Your SlideShare is downloading. ×
0
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Steganography

3,822

Published on

The art of hiding messages, or data behind Pictures, …

The art of hiding messages, or data behind Pictures,

For Documentation and Downloads Visit
www.presentationslive.blogspot.com

Published in: Education
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,822
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
5
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. For Documentation and Downloads Visit
  • 2. <ul><li>In the present world, maximum of the world business is going on using “INTERNET” </li></ul><ul><li>Consequences: </li></ul><ul><li>Security required for the data, so that no other person can access it illegally. </li></ul><ul><li>Data should be transferred accurately with out errors. </li></ul>
  • 3. Two basic mechanisms for security of the data 1. CRYPTOGRAPHY 2. STEGANOGRAPHY Steganography 's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood.
  • 4.  
  • 5. “ To human eyes, data usually contains known forms like images, e-mail, sounds and text. Most Internet data naturally includes gratuitous headers, too.” The above message is decoded by using steganography technique concerning certain rules, as follows… “ THE DUCK FLIES AT MIDNIGHT” HOW IS IT DECODED?.......
  • 6. CONSIDER THE GIVEN DATA “ T o h uman e yes, d ata u sually c ontains k nown f orms l ike i mages, e -mail, s ounds a nd t ext. M ost I nternet d ata n aturally i ncludes g ratuitous h eaders, t oo.” Here the rule is “considering the first letters of all the words”. The decoding process is done by using the above rule. This is a simple way used in steganography.
  • 7. Steganography is a means of storing information in such a way that it hides private information and even the existence of the information with in the other medium. The goal of steganography is “to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present.''
  • 8. <ul><li>COVER: The data that is visible to the world . </li></ul><ul><li>EMBEDDED: The data to be hidden (not visible to </li></ul><ul><li>the world) </li></ul><ul><li>3. STEGO: The data contains both cover </li></ul><ul><li>&embedded data. </li></ul><ul><li>The data may be audio or video or image…etc </li></ul><ul><li>In case of audio data the cover is also termed as host signal , where as in case of image data the cover is termed as container . The process of hiding the data is known as Embedding. </li></ul>
  • 9. This technique is well known to Greeks in 500 B.C itself and efficiently used in World war2 by Germany. One example is “ A p parently n e utral's p r otest i s t h oroughly d i scounted a n d i g nored. I s man h a rd h i t. B l ockade i s sue a f fects p r etext f o r e m bargo o n b y -products, e j ecting s u ets a n d v e getable o i ls.” This is given by a German Spy Giving the secret message that “ Pershing sails from NY June 1.” In World war 2.
  • 10. three basic ways to encode the data in steganography are 1.Image as a carrier 2.Pixel representation in RGB 3.Bandwidth reduced file transfer Practical implementation
  • 11. It is an efficient technique for steganography, An image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha : degree of transparency Red : intensity of red color Green : intensity of green color Blue : intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.
  • 12. If an image data takes six mins to transfer between two systems and a text file takes 3 mins. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six mins. Two basic algorithms used for steganography are 1.Text on Image algorithm. 2. Image on Image algorithm.
  • 13. IMAGE EMBEDDED IMAGE FILE
  • 14. “ ATTACK” --- An attempt to detect the Stegnography messages 1.ACTIVE ATTACK 2.PASSIVE ATTACK check sum character is embedded into the actual data in order to indicate the beginning of the stego data, and how much data is tampered will not be known in this process. Audio can be detected by using a specified noise signal.
  • 15. 1. Steganographers need to avoid well-known images for this reason . 2. S teganographer must use caution when choosing certain data hiding techniques to avoid unusual patterns
  • 16. The answer is definitely “ BIN LADEN ” The attack on 11 th September was perfectly preplanned by BIN LADEN and AL QA’IDA by communicating with the hijackers by sending the pictures and the terrorist targets by using steganography technique. (in the form of pictures of children and in sports chat rooms) The advanced tools used for this purpose by them are 1. White Noise Storm 2. S-Tools …. Efficient softwares for the steganography of voice, image, data in digitized format.
  • 17. <ul><li>Internet privacy. </li></ul><ul><li>2. Secret communication between the organizations like boarder security force and defense organization. </li></ul><ul><li>3. Effective than that of cryptography . </li></ul><ul><li>4. Additional layer for security than cryptography </li></ul>
  • 18. That message may be an important one like “ about the safety of a country ”
  • 19. As EVERY COIN HAS TWO SIDES, This technology besides having much benefits to make the internet business very safe and transmitting the defense messages secretly, there is a threat to the society if it is used in terrorism(11 th September),in anti social events. FINALLY, “ It will be more helpful if this technology is used in the proper way. The stegnography e are seeing today is just an ice cap, we have to wait until it melts(developed fully) whether it is helpful to society or becoming threat . ”
  • 20.  
  • 21. THANK YOU…
  • 22. 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 WIebvdiCqsOoabK3jEfdGExce63zDI0= =MpRf CRYPTO CODE: STEGO CODE:
  • 23. TEXT ON IMAGE ALGORITHM Password: 9966572497 Hidden Data BACK Cover Stego Data
  • 24. TEXT ON IMAGE ALGORITHM BACK Cover Stego Data

×