SlideShare a Scribd company logo
1 of 13
CYBER
SECURITY
BITS EDU CAMPUS
COMPUTER SCIENCE DEPARTMENT
TOPIC:
STEGANOGRAPHY
Prepared by:
Shruti Ghelani-140050107031
Taha Malampattiwala-140050107052
Jinal Mayavanshi-140050107056
INFORMATION HIDING
• Information Hiding is a branch of computer science that deals with
concealing the existence of a message
• It is related to cryptography whose intent is to render messages
unreadable except by the intended recipients
• It employs technologies from numerous science disciplines:
• Digital Signal Processing (Images, Audio, Video)
• Cryptography
• Information TheoryCoding Theory
• Data Compression
• Human Visual/Auditory perception
• There are four primary sub-disciplines of Information Hiding
• Steganography
• Watermarking
• Covert Channels
• Anonymity
• Alice and Bob
• Classical names given to the parties wishing to communicate
• Sometimes, you may have a Carol and a Dave
• Eve, an adversary, can listen to but not modify or forge a message
• (think passive eavesdropping)
• Wendy the Warden, another adversary, can monitor, modify, or forge a
message
• A passive warden simply listens (like Eve)
• An active warden may modify a message
• A malicious warden may forge a fake message
BASIC TERMINOLOGY
What is Steganography?
def’n:
the art and science of hiding information by
embedding it in some other data.
cryptography - render message unintelligible
steganography - conceal the existence of the message
• Steganography literally means “covered writing”
• A stegosaurus has a covered back
• Steganography’s primary goal is to hide data within some other data such that
the hidden data cannot be detected even if it is being sought
• Secondary goals:
• prevent extraction from the cover file without destroying the cover
• prevent destruction of the stego-message without destroying the cover
• Most frequently, steganography is applied to images, but many other data or
file types are possible
• Audio
• Video
• Text
• Executable programs
The cover provides a host for transporting the hidden info.
info
embed
-file
extract
info
Digital Steganography
• HTML message as cover?
• computer program as cover?
• network protocol headers
• white space in text
• unused space in buffer
• least significant bits of image
• slight distortion in sound file
• “Easter eggs”
Steganography in Images
Two types of compression:
• lossless (gif)
• lossy (jpeg)
Sometimes concealed message inserted as a comment.
Sometimes the accuracy of the image is sacrificed slightly.
Common Tools
• StegoDOS
• White Noise Storm
• S-tools
• Outguess
• Steghide
APPLICATIONS OF INFORMATION
HIDING• Covert military communications
• Covert police communications
• Criminals have learned that police are nearby when they hear encrypted
communications, so they abate their activity for the moment
• A steganographic system would prevent this detection
• Digital Rights Management – protecting intellectual property such as
images, music, electronic books, etc.
• Embedding textual data in medical images would better ensure that the
picture belongs to a particular patient
• This technique could apply to personal pictures, sounds, and movies
• Tamper proofing – ensuring a data file has not been changed
• Communicating in an oppressive country w/o free speech
NEFARIOUS APPLICATIONS OF INFORMATION HIDING
• You won’t find these applications in the book
• money laundering
• drug running
• child pornography
• spying (good or bad depending upon which side you’re on!)
• terrorism
• Unfortunately, these uses are also possible
• The technology itself isn’t bad, but like many things, it can be (and is)
abused
• Since there are nefarious uses, law enforcement and the military is also
interested in understanding hiding techniques and detecting hidden data
• There are some projects right here at UTSA that have done research for the
Air Force
STEGANALYSIS
• Steganalysis is the detection of data that has been hidden
• It is a cat and mouse game – as one group of researchers come up with
better ways to hide stuff, another group figures out how to detect it or
perhaps just destroy it
• In the summer course last year, one student thought he had a hiding system
that was undetectable
• His lab partner wrote a statistical analysis program that exposed the
hidden message
• The first student modified his program to defeat the attack
• His lab partner modified his analyzer and still found the message
THANKYOU.

More Related Content

What's hot

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
PPT steganography
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
steganography
steganographysteganography
steganographyManika Arora
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)Firdous Ahmad Khan
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Steganography
SteganographySteganography
SteganographyNeha Sharma
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Cryptography
CryptographyCryptography
Cryptographysubodh pawar
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography
SteganographySteganography
Steganographysandeipz
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- Nikhil Praharshi
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyHushen Savani
 
Information hiding
Information hidingInformation hiding
Information hidingTabassumSaifi2
 

What's hot (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Cryptography
CryptographyCryptography
Cryptography
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 

Viewers also liked

Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
Cox&king manendra shukla
Cox&king manendra shuklaCox&king manendra shukla
Cox&king manendra shuklaManendra Shukla
 
