SlideShare a Scribd company logo
1 of 16
STEGANOGRAPHY
ā€œThe Art Of Hiding Dataā€
Department of Computer Science & Engg.
Gandhi Institute for Technological Advancement(GITA), Bhubaneswar.
OVERVIEW
ā€¢ What is Steganography?
ā€¢ History
ā€¢ Steganography vs Cryptography
ā€¢ Types of Steganography
ā€¢ Basic Steganography Model
ā€¢ Techniques for using Image Steganography
ā€¢ LSB Algorithm
ā€¢ Steganography And Cryptography
ā€¢ Application
ā€¢ Conclusion 2
ā€¢ The word steganography is of Greek origin and means "concealed writing" from the Greek
words steganos meaning "covered or protected", and graphein meaning "writing".
ā€¢ Steganography is the art and science of writing hidden messages in such a way that no one, apart
from the sender and intended recipient, suspects the existence of the message.
ā€¢ The main objective of Steganography is mainly concerned with the protection of contents of the
hidden information.
What is Steganography
3
ā€¢ The first recorded uses of steganography can be traced back to 440 BC where wax tablets were
used to write message.
ā€¢ Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and
covered in wax.
ā€¢ During Second World War a technique was developed to shrink photographically a page of text
into a dot less than one millimeter in diameter
History Of Steganography
4
Steganography VS Cryptography
STEGANOGRAPHY CRYPTOGRAPHY
Steganography prevents discovery of the
very existence of communication
Encryption prevents an unauthorized
party from discovering the contents of a
communication
Technology still being develop for certain
formats
Most of algorithm known by all
Once detected message is known Strong current algorithm are resistant to
attacks ,larger expensive computing
power is required for cracking
Steganography does not alter the structure
of the secret message
Cryptography alter the structure of the
secret message
5
ā€¢ Text Steganography : Text steganography can be achieved by altering the text formatting, or by
altering certain characteristics of textual elements
ā€¢ Image Steganography : Images are used as the message carriers. Images are the most popular
cover objects used for steganography.
ā€¢ Audio Steganography : In audio steganography, secret message is embedded into digitized audio
signal which result slight altering of binary sequence of the corresponding audio file.
Types Of Steganography
6
Basic Steganography Model
Secret
message
Cover
Stegosystem
encoder
Key
Stegosystem
decoder
Stego object
Secret
Message
Communication
Channel
Stego Object
7
ā€¢ By using LSB(Least Significant Bit algorithm)
ā€¢ Masking and Filtering
ā€¢ Algorithms and Transformation
Techniques for using Image Steganography
8
ā€¢ Least significant bit (LSB) insertion is a common, simple approach to embedding information in
a cover image.
ā€¢ The least significant bit of some or all of the bytes inside an image is changed to a bit of the
secret message.
ā€¢ When using a 24-bit image, a bit of each of the red, green and blue colour components can be
used, since they are each represented by a byte.
ā€¢ In its simplest form, LSB makes use of BMP images, since they use lossless compression.
LSB Algorithm
9
What Images are made up of?:-
Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes ā€“ one
for Red, one for Green and one for Blue.
11111000 11001001 00000011
ā€¢ The difference between two colors that differ by one bit in either one red, green or blue value is
impossible detect for a human eye.
ā€¢ This means we can overwrite the last bit in a byte without affecting the colors it appears to be.
Contā€¦
10
ā€¢ Example:
We can use images to hide things if we replace the last bit of every colorā€™s byte with a
bit from the message.
Message A-01000001
Image with 3 pixels
Pixel 1: 11111000 11001001 00000011
Pixel 2: 11111000 11001001 00000011
Pixel 3: 11111000 11001001 00000011
Contā€¦
11
Now we hide our message in the image.
Message: 01000001
Pixel 1: 11111000 11001001 00000010
Pixel 2: 11111000 11001000 00000010
Pixel 3: 11111000 11001001 00000011
Contā€¦
12
Steganography And Cryptography
Plain Text Encryption Cipher Text Cover Image
Stego Images
Cipher TextDecryptionPlain Text
13
ā€¢ Transport Highly Private Documents between International Governments.
ā€¢ Copyright protection: A secret copyright notice or watermark can be embedded inside an image
to identify it as intellectual property.
ā€¢ Feature tagging: An article, illustration, or poster and other brief explanation elements can be
embedded inside an image.
ā€¢ Usage in modern printers.
Application
14
ā€¢ Security is an important issue while transferring the data using internet because any unauthorized
individual can hack the data and make it useless or obtain information un- intended to him.
ā€¢ Hiding a message with steganography methods reduces the chance of a message being detected.
ā€¢ In and of itself, steganography is not a good solution to secrecy, but neither is simple substitution
and short block permutation for encryption. But if these methods are combined, we have much
stronger encryption routines.
Conclusion
15
THANK YOU

More Related Content

What's hot

Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
Ā 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
Ā 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
Ā 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
Ā 
Steganography
SteganographySteganography
Steganography
Neha Sharma
Ā 
Steganography
Steganography Steganography
Steganography
Uttam Jain
Ā 

What's hot (20)

Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Ā 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Ā 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Ā 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
Ā 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Ā 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
Ā 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Ā 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
steganography
steganographysteganography
steganography
Ā 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Ā 

