn't cause significant quality degradation. Note that
there's a fifty percent chance that the bit you're replacing is the same as its
replacement, in other words, half the time, the bit doesn't change, which helps to
minimize quality degradation.
The illustration shows how the message 'HEY' is encoded in a 16-bit CD quality
sample using the LSB method. Here the secret information is ‘HEY’ and the cover
file is audio file. HEY is to be embedded inside the audio file. First the secret
information ‘HEY’ and the audio file are converted into bit stream. The least
significant column of the audio file is replaced by the bit stream of secrete
information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is
called Stego-file.
2. Echo Hiding
Echo hiding technique embeds secret information in a sound file by introducing an
echo into the discrete signal. Echo hiding has advantages of providing a high
Encoding Density and superior robustness when compared to other methods. Only
one bit of secret information could be encoded if only one echo was produced from
the original signal. Hence, before the encoding process begins the original signal is
broken down into blocks. Once the encoding process is done, the blocks are
concatenated back together to create the final signal [5, 20]. Echo Hiding is shown
in the illustration:
3. Phase Coding
The phase coding technique works by replacing the phase of an initial audio
segment with a reference phase that represents the secret information. The
remaining segments phase is adjusted in order to preserve the relative phase
between segments.
STEGANOGRAPHYIN IMAGES
To a computer, an image is an array of numbers that represent light intensities at
various points, or pixels. The 8-bit color images is more preferably used to hide
information. In 8-bit color images, each pixel is represented as a single byte. Each pixel
merely points to a color index table, or palette, with 256 possible colors. The pixel's value,
then, is between 0 and 255.
The challenge of using steganography in computer images is to hide as much data as
possible with the least noticeable difference in the image. Many Steganography experts
recommend using images featuring 256 shades of gray as the palette, for reasons that will
become apparent. Grey-scale images are preferred because the shades change very
gradually between palette entries. This increases the image's ability to hide information!
Also Images having large areas of solid color should be avoided to be used as Carrier Files
as even minute change in the Carrier would be visual noticeable!
Information in Images can be hidden many different ways. Some of the prominent
Encoding techniques of Image Steganography are:
1. Least Significant Bit Encoding a.k.a. Insertion Technique
One of the most common techniques used in steganography today is called least
significant bit (LSB) insertion. This method is exactly what it sounds like; the least
significant bits of the cover-image are altered so that they form the embedded
information. The following example shows how the letter A can be hidden in the
first eight bytes of three pixels in a 24-bit image:
Pixels: (00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
The Code for letter ‘A’ which is to be hidden: 10000001
After the Insertion technique:
Resultant Pixels: (00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
The highlighted bits of respective bytes are the only bits of 3 pixels that were
actually altered. LSB insertion requires on average that only half the bits in an
image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the
ninth byte of the three pixels can be used to hide the next character of the hidden
message!
2 or more Least Significant bits per byte can be used to embed more payload
increasing the encoding density, however the cover image degrades sharply leading
to its easing detection for holding hidden information.
2. Masking and Filtering
Masking and filtering techniques hide information by marking an image in a
manner similar to paper watermarks. Because watermarking techniques are more
integrated into the image, they may be applied without fear of image destruction
from “lossy” compression. By covering, or masking a faint but perceptible signal
with another to make the first non-perceptible, we exploit the fact that the human
visual system cannot detect slight changes in certain temporal domains of the
image.
COVERT CHANNELS
Covert channels are communication paths that were neither designed nor intended to
transfer information at all, but are used that way, using entities that were not intended for
such use.
The most prominent example of Covert Channel is the TCP/IP Headers.
The IP header contains the key information that is needed for packets of data to be routed
properly. When using Stego you want to find fields that you can overwrite or change that
will not have an effect on the host communication. One field in the IP header that you can
change without having any effect is the IP identification number. Usually the ID is
incremented by 1 for each packet that is sent out, but any number can be used and the
protocol will function properly. This ability to make a change and not damage functionality
makes this piece of data an ideal candidate for hiding stego.
In the TCP, we can use the sequence and the acknowledgement number fields to hide the
data. During the initial handshake the values of sequence and acknowledgement numbers
are picked and randomly generated by the sender and receiver. Therefore, the first packet
that is sent can contain data hidden in those fields because the initial values don’t have any
purpose. Essentially, once communication has been established, these fields can no longer
be used to hide data.
STEGANOGRAPHYOVER NETWORK
On a computer network you can use Steganographic techniques to hide files in traffic,
