SlideShare a Scribd company logo
1 of 24
1 
se Technical semmiinnaarr pprreesseennttaattiioonn 
oonn SStteeggaannooggrraapphhyy 
BByy,, 
BB..JJoosshhppiinn BBaallaa 
1100888811AA00441144 
UUnnddeerr tthhee ssuuppeerrvviissiioonn ooff 
MMrr..SS..SSrriinniivvaass 
AAssssiissttaanntt PPrrooffeessssoorr((SSrr..))
2 
SStteeggaannooggrraapphhyy 
One of the most important property of (digital) information is that it is in 
principle very easy to produce and distribute unlimited number of its copies. 
This might undermine the music, film, book and software industries and 
therefore it brings a variety of important problems concerning the protection of 
the intellectual and production rights that badly need to be solved. 
The fact that an unlimited number of perfect copies of text, audio and video 
data can be illegally produced and distributed requires to study ways of 
embedding copyright information and serial numbers in audio and video data. 
Steganography and watermarking bring a variety of very important techniques 
how to hide important information in an undetectable and/or irremovable way in 
audio and video data. 
Steganography and watermarking are main parts of the fast developing area of 
information hiding.
3
4 
INFORMATION HHIIDDIINNGG SSUUBBDDIISSCCIIPPLLIINNEESS 
CCoovveerrtt cchhaannnneellss, especially in operating systems and networks. They are 
communication paths that were neither designed nor intended to transfer 
information at all, but are used that way. 
These channels are typically used by untrustworthy programs to leak 
information to their owner while performing service for another program. 
AAnnoonnyymmiittyy is finding ways to hide meta content of the message (for example 
the sender and/or the recipients of the message). Anonymity is need when 
making on-line voting or to hide access to some web pages, or to hide sender. 
SStteeggaannooggrraapphhyy - covered writing – from Greek stegan-x   graf-ein 
WWaatteerrmmaarrkkiinngg - visible digital watermarks and also imperceptible (invisible, 
transparent,....) watermarks.
Covert channels are communication paths that were neither designed 
nor intended to transfer information at all, but are used that way, 
using entities that were not intended for such use. 
Such channels often occur in multilevel operating systems in which 
security based on availability of several levels of security. 
Example. Let A be a process capable to write on a harddisk and B be 
a process of a lower security level that cannot read data from that 
harddisk, but has an access to the corresponding file allocation table. 
All that creates a potential cover channel in which process A can 
transmit information to B by writing this information using names of 
files and their size on harddisk what can the process B read using 
the file allocation table to which B has an access. 
5 
COVERT CHANNELS
6 
STEGANOGRAPHY vveerrssuuss WWAATTEERRMMAARRKKIINNGG 
Differences between steganography and watermarking are both subtle and 
essential. 
The main goal of steganography is to hide a message m in some audio or 
video (cover) data d, to obtain new data d', practically indistinguishable from 
d, by people, in such a way that an eavesdropper cannot detect the presence 
of m in d'. 
The main goal of watermarking is to hide a message m in some audio or 
video (cover) data d, to obtain new data d', practically indistinguishable from 
d, by people, in such a way that an eavesdropper cannot remove or replace 
m in d'. 
It is also often said that the goal of steganography is to hide a message in 
one-to-one communications and the goal of watermarking is to hide 
message in one-to-many communications. 
Shortly, one can say that cryptography is about protecting the content of 
messages, steganography is about concealing its very existence. 
Steganography methods usually do not need to provide strong security against 
removing or modification of the hidden message. Watermarking methods need 
to to be very robust to attempts to remove or modify a hidden message.
7
8 
APPLICATIONS ooff SSTTEEGGAANNOOGGRRAAPPHHYY 
• To have secure secret communications where cryptographic 
encryption methods are not available. 
• To have secure secret communication where strong cryptography is 
impossible. 
• In some cases, for example in military applications, even the 
knowledge that two parties communicate can be of large importance. 
• The health care, and especially medical imaging systems, may very 
much benefit from information hiding techniques.
9 
Steganography vveerrssuuss CCrryyppttooggrraapphhyy 
The purpose of both is to provide secret communication. 
Cryptography hides the contents of the message from an attacker, but not the 
existence of the message. 
Steganography/watermarking even hide the very existence of the message in the 
communicating data. 
Consequently, the concept of breaking the system is different for 
cryptosystems and stegosystems (watermarking systems). 
• A cryptographic system is broken when the attacker can read the secrete 
message. 
• Breaking of a steganographic/watermarking system has two stages: 
- The attacker can detect that steganography/watermarking has been used; 
- The attacker is able to read, modify or remove the hidden message. 
A steganography/watermarking system is considered as insecure already if the 
detection of steganography/watermarking is possible.
10 
FIRST SSTTEEGGAANNOOGGRRAAPPHHIICC MMEETTHHOODDSS 
• Ancient Chinese wrote messages on fine silk, which was then crunched into a 
tiny ball and covered in wax. The messenger then swallowed the ball of wax. 
• In the sixteenth century, the Italian scientist Giovanni Porta described how to 
conceal a message within a hard-boiled egg by making an ink from a mixture of 
one ounce of alum and a pint of vinegar, and then using ink to write on the shell. 
The ink penetrated the porous shell, and left the message on the surface of the 
hardened egg albumen, which could be read only when the shell was removed. 
• Special “inks” were important steganographic tools even during Second World 
War. 
• During Second World War a technique was developed to shrink photographically 
a page of text into a dot less than one millimeter in diameter, and then hide this 
microdot in an apparently innocuous letter. (The first microdot has been spotted by 
FBI in 1941.)
11 
GENERAL SSTTEEGGAANNOOGGRRAAPPHHIICC MMOODDEELL 
A general model of a cryptographic system has already emerged. 
Figure 1: Model of steganographic systems 
Steganographic algorithms are in general based on replacing noise component of a 
digital object with a to-be-hidden message. 
Kirchoffov principle holds also for steganography. Security of the system should not 
be based on hiding embedding algorithm, but on hiding the key.
12 
BASIC CCOONNCCEEPPTTSS ooff SSTTEEGGOOSSYYSSTTEEMMSS 
• CCoovveerrtteexxtt ((ccoovveerr--ddaattaa -- ccoovveerr--oobbjjeecctt)) is an original unaltered message. 
• EEmmbbeeddddiinngg pprroocceessss (ukryvaci process) in which the sender, Alice, tries to hide a 
message by embedding it into a (randomly chosen) cover-text, usually using a key, 
to obtain a stego-text (stego-data or stego-object). The embedding process can be 
described by the mapping E:C ´ K ´ M ® C, where C is the set of possible cover-and 
stego-texts, K is the set of keys and M is the set of messages. 
• SStteeggootteexxtt ((sstteeggoo--ddaattaa -- sstteeggoo--oobbjjeecctt)) 
• RReeccoovveerriinngg pprroocceessss (or extraction process – odkryvaci process) in which the 
