SlideShare a Scribd company logo
1 of 37
Made by :
Manika Arora
What is Steganography?
• Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the
sender and intended recipient, suspects the existence of
the message, a form of security through obscurity.
• The word steganography is of Greek origin and means
"concealed writing" from the Greek
words steganos meaning "covered or protected",
and graphein meaning "writing".
• “Steganography means hiding one piece of data
within another”.
Typical Scenario
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
History Of Steganography
• Dates back to 400 BC when Histaeus sent a message, by
shaving the head of his most trusted slave, then tattooed a
message on the slave's scalp, to his friend Aristagorus, urging
revolt against the Persians.
• Demaratus tells Athens of Persia’s attack plans by writing the
secret message on a tablet, & covers it with wax.
• Chinese wrote messages on silk and encased them in balls of
wax. The wax ball, "la wan," could then be hidden in the
messenger.
• A more subtle method, nearly as old, is to use invisible
ink( lemon juice, milk, or urine, all of which turn dark when held
over a flame).
• Special “inks” were important steganographic tools even during
Second World War.
Modern steganography
• Hiding one message within another(“container”)
• Most containers are rich media
Images, audio, video are very redundant, can be tweaked without
affecting human eye/ear
US argued that Al_QAIDA implanted instructions within taped
interviews.
• Copyright notices embedded in digital art
Prove ownership(Watermarking)
Serial number embedded to prevent replication
Seek infringements on the web using spiders/crawlers
• Digital cameras EXIF(Exchangeable Image File Format) tags
Not secretive but hidden from the eye
Embed info such as camera type, date, shutter speed, focal length..
• Similarly, possible to embed messages in invisible part of html
pages
Physical techniques
• Physical Techniques Hidden messages within wax
tablets
a) Hidden messages on messenger's body
b) Hidden messages on paper written in secret inks
c) Messages written in Morse code on
knitting yarn and then knitted into a piece of
clothing worn by a courier
d) Messages written on envelopes in the area
covered by postage stamps.
Digital technique
• Digital Techniques
a) Concealing messages within the lowest bits
of noisy images or sound files.
b) Modifying the echo of a sound file (Echo
Steganography)
c) Including data in ignored sections of a file, such
as after the logical end of the carrier file.
Comparison Of Secret Communication
Techniques
Evolution
Cryptography
Steganography
Watermarking
Steganography V/s Cryptography
Steganography Terms
• Carrier or Cover File - A Original message or a file in
which hidden information will be stored inside of it .
• Stego-Medium - The medium in which the information is
hidden.
• Embedded or Payload - The information which is to be
hidden or concealed.
• Steganalysis - The process of detecting hidden
information inside a file.
Basic Steganography Model
Types of steganography
• Steganography In text/documents
• Steganography In images
• Steganography In audio
• Steganography in video
Text Steganography
• Text steganography can be applied in the digital makeup format
such as PDF, digital watermark or information hiding
• It is more difficult to realize the information hiding based on
text. The simplest method of information hiding is to select the
cover first, adopt given rules to add the phraseological or
spelling mistakes, or replace with synonymy words.
• E.g 1] Textto setups some sentence structure in advance, fills
in the empty location by arranged words,
and then the text doesn’t have phraseological mistakes, but
have some word changes or morphology mistakes.
2] TextHide hides the information in the manner of text
overwriting and words’ selection.
Examples of Text Steganography
• An example of a message containing cipher text by
German Spy in World War II:
“Apparently neutral's protest is thoroughly discounted
And ignored. Isman hard hit. Blockade issue affects
Pretext for embargo on by products, ejecting suets and
Vegetable oils. ”
• Taking the second letter in each word the following
message emerges:
Pershing sails from NY June 1.
Examples of Text Steganography
• Minor changes to shapes of characters
Examples of text Steganography
Image Steganography
• Using image files as hosts for steganographic messages
takes advantage of the limited capabilities of the human
visual system
• Some of the more common method for embedding
messages in image files can be categorized into two main
groups, image domain methods and transform domain
methods
Image And Transform Domain
• Image – also known as spatial – domain techniques
embed messages in the intensity of the pixels directly,
while for transform – also known as frequency – domain,
images are first transformed and then the message is
embedded in the image
• Image domain techniques encompass bit-wise methods
that apply bit insertion and noise manipulation and are
sometimes characterised as “simple systems”
• Steganography in the transform domain involves the
manipulation of algorithms and image transforms
Example of image Steganography
Fig:Image in hex editor
Audio Steganography
• Embedding secret messages into digital sound is
known as audio Steganography.
• Audio Steganography methods can embed
messages in WAV, AU, and even MP3 sound
files.
• The properties of the human auditory system
(HAS) are exploited in the process of audio
Steganography
Flowchart Of Audio Steganography
Example of LSB Method
• The message 'HEY' is
encoded in a 16-bit CD
quality sample using the LSB
method.
• Here the secret information is
‘HEY’ and the cover file is
audio file. HEY is to be
embedded inside the audio