transmit viruses, or hide the trail somebody when moving around online. The 3 methods to
implement Steganography over a network are:
1. Hiding in an Attachment
Hiding data in an attachment is the most basic form of using a network to transmit
stego from one person to another. Three most popular ways to do this are with
Email, by file transfer such as FTP, or by posting a file on a website
2. Hiding in a Transmission
Hiding data in an attachment is the most basic form of using a network to transmit
stego from one person to another. Three most popular ways to do this are with
Email, by file transfer such as FTP, or by posting a file on a website
3. Hiding in Overt Protocol
Essentially, this is what is called as data camouflaging, where you make data look
like something else. With this technique you take data, put it in normal network
traffic, and modify the data in such a way that it looks like the overt protocol.
For example, most networks carry large amounts of HTTP or Web traffic. You
could send data over port 80, and it would look like web traffic. The problem is
that, if someone examined the payload, it would not look like normal web traffic,
which usually contains HTML. What if you added symbols such as < >, < / > to the
data? Because these are the types of characters that HTML contains, the traffic
would look like Web traffic and probably would slip by the casual observer.
CHAPTER 3
DISCUSSION
This Section is included in this report to state and explain where exactly
Steganography stands in the present time. Despite the presence of many other method of
secure communication, like Cryptography, why is Steganography now being more
preferred than the rest. Also this section also explains if there is way to hide information in
any media, then there is a way to catch these Stego-media carrying the covert information
while being transmitted as any other carrier media.
STAGANALYSIS
Since Steganography provides a medium of covert communications, it can be
abused by some anti-social or ill elements present in the world. These elements can use any
media to send their messages though the internet without being detected by anyone. Hence
it is necessary to analyze any suspected media for a hidden message. This is where
Steganalysis comes in.
Steganalysis is the study of detecting messages hidden using steganography. The goal of
Steganalysis is to identify suspected packages, determine whether or not they have a
payload encoded into them, and, if possible, recover that payload. Steganalysis generally
starts with a pile of suspect data files, but little information about which of the files, if any,
contain a payload.
Basic Technique: A set of unmodified files of the same type, and ideally from the same
source as the set being inspected, are analyzed for various statistics. Some of these are as
simple as spectrum analysis, also attempt to look for inconsistencies in the way this data
has been compressed. One case where detection of suspect files is straightforward is when
the original, unmodified carrier is available for comparison. Comparing the package
against the original file will yield the differences caused by encoding the payload—and,
thus, the payload can be extracted.
Another Technique: Most programs which are employed to detect Stego-Media used the
concept of randomness.
With most files that do not contain random data you would get a histogram that has peaks
and valleys where certain characters appear often and others appear only infrequently.
Below is a histogram for unencrypted data.
On the other hand, with encrypted data, because it is random, you acquire a much flatter
histogram, as you can see in Figure 4.2. You can see that, compared to Figure 4.1, Figure
4.2 looks extremely flat. Every character appears with equal frequency.
Hence the degree of randomness depicted by the Histogram can be used to take up media
for inspection even if an unmodified file from same source is not available for comparison
APPLICATIONS
Data Hiding was the Major Application of the Steganography since its inception.
However, by the 21st Century, Steganography has found many more applications which are
not meant for any kind of secrete communications! Some of the Prominent Applications of
Steganography are explain below:
1. Digital Watermarking
A Digital Watermark is a kind of marker covertly embedded in a noise-tolerant
signal such as audio or image data. A popular application of watermarking
techniques is to provide a proof of ownership of digital data by embedding
copyright statements into video or image digital products and hence does not need
any relation to the Carrier Media. Like traditional watermarks, digital watermarks
can be made perceptible under certain conditions, i.e. after using some algorithm,
and imperceptible anytime else, keeping in mind that the Digital Watermark does
not distorts the carrier signal.
Both steganography and digital watermarking employ Steganographic techniques to
embed data covertly in noisy signals. Steganography aims for imperceptibility to
human senses, but digital watermarking tries to control the robustness as top
priority even if the watermark becomes perceptible.
Digital watermarking may be used for a wide range of applications, such as:
 Copyright protection
 Source tracking (different recipients get differently watermarked content)
 Broadcast monitoring (television news often contains watermarked video
from international agencies)
 Authentication of the Media
2. Tamper Proofing of Files
When any fie containing any sensitive information is being transferred or
transmitted, there is a risk of it being altered by any person or organization which
could prove fatal. The principle of Steganography can help here. A data, just like a
watermark, can be embedded into the file through Steganographic methods. If the
file undergoes any changes by any unauthorized person, the embedded data will
also undergo some changes. Hence the embedded data can be check to see whether
the file has been tampered or not. Of course it is not possible to remove the
embedded data without destroying the file itself. Therefore the presence of the
embedded data into the file acts as medium for making the file Tamper Proof.
3. Steganography in Modern Printers
Steganography is used by some modern printers, including HP and Xerox brand
color laser printers. Tiny yellow dots are added to each page. The dots are barely
visible and contain encoded printer serial numbers, as well as date and time stamps.
4. Steganography in DNA
Even biological data, stored on DNA, may be a candidate for hiding messages, as
biotech companies seek to prevent unauthorized use of their genetically engineered
material. The technology is already in place for this: three New York researchers
successfully hid a secret message in a DNA sequence and sent it across the country.
STEGANOGRAPHYVS CRYPTOGRAPHY
Cryptography and Steganography are well known and widely used techniques that
manipulate information in order to cipher or hide their existence respectively.
Steganography is the art and science of communicating in a way which hides the existence
of the communication, while Cryptography scrambles a message so it cannot be
understood; the Steganography hides the message so it cannot be seen. Even though both
methods provide security, there are some significant differences between the 2 sciences.
However it’s the Steganography which comes on top, providing a better sense of
security over Cryptography.
The advantage of steganography over cryptography alone is that messages do not
attract attention to themselves, to messengers, or to recipients. Whereas the goal of
cryptography is to make data unreadable by a third party, the goal of steganography
is to hide the data from a third party.
Steganography
Only Sender & Reciever knows
the existence of the message.
Prevents Discovery of the very
existence of Communications.
Does not Alter the structur &
content of the message.
Cryptograpphy
The Existence of Message is
Known to all..
Prevents Unauthorized party to
dicover the contents of
Communications.
Alters the structure of the
Meessage.
But still, steganography and cryptography can be used together to ensure more
robust and foolproof security of the covert message.
FUTURE SCOPE OF STEGANOGRAPHY
One thing that you can certainly say about the future of Steganography: Change and
the introduction of new approaches will continue to occur on a frequent basis. The first
area where we can appreciate Stego making strides is in the technology used to produce
and break it.
 Improved Resistance to Analysis
As Stego-media gets more sophisticated, its resistance to being analyzed, or even
recognized, will improve. In the current state of Stego technology, if you suspect
Stego-media is being used, it is relatively easy to detect it. Once you detect it, you
can probably retrieve the contents which would then be protected only by the
strength of the encryption applied to it, if any. In the future, efforts will make
Stego undetectable and irretrievable except by those for whom it is intended. The
ability to manipulate data, then printing out a hard copy, rescanning it, and again
being able to retrieve the hidden data would be an intriguing scenario.
 Higher Encoding Density
The ability to hide huge amounts of data with stego is another logical area for
improvement. Currently stego can use only a certain amount of data bits in a host
file without degrading the file to the point where it’s obvious that stego is being
used. As stego is used in crimes such as corporate espionage, there will be more
demand to hide larger amounts of data. Large-scale stego, where you can perform
compression on huge amounts of data on the fly and store it in small files, is one
possible future.
CONCLUSION
Steganography is a really interesting subject and outside of the mainstream
cryptography and system administration that most of us deal with day after day. “You
never know if a message is hidden”, this is the dilemma that empowers steganography.
As main emphasis of Steganography is placed on the areas of providing a Covert
Communication in an Overt Environment, but it does not mean it is limited to Data Hiding.
Steganography is now also finding grounds in copyright protection, privacy protection, and
surveillance, and in checking genuineness. I believe that steganography will continue to
grow in importance as a protection mechanism.
In spite of being proved more superior to Cryptography, Steganography is not intended to
replace cryptography but rather to supplement it. If a message is encrypted and hidden with
a Steganographic method it provides an additional layer of protection and reduces the
chance of the hidden message being detected. Also the opposite way can be done: The
secrete message first being embedded into the Carrier file and then the carrier file
undergoes Encryption.
Hence both Steganography and Cryptography together can unlock a new world of hiding
data and reach new heights.
However with the advancement of Data Hiding and encryption, it is expected that
Steganography can be abused for greedy and illicit purposes. But with continuous
advancements in technology it is expected that in the near future more efficient and
advanced techniques in Steganalysis will emerge that will help law enforcement to better
detect illicit materials transmitted through the Internet.
REFERENCES
 Site: http://en.wikipedia.org/wiki/Steganography
 Site: http://www.sarc-wv.com/news.aspx
 Site:
http://www.strangehorizons.com/2001/20011008/steganography.shtml
 Site: http://vww.jjtc.com/stegdoc
 Eric Cole - “Hiding in Plain Text”, Wiley Publishing Inc. :2003
 S. Katzenbeisser, F. Petitcolas – “Information Hiding: Techniques for
Steganography and Digital Watermarking”

More Related Content

What's hot

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 

What's hot (20)

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
steganography
steganographysteganography
steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
Mtech syllabus computer science uptu
Mtech syllabus computer science uptu Mtech syllabus computer science uptu
Mtech syllabus computer science uptu Abhishek Kesharwani
 
Digital systems computer_electronics
Digital systems  computer_electronicsDigital systems  computer_electronics
Digital systems computer_electronicsNeeharika Kasarla
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 

Viewers also liked (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
bf32-Final_ (2)
bf32-Final_ (2)bf32-Final_ (2)
bf32-Final_ (2)
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
steganography
steganographysteganography
steganography
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Pres_FORENSECURE
Pres_FORENSECUREPres_FORENSECURE
Pres_FORENSECURE
 
Mtech syllabus computer science uptu
Mtech syllabus computer science uptu Mtech syllabus computer science uptu
Mtech syllabus computer science uptu
 
Rakesh kumar srirangam
Rakesh kumar srirangamRakesh kumar srirangam
Rakesh kumar srirangam
 
Steganography
SteganographySteganography
Steganography
 
Digital systems computer_electronics
Digital systems  computer_electronicsDigital systems  computer_electronics
Digital systems computer_electronics
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

Similar to Steganography

Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar reportTejas_srinivas
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesIRJAES Editor
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docxUJJWALPAL15
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 

Similar to Steganography (20)

A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
C01111519
C01111519C01111519
C01111519
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Steganography