receiver, Bob, tries to get, using the key only, not the covertext, the hidden 
message in the stegotext. 
The recovery process can be seen as mapping D: C ´ K ® C. 
• SSeeccuurriittyy rreeqquuiirreemmeenntt is that a third person watching such a communication should 
not be able to find out whether the sender has been active, and when, in the 
sense that he really embedded a message in the cover -text. In other words, 
stegotexts should be indistinguishable from covertexts.
13 
PUBLIC-KEY STEGANOGRAPHY 
Similarly as in case of the public-key cryptography, two keys are used: 
a public-key E for embedding and a private-key D for recovering. 
It is often useful to combine such a public-key stegosystem with a 
public-key cryptosystem. 
For example, in case Alice wants to send a message m to Bob, 
encode first m using Bob’s public key eB, then make embedding of 
eB(m) using process E into a cover and sends the resulting stegotext 
to Bob, who recovers eB(m) using D and then decrypts it, using 
decryption function dB.
14
15 
LINGUISTIC SSTTEEGGAANNOOGGRRAAPPHHYY 
A variety steganography techniques allowed to hide messages in formatted texts. 
	 · Acrostic. A message is concealed into certain letters of the text, for example 
into the first letters of some words. 
Tables have been produced, the first one by Trithentius, called Ave Maria, how 
to replace plaintext letters by words. 
	 · An improvement of the previous method is to distribute plaintext letters 
randomly in the cover-text and then use a mask to read it. 
	 · The presence of errors or stylistic features at predetermined points in the cover 
data is another way to select the location of the embedded information.
16 
ACTIVE aanndd MMAALLIICCIIOOUUSS AATTTTAACCKKSS 
At the design of stegosystems special attention has to be paid to the 
presence of active and malicious attackers. 
• Active attackers can change cover during the communication 
process. 
• An attacker is malicious if he forges messages or initiates a 
steganography protocol under the name of one communicating party. 
In the presence of a malicious attacker, it is not enough that 
stegosystem is robust. 
If the embedding method does not depend on a key shared by the 
sender and receiver, then an attacker can forge messages, since the 
recipient is not able to verify sender's identity.
17 
SECURITY OF STEGOSYSTEMS 
DDeeffiinniittiioonn A steganographic algorithm is called secure if 
• Messages are hidden using a public algorithm and a secret key. The 
secret key must identify the sender uniquely. 
• Only the holder of the secret key can detect, extract and prove the 
existence of the hidden message. (Nobody else should be able to 
find any statistical evidence of a message's existence.) 
• Even if an enemy gets the contents of one hidden message, he 
should have no chance of detecting others. 
• It is computationally infeasible to detect hidden messages.
18 
SSTTEEGGOO -- AATTTTAACCKKSS 
SStteeggoo--oonnllyy aattttaacckk Only the stego-object is available for stegoanalysis. 
KKnnoowwnn ccoovveerr aattttaacckk The original cover-object and stego-object are both 
available. 
KKnnoowwnn mmeessssaaggee aattttaacckk Sometimes the hidden message may become known 
to the stegoanalyser. Analyzing the stego-object for patterns that correspond to 
the hidden message may be beneficial for future attacks against that system. 
(Even with the message, this may be very difficult and may even be considered 
equivalent to the stego-analysis.) 
CChhoosseenn sstteeggoo aattttaacckk The stegoanalysis generates a stego-object from some 
steganography tool or algorithm from a chosen message. The goal in this 
attack is to determine corresponding patterns in the stego-object that may point 
to the use of specific steganography tools or alorithms. 