file. First the secret
information ‘HEY’ and the
audio file are converted into
bit stream.
• The least significant column
of the audio file is replaced by
the bit stream of secret
information ‘HEY’. The
resulting file after embedding
secret information ‘HEY’ is
called Stego-file.
Steganalysis
• The art and science of steganalysis is intended to detect or estimate
hidden information based on observing some data transfer.
• In some cases, just being caught sending a message can bring
suspicion, or give information to the 3rd party
• Steganalysis techniques can be classified in a similar way as
cryptanalysis methods, largely based on how much prior information
is known.
Steganography-only attack: The steganography medium is the only
item available for analysis.
Known-carrier attack: The carrier and steganography media are
both available for analysis
Steganalysis
 Known-message attack: The hidden message is known.
Chosen-steganography attack: The steganography medium and
algorithm are both known.
Chosen-message attack: A known message and steganography
algorithm are used to create steganography media for future
analysis and comparison.
Known-steganography attack: The carrier and steganography
medium, as well as the steganography algorithm, are known
discipline with few articles appearing before the late 1990s.
Steganography Tools
1. Hide in Picture
2. TextHide
3. Snow
4. Camouflage
5. OpenPuff
Advantages
• Difficult to detect and Only receiver can detect.
• It can be done faster with large no. of software's.
Disadvantage
• The confidentiality of information is maintained by the
algorithms, and if the algorithms are known then this
technique is of no use.
• Password leakage may occur and it leads to the
unauthorized access of data.
• If this technique is gone in the wrong hands like hackers can
be very much dangerous for all.
Applications
• Confidential communication and secret data
storing
• Steganography provides us with:
• Potential capability to hide the existence of
confidential data
• Hardness of detecting the hidden (i.e.Strengthening
of the secrecy of the encrypted data)
• Protection of data alteration
Applications
• Usage in modern printers
• Access control system for digital
content distribution
• Alleged use by terrorists
• Alleged use by intelligence services
Who’s Using It?
• Good question… nobody knows for sure.
• The whole point to steganography is to disguise its use.
• However, anybody can use it to hide data or to protect
anonymity
• Likely users include:
a) Trade fraud
b) Industrial espionage
c) Organized crime
d) Narcotics traffickers
e) Child pornographers
f) Criminal gangs
g) Individuals concerned about perceived government “snooping”
h) Those who want to circumvent restrictive encryption export rules
i) Anyone who wants to communicate covertly and anonymously
Detection
• Can steganography be detected?
• Sometimes…many of the simpler steganographic
techniques produce some discernable change in the file
size, statistics, or both. For image files, these include:
• Color variations
• Loss of resolution or exaggerated noise
• Images larger in size than that to be expected
• Characteristic signatures, e.g., distortions or patterns
• However, detection often requires a priori knowledge of
what the image or file should look like
Detection Challenges
• Lack of tools and techniques to recover the
hidden data
• No commercial products exist for detection
• Custom tools are analyst-intensive
• Few methods beyond visual analysis of graphics
files have been explored
• Usually, no a priori knowledge of existence
• No access to stegokey
• Use of unknown applications
Need for Improved Detection
• Growing awareness of data hiding techniques and uses
• Availability and sophistication of shareware and freeware
data hiding software
• Concerns over use to hide serious crimes, e.g., drug
trafficking, pedophilia, terrorism
• Frees resources currently spent on investigating cases
with questionable/unknown payoff
• Legislative calls
• US Bill H.R. 850, Security and Freedom through Encryption (SAFE)
Act
• UK Revision of Interception of Communications Act 1985
Future Scope
• Steganography, though is still a fairly new idea. There are
constant advancements in the computer field, suggesting
advancements in the field of steganography as well. It is likely
that there will soon be more efficient and more advanced
techniques for Steganalysis. A hopeful advancement is the
improved sensitivity to small messages. Knowing how difficult it
is to detect the presence of a fairly large text file within an
image, imagine how difficult it is to detect even one or two
sentences embedded in an image! It is like finding a
microscopic needle in the ultimate haystack.
• What is scary is that such a small file of only one or two
sentences may be all that is needed to commence a terrorist
attack. In the future, it is hoped that the technique of
Steganalysis will advance such that it will become much easier
to detect even small messages within an image.
Conclusion
• Steganography & Steganalysis are still at an early stage of
research.
• Although in principle secure schemes exist, practical ones with
reasonable capacity are known.
• Notion for security & capacity for steganography needs to be
investigated.
• Since it obvious that no system of data hiding is totally
immune to attacks. However, steganography has its place in
security. It in no way can replace cryptography, but is
intended to supplement it. Its application in watermarking for
use in detection of unauthorized, illegally copied material is
continually being realized and developed.
• The growing number of communication protocols, services
and computing environments offers almost unlimited
opportunities for displaying a whole spectrum of
steganographic methods.
steganography