Similar to Image steganography and cryptography

Steganography
SteganographySteganography
Steganography
Sonam M
Ā 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
Ā 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
Ā 
B03208016
B03208016B03208016
B03208016
inventy
Ā 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
Ā 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
Ā 

Similar to Image steganography and cryptography (20)

Steganography
SteganographySteganography
Steganography
Ā 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
Ā 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Ā 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Ā 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
Ā 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
Ā 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
Ā 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Ā 
B03208016
B03208016B03208016
B03208016
Ā 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Ā 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
Ā 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
Ā 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
Ā 
Information hiding
Information hidingInformation hiding
Information hiding
Ā 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Ā 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
Ā 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
Ā 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
Ā 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
Ā 
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
Ā 

Recently uploaded (20)

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Ā 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
Ā 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
Ā 
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] šŸ„ Women's Abortion Clinic in T...
Ā 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
Ā 
WSO2CON 2024 - Building the API First Enterprise ā€“ Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise ā€“ Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise ā€“ Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise ā€“ Running an API Program, fr...
Ā 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
Ā 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
Ā 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
Ā 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
Ā 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
Ā 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
Ā 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
Ā 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
Ā 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
Ā 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
Ā 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
Ā 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
Ā 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
Ā 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
Ā 

Image steganography and cryptography

  • 1. STEGANOGRAPHY ā€œThe Art Of Hiding Dataā€ Department of Computer Science & Engg. Gandhi Institute for Technological Advancement(GITA), Bhubaneswar.
  • 2. OVERVIEW ā€¢ What is Steganography? ā€¢ History ā€¢ Steganography vs Cryptography ā€¢ Types of Steganography ā€¢ Basic Steganography Model ā€¢ Techniques for using Image Steganography ā€¢ LSB Algorithm ā€¢ Steganography And Cryptography ā€¢ Application ā€¢ Conclusion 2
  • 3. ā€¢ The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing". ā€¢ Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. ā€¢ The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. What is Steganography 3
  • 4. ā€¢ The first recorded uses of steganography can be traced back to 440 BC where wax tablets were used to write message. ā€¢ Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and covered in wax. ā€¢ During Second World War a technique was developed to shrink photographically a page of text into a dot less than one millimeter in diameter History Of Steganography 4
  • 5. Steganography VS Cryptography STEGANOGRAPHY CRYPTOGRAPHY Steganography prevents discovery of the very existence of communication Encryption prevents an unauthorized party from discovering the contents of a communication Technology still being develop for certain formats Most of algorithm known by all Once detected message is known Strong current algorithm are resistant to attacks ,larger expensive computing power is required for cracking Steganography does not alter the structure of the secret message Cryptography alter the structure of the secret message 5
  • 6. ā€¢ Text Steganography : Text steganography can be achieved by altering the text formatting, or by altering certain characteristics of textual elements ā€¢ Image Steganography : Images are used as the message carriers. Images are the most popular cover objects used for steganography. ā€¢ Audio Steganography : In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. Types Of Steganography 6
  • 8. ā€¢ By using LSB(Least Significant Bit algorithm) ā€¢ Masking and Filtering ā€¢ Algorithms and Transformation Techniques for using Image Steganography 8
  • 9. ā€¢ Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. ā€¢ The least significant bit of some or all of the bytes inside an image is changed to a bit of the secret message. ā€¢ When using a 24-bit image, a bit of each of the red, green and blue colour components can be used, since they are each represented by a byte. ā€¢ In its simplest form, LSB makes use of BMP images, since they use lossless compression. LSB Algorithm 9
  • 10. What Images are made up of?:- Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes ā€“ one for Red, one for Green and one for Blue. 11111000 11001001 00000011 ā€¢ The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eye. ā€¢ This means we can overwrite the last bit in a byte without affecting the colors it appears to be. Contā€¦ 10
  • 11. ā€¢ Example: We can use images to hide things if we replace the last bit of every colorā€™s byte with a bit from the message. Message A-01000001 Image with 3 pixels Pixel 1: 11111000 11001001 00000011 Pixel 2: 11111000 11001001 00000011 Pixel 3: 11111000 11001001 00000011 Contā€¦ 11
  • 12. Now we hide our message in the image. Message: 01000001 Pixel 1: 11111000 11001001 00000010 Pixel 2: 11111000 11001000 00000010 Pixel 3: 11111000 11001001 00000011 Contā€¦ 12
  • 13. Steganography And Cryptography Plain Text Encryption Cipher Text Cover Image Stego Images Cipher TextDecryptionPlain Text 13
  • 14. ā€¢ Transport Highly Private Documents between International Governments. ā€¢ Copyright protection: A secret copyright notice or watermark can be embedded inside an image to identify it as intellectual property. ā€¢ Feature tagging: An article, illustration, or poster and other brief explanation elements can be embedded inside an image. ā€¢ Usage in modern printers. Application 14
  • 15. ā€¢ Security is an important issue while transferring the data using internet because any unauthorized individual can hack the data and make it useless or obtain information un- intended to him. ā€¢ Hiding a message with steganography methods reduces the chance of a message being detected. ā€¢ In and of itself, steganography is not a good solution to secrecy, but neither is simple substitution and short block permutation for encryption. But if these methods are combined, we have much stronger encryption routines. Conclusion 15