KKnnoowwnn sstteeggoo aattttaacckk The steganography algorithm is known and both the 
original and stego-objects are available.
19 
BASIC STEGANOGRAPHIC TTEECCHHNNIIQQUUEESS 
SSuubbssttiittuuttiioonn tteecchhnniiqquueess substitute redundant part of the cover-object with a 
secret message. 
TTrraannssffoorrmm ddoommaaiinn tteecchhnniiqquueess embed secret message in a transform space of 
the signal (e.g. in the frequency domain). 
SSpprreeaadd ssppeeccttrruumm tteecchhnniiqquueess embed secret messages adopting ideas from 
spread spectrum communications. 
SSttaattiissttiiccaall tteecchhnniiqquueess embed messages by changing some statistical 
properties of the cover-objects and use hypothesis-testing methods in the 
extraction process. 
DDiissttoorrttiioonn tteecchhnniiqquueess store secret messages by signal distortion and measure 
the deviation from the original cover in the extraction step. 
CCoovveerr ggeenneerraattiioonn tteecchhnniiqquueess do not embed messages in randomly chosen 
cover-objects, but create covers that fit a message that need to be hidden.
BASIC SUBSTITUTION TTEECCHHNNIIQQUUEESS 
• LSB substitution - the LSB of an i-th binary block cki is replaced by the 
bit mi of the secret message. 
The methods differ by techniques how to determine ki for a given i. 
For example, ki+1 = ki + ri, where ri is a sequence of numbers generated 
by a pseudo-random generators. 
• Substitution into parity bits of blocks. If parity bit of the block cki is mi, 
then the block cki is not changed; otherwise one of its bits is changed. 
• Substitution in binary images. If image ci has more (less) black pixels 
than white pixels and mi = 1 (mi = 0), then ci is not changed; otherwise 
the portion of black and white pixels is changed (by making changes at 
those pixels that are neighbors of pixels of the opposite color). 
• Substitution in unused or reserved space in computer systems. 
20
21 
IINNVVIISSIIBBLLEE CCOOMMMMUUNNIICCAATTIIOONNSS 
We describe some important cases of information hiding. 
SSuubblliimmiinnaall cchhaannnneellss.. We have seen how to use a digital signature 
scheme to establish a subliminal cannel for communication. 
CCoovveerrtt cchhaannnneellss iinn ooppeerraattiinngg ssyysstteemmss.. Covert channels can arise 
when one part of the system, operating at a specific security level, is 
able to supply a service to another system part with a possibly different 
security level. 
VViiddeeoo ccoommmmuunniiccaattiinngg ssyysstteemmss.. Steganography can be used to embed 
secret messages into a video stream recorded by videoconferencing 
systems. 
DDaattaa hhiiddiinngg iinn eexxeeccuuttaabbllee ffiilleess.. Executable files contain a lot of 
redundancies in the way independent instructions are scheduled or an 
instruction subset is chosen to solve a specific problem. This can be 
utilized to hide messages.
22 
SECRET SHARING bbyy SSEECCRREETT HHIIDDIINNGG 
A simple technique has been developed, by Naor and Shamir, that 
allows for a given n and t < n to hide any secret (image) message m in 
images on transparencies in such away that each of n parties receives 
one transparency and 
· no t -1 parties are able to obtain the message m from the 
transparencies they have. 
· any t of the parties can easily get (read or see) the message m 
just by stacking their transparencies together and aligning them 
carefully.
23 
SSEECCRREETT SSHHAARRIINNGG bbyy SSEECCRREETT HHIIDDIINNGG
References 
• [1]Eric Cole, Hiding in Plain Text, Wiley Publishing,Inc. :2003 
• [2] http://www.jjtc.com/ihws98/jjgmu.html 
• [3]Natarajan Meghanathan and Lopamudra Nayak,Steganalysis 
Algorithms for Detecting the Hidden Information in Image, Audio and 
Video Cover Media, Jackson State University, 1400 Lynch St., 
Jackson, USA. 
24

