SlideShare a Scribd company logo
1 of 31
Steganography
and Watermarking
Lecture Slides
by
Israa
INTRODUCTION
Information Hiding Techniques
Information Hiding
Steganography Watermarking
2
Information Hiding
Information Hiding : Communication of
information by embedding in original data and
retrieving it from other digital data.
Depending on application we may need process to
be imperceptible, robust, secure. Etc.
Where can we hide?
Media
 Video
 Audio
 Images
 Documents
Why Hide?
Because you don’t want any one to even know about its
existence.
Covert communication – Steganography
Because you want to protect it from malicious use.
copy protection and deterrence - Digital Watermarks
STEGANOGRAPHY
Steganography defined
The word steganography comes from the Greek
‘steganos’ , meaning covered or secret, and
‘graphy’ , meaning writing or drawing.
Therefore, steganography literally means –
“covered writing”.
Steganography
 hides existence of message.
 Only sender and intended recipient know
there is a hidden message .
 It allows the people to communicate secretly.
 has drawbacks
 high overhead to hide relatively few
information bits
 Is a branch of information hiding.
 an alternative to encryption
Steganography & Cryptography
 Steganography and Cryptography are closely
related
 The difference is in their goals...
– Cryptography: although encypted and unreadable,
the existence of data is not hidden
– Steganography: no knowledge of the existence of
the data
 Steganography and Cryptography can be used
together to produce better protection
STEGANOGRAPHY UNDER VaRIOUS MEDIA
 Steganography in “TEXT”
 Steganography in “IMAGES”
 Steganography in “AUDIO”
Steganography in “Video”
STEGANOGRAPHY IN TEXT
It involves two types of coding:
Line-Shift Coding : Here, text lines are vertically shifted to
encode the document uniquely.
 Word-Shift Coding : The codewords are coded into a
document by shifting the horizontal locations of words
within text lines, while maintaining a natural spacing
appearance.
STEGANOGRAPHY IN IMAGE
 Digital images are made up of pixels.
 The arrangement of pixels make up the
image.
 Each pixel can have 8-bit(Gray image)
and 24-bit(Color image) binary number.
 The larger the image size, the more
information you can hide. However, larger
images may require compression to avoid
detection
 The most popular medium!
Least-significant bit (LSB) modifications
STEGANOGRAPHY IN AUDIO
In audio steganography, secret message is embedded into
digitized audio signal which result slight altering of binary
sequence of the corresponding audio file.
There are several methods are available for audio
steganography.
Methods of Audio Data Hiding
 LSB techniques
 Phase coding
STEGANALYSIS
Here methods of Steganalysis are looked into :
 Detecting and decoding the hidden data within a
given medium .
 disabling embedded information
 Even if secret content is not revealed, modifying the
cover medium changes the medium’s statistical
properties
 Distributed Dictionary Attack
RELATION BETWEEN STEGANOGRAPHY
AND STEGANALYSIS
APPLICATION OF STEGANOGRAPHY
 Confidential communication and secret data storing
 to have secure secret communications where cryptographic
encryption methods are not available, or strong
cryptography is impossible.
 Protection of data alteration
 Media database system
 In some cases, for example in military applications, even
the knowledge that two parties communicate can be of large
importance
ADVANTAGES :
 Difficult to detect and Only receiver can detect.
 It can be done faster with large no. of software.
DISADVANTAGES :
 The confidentiality of information is maintained by the
algorithms, and if the algorithms are known then this
technique is of no use.
 Password leakage may occur and it leads to the
unauthorized access of data.
 high overhead to hide relatively few information bits
Advantages and Disadvantages Of Steganography
