SlideShare a Scribd company logo
1 of 18
PRESENTED BY
Presented To
Teacher Name
University Name
Name 1
161-15-0000
Name 2
161-15-0001
Name 3
161-15-0002
Name 4
161-15-0003
Name 5
161-15-0004
Name 6
161-15-0005
WHAT IS STEGANOGRAPHY?
Steganography is data hidden within data.
Steganography is an encryption technique
that can be used along with cryptography as
an extra-secure method in which to protect
data.
MAIN CONCEPT OF STEGANOGRAPHY
Cover File
(image, video or audio)
Data to hide
(text, image, video, audio, etc.)
Stego
Application Stego File
TYPES OF STEGANOGRAPHY
Audio Steganography
Video Steganography
Text Steganography
Image Steganography
AUDIO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
TEXT STEGANOGRAPHY
IMAGE STEGANOGRAPHY
Embedding
Process
Extracting
ProcessStego Image
TEXT/Massage
Stego key
TEXT/
Massage
|
|
|
SENDER RECEIVER
IMAGE STEGANOGRAPHY
PROGRAM IMAGE FILES AUDIO FILES VIDEO FILES DOCUMENT
FILES
Openpuff BMP,JPG,
PNG,TGA
Mp3, WAV 3gp, Mp4,
MPEG, VOB,
SWF,FLV
Pdf
MP3Stego - Mp3 - -
OpenStego BMP,PNG - - -
S-Tools BMO,GIF Wav - -
Steganographic
Labratory (VLS)
BMP,PNG,
JPG,TIFF
- - -
PHP-Class
Stream
Steganography
PNG - - -
TOOLS FOR STEGANOGRAPHY
LSB METHOD
ASCII Value for “h” in Decimal is 104 and Binary
01101000Before LSB Insertion of 8 consecutive bytes of an
image:
10000010 10100110 11110101 10110101
10110011 10010111 10000100 10110001
After inserting h (01101000) in Least Significant Bits:
0 1 1 0 1 0 0 0
100000100 101001101 111101011 101101010 101100111 100101110 100001000 101100010
ADVANTAGES
 It is used in the way of hiding not the information but the password
to reach that information.
 Difficult to detect. Only receiver can detect.
 Can be applied differently in digital image, audio and video file.
 It can be done faster with the large number of software's.
DISADVANTAGES
 Huge number of data, huge file size, so someone can
suspect about it.
 If this technique is gone in the wrong hands like hackers,
terrorist, criminals then this can be very much dangerous for
all.
Steganalys
is
DETECTING THE SECRET MESSAGE
CONCLUSION
 Though Steganography is not implemented in wider ways but it can
be the best security tool.
 The main problem of today’s world is to secure their data
confidentially, the techniques used currently are not considered the
best which can only be replaced by Steganography.
ANY QUESTION ? ? ?
Steganography

More Related Content

Similar to Steganography

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Cryptography concepts and techniques
Cryptography concepts and techniquesCryptography concepts and techniques
Cryptography concepts and techniques
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Stegnography
Stegnography Stegnography
Stegnography
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Steganography

  • 1.
  • 2. PRESENTED BY Presented To Teacher Name University Name Name 1 161-15-0000 Name 2 161-15-0001 Name 3 161-15-0002 Name 4 161-15-0003 Name 5 161-15-0004 Name 6 161-15-0005
  • 3. WHAT IS STEGANOGRAPHY? Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data.
  • 4. MAIN CONCEPT OF STEGANOGRAPHY Cover File (image, video or audio) Data to hide (text, image, video, audio, etc.) Stego Application Stego File
  • 5. TYPES OF STEGANOGRAPHY Audio Steganography Video Steganography Text Steganography Image Steganography
  • 11. PROGRAM IMAGE FILES AUDIO FILES VIDEO FILES DOCUMENT FILES Openpuff BMP,JPG, PNG,TGA Mp3, WAV 3gp, Mp4, MPEG, VOB, SWF,FLV Pdf MP3Stego - Mp3 - - OpenStego BMP,PNG - - - S-Tools BMO,GIF Wav - - Steganographic Labratory (VLS) BMP,PNG, JPG,TIFF - - - PHP-Class Stream Steganography PNG - - - TOOLS FOR STEGANOGRAPHY
  • 12. LSB METHOD ASCII Value for “h” in Decimal is 104 and Binary 01101000Before LSB Insertion of 8 consecutive bytes of an image: 10000010 10100110 11110101 10110101 10110011 10010111 10000100 10110001 After inserting h (01101000) in Least Significant Bits: 0 1 1 0 1 0 0 0 100000100 101001101 111101011 101101010 101100111 100101110 100001000 101100010
  • 13. ADVANTAGES  It is used in the way of hiding not the information but the password to reach that information.  Difficult to detect. Only receiver can detect.  Can be applied differently in digital image, audio and video file.  It can be done faster with the large number of software's.
  • 14. DISADVANTAGES  Huge number of data, huge file size, so someone can suspect about it.  If this technique is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous for all.
  • 16. CONCLUSION  Though Steganography is not implemented in wider ways but it can be the best security tool.  The main problem of today’s world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography.