SlideShare a Scribd company logo
1 of 23
Steganography
By
Shri Swetha. M
Shri Sailaxmi. S
Overview
• Steganography
• Aim of Steganography
• History of Steganography
• Cryptography Vs Steganography
• Types of Steganography
1. Text Steganography
2. Image Steganography
3. Audio Steganography
• Advantages of Steganography
• Disadvantages of Steganography
• Applications of Steganography
INTRODUCTION
• Steganography is an art of hiding
data within data.
• Stego means covering and grafia
means writing.
• Steganography is one of the
oldest forms of cryptology
History of Steganography
• Invisible ink has been a popular form by the ancient Greeks and
Romans over 2000 years ago, even during II world war.
• The first invisible inks used organic substances, such as, diluted
lemon juice, vinegar, milk, sweat, saliva, onion juice or many other
organic substances. The recipient would reveal the message by
applying a flame to the paper.
• A mixture of alum and vinegar was used to write on a hard-boiled
egg. The message could only be read after peeling the egg to see the
message on the albumen.
• Wax tablets were in common use then as reusable writing surfaces,
sometimes used for shorthand.
Aim of Steganography
1) Confidential communication and
secret data storing
2) Protection of data alteration
3) Access control system for digital
content distribution
4) Media Database systems
Method of providing security to
information
• We have two methods to provide security to information.
Cryptography
• Cryptography is the study of hiding information and it
is used when communicating over an untrusted
medium such as internet, where information needs
to be protected from other third parties.
Steganography
• Steganography is the art and science of writing hidden messages in
such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message, a form of security through
obscurity.
• "Steganography means hiding one piece of data within another".
• E.g.
Cryptography Vs Steganography
EMBEDDING METHODS
TYPES
Spatial Domain
Embedding
LSB
Frequency
Domain
Embedding
DCT
DWT
TYPES OF COMPRESSION
• To improve the process message
compression can be applied.
• It was found that lossless
compression produces better
result.
• In this the originality of digital
image is maintained.
COMPRESSION
LOSSY LOSSLESS
TYPES OF STEGANOGRAPHY
•Text/Documents
•Images
•Video
•Audio
Steganography In Text/Documents
• STEPS FOLLWED IN A IMAGE FILE STEGANOGRAPHY
1. Data can be either in colour image or grey scale image.
2. Image is embedded using cryptography algorithm.
3. The embedded data is embedded into the image file which turns into
a stego image.
4. Stego key is used during the hiding process to send the image
securely.
5. After the image is received, the receiver will extract the data from
image.
6. In order to extract the message the receiver requires a shared key.
THIS APPROACH IS CALLED STEGO KEY APPROACH
Steganography In Images
• Images are composed of dots called
PIXELS.
• 8-bit and 24-bit per pixel image files.
• Each pixel gets its own color by
combining percentages of red, green
and blue(RGB).
• For 8bit each of these colors has value
from 0 to 225.
• E.g.10GB of pictures are transmitted
over a connection. Then at most 3GB
of steganographically hidden data can
be transmitted using them as carriers.
Image/Video watermarking
• Spatial domain watermarking
- bit flipping
- color separation
• Frequency domain watermarking
- embed signal in select frequency bands (e.g. high frequency areas)
- apply FFT/DCT transform first
- e.g. Digi marc
- watermark should alter the least perceptible bits
-these are the same bits targeted by lossy image compression software.
- used by most networks (logo at bottom-right)
Steganography In Audio
• Audio steganography embeds the secret message
into the music files having formats.
The different methods are:
• Low-bit encoding
• Phase coding
• Spread spectrum
ADVANTAGES
• It can be done faster with large number of software.
• Provides better security for sharing data in LAN,MAN & WAN.
• It is used in the way of hiding not the information but the password to
reach that information.
• Difficult to detect. Only receiver can detect.
• Can be applied differently in digital image, audio and video file.
APPLICATIONS
• Defence organisation: security from enemies
• Intelligence Agencies: security of person's private information
• Government Agencies: store critical data like criminal record
• Smart identity cards: personal information is embedded into photo
• Medical: patient's details are embedded within image
Negative Aspects
• The confidentiality of information is maintained by the
algorithms,
and if the algorithms are known then this technique is of no use.
• Huge number of data results in huge file size, so some one can
suspect about it.
• Password leakage may occur and it leads to the unauthorized
access of data.
• If this technique is gone in the wrong hands like hackers can be
very much dangerous for all.
FUTURE SCOPES
• Specifically, you can embed all your good/bad memory in each snap
shot of the digital photo such as photo recovery.
• If a "motion picture steganography system" has been developed in
the near future.
• A keyword based movie-scene retrieving system will be
implemented.
• An HTML source file has lot of free space e.g. bank webpage, online
transaction etc.
• With a painting/art work the original artist detail can be hidden.
• With a X-ray copy the details of a his/her patient can be stored.
CONCLUSION
• Though Steganography is not implemented in wider ways but it can be
the best security tool.
• The main problem of today’s world is to secure their data confidentially,
the techniques used currently are not considered the best which can only
be replaced by Steganography.
• The importance of Steganography has not been realized to that stage
where it is preferred over its close rival "Encryption".
• New techniques are being discovered and implemented.
THANK YOU
Any Queries

More Related Content

What's hot

Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
Steganography basic
Steganography basicSteganography basic
Steganography basicSanoj Kumar
 
Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganographyPuneet Singla
 
Cryptography concepts and techniques
Cryptography concepts and techniquesCryptography concepts and techniques
Cryptography concepts and techniquesPVSaiGanesh
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applicationsManasitilak
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatiaJayant Bhatia
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themstuimrozsm
 

What's hot (20)

Stegnography
StegnographyStegnography
Stegnography
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Steganography
Steganography Steganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Stegnography
Stegnography Stegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
 
Cryptography concepts and techniques
Cryptography concepts and techniquesCryptography concepts and techniques
Cryptography concepts and techniques
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Steganography
SteganographySteganography
Steganography
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatia
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Steganography
SteganographySteganography
Steganography
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Introduction to Steganography: Hiding Data Within Data

Steganography
SteganographySteganography
SteganographySonam M
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptssuser4d4e5a
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptSamehShenoda
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptakashkr0802
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.pptRobertCarreonBula
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.pptSantu Chall
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptxAutuag
 

Similar to Introduction to Steganography: Hiding Data Within Data (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
steganography
steganographysteganography
steganography
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
Final2
Final2Final2
Final2
 
Steganography
Steganography Steganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Introduction to Steganography: Hiding Data Within Data

  • 2. Overview • Steganography • Aim of Steganography • History of Steganography • Cryptography Vs Steganography • Types of Steganography 1. Text Steganography 2. Image Steganography 3. Audio Steganography • Advantages of Steganography • Disadvantages of Steganography • Applications of Steganography
  • 3. INTRODUCTION • Steganography is an art of hiding data within data. • Stego means covering and grafia means writing. • Steganography is one of the oldest forms of cryptology
  • 4. History of Steganography • Invisible ink has been a popular form by the ancient Greeks and Romans over 2000 years ago, even during II world war. • The first invisible inks used organic substances, such as, diluted lemon juice, vinegar, milk, sweat, saliva, onion juice or many other organic substances. The recipient would reveal the message by applying a flame to the paper. • A mixture of alum and vinegar was used to write on a hard-boiled egg. The message could only be read after peeling the egg to see the message on the albumen. • Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand.
  • 5. Aim of Steganography 1) Confidential communication and secret data storing 2) Protection of data alteration 3) Access control system for digital content distribution 4) Media Database systems
  • 6. Method of providing security to information • We have two methods to provide security to information.
  • 7. Cryptography • Cryptography is the study of hiding information and it is used when communicating over an untrusted medium such as internet, where information needs to be protected from other third parties.
  • 8. Steganography • Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. • "Steganography means hiding one piece of data within another". • E.g.
  • 11. TYPES OF COMPRESSION • To improve the process message compression can be applied. • It was found that lossless compression produces better result. • In this the originality of digital image is maintained. COMPRESSION LOSSY LOSSLESS
  • 13. Steganography In Text/Documents • STEPS FOLLWED IN A IMAGE FILE STEGANOGRAPHY 1. Data can be either in colour image or grey scale image. 2. Image is embedded using cryptography algorithm. 3. The embedded data is embedded into the image file which turns into a stego image. 4. Stego key is used during the hiding process to send the image securely. 5. After the image is received, the receiver will extract the data from image. 6. In order to extract the message the receiver requires a shared key. THIS APPROACH IS CALLED STEGO KEY APPROACH
  • 14. Steganography In Images • Images are composed of dots called PIXELS. • 8-bit and 24-bit per pixel image files. • Each pixel gets its own color by combining percentages of red, green and blue(RGB). • For 8bit each of these colors has value from 0 to 225. • E.g.10GB of pictures are transmitted over a connection. Then at most 3GB of steganographically hidden data can be transmitted using them as carriers.
  • 15. Image/Video watermarking • Spatial domain watermarking - bit flipping - color separation • Frequency domain watermarking - embed signal in select frequency bands (e.g. high frequency areas) - apply FFT/DCT transform first - e.g. Digi marc - watermark should alter the least perceptible bits -these are the same bits targeted by lossy image compression software. - used by most networks (logo at bottom-right)
  • 16. Steganography In Audio • Audio steganography embeds the secret message into the music files having formats. The different methods are: • Low-bit encoding • Phase coding • Spread spectrum
  • 17. ADVANTAGES • It can be done faster with large number of software. • Provides better security for sharing data in LAN,MAN & WAN. • It is used in the way of hiding not the information but the password to reach that information. • Difficult to detect. Only receiver can detect. • Can be applied differently in digital image, audio and video file.
  • 18. APPLICATIONS • Defence organisation: security from enemies • Intelligence Agencies: security of person's private information • Government Agencies: store critical data like criminal record • Smart identity cards: personal information is embedded into photo • Medical: patient's details are embedded within image
  • 19. Negative Aspects • The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use. • Huge number of data results in huge file size, so some one can suspect about it. • Password leakage may occur and it leads to the unauthorized access of data. • If this technique is gone in the wrong hands like hackers can be very much dangerous for all.
  • 20. FUTURE SCOPES • Specifically, you can embed all your good/bad memory in each snap shot of the digital photo such as photo recovery. • If a "motion picture steganography system" has been developed in the near future. • A keyword based movie-scene retrieving system will be implemented. • An HTML source file has lot of free space e.g. bank webpage, online transaction etc. • With a painting/art work the original artist detail can be hidden. • With a X-ray copy the details of a his/her patient can be stored.
  • 21. CONCLUSION • Though Steganography is not implemented in wider ways but it can be the best security tool. • The main problem of today’s world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography. • The importance of Steganography has not been realized to that stage where it is preferred over its close rival "Encryption". • New techniques are being discovered and implemented.