Your SlideShare is downloading. ×
  • Like
Steganography and Steganalysis
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Steganography and Steganalysis



Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • good data
    Are you sure you want to
    Your message goes here
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Who am I ?• My name• My Background• My major
  • 2. SteganographyANDStegnalysisByName: zaid alfawzanCourse: Lewis UniversityUniversity: Capstone
  • 3. Encryption and Decryption• What is Encryption• What is Decryption
  • 4. Encryption• What is Encryption ?
  • 5. Decryption• What is Decryption
  • 6. • Steganography and Steganalysis
  • 7. Proposed research topic Steganography Data Protection & Encryptionthrough Information Security.we are going to study detail observation of Steganography technologyand Steganalysis, definition of steganography technique, definition ofdata and information detection (Steganalysis)Introduction
  • 8. The History of Steganography• Steganography in the past
  • 9. The History of Steganography• Steganography in the current time
  • 10. The idea of Steganography
  • 11. Steganography and Steganalysis• 5
  • 12. SteganographySteganography:Is a technique to hide the written data.Steganography word is a Greek word
  • 13. Steganalysisused to detect and identify the hidden data.Use special algorithms to identify compressed information.
  • 14. Steganalysis Approaches• A) Statistical Approach• B) Structural Approach• C) Visual Approach
  • 15. Steganalysis ApproachesStatistical Approachsome mathematical formulas are applied.
  • 16. Structural ApproachBy steganography the structure of data can be changeand embedded attribute of object.
  • 17. Visual Approach• In this method Steganalysis visuallyanalyze images and find thedifference.
  • 18. Steganography vs. Cryptography• Steganography• Cryptography
  • 19. Cryptography• Cryptography• data encryption cannot be identify and it is protected in steganography.
  • 20. Main FocusMain focus of our research Steganography and Steganalysis, as definein the introduction.Steganography is scientific technique to hide and protect data andinformation from unauthorized user and preforms specific modificationson the object to protect and hide.Research is divided into two parts; we can say start and end in startingportion object or file is going to hide and ending portion the hidden file isgoing to reshape into its original form and define as:
  • 21. First Part: What is Steganography? How Steganography work? What is the methodology of Steganography? How algorithms use to perform Steganography? During Steganography process which elements areinvolve?Second Part: What is Steganalysis? How Steganalysis work? What is the methodology of Steganalysis? How algorithms use to perform Steganalysis? During Steganalysis process which elements areinvolve?
  • 22. Images SteganographyClassification of Images Steganography involves the following Communication Algorithms Insertion Technique Least Significant Bit (LSB) Filtering & Masking
  • 23. Communication Algorithms:Data and information can embedded into undetected coverThere are three common communication techniques1. Discrete wavelet transformation technique (DWT)2. Fast Fourier transformation technique (FFT)3. Discrete cosine transformation technique (DCT)
  • 24. Discrete wavelet transformation technique (DWT)• Hidden secret image S inside coverC, by using 2 different keys.
  • 25. Fast Fourier transformation technique (FFT)• It a signal process• Used to analysis part of spectrum
  • 26. Discrete cosine transformation technique (DCT)• Convert a signal into elementary.• Used in image compression
  • 27. Insertion Technique Least Significant Bit (LSB)• LSB used for transmission of data.• digital signal processing images.• Images are of two type 8 bit and 24 bit. In 24 bit image 3 bit data embedded. In 8 bit image 1 bit data embedded.
  • 28. Filtering & Masking• Many signals are mask and the first signal unmask,• used in watermarking method.
  • 29. Type of Steganography• A) Fragile• B) Robust
  • 30. Fragile• Embedded the data in file
  • 31. Robust• Hard to embedded the data in file
  • 32. Categories of Steganography• A) Statistical aware steganography• B) Model based steganography
  • 33. Categories of Steganography• A) Model based steganographyAchieve the highest embedding
  • 34. Categories of Steganography• B) Statistical aware steganographyStegnalysis used to detect steganography
  • 35. Categories of Stegnalyisi• A) Passive• B) Active• C)
  • 36. Categories of Stegnalyisi• A) passive• Detect the absence of secret image
  • 37. Categories of Stegnalyisi• B) Active• Extract the propraties
  • 38. Categories of Stegnalyisi• C)
  • 39. LSB• What is LSB?Convert image file from JPEG to GIFor BMP
  • 40. Images of Stenganlyiss• Will be divided into two categories• A) Generic• B) specific
  • 41. Images of Stenganlyiss• A) Generic:used for steganography
  • 42. Images of Stenganlyiss• B) specific• Used for digital images
  • 43. • Water marketing , hidden images• Build content authentication
  • 44. Technical In Steganography and stegnalysis• Detecting Steganography content on the Internet.• Survey of Data mining Technique for stengalysis .• Using Image quality Metrics in stegnalysis• Using Image-adaption technique• The investigation of hidden data/ info
  • 45. Detecting Steganography content on theInternet.• Hidden information over the internet.
  • 46. The investigation of hidden data/information• Used a software to identify the hiddeninformation
  • 47. Survey of Data mining Techniquefor stengalysis• Provide a powerful tools to detectinformation
  • 48. Using Image-adaption technique• It is secure the data during thetransfer
  • 49. Using Image quality Metrics in stegnalysis• It is devolved algorithm
  • 50. Experiment & observationsThere are number of research paper demonstrated on steganography indifferent ways but our research focuses on core issue of our researchimage steganography and one technique with LSB.Data collection for steganography described different assumptions andparities related to our topic (image steganography). Water marking andleast significant bit calculated that for image steganography these twotechniques are effective and used as common. In water marking if weadd one image with another image the output must be combination ofthese images, it’s very simple phenomena and often observed.
  • 51. Experiment & observationsExample-1Most significant bit of image is used for hidden the image in leastsignificant bit method and steganography.
  • 52. Example-2Two images are stored in memory locations one image worked as objectand other is host image.Host image bits are selected for hide the object image as shown below.Host image pixels 10110001Secret image pixels0011111And the output image pixels 10110011Experiment & observations
  • 53. Experiment & observationsOne issue explored during experiment by comparing images it is difficultto prevent attacks.As 16 bit audio signals areAudio bit Audio in Binary Audio with encodeoutput1001 1000 0011 1100 0 1001 1000 0011 11001101 1011 0011 1000 1 1101 1011 0011 10011011 1100 0011 1101 1 1011 1100 0011 11011011 1111 0011 1100 0 1011 1111 0011 11001011 1111 0011 1100 0 1011 1010 0111 11101111 1000 0011 1100 1 1111 1000 0011 11011101 1100 0111 1000 0 1101 1100 0111 10001000 1000 0001 1111 1 1000 1000 0001 1111
  • 54. Experiment & observationsIn one 8 bit/channel image size is 1000x1400 pixels and compressed byuse Jseg, JPEG image file format used DCT (Discrete cosine transform )to hide information of image size 8x8 pixel image block into coefficientsof 64 (Discrete cosine transform) and least significant bits of DCT nolonger used inside which the hidden information embedded.Statistical analysis or test introduced if actual image has changed (alter)in its original form statistical characteristics accepted.