  • 1. DELHI TECHNOLOGICAL UNIVERSITY SHAHBAD DAULTAPUR, BAWANA RD., DELHI-42 DEPARTMENT OF COMPUTER ENGINEERING SELF-STUDY SEEMINAR REPORT ON STEGANOGRAPHY PRESENTED BY
  • 2. CERTIFICATE I Abhishek Singh, hereby solemnly affirm that the Self-Study Seminar Report entitled “Steganography” being submitted by me in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Computer Engineering, to the Delhi Technological University, is a record of bona fide work carried out by me under the guidance of Ms. Indu Singh and Mr. Vinod Kumar___________ The work reported in this report in full or in part has not been submitted to any university or Institute for the award of any other degree or diploma. Place: DTU, Bawana Road, Delhi-11092 Date:
  • 3. ACKNOWLEDGEMENT I would like to express our greatest gratitude to the people who have helped & support me throughout my Self-Study Seminar Report. I are grateful to my guides, ____Ms. Indu Singh and Mr. Vinod Kumar ______ for their continuous support for the project, from initial advice to contacts in the early stages of conceptual inception & through ongoing advice & encouragement to this day. I wish to thank them for their undivided support and interest, which inspired and encouraged me to go the right way. At last, but not the least, I want to thank my friends who appreciated me for my work and motivated me; and finally to God who made all the things possible.
  • 4. ABSTRACT Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This Report is primarily a reference resource on the Steganography. The material here is designed to allow a student to learn and understand what Steganography is and how it works. I do discuss quite a number of Practical Steganographic Methodology to achieve Covert Communications, but I also focus on how these secrete communication using Steganography can be busted, as well as how Steganography can used other than as method to hide data. Also in this report you will find how Steganography does when compared to the quite famous methodology of Securing Data i.e. Cryptology. If you want to really understand about Steganography is and what makes it work, you’ve come to the right place. If all you want is simple instructions on how to hide information in media files, this probably isn’t the Guide for you. It tells you about Steganography and its deep study. IMPORTANT KEYWORDS  Steganography  Cryptography  Cover Media  Plain Text  Digital Watermarking  Steganalysis  Stego-Key  Stego-Media TABLE OF CONTENT
  • 5. 1. INTRODUCTION…………………………………………………………………1 WHAT EXACTLY IS STEGANOGRAPHY?…………………………......1 WHY IS STEGANOGRAPHY IMPORTANT?............................................1 2. LITERATURE SURVEY…………………………………………………………3 STEGANOGRAPHY IN TEXT FILES…………………………………….5 STEGANOGRAPHY IN AUDIO FILES…………………………………..6 STEGANOGRAPHY IN MAGES………………………………………….8 COVERT CHANNELS……………..……………………………………..10 STEGANOGRAPHY OVER NETWORKS………………………………11 3. DISCUSSION……………………………………………………………………..13 STEGANALYSIS…………………………………………………………13 APPLICATIONS………………………………………………………….15 STEGANOGRAPHY VS. CRYPTOGRAPHY………………………..…17 FUTURE SCOPE OF STEGANOGRAPHY……………………………..18 4. CONCLUSION…………………………………………………………………...19 5. REFERENCES…………………………………………………………………...20 CHAPTER 1:
  • 6. INTRODUCTION WHAT EXACTLY IS STEGANOGRAPHY? The word Steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and science of communicating in a way which hides the existence of the communication. Steganography boosts the concept of Information Hiding without altering or recasting the Information. Steganography has been widely used, including in recent historical times and the present day, from using slaves’ shaven heads and patterns sewed into quilts in ancient time, to using crossword puzzles and invisible ink in modern times, to relay messages which were not meant for others to read. However today, in the 21st Century, Steganography is most often associated with data hidden with other data in an electronic file, including the concealment of information within computer files such as a document file, image file, program and even protocol. WHY IS STEGANOPGRAPHYIMPORTANT? The Primary Goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present. Only due to Steganography, Secret Communications can be established which is presently required by an individual as well as any organization or the Government. Another purpose Steganography serves is to protect the Intellectual Property Rights of Copyright Owners over their digital media. Information about the owner, recipient and access level can be embedded within the media through Steganographic Methods. This allows no one to claim their rights over someone else’s copyrighted media as long as the
  • 7. “Watermark” hidden in the media is present. Steganography also makes the removal of the “Watermark” without destroying the media itself.
  • 8. CHAPTER 2 LITERATURE SURVEY The purpose of this Literature Review is the state and explain the how Steganography actually helps in strengthening the security of any sensitive information. It will take a look at how the technology and encoding systems have developed today to sophisticatedly embed data over different types of files such that the embedded data is not even perceptible to anyone not only at first look but also when the file undergoes scrutiny. Furthermore, the use of mediums, which were not intended for communications, are being used to transmit stego-media are also mentioned in this section. Also explaining how the networking today helps in Steganography. Steganography involves hiding data in an overt message and doing it in such a way that it is difficult for an adversary to detect and difficult for an adversary to remove. Based on this goal, the basic Steganographic Model is shown below:
  • 9.  Carrier Media (cover-media) is an original unaltered message into which the message meant to be hidden is to be embedded into the media.  Encoding process/Steganographic Algorithm in which the sender tries to hide a message by embedding it into a cover-text, usually using a key, to obtain a stego- media.  The Payload (or the Secrete Message) is taken along with Carrier Media which are worked in the Steganographic Technique/Algorithm to embed the payload into carrier.  The unique key in the Encoding System/Algorithm known as Stego-Key decides how the process of alteration of carrier media is to be done in order to accommodate the payload without revealing the payload to others.  The final incorporated media obtained from the Algorithm is called the Stego- Media. It is this media which holds the secrete message and is ready to be transmitted without being detected for holding any covert information!