More Related Content

What's hot

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117Anas Pa
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganographyVaibhav Khanna
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 

What's hot (20)

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography document
Steganography documentSteganography document
Steganography document
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
Steganography Steganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117
 
Steganography
SteganographySteganography
Steganography
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
 
Steganography
SteganographySteganography
Steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Similar to art of Steganography

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarkingamitchauhan1990
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
B03208016
B03208016B03208016
B03208016inventy
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Steganography Based on Bacterial Foraging Optimization
Steganography Based on Bacterial Foraging OptimizationSteganography Based on Bacterial Foraging Optimization
Steganography Based on Bacterial Foraging Optimizationijsrd.com
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
A Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesA Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesAudrey Britton
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 

Similar to art of Steganography (20)

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
Steganography Steganography
Steganography
 
steganography
steganographysteganography
steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
B03208016
B03208016B03208016
B03208016
 
Steganography
SteganographySteganography
Steganography
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Finalmarch4 th
Finalmarch4 thFinalmarch4 th
Finalmarch4 th
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Steganography Based on Bacterial Foraging Optimization
Steganography Based on Bacterial Foraging OptimizationSteganography Based on Bacterial Foraging Optimization
Steganography Based on Bacterial Foraging Optimization
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
A Review Paper On Steganography Techniques
A Review Paper On Steganography TechniquesA Review Paper On Steganography Techniques
A Review Paper On Steganography Techniques
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 

More from Joshpin Bala.B

Role of research in advancement of science
Role of research in advancement of scienceRole of research in advancement of science
Role of research in advancement of scienceJoshpin Bala.B
 
Presentation on electronics industry
Presentation  on electronics industryPresentation  on electronics industry
Presentation on electronics industryJoshpin Bala.B
 
Britannia's digital marketing
Britannia's digital marketingBritannia's digital marketing
Britannia's digital marketingJoshpin Bala.B
 
Testimonial advertising
Testimonial advertisingTestimonial advertising
Testimonial advertisingJoshpin Bala.B
 
Incredible India campaign
Incredible India campaignIncredible India campaign
Incredible India campaignJoshpin Bala.B
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring systemJoshpin Bala.B
 

More from Joshpin Bala.B (14)

Illustrationss
IllustrationssIllustrationss
Illustrationss
 
Role of research in advancement of science
Role of research in advancement of scienceRole of research in advancement of science
Role of research in advancement of science
 
Inbound marketing
Inbound marketingInbound marketing
Inbound marketing
 
CRM at capital one
CRM at capital one CRM at capital one
CRM at capital one
 
Presentation on electronics industry
Presentation  on electronics industryPresentation  on electronics industry
Presentation on electronics industry
 
Britannia's digital marketing
Britannia's digital marketingBritannia's digital marketing
Britannia's digital marketing
 
Balanced scorecard
Balanced scorecardBalanced scorecard
Balanced scorecard
 
Testimonial advertising
Testimonial advertisingTestimonial advertising
Testimonial advertising
 
telephone etiquettes
telephone etiquettestelephone etiquettes
telephone etiquettes
 
Incredible India campaign
Incredible India campaignIncredible India campaign
Incredible India campaign
 
Privatisation me
Privatisation mePrivatisation me
Privatisation me
 
AD-MAD show
AD-MAD show AD-MAD show
AD-MAD show
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring system
 
Marketing case study
Marketing case study Marketing case study
Marketing case study
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