Steganography ppt
Steganography pptSteganography ppt
Steganography pptVikas Sharma
 
Cox and kings project
Cox and kings projectCox and kings project
Cox and kings projectMuskan Asnani
 
Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)guest28c6d
 
Internship report
Internship reportInternship report
Internship reportSajjad Ashraf
 

Viewers also liked (6)

Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Cox&king manendra shukla
Cox&king manendra shuklaCox&king manendra shukla
Cox&king manendra shukla
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Cox and kings project
Cox and kings projectCox and kings project
Cox and kings project
 
Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)
 
Internship report
Internship reportInternship report
Internship report
 

Similar to Steganography ppt

Steganography
SteganographySteganography
SteganographyShawaizBajwa
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganographyVaibhav Khanna
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENSjusttest10
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptxjusttest10
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debateKristine Hejna
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slidesJames Eglinton
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor ProxiesBrijesh Kukreja
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyMatt Imrie
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.pptssuserba01a3
 

Similar to Steganography ppt (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Sujit
SujitSujit
Sujit
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENS
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptx
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debate
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
Steganography
SteganographySteganography
Steganography
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Threats
ThreatsThreats
Threats
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 

More from Taha Malampatti

Cultural heritage tourism
Cultural heritage tourismCultural heritage tourism
Cultural heritage tourismTaha Malampatti
 
Request dispacther interface ppt
Request dispacther interface pptRequest dispacther interface ppt
Request dispacther interface pptTaha Malampatti
 
Introduction to Android ppt
Introduction to Android pptIntroduction to Android ppt
Introduction to Android pptTaha Malampatti
 
Intodcution to Html
Intodcution to HtmlIntodcution to Html
Intodcution to HtmlTaha Malampatti
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to phpTaha Malampatti
 
Database Connectivity in PHP
Database Connectivity in PHPDatabase Connectivity in PHP
Database Connectivity in PHPTaha Malampatti
 
Cox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial TrainingCox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial TrainingTaha Malampatti
 
An application of 8085 register interfacing with LCD
An application  of 8085 register interfacing with LCDAn application  of 8085 register interfacing with LCD
An application of 8085 register interfacing with LCDTaha Malampatti
 
An application of 8085 register interfacing with LED
An application  of 8085 register interfacing with LEDAn application  of 8085 register interfacing with LED
An application of 8085 register interfacing with LEDTaha Malampatti
 
Java Virtual Machine
Java Virtual MachineJava Virtual Machine
Java Virtual MachineTaha Malampatti
 
The sunsparc architecture
The sunsparc architectureThe sunsparc architecture
The sunsparc architectureTaha Malampatti
 
Orthogonal Projection
Orthogonal ProjectionOrthogonal Projection
Orthogonal ProjectionTaha Malampatti
 
Compressors and its applications
Compressors and its applicationsCompressors and its applications
Compressors and its applicationsTaha Malampatti
 
Laws Of Gravitation
Laws Of GravitationLaws Of Gravitation
Laws Of GravitationTaha Malampatti
 

More from Taha Malampatti (17)

Lex & yacc
Lex & yaccLex & yacc
Lex & yacc
 
Cultural heritage tourism
Cultural heritage tourismCultural heritage tourism
Cultural heritage tourism
 
Request dispacther interface ppt
Request dispacther interface pptRequest dispacther interface ppt
Request dispacther interface ppt
 
Introduction to Android ppt
Introduction to Android pptIntroduction to Android ppt
Introduction to Android ppt
 
Intodcution to Html
Intodcution to HtmlIntodcution to Html
Intodcution to Html
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to php
 
Database Connectivity in PHP
Database Connectivity in PHPDatabase Connectivity in PHP
Database Connectivity in PHP
 
Cox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial TrainingCox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial Training
 
An application of 8085 register interfacing with LCD
An application  of 8085 register interfacing with LCDAn application  of 8085 register interfacing with LCD
An application of 8085 register interfacing with LCD
 
An application of 8085 register interfacing with LED
An application  of 8085 register interfacing with LEDAn application  of 8085 register interfacing with LED
An application of 8085 register interfacing with LED
 
Java Virtual Machine
Java Virtual MachineJava Virtual Machine
Java Virtual Machine
 
The sunsparc architecture
The sunsparc architectureThe sunsparc architecture
The sunsparc architecture
 
Orthogonal Projection
Orthogonal ProjectionOrthogonal Projection
Orthogonal Projection
 
Apple inc
Apple incApple inc
Apple inc
 
Blood donation
Blood donationBlood donation
Blood donation
 
Compressors and its applications
Compressors and its applicationsCompressors and its applications
Compressors and its applications
 
Laