SlideShare a Scribd company logo
1 of 22
Prepared By- Saurabh Walia

Submitted to- Ms. Neha Kapur
Senior Lecturer (C.S.)
Steganography, Cryptography, and
Watermarking
There are two major branches of information hiding, Steganography and
Watermarking

Watermarking: ℗
– Communication in watermarking is the host signal, with the embedded data
providing copyright protection.
– The existence of a watermark is often declared openly.
– Any attempt to remove or invalidate the embedded content renders the host
useless.

Cryptography:
–
–
–
–

Doesn’t conceal the communication.
Scrambles the data to prevent eavesdroppers understanding the content.
Cryptography involves various methods and implementations.
May be considered complementary and orthogonal (unrelated).

Once the presence of hidden information is revealed or even suspected, the
purpose of steganography is defeated.
EVOLUTION-:

steganography
cryptography

watermarking
History of Steganography
440 B.C. (physical and wax based)

1st and 2nd world wars.(letters)

Modern Times(microdot)
Examples-:
Ancient times•

Demeratus sent a warning about a forthcoming attack to Greece by writing it on a
wooden panel and covering it in wax.

•

Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it.
After his hair had grown the message was hidden. The purpose was to instigate a revolt
against the Persians.

World War II
Invincible inks

Null ciphers (unencrypted messages):

Apparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on by
products, ejecting suets and vegetable oils.
Sent by a German Spy in WWII, by taking the second letter in each word the following
message emerges:
Pershing sails from NY June 1.
Microdot Technology
Shrinking messages down to the size of a dot became a popular method. Since the
microdot could be placed at the end of a sentence or above a j or an i .
Introduction-

Art and science of writing hidden
messages

A form of security through
obscurity

No one apart from the sender and
intended recipients suspects the
existence of messages.
Terminology-:
Steganalysis
StegoMedium
Carrier/
Cover File

Embedded/
payload
Basics of Modern Steganography

fE:
fE-1:
cover:
emb:
key:
stego:

steganographic function "embedding"
steganographic function "extracting"
cover data in which emb will be hidden
message to be hidden
parameter of fE
cover data with the hidden message
Text/
document

Video

Types of
Steganography

Audio

Images
Steps In SteganographySteganography

Encoding a
message

Decoding a
message
Encoding -:
Prepare a
VESSEL
FILE

Stego
Data
Embed the
payload in
cover file.
Decoding-:
Payload
Plain
Document

StegoData
SteganographyTools-:
Programs

Images files

Audio files

Video files

Document files

DarkCryptTC

BMP, JPG, TIFF,
PNG, PSD, TGA,
MNG

WAV

-

TXT, HTML,
XML, ODT

OpenPuff
S-Tools

MP3, WAV

BMP, GIF

Steg
ImageSpyer G2

3gp, MP4, MPEG1, MPEG-2, VOB,
SWF, FLV

Pdf

Wav

BMP, JPEG, PNG,
TGA

-

-

BMP, PNG,
JPEG, GIF

-

-

-

BMP, TIFF

-

-

-
Steganalysis-:

Art and
science of
detecting
hidden
messages.

Just discovers
steganography

Not related
with
decryption of
data.
Steganography techniques-:
Least significant bit method-
LBS Example-

The message"Boss said that
we should blow
up the bridge at
midnight."
encrypted with
mozaiq using
"växjö" as
password.
Audio Steganography-:
•

•
•

•

•
•

Watermarking of audio signals is more challenging compared to the watermarking
of images or video sequences, due to wider dynamic range of the HAS in
comparison with human visual system (HVS). The sensitivity of the HAS to the
additive white Gaussian noise (AWGN) is high as well; this noise in a sound file can
be detected as low as 70 dB.
Some commonly used methods of audio steganography are discussed below-.
Least Significant Bit (LSB) Coding : One of the earliest techniques studied in the
information hiding of digital audio (as well as other media types) is LSB coding. In
this technique LSB of binary sequence of each sample of digitized audio file is
replaced with binary equivalent of secret message.
Parity Coding : Instead of breaking a signal down into individual samples, the parity
coding method breaks a signal down into separate regions of samples and encodes
each bit from the secret message in a sample region's parity bit. If the parity bit of a
selected region does not match the secret bit to be encoded, the process flips the
LSB of one of the samples in the region.
Advantage: The sender has more of a choice in encoding the secret bit, and the
signal can be changed in a more unobtrusive manner.
Disadvantage: This method like LSB coding is not robust in nature.
Video steganography-:
• Algorithm of hiding
messages
in video files:
Users and Applications-:
Cyber
Forensics

