http://isrc.ulster.ac.uk9th May 2013www.hidinimage.co.ukPratheepan YogarajahThe role of Steganography inSecure Information...
http://isrc.ulster.ac.ukSecuring Digital Information2
http://isrc.ulster.ac.ukSecuring Digital InformationPaper documentDigital documentServer
http://isrc.ulster.ac.uk4Securing Digital InformationClosed System Open System
http://isrc.ulster.ac.uk5If we don’t secure information…Scenario 1:
http://isrc.ulster.ac.uk6
http://isrc.ulster.ac.uk7
http://isrc.ulster.ac.uk8
http://isrc.ulster.ac.uk9Integrity—How do weknow if the supportingdocuments have beenaltered?Client logs into ABC Insuranc...
http://isrc.ulster.ac.uk10Scenario 3:If we don’t secure information…
http://isrc.ulster.ac.ukSteganography11
http://isrc.ulster.ac.uk12SteganographyKeyEncoderCoverImageSecretDataStego ObjectDecoderSecretDataCommunicationsChannel
http://isrc.ulster.ac.ukHidInImage HidInImage enables the encryption and hidingof secret information (text or images) ins...
http://isrc.ulster.ac.ukWhy HidInImage is Unique? Revolutionary software algorithm forencryption Novel technique for emb...
http://isrc.ulster.ac.uk15Cover ImageProtected ImageWhat does HidInImage do?+ Key =>Secret Data
http://isrc.ulster.ac.ukHidInImage Video16
http://isrc.ulster.ac.uk 17Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with her...
http://isrc.ulster.ac.uk18Secret Data Cover Image Stego ObjectDocument authentication
http://isrc.ulster.ac.uk19How to detect alterationsAltered Document Recovered DocumentGrayscale image ofAltered DocumentFi...
http://isrc.ulster.ac.ukReceived Document Extracted original contentfrom received DocumentDocument authentication
http://isrc.ulster.ac.ukAnti-Counterfeit & Track and TraceSolution
http://isrc.ulster.ac.ukSolutions for Digital Imagesimages used by creative individuals, enterprises,governments and law e...
http://isrc.ulster.ac.uk23Thank You
Upcoming SlideShare
Loading in...5
×

The role of steganography in secure information solutions (Prathepan yogarajah)

471

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
471
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Secret Data can be image or text
  • The role of steganography in secure information solutions (Prathepan yogarajah)

    1. 1. http://isrc.ulster.ac.uk9th May 2013www.hidinimage.co.ukPratheepan YogarajahThe role of Steganography inSecure Information solutions
    2. 2. http://isrc.ulster.ac.ukSecuring Digital Information2
    3. 3. http://isrc.ulster.ac.ukSecuring Digital InformationPaper documentDigital documentServer
    4. 4. http://isrc.ulster.ac.uk4Securing Digital InformationClosed System Open System
    5. 5. http://isrc.ulster.ac.uk5If we don’t secure information…Scenario 1:
    6. 6. http://isrc.ulster.ac.uk6
    7. 7. http://isrc.ulster.ac.uk7
    8. 8. http://isrc.ulster.ac.uk8
    9. 9. http://isrc.ulster.ac.uk9Integrity—How do weknow if the supportingdocuments have beenaltered?Client logs into ABC Insurance portal and fillsin a claim application and submits along withsupporting documents.Approved or rejectedapplication sent back to ClientScenario 2:If we don’t secure information…
    10. 10. http://isrc.ulster.ac.uk10Scenario 3:If we don’t secure information…
    11. 11. http://isrc.ulster.ac.ukSteganography11
    12. 12. http://isrc.ulster.ac.uk12SteganographyKeyEncoderCoverImageSecretDataStego ObjectDecoderSecretDataCommunicationsChannel
    13. 13. http://isrc.ulster.ac.ukHidInImage HidInImage enables the encryption and hidingof secret information (text or images) insideimages using Steganography techniques. Secret information is hidden imperceptibly inthat it cannot be detected by the human eye. Our innovative Steganograpy-basedhiding solution plays a vital role in securingdigital media content.
    14. 14. http://isrc.ulster.ac.ukWhy HidInImage is Unique? Revolutionary software algorithm forencryption Novel technique for embedding of data inimages using Steganography techniquePatented Encryption SoftwarePatented Embedding Software
    15. 15. http://isrc.ulster.ac.uk15Cover ImageProtected ImageWhat does HidInImage do?+ Key =>Secret Data
    16. 16. http://isrc.ulster.ac.ukHidInImage Video16
    17. 17. http://isrc.ulster.ac.uk 17Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with herinformation details, (b) encrypted secret data (payload) of (a), a clean image showing nature in whichthe encrypted data will be embedded to and finally (d) shows the stego-image carrying the encryptedpatient dataSecret Communication
    18. 18. http://isrc.ulster.ac.uk18Secret Data Cover Image Stego ObjectDocument authentication
    19. 19. http://isrc.ulster.ac.uk19How to detect alterationsAltered Document Recovered DocumentGrayscale image ofAltered DocumentFinal Result
    20. 20. http://isrc.ulster.ac.ukReceived Document Extracted original contentfrom received DocumentDocument authentication
    21. 21. http://isrc.ulster.ac.ukAnti-Counterfeit & Track and TraceSolution
    22. 22. http://isrc.ulster.ac.ukSolutions for Digital Imagesimages used by creative individuals, enterprises,governments and law enforcement• Copyright Communication– Identifies content owner and rights• Copy Protection– Controls copying of content• Classification– Classifies content so it is used appropriately;• Authentication– Verifies that content is genuine, from an authorizedsource and has not been altered
    23. 23. http://isrc.ulster.ac.uk23Thank You
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×