More Related Content

What's hot

What's hot (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Stego.ppt
Stego.pptStego.ppt
Stego.ppt
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 

Viewers also liked (19)

Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
Steganography Steganography
Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 

Similar to steganography

Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyScott Donald
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Steganography
SteganographySteganography
SteganographySonam M
 
Information security
Information securityInformation security
Information securityJay Nagar
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxSAMPATHKUMARS20
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 

Similar to steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Final2
Final2Final2
Final2
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography.
Steganography.Steganography.
Steganography.
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of Steganography
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Information security
Information securityInformation security
Information security
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

steganography

  • 2. What is Steganography? • Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. • The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing". • “Steganography means hiding one piece of data within another”.
  • 4. Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 5. History Of Steganography • Dates back to 400 BC when Histaeus sent a message, by shaving the head of his most trusted slave, then tattooed a message on the slave's scalp, to his friend Aristagorus, urging revolt against the Persians. • Demaratus tells Athens of Persia’s attack plans by writing the secret message on a tablet, & covers it with wax. • Chinese wrote messages on silk and encased them in balls of wax. The wax ball, "la wan," could then be hidden in the messenger. • A more subtle method, nearly as old, is to use invisible ink( lemon juice, milk, or urine, all of which turn dark when held over a flame). • Special “inks” were important steganographic tools even during Second World War.
  • 6. Modern steganography • Hiding one message within another(“container”) • Most containers are rich media Images, audio, video are very redundant, can be tweaked without affecting human eye/ear US argued that Al_QAIDA implanted instructions within taped interviews. • Copyright notices embedded in digital art Prove ownership(Watermarking) Serial number embedded to prevent replication Seek infringements on the web using spiders/crawlers • Digital cameras EXIF(Exchangeable Image File Format) tags Not secretive but hidden from the eye Embed info such as camera type, date, shutter speed, focal length.. • Similarly, possible to embed messages in invisible part of html pages
  • 7. Physical techniques • Physical Techniques Hidden messages within wax tablets a) Hidden messages on messenger's body b) Hidden messages on paper written in secret inks c) Messages written in Morse code on knitting yarn and then knitted into a piece of clothing worn by a courier d) Messages written on envelopes in the area covered by postage stamps.
  • 8. Digital technique • Digital Techniques a) Concealing messages within the lowest bits of noisy images or sound files. b) Modifying the echo of a sound file (Echo Steganography) c) Including data in ignored sections of a file, such as after the logical end of the carrier file.
  • 9. Comparison Of Secret Communication Techniques
  • 12. Steganography Terms • Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it . • Stego-Medium - The medium in which the information is hidden. • Embedded or Payload - The information which is to be hidden or concealed. • Steganalysis - The process of detecting hidden information inside a file.
  • 14. Types of steganography • Steganography In text/documents • Steganography In images • Steganography In audio • Steganography in video
  • 15. Text Steganography • Text steganography can be applied in the digital makeup format such as PDF, digital watermark or information hiding • It is more difficult to realize the information hiding based on text. The simplest method of information hiding is to select the cover first, adopt given rules to add the phraseological or spelling mistakes, or replace with synonymy words. • E.g 1] Textto setups some sentence structure in advance, fills in the empty location by arranged words, and then the text doesn’t have phraseological mistakes, but have some word changes or morphology mistakes. 2] TextHide hides the information in the manner of text overwriting and words’ selection.
  • 16. Examples of Text Steganography • An example of a message containing cipher text by German Spy in World War II: “Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit. Blockade issue affects Pretext for embargo on by products, ejecting suets and Vegetable oils. ” • Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 17. Examples of Text Steganography • Minor changes to shapes of characters
  • 18. Examples of text Steganography
  • 19. Image Steganography • Using image files as hosts for steganographic messages takes advantage of the limited capabilities of the human visual system • Some of the more common method for embedding messages in image files can be categorized into two main groups, image domain methods and transform domain methods
  • 20. Image And Transform Domain • Image – also known as spatial – domain techniques embed messages in the intensity of the pixels directly, while for transform – also known as frequency – domain, images are first transformed and then the message is embedded in the image • Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation and are sometimes characterised as “simple systems” • Steganography in the transform domain involves the manipulation of algorithms and image transforms