Modern
Printers (HP)

Terrorists

Intelligence
agencies

Hackers
Future Scope-:
Finding Needle
in a haystack is
a very
cumbersome task.
•So we hope in
future techniques
would be
developed that
gonna detect the
presence of
smallest and tiniest
of sentences in the
Huge text, audio
and video files
effeciently.
SteganographySecond

More Related Content

What's hot

Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 

What's hot (20)

About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Steganography
Steganography Steganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 

Similar to SteganographySecond

Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 

Similar to SteganographySecond (20)

83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
Steganography Steganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
SteganographySteganography
Steganography
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography
SteganographySteganography
Steganography
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography
SteganographySteganography
Steganography
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

SteganographySecond

  • 1. Prepared By- Saurabh Walia Submitted to- Ms. Neha Kapur Senior Lecturer (C.S.)
  • 2. Steganography, Cryptography, and Watermarking There are two major branches of information hiding, Steganography and Watermarking Watermarking: ℗ – Communication in watermarking is the host signal, with the embedded data providing copyright protection. – The existence of a watermark is often declared openly. – Any attempt to remove or invalidate the embedded content renders the host useless. Cryptography: – – – – Doesn’t conceal the communication. Scrambles the data to prevent eavesdroppers understanding the content. Cryptography involves various methods and implementations. May be considered complementary and orthogonal (unrelated). Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
  • 4. History of Steganography 440 B.C. (physical and wax based) 1st and 2nd world wars.(letters) Modern Times(microdot)
  • 5. Examples-: Ancient times• Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. • Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. World War II Invincible inks Null ciphers (unencrypted messages): Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Sent by a German Spy in WWII, by taking the second letter in each word the following message emerges: Pershing sails from NY June 1. Microdot Technology Shrinking messages down to the size of a dot became a popular method. Since the microdot could be placed at the end of a sentence or above a j or an i .
  • 6. Introduction- Art and science of writing hidden messages A form of security through obscurity No one apart from the sender and intended recipients suspects the existence of messages.
  • 8. Basics of Modern Steganography fE: fE-1: cover: emb: key: stego: steganographic function "embedding" steganographic function "extracting" cover data in which emb will be hidden message to be hidden parameter of fE cover data with the hidden message
  • 10. Steps In SteganographySteganography Encoding a message Decoding a message
  • 13. SteganographyTools-: Programs Images files Audio files Video files Document files DarkCryptTC BMP, JPG, TIFF, PNG, PSD, TGA, MNG WAV - TXT, HTML, XML, ODT OpenPuff S-Tools MP3, WAV BMP, GIF Steg ImageSpyer G2 3gp, MP4, MPEG1, MPEG-2, VOB, SWF, FLV Pdf Wav BMP, JPEG, PNG, TGA - - BMP, PNG, JPEG, GIF - - - BMP, TIFF - - -
  • 14. Steganalysis-: Art and science of detecting hidden messages. Just discovers steganography Not related with decryption of data.
  • 17. LBS Example- The message"Boss said that we should blow up the bridge at midnight." encrypted with mozaiq using "växjö" as password.
  • 18. Audio Steganography-: • • • • • • Watermarking of audio signals is more challenging compared to the watermarking of images or video sequences, due to wider dynamic range of the HAS in comparison with human visual system (HVS). The sensitivity of the HAS to the additive white Gaussian noise (AWGN) is high as well; this noise in a sound file can be detected as low as 70 dB. Some commonly used methods of audio steganography are discussed below-. Least Significant Bit (LSB) Coding : One of the earliest techniques studied in the information hiding of digital audio (as well as other media types) is LSB coding. In this technique LSB of binary sequence of each sample of digitized audio file is replaced with binary equivalent of secret message. Parity Coding : Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample region's parity bit. If the parity bit of a selected region does not match the secret bit to be encoded, the process flips the LSB of one of the samples in the region. Advantage: The sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive manner. Disadvantage: This method like LSB coding is not robust in nature.
  • 19. Video steganography-: • Algorithm of hiding messages in video files:
  • 20. Users and Applications-: Cyber Forensics Modern Printers (HP) Terrorists Intelligence agencies Hackers
  • 21. Future Scope-: Finding Needle in a haystack is a very cumbersome task. •So we hope in future techniques would be developed that gonna detect the presence of smallest and tiniest of sentences in the Huge text, audio and video files effeciently.