art of Steganography

  • 1. 1 se Technical semmiinnaarr pprreesseennttaattiioonn oonn SStteeggaannooggrraapphhyy BByy,, BB..JJoosshhppiinn BBaallaa 1100888811AA00441144 UUnnddeerr tthhee ssuuppeerrvviissiioonn ooff MMrr..SS..SSrriinniivvaass AAssssiissttaanntt PPrrooffeessssoorr((SSrr..))
  • 2. 2 SStteeggaannooggrraapphhyy One of the most important property of (digital) information is that it is in principle very easy to produce and distribute unlimited number of its copies. This might undermine the music, film, book and software industries and therefore it brings a variety of important problems concerning the protection of the intellectual and production rights that badly need to be solved. The fact that an unlimited number of perfect copies of text, audio and video data can be illegally produced and distributed requires to study ways of embedding copyright information and serial numbers in audio and video data. Steganography and watermarking bring a variety of very important techniques how to hide important information in an undetectable and/or irremovable way in audio and video data. Steganography and watermarking are main parts of the fast developing area of information hiding.
  • 3. 3
  • 4. 4 INFORMATION HHIIDDIINNGG SSUUBBDDIISSCCIIPPLLIINNEESS CCoovveerrtt cchhaannnneellss, especially in operating systems and networks. They are communication paths that were neither designed nor intended to transfer information at all, but are used that way. These channels are typically used by untrustworthy programs to leak information to their owner while performing service for another program. AAnnoonnyymmiittyy is finding ways to hide meta content of the message (for example the sender and/or the recipients of the message). Anonymity is need when making on-line voting or to hide access to some web pages, or to hide sender. SStteeggaannooggrraapphhyy - covered writing – from Greek stegan-x graf-ein WWaatteerrmmaarrkkiinngg - visible digital watermarks and also imperceptible (invisible, transparent,....) watermarks.
  • 5. Covert channels are communication paths that were neither designed nor intended to transfer information at all, but are used that way, using entities that were not intended for such use. Such channels often occur in multilevel operating systems in which security based on availability of several levels of security. Example. Let A be a process capable to write on a harddisk and B be a process of a lower security level that cannot read data from that harddisk, but has an access to the corresponding file allocation table. All that creates a potential cover channel in which process A can transmit information to B by writing this information using names of files and their size on harddisk what can the process B read using the file allocation table to which B has an access. 5 COVERT CHANNELS
  • 6. 6 STEGANOGRAPHY vveerrssuuss WWAATTEERRMMAARRKKIINNGG Differences between steganography and watermarking are both subtle and essential. The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot detect the presence of m in d'. The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot remove or replace m in d'. It is also often said that the goal of steganography is to hide a message in one-to-one communications and the goal of watermarking is to hide message in one-to-many communications. Shortly, one can say that cryptography is about protecting the content of messages, steganography is about concealing its very existence. Steganography methods usually do not need to provide strong security against removing or modification of the hidden message. Watermarking methods need to to be very robust to attempts to remove or modify a hidden message.
  • 7. 7
  • 8. 8 APPLICATIONS ooff SSTTEEGGAANNOOGGRRAAPPHHYY • To have secure secret communications where cryptographic encryption methods are not available. • To have secure secret communication where strong cryptography is impossible. • In some cases, for example in military applications, even the knowledge that two parties communicate can be of large importance. • The health care, and especially medical imaging systems, may very much benefit from information hiding techniques.
  • 9. 9 Steganography vveerrssuuss CCrryyppttooggrraapphhyy The purpose of both is to provide secret communication. Cryptography hides the contents of the message from an attacker, but not the existence of the message. Steganography/watermarking even hide the very existence of the message in the communicating data. Consequently, the concept of breaking the system is different for cryptosystems and stegosystems (watermarking systems). • A cryptographic system is broken when the attacker can read the secrete message. • Breaking of a steganographic/watermarking system has two stages: - The attacker can detect that steganography/watermarking has been used; - The attacker is able to read, modify or remove the hidden message. A steganography/watermarking system is considered as insecure already if the detection of steganography/watermarking is possible.
  • 10. 10 FIRST SSTTEEGGAANNOOGGRRAAPPHHIICC MMEETTHHOODDSS • Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and covered in wax. The messenger then swallowed the ball of wax. • In the sixteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using ink to write on the shell. The ink penetrated the porous shell, and left the message on the surface of the hardened egg albumen, which could be read only when the shell was removed. • Special “inks” were important steganographic tools even during Second World War. • During Second World War a technique was developed to shrink photographically a page of text into a dot less than one millimeter in diameter, and then hide this microdot in an apparently innocuous letter. (The first microdot has been spotted by FBI in 1941.)
  • 11. 11 GENERAL SSTTEEGGAANNOOGGRRAAPPHHIICC MMOODDEELL A general model of a cryptographic system has already emerged. Figure 1: Model of steganographic systems Steganographic algorithms are in general based on replacing noise component of a digital object with a to-be-hidden message. Kirchoffov principle holds also for steganography. Security of the system should not be based on hiding embedding algorithm, but on hiding the key.
  • 12. 12 BASIC CCOONNCCEEPPTTSS ooff SSTTEEGGOOSSYYSSTTEEMMSS • CCoovveerrtteexxtt ((ccoovveerr--ddaattaa -- ccoovveerr--oobbjjeecctt)) is an original unaltered message. • EEmmbbeeddddiinngg pprroocceessss (ukryvaci process) in which the sender, Alice, tries to hide a message by embedding it into a (randomly chosen) cover-text, usually using a key, to obtain a stego-text (stego-data or stego-object). The embedding process can be described by the mapping E:C ´ K ´ M ® C, where C is the set of possible cover-and stego-texts, K is the set of keys and M is the set of messages. • SStteeggootteexxtt ((sstteeggoo--ddaattaa -- sstteeggoo--oobbjjeecctt)) • RReeccoovveerriinngg pprroocceessss (or extraction process – odkryvaci process) in which the receiver, Bob, tries to get, using the key only, not the covertext, the hidden message in the stegotext. The recovery process can be seen as mapping D: C ´ K ® C. • SSeeccuurriittyy rreeqquuiirreemmeenntt is that a third person watching such a communication should not be able to find out whether the sender has been active, and when, in the sense that he really embedded a message in the cover -text. In other words, stegotexts should be indistinguishable from covertexts.
  • 13. 13 PUBLIC-KEY STEGANOGRAPHY Similarly as in case of the public-key cryptography, two keys are used: a public-key E for embedding and a private-key D for recovering. It is often useful to combine such a public-key stegosystem with a public-key cryptosystem. For example, in case Alice wants to send a message m to Bob, encode first m using Bob’s public key eB, then make embedding of eB(m) using process E into a cover and sends the resulting stegotext to Bob, who recovers eB(m) using D and then decrypts it, using decryption function dB.
  • 14. 14
  • 15. 15 LINGUISTIC SSTTEEGGAANNOOGGRRAAPPHHYY A variety steganography techniques allowed to hide messages in formatted texts. · Acrostic. A message is concealed into certain letters of the text, for example into the first letters of some words. Tables have been produced, the first one by Trithentius, called Ave Maria, how to replace plaintext letters by words. · An improvement of the previous method is to distribute plaintext letters randomly in the cover-text and then use a mask to read it. · The presence of errors or stylistic features at predetermined points in the cover data is another way to select the location of the embedded information.
  • 16. 16 ACTIVE aanndd MMAALLIICCIIOOUUSS AATTTTAACCKKSS At the design of stegosystems special attention has to be paid to the presence of active and malicious attackers. • Active attackers can change cover during the communication process. • An attacker is malicious if he forges messages or initiates a steganography protocol under the name of one communicating party. In the presence of a malicious attacker, it is not enough that stegosystem is robust. If the embedding method does not depend on a key shared by the sender and receiver, then an attacker can forge messages, since the recipient is not able to verify sender's identity.
  • 17. 17 SECURITY OF STEGOSYSTEMS DDeeffiinniittiioonn A steganographic algorithm is called secure if • Messages are hidden using a public algorithm and a secret key. The secret key must identify the sender uniquely. • Only the holder of the secret key can detect, extract and prove the existence of the hidden message. (Nobody else should be able to find any statistical evidence of a message's existence.) • Even if an enemy gets the contents of one hidden message, he should have no chance of detecting others. • It is computationally infeasible to detect hidden messages.