  • 21. Example of image Steganography Fig:Image in hex editor
  • 22. Audio Steganography • Embedding secret messages into digital sound is known as audio Steganography. • Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. • The properties of the human auditory system (HAS) are exploited in the process of audio Steganography
  • 23. Flowchart Of Audio Steganography
  • 24. Example of LSB Method • The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. • Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. • The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  • 25. Steganalysis • The art and science of steganalysis is intended to detect or estimate hidden information based on observing some data transfer. • In some cases, just being caught sending a message can bring suspicion, or give information to the 3rd party • Steganalysis techniques can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known. Steganography-only attack: The steganography medium is the only item available for analysis. Known-carrier attack: The carrier and steganography media are both available for analysis
  • 26. Steganalysis  Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and algorithm are both known. Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known discipline with few articles appearing before the late 1990s.
  • 27. Steganography Tools 1. Hide in Picture 2. TextHide 3. Snow 4. Camouflage 5. OpenPuff
  • 28. Advantages • Difficult to detect and Only receiver can detect. • It can be done faster with large no. of software's. Disadvantage • The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use. • Password leakage may occur and it leads to the unauthorized access of data. • If this technique is gone in the wrong hands like hackers can be very much dangerous for all.
  • 29. Applications • Confidential communication and secret data storing • Steganography provides us with: • Potential capability to hide the existence of confidential data • Hardness of detecting the hidden (i.e.Strengthening of the secrecy of the encrypted data) • Protection of data alteration
  • 30. Applications • Usage in modern printers • Access control system for digital content distribution • Alleged use by terrorists • Alleged use by intelligence services
  • 31. Who’s Using It? • Good question… nobody knows for sure. • The whole point to steganography is to disguise its use. • However, anybody can use it to hide data or to protect anonymity • Likely users include: a) Trade fraud b) Industrial espionage c) Organized crime d) Narcotics traffickers e) Child pornographers f) Criminal gangs g) Individuals concerned about perceived government “snooping” h) Those who want to circumvent restrictive encryption export rules i) Anyone who wants to communicate covertly and anonymously
  • 32. Detection • Can steganography be detected? • Sometimes…many of the simpler steganographic techniques produce some discernable change in the file size, statistics, or both. For image files, these include: • Color variations • Loss of resolution or exaggerated noise • Images larger in size than that to be expected • Characteristic signatures, e.g., distortions or patterns • However, detection often requires a priori knowledge of what the image or file should look like
  • 33. Detection Challenges • Lack of tools and techniques to recover the hidden data • No commercial products exist for detection • Custom tools are analyst-intensive • Few methods beyond visual analysis of graphics files have been explored • Usually, no a priori knowledge of existence • No access to stegokey • Use of unknown applications
  • 34. Need for Improved Detection • Growing awareness of data hiding techniques and uses • Availability and sophistication of shareware and freeware data hiding software • Concerns over use to hide serious crimes, e.g., drug trafficking, pedophilia, terrorism • Frees resources currently spent on investigating cases with questionable/unknown payoff • Legislative calls • US Bill H.R. 850, Security and Freedom through Encryption (SAFE) Act • UK Revision of Interception of Communications Act 1985
  • 35. Future Scope • Steganography, though is still a fairly new idea. There are constant advancements in the computer field, suggesting advancements in the field of steganography as well. It is likely that there will soon be more efficient and more advanced techniques for Steganalysis. A hopeful advancement is the improved sensitivity to small messages. Knowing how difficult it is to detect the presence of a fairly large text file within an image, imagine how difficult it is to detect even one or two sentences embedded in an image! It is like finding a microscopic needle in the ultimate haystack. • What is scary is that such a small file of only one or two sentences may be all that is needed to commence a terrorist attack. In the future, it is hoped that the technique of Steganalysis will advance such that it will become much easier to detect even small messages within an image.
  • 36. Conclusion • Steganography & Steganalysis are still at an early stage of research. • Although in principle secure schemes exist, practical ones with reasonable capacity are known. • Notion for security & capacity for steganography needs to be investigated. • Since it obvious that no system of data hiding is totally immune to attacks. However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking for use in detection of unauthorized, illegally copied material is continually being realized and developed. • The growing number of communication protocols, services and computing environments offers almost unlimited opportunities for displaying a whole spectrum of steganographic methods.