Your SlideShare is downloading. ×
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Steganography
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Steganography

18,106

Published on

3 Comments
17 Likes
Statistics
Notes
No Downloads
Views
Total Views
18,106
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1,699
Comments
3
Likes
17
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. STEGANOGRAPHY
  • 2. INTRODUCTION No one apart from the Art and A form of sender and science of security intendedwriting hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  • 3. Steganós • CoveredGraptos • WritingETYMOLOGY
  • 4. HISTORY OF STEGANOGRAPHY Current 1st and 2nd World Wars 440 B.C. www.company.com
  • 5. Cryptography SteganographyWatermarking EVOLUTION
  • 6. ADVANTAGE OF STEGANOGRAPHY OVER CRYPTOGRAPHY Messages do not attract attention to Protects both themselves messages and communicating parties www.company.com
  • 7. TYPES OF STEGANOGRAPHY Steganography In Text/Documents Steganography In Video Steganography In Audio Steganography In Images www.company.com
  • 8. Carrier or Cover File Stego-Medium Embedded or Payload SteganalysisSTEGANOGRAPHY TERMS
  • 9. VIDEO
  • 10. HOW IT WORKSwww.company.com
  • 11. STEGANOGRAPHY STEPS Steganography Encoding a Decode a message message www.company.com
  • 12. Embedded Data MESSAGEPlain info MESSAGE
  • 13. ENCODING Step 2• Prepare • Encode • Steganographic data cover data embedded data with cover data Step1 Step 3 www.company.com
  • 14. DECODING Step 2• Steganographic • Embedded Data • Decode data Plain info obtained Step1 Step 3 www.company.com
  • 15. STEGANALYSISArt and Science of detecting hidden messages Just discover Steganography Not deals with decrypting the datawww.company.com
  • 16. Line Shift Coding Word Shift Coding Feature Coding Least Significant Bit Insertion Low bit encoding Masking and FilteringSTEGANOGRAPHY TECHNIQUES
  • 17. STEGANOGRAPHY USING LEAST SIGNIFICANT BITwww.company.com
  • 18. PRACTICAL
  • 19. Program Image files Audio files Video files Document files BMP, JPG, Mp3, WAV 3gp, Mp4, Pdf PNG, TGA MPEG-1, OpenPuff MPEG-2, VOB, SWF, FLV MP3Stego - Mp3 - - OpenStego BMP, PNG - - - S-Tools BMP, GIF Wav - - StegFS - - - - Steganographic BMP, PNG, - - - Laboratory (VSL) JPG, TIFF PHP-Class PNG - - -StreamSteganographyList of some tools for Steganography www.company.com
  • 20. USAGE IN MODERN PRINTERS Tiny yellow dots are added to each pagePrinter serial numbers date and time stamps are encoded on yellow dotsEXAMPLE: HP and Xerox color laser printers. www.company.com
  • 21. ILLEGAL USAGE HACKERS TERRORISTS CRIMINALSwww.company.com
  • 22. CONCLUSION
  • 23. QUERIESwww.company.com

×