  • 18. 18 SSTTEEGGOO -- AATTTTAACCKKSS SStteeggoo--oonnllyy aattttaacckk Only the stego-object is available for stegoanalysis. KKnnoowwnn ccoovveerr aattttaacckk The original cover-object and stego-object are both available. KKnnoowwnn mmeessssaaggee aattttaacckk Sometimes the hidden message may become known to the stegoanalyser. Analyzing the stego-object for patterns that correspond to the hidden message may be beneficial for future attacks against that system. (Even with the message, this may be very difficult and may even be considered equivalent to the stego-analysis.) CChhoosseenn sstteeggoo aattttaacckk The stegoanalysis generates a stego-object from some steganography tool or algorithm from a chosen message. The goal in this attack is to determine corresponding patterns in the stego-object that may point to the use of specific steganography tools or alorithms. KKnnoowwnn sstteeggoo aattttaacckk The steganography algorithm is known and both the original and stego-objects are available.
  • 19. 19 BASIC STEGANOGRAPHIC TTEECCHHNNIIQQUUEESS SSuubbssttiittuuttiioonn tteecchhnniiqquueess substitute redundant part of the cover-object with a secret message. TTrraannssffoorrmm ddoommaaiinn tteecchhnniiqquueess embed secret message in a transform space of the signal (e.g. in the frequency domain). SSpprreeaadd ssppeeccttrruumm tteecchhnniiqquueess embed secret messages adopting ideas from spread spectrum communications. SSttaattiissttiiccaall tteecchhnniiqquueess embed messages by changing some statistical properties of the cover-objects and use hypothesis-testing methods in the extraction process. DDiissttoorrttiioonn tteecchhnniiqquueess store secret messages by signal distortion and measure the deviation from the original cover in the extraction step. CCoovveerr ggeenneerraattiioonn tteecchhnniiqquueess do not embed messages in randomly chosen cover-objects, but create covers that fit a message that need to be hidden.
  • 20. BASIC SUBSTITUTION TTEECCHHNNIIQQUUEESS • LSB substitution - the LSB of an i-th binary block cki is replaced by the bit mi of the secret message. The methods differ by techniques how to determine ki for a given i. For example, ki+1 = ki + ri, where ri is a sequence of numbers generated by a pseudo-random generators. • Substitution into parity bits of blocks. If parity bit of the block cki is mi, then the block cki is not changed; otherwise one of its bits is changed. • Substitution in binary images. If image ci has more (less) black pixels than white pixels and mi = 1 (mi = 0), then ci is not changed; otherwise the portion of black and white pixels is changed (by making changes at those pixels that are neighbors of pixels of the opposite color). • Substitution in unused or reserved space in computer systems. 20
  • 21. 21 IINNVVIISSIIBBLLEE CCOOMMMMUUNNIICCAATTIIOONNSS We describe some important cases of information hiding. SSuubblliimmiinnaall cchhaannnneellss.. We have seen how to use a digital signature scheme to establish a subliminal cannel for communication. CCoovveerrtt cchhaannnneellss iinn ooppeerraattiinngg ssyysstteemmss.. Covert channels can arise when one part of the system, operating at a specific security level, is able to supply a service to another system part with a possibly different security level. VViiddeeoo ccoommmmuunniiccaattiinngg ssyysstteemmss.. Steganography can be used to embed secret messages into a video stream recorded by videoconferencing systems. DDaattaa hhiiddiinngg iinn eexxeeccuuttaabbllee ffiilleess.. Executable files contain a lot of redundancies in the way independent instructions are scheduled or an instruction subset is chosen to solve a specific problem. This can be utilized to hide messages.
  • 22. 22 SECRET SHARING bbyy SSEECCRREETT HHIIDDIINNGG A simple technique has been developed, by Naor and Shamir, that allows for a given n and t < n to hide any secret (image) message m in images on transparencies in such away that each of n parties receives one transparency and · no t -1 parties are able to obtain the message m from the transparencies they have. · any t of the parties can easily get (read or see) the message m just by stacking their transparencies together and aligning them carefully.
  • 23. 23 SSEECCRREETT SSHHAARRIINNGG bbyy SSEECCRREETT HHIIDDIINNGG
  • 24. References • [1]Eric Cole, Hiding in Plain Text, Wiley Publishing,Inc. :2003 • [2] http://www.jjtc.com/ihws98/jjgmu.html • [3]Natarajan Meghanathan and Lopamudra Nayak,Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media, Jackson State University, 1400 Lynch St., Jackson, USA. 24