  • 10.  Recovering process in which the receiver tries to get, using the key only, the hidden message in the stego-media.  Security requirement is that a third person watching such a communication should not be able to find out whether the sender has been active, and when, in the sense that he really embedded a message in the carrier media. In other words, stego- media should be indistinguishable from Carrier media. Depending upon the type of carrier media, suitable technique can be applied to bring about the maximum encoding density i.e. the degree of alteration of carrier media to encode the payload. Steganography can be classified into image, text, audio steganography depending on the cover media used to embed secret data STEGANOGRAPHYIN TEXT FILES Text steganography can involve anything from changing the formatting of an existing text, to changing words within a text, to generating random character sequences or using context-free grammars to generate readable texts. Text steganography is believed to be the trickiest due to deficiency of redundant information which is present in image, audio or a video file. However, in text documents, we can hide information by introducing changes in the structure of the document without making a notable change in the concerned output. The Payload can be embedded in a text through 3 pre-established techniques: 1. Line-Shift Coding In this method, secret message is hidden by vertically shifting the text lines to some degree. Vertically shift the positions of the locations of text lines in order to hide the secret information in the document. The user can chose an arbitrary number between 0 and 127, which is converted into an 8 bit sequence. According to this bit sequence every second line is shifted one pixel down if there is a 1 whereas a 0 keeps the line in the normal position.
  • 11. 2. Word-Shift Coding In this method, secret message is hidden by shifting the words horizontally, i.e. left or right to represent bit 0 or 1 respectively. Words shift can only be detected using correlation method. The scheme is based on the fact that most documents use variable word spacing to distribute white space when justifying a document. If the space between adjacent words were not different, word-shift coding would not make sense at all. 3. Feature Coding In feature coding, secret message is hidden by altering one or more features of the text. A parser examines a document and picks out all the features that it can use to hide the information. For example, point in letters i and j can be displaced, length of strike in letters f and t can be changed, or by extending or shortening height of letters b, d, h, etc. STEGANOGRAPHYIN AUDIO FILES Today most of the Audio Files are available in Digital form. Digital audio is discrete rather than continuous signal as found in analog audio. A discrete signal is created by sampling a continuous analog signal at a specified rate. Digital audio is stored in a computer as a sequence of 0's and 1's. With the right tools, it is possible to change the individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary sequence that are not discernible to the human ear. There have been many techniques for hiding information or messages in audio in such a manner that the alterations made to the audio file are perceptually indiscernible. Some of the pre- established and prominent methods of Audio Steganography are: 1. Least Significant Bit Coding A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation. Note that there's a fifty percent chance that the bit you're replacing is the same as its
  • 12. replacement, in other words, half the time, the bit doesn't change, which helps to minimize quality degradation. The illustration shows how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of secrete information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file. 2. Echo Hiding Echo hiding technique embeds secret information in a sound file by introducing an echo into the discrete signal. Echo hiding has advantages of providing a high Encoding Density and superior robustness when compared to other methods. Only one bit of secret information could be encoded if only one echo was produced from the original signal. Hence, before the encoding process begins the original signal is
  • 13. broken down into blocks. Once the encoding process is done, the blocks are concatenated back together to create the final signal [5, 20]. Echo Hiding is shown in the illustration: 3. Phase Coding The phase coding technique works by replacing the phase of an initial audio segment with a reference phase that represents the secret information. The remaining segments phase is adjusted in order to preserve the relative phase between segments. STEGANOGRAPHYIN IMAGES To a computer, an image is an array of numbers that represent light intensities at various points, or pixels. The 8-bit color images is more preferably used to hide information. In 8-bit color images, each pixel is represented as a single byte. Each pixel merely points to a color index table, or palette, with 256 possible colors. The pixel's value, then, is between 0 and 255. The challenge of using steganography in computer images is to hide as much data as possible with the least noticeable difference in the image. Many Steganography experts recommend using images featuring 256 shades of gray as the palette, for reasons that will become apparent. Grey-scale images are preferred because the shades change very gradually between palette entries. This increases the image's ability to hide information!
  • 14. Also Images having large areas of solid color should be avoided to be used as Carrier Files as even minute change in the Carrier would be visual noticeable! Information in Images can be hidden many different ways. Some of the prominent Encoding techniques of Image Steganography are: 1. Least Significant Bit Encoding a.k.a. Insertion Technique One of the most common techniques used in steganography today is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embedded information. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image: Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) The Code for letter ‘A’ which is to be hidden: 10000001 After the Insertion technique: Resultant Pixels: (00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) The highlighted bits of respective bytes are the only bits of 3 pixels that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to hide the next character of the hidden message!
  • 15. 2 or more Least Significant bits per byte can be used to embed more payload increasing the encoding density, however the cover image degrades sharply leading to its easing detection for holding hidden information. 2. Masking and Filtering Masking and filtering techniques hide information by marking an image in a manner similar to paper watermarks. Because watermarking techniques are more integrated into the image, they may be applied without fear of image destruction from “lossy” compression. By covering, or masking a faint but perceptible signal with another to make the first non-perceptible, we exploit the fact that the human visual system cannot detect slight changes in certain temporal domains of the image.
  • 16. COVERT CHANNELS Covert channels are communication paths that were neither designed nor intended to transfer information at all, but are used that way, using entities that were not intended for such use. The most prominent example of Covert Channel is the TCP/IP Headers. The IP header contains the key information that is needed for packets of data to be routed properly. When using Stego you want to find fields that you can overwrite or change that will not have an effect on the host communication. One field in the IP header that you can change without having any effect is the IP identification number. Usually the ID is incremented by 1 for each packet that is sent out, but any number can be used and the protocol will function properly. This ability to make a change and not damage functionality makes this piece of data an ideal candidate for hiding stego. In the TCP, we can use the sequence and the acknowledgement number fields to hide the data. During the initial handshake the values of sequence and acknowledgement numbers are picked and randomly generated by the sender and receiver. Therefore, the first packet that is sent can contain data hidden in those fields because the initial values don’t have any purpose. Essentially, once communication has been established, these fields can no longer be used to hide data. STEGANOGRAPHYOVER NETWORK On a computer network you can use Steganographic techniques to hide files in traffic, transmit viruses, or hide the trail somebody when moving around online. The 3 methods to implement Steganography over a network are: 1. Hiding in an Attachment Hiding data in an attachment is the most basic form of using a network to transmit stego from one person to another. Three most popular ways to do this are with Email, by file transfer such as FTP, or by posting a file on a website
  • 17. 2. Hiding in a Transmission Hiding data in an attachment is the most basic form of using a network to transmit stego from one person to another. Three most popular ways to do this are with Email, by file transfer such as FTP, or by posting a file on a website 3. Hiding in Overt Protocol Essentially, this is what is called as data camouflaging, where you make data look like something else. With this technique you take data, put it in normal network traffic, and modify the data in such a way that it looks like the overt protocol. For example, most networks carry large amounts of HTTP or Web traffic. You could send data over port 80, and it would look like web traffic. The problem is that, if someone examined the payload, it would not look like normal web traffic, which usually contains HTML. What if you added symbols such as < >, < / > to the data? Because these are the types of characters that HTML contains, the traffic would look like Web traffic and probably would slip by the casual observer.
  • 18. CHAPTER 3 DISCUSSION This Section is included in this report to state and explain where exactly Steganography stands in the present time. Despite the presence of many other method of secure communication, like Cryptography, why is Steganography now being more preferred than the rest. Also this section also explains if there is way to hide information in any media, then there is a way to catch these Stego-media carrying the covert information while being transmitted as any other carrier media. STAGANALYSIS Since Steganography provides a medium of covert communications, it can be abused by some anti-social or ill elements present in the world. These elements can use any media to send their messages though the internet without being detected by anyone. Hence it is necessary to analyze any suspected media for a hidden message. This is where Steganalysis comes in. Steganalysis is the study of detecting messages hidden using steganography. The goal of Steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload. Steganalysis generally starts with a pile of suspect data files, but little information about which of the files, if any, contain a payload. Basic Technique: A set of unmodified files of the same type, and ideally from the same source as the set being inspected, are analyzed for various statistics. Some of these are as simple as spectrum analysis, also attempt to look for inconsistencies in the way this data has been compressed. One case where detection of suspect files is straightforward is when
  • 19. the original, unmodified carrier is available for comparison. Comparing the package against the original file will yield the differences caused by encoding the payload—and, thus, the payload can be extracted. Another Technique: Most programs which are employed to detect Stego-Media used the concept of randomness. With most files that do not contain random data you would get a histogram that has peaks and valleys where certain characters appear often and others appear only infrequently. Below is a histogram for unencrypted data. On the other hand, with encrypted data, because it is random, you acquire a much flatter histogram, as you can see in Figure 4.2. You can see that, compared to Figure 4.1, Figure 4.2 looks extremely flat. Every character appears with equal frequency. Hence the degree of randomness depicted by the Histogram can be used to take up media for inspection even if an unmodified file from same source is not available for comparison
  • 20. APPLICATIONS Data Hiding was the Major Application of the Steganography since its inception. However, by the 21st Century, Steganography has found many more applications which are not meant for any kind of secrete communications! Some of the Prominent Applications of Steganography are explain below: 1. Digital Watermarking A Digital Watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image data. A popular application of watermarking techniques is to provide a proof of ownership of digital data by embedding copyright statements into video or image digital products and hence does not need any relation to the Carrier Media. Like traditional watermarks, digital watermarks can be made perceptible under certain conditions, i.e. after using some algorithm, and imperceptible anytime else, keeping in mind that the Digital Watermark does not distorts the carrier signal. Both steganography and digital watermarking employ Steganographic techniques to embed data covertly in noisy signals. Steganography aims for imperceptibility to human senses, but digital watermarking tries to control the robustness as top priority even if the watermark becomes perceptible.
  • 21. Digital watermarking may be used for a wide range of applications, such as:  Copyright protection  Source tracking (different recipients get differently watermarked content)  Broadcast monitoring (television news often contains watermarked video from international agencies)  Authentication of the Media 2. Tamper Proofing of Files When any fie containing any sensitive information is being transferred or transmitted, there is a risk of it being altered by any person or organization which could prove fatal. The principle of Steganography can help here. A data, just like a watermark, can be embedded into the file through Steganographic methods. If the file undergoes any changes by any unauthorized person, the embedded data will also undergo some changes. Hence the embedded data can be check to see whether the file has been tampered or not. Of course it is not possible to remove the embedded data without destroying the file itself. Therefore the presence of the embedded data into the file acts as medium for making the file Tamper Proof. 3. Steganography in Modern Printers Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. 4. Steganography in DNA Even biological data, stored on DNA, may be a candidate for hiding messages, as biotech companies seek to prevent unauthorized use of their genetically engineered material. The technology is already in place for this: three New York researchers successfully hid a secret message in a DNA sequence and sent it across the country.
  • 22. STEGANOGRAPHYVS CRYPTOGRAPHY Cryptography and Steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence respectively. Steganography is the art and science of communicating in a way which hides the existence of the communication, while Cryptography scrambles a message so it cannot be understood; the Steganography hides the message so it cannot be seen. Even though both methods provide security, there are some significant differences between the 2 sciences. However it’s the Steganography which comes on top, providing a better sense of security over Cryptography. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party. Steganography Only Sender & Reciever knows the existence of the message. Prevents Discovery of the very existence of Communications. Does not Alter the structur & content of the message. Cryptograpphy The Existence of Message is Known to all.. Prevents Unauthorized party to dicover the contents of Communications. Alters the structure of the Meessage.
  • 23. But still, steganography and cryptography can be used together to ensure more robust and foolproof security of the covert message. FUTURE SCOPE OF STEGANOGRAPHY One thing that you can certainly say about the future of Steganography: Change and the introduction of new approaches will continue to occur on a frequent basis. The first area where we can appreciate Stego making strides is in the technology used to produce and break it.  Improved Resistance to Analysis As Stego-media gets more sophisticated, its resistance to being analyzed, or even recognized, will improve. In the current state of Stego technology, if you suspect Stego-media is being used, it is relatively easy to detect it. Once you detect it, you can probably retrieve the contents which would then be protected only by the strength of the encryption applied to it, if any. In the future, efforts will make Stego undetectable and irretrievable except by those for whom it is intended. The ability to manipulate data, then printing out a hard copy, rescanning it, and again being able to retrieve the hidden data would be an intriguing scenario.  Higher Encoding Density The ability to hide huge amounts of data with stego is another logical area for improvement. Currently stego can use only a certain amount of data bits in a host file without degrading the file to the point where it’s obvious that stego is being used. As stego is used in crimes such as corporate espionage, there will be more demand to hide larger amounts of data. Large-scale stego, where you can perform compression on huge amounts of data on the fly and store it in small files, is one possible future.
  • 24. CONCLUSION Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. “You never know if a message is hidden”, this is the dilemma that empowers steganography. As main emphasis of Steganography is placed on the areas of providing a Covert Communication in an Overt Environment, but it does not mean it is limited to Data Hiding. Steganography is now also finding grounds in copyright protection, privacy protection, and surveillance, and in checking genuineness. I believe that steganography will continue to grow in importance as a protection mechanism. In spite of being proved more superior to Cryptography, Steganography is not intended to replace cryptography but rather to supplement it. If a message is encrypted and hidden with a Steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. Also the opposite way can be done: The secrete message first being embedded into the Carrier file and then the carrier file undergoes Encryption. Hence both Steganography and Cryptography together can unlock a new world of hiding data and reach new heights. However with the advancement of Data Hiding and encryption, it is expected that Steganography can be abused for greedy and illicit purposes. But with continuous advancements in technology it is expected that in the near future more efficient and advanced techniques in Steganalysis will emerge that will help law enforcement to better detect illicit materials transmitted through the Internet.
  • 25. REFERENCES  Site: http://en.wikipedia.org/wiki/Steganography  Site: http://www.sarc-wv.com/news.aspx  Site: http://www.strangehorizons.com/2001/20011008/steganography.shtml  Site: http://vww.jjtc.com/stegdoc  Eric Cole - “Hiding in Plain Text”, Wiley Publishing Inc. :2003  S. Katzenbeisser, F. Petitcolas – “Information Hiding: Techniques for Steganography and Digital Watermarking”