 Used primarily for identification and verify the
authentication .
 Embedding a unique piece of information within a
medium (typically an image) without noticeably
altering the medium
 Almost impossible to remove without seriously
degrading an image
 Usually, only the knowledge of a secret key allows
us to extract the watermark.
Watermarking
 A watermark is a “secret message” that is embedded
into a “cover message”.
History
• The Italians where the 1st to use watermarks in the
manufacture of paper in the 1270's.
• A watermark was used in banknote production by the
Bank of England in 1697.
It is a good security feature because the watermark
cannot be photocopied or scanned effectively.
19
Why Watermark? Motivation
20
 Copyright protection of multimedia data Copyright owners
want to be compensated every time their work is used.
 The need to limit the number of copies created whereas
the watermarks are modified by the hardware and at some
point would not create any more copies (i.e. DVD) - the
reading device must be able to modify the watermark
 Content protection – content stamped with a visible
watermark that is very difficult to remove so that it can be
publicly and freely distributed
Watermarks Classification
1. Paper Watermark: Intended to be somewhat
visible.
2. Digital Watermark: A digital signal or pattern
imposed on a digital document ( text, graphics,
multimedia presentations , …).
21
Paper Watermark
The technique of impressing into the
paper a form of image or text.
“Cannot be photocopied or scanned
effectively”
Purpose: To make forgery more difficult to
record the manufacturer’s trademark, Copyright
protection, logos, etc …
Used in :
Currency, Banknotes ,
Passports, …
22
Paper watermark
Example
Digital Watermarking Types
24
 Visible and Invisible:
 Visible such as a company logo stamped on an image or
Video.
 Invisible intended to be imperceptible to the human eye or
inaudible. the watermark can only be determined through
watermark extraction or detection by computers.
Visible Watermarking Invisible Watermarking
Watermarking Process
• Two major steps:
– Location Selection : Where to embed watermark
– Processing : How to modify original data to embed
watermark
25
Watermarking Embedding & Extraction
26
Cover Image Cover + WM
Embedding F : Watermarked Image = Function (Cover, Watermark, Key)
Extraction F : Watermark = Function (Watermarked Image, Key(
Cover + WM
Watermarking Techniques
• Text – Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of sentences, etc.
• Audio – Low bit coding, random.
• Images / Video – Least-significant bit, random
27
STEGANOGRAPHY VS WATERMARKING
 The key difference is their goals...
– Steganography: hiding information
– Watermarking: extending the file with extra information
 steganography is changing the image in a way that only the
sender and the intended recipient are able to detect the
message sent through it.
 Watermarking is a process in which the information which
verifies the owner is embedded into the digital image or signal.
These signals could be either videos or pictures or audios;
STEGANOGRAPHY VS WATERMARKING
 Steganography is typically invisible. Steganographic
information must never be apparent to a viewer unaware of its
presence.
 Watermarking is of two types; visible watermarking and
invisible watermarking.
 Digital watermarking hides data in a file, and the act of
hiding data makes it a form or steganography
Limitations / Conclusions
• Rapidly growing field of digitized images, video and audio has
urged for the need of protection.
• Watermarking is a key process in the protection of copyright
ownership of electronic data (image, videos, audio, ...).
• Digital watermarking does not prevent copying or distribution.
• Digital watermarking alone is not a complete solution for
access/copy control or copyright protection.
• Digital watermarks cannot survive every possible attack.
30
31
Thank you

More Related Content

What's hot

What's hot (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
steganography
steganographysteganography
steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 

Similar to Information and data security steganography and watermarking

Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
B03208016
B03208016B03208016
B03208016inventy
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 

Similar to Information and data security steganography and watermarking (20)

digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography
SteganographySteganography
Steganography
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Steganography
SteganographySteganography
Steganography
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
B03208016
B03208016B03208016
B03208016
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 

More from Mazin Alwaaly

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometricsMazin Alwaaly
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earMazin Alwaaly
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionMazin Alwaaly
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identificationMazin Alwaaly
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprintsMazin Alwaaly
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMazin Alwaaly
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniquesMazin Alwaaly
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in videoMazin Alwaaly
 

More from Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 

Recently uploaded

Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 

Recently uploaded (20)

Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 

Information and data security steganography and watermarking

  • 2. INTRODUCTION Information Hiding Techniques Information Hiding Steganography Watermarking 2
  • 3. Information Hiding Information Hiding : Communication of information by embedding in original data and retrieving it from other digital data. Depending on application we may need process to be imperceptible, robust, secure. Etc.
  • 4. Where can we hide? Media  Video  Audio  Images  Documents
  • 5. Why Hide? Because you don’t want any one to even know about its existence. Covert communication – Steganography Because you want to protect it from malicious use. copy protection and deterrence - Digital Watermarks
  • 6. STEGANOGRAPHY Steganography defined The word steganography comes from the Greek ‘steganos’ , meaning covered or secret, and ‘graphy’ , meaning writing or drawing. Therefore, steganography literally means – “covered writing”.
  • 7. Steganography  hides existence of message.  Only sender and intended recipient know there is a hidden message .  It allows the people to communicate secretly.  has drawbacks  high overhead to hide relatively few information bits  Is a branch of information hiding.  an alternative to encryption
  • 8. Steganography & Cryptography  Steganography and Cryptography are closely related  The difference is in their goals... – Cryptography: although encypted and unreadable, the existence of data is not hidden – Steganography: no knowledge of the existence of the data  Steganography and Cryptography can be used together to produce better protection
  • 9.
  • 10. STEGANOGRAPHY UNDER VaRIOUS MEDIA  Steganography in “TEXT”  Steganography in “IMAGES”  Steganography in “AUDIO” Steganography in “Video”
  • 11. STEGANOGRAPHY IN TEXT It involves two types of coding: Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.  Word-Shift Coding : The codewords are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.
  • 12. STEGANOGRAPHY IN IMAGE  Digital images are made up of pixels.  The arrangement of pixels make up the image.  Each pixel can have 8-bit(Gray image) and 24-bit(Color image) binary number.  The larger the image size, the more information you can hide. However, larger images may require compression to avoid detection  The most popular medium! Least-significant bit (LSB) modifications
  • 13. STEGANOGRAPHY IN AUDIO In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. There are several methods are available for audio steganography. Methods of Audio Data Hiding  LSB techniques  Phase coding
  • 14. STEGANALYSIS Here methods of Steganalysis are looked into :  Detecting and decoding the hidden data within a given medium .  disabling embedded information  Even if secret content is not revealed, modifying the cover medium changes the medium’s statistical properties  Distributed Dictionary Attack
  • 16. APPLICATION OF STEGANOGRAPHY  Confidential communication and secret data storing  to have secure secret communications where cryptographic encryption methods are not available, or strong cryptography is impossible.  Protection of data alteration  Media database system  In some cases, for example in military applications, even the knowledge that two parties communicate can be of large importance
  • 17. ADVANTAGES :  Difficult to detect and Only receiver can detect.  It can be done faster with large no. of software. DISADVANTAGES :  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data.  high overhead to hide relatively few information bits Advantages and Disadvantages Of Steganography
  • 18.  Used primarily for identification and verify the authentication .  Embedding a unique piece of information within a medium (typically an image) without noticeably altering the medium  Almost impossible to remove without seriously degrading an image  Usually, only the knowledge of a secret key allows us to extract the watermark. Watermarking  A watermark is a “secret message” that is embedded into a “cover message”.
  • 19. History • The Italians where the 1st to use watermarks in the manufacture of paper in the 1270's. • A watermark was used in banknote production by the Bank of England in 1697. It is a good security feature because the watermark cannot be photocopied or scanned effectively. 19
  • 20. Why Watermark? Motivation 20  Copyright protection of multimedia data Copyright owners want to be compensated every time their work is used.  The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) - the reading device must be able to modify the watermark  Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed
  • 21. Watermarks Classification 1. Paper Watermark: Intended to be somewhat visible. 2. Digital Watermark: A digital signal or pattern imposed on a digital document ( text, graphics, multimedia presentations , …). 21
  • 22. Paper Watermark The technique of impressing into the paper a form of image or text. “Cannot be photocopied or scanned effectively” Purpose: To make forgery more difficult to record the manufacturer’s trademark, Copyright protection, logos, etc … Used in : Currency, Banknotes , Passports, … 22
  • 24. Digital Watermarking Types 24  Visible and Invisible:  Visible such as a company logo stamped on an image or Video.  Invisible intended to be imperceptible to the human eye or inaudible. the watermark can only be determined through watermark extraction or detection by computers. Visible Watermarking Invisible Watermarking
  • 25. Watermarking Process • Two major steps: – Location Selection : Where to embed watermark – Processing : How to modify original data to embed watermark 25
  • 26. Watermarking Embedding & Extraction 26 Cover Image Cover + WM Embedding F : Watermarked Image = Function (Cover, Watermark, Key) Extraction F : Watermark = Function (Watermarked Image, Key( Cover + WM
  • 27. Watermarking Techniques • Text – Varying spaces after punctuation, spaces in between lines of text, spaces at the end of sentences, etc. • Audio – Low bit coding, random. • Images / Video – Least-significant bit, random 27
  • 28. STEGANOGRAPHY VS WATERMARKING  The key difference is their goals... – Steganography: hiding information – Watermarking: extending the file with extra information  steganography is changing the image in a way that only the sender and the intended recipient are able to detect the message sent through it.  Watermarking is a process in which the information which verifies the owner is embedded into the digital image or signal. These signals could be either videos or pictures or audios;
  • 29. STEGANOGRAPHY VS WATERMARKING  Steganography is typically invisible. Steganographic information must never be apparent to a viewer unaware of its presence.  Watermarking is of two types; visible watermarking and invisible watermarking.  Digital watermarking hides data in a file, and the act of hiding data makes it a form or steganography
  • 30. Limitations / Conclusions • Rapidly growing field of digitized images, video and audio has urged for the need of protection. • Watermarking is a key process in the protection of copyright ownership of electronic data (image, videos, audio, ...). • Digital watermarking does not prevent copying or distribution. • Digital watermarking alone is not a complete solution for access/copy control or copyright protection. • Digital watermarks cannot survive every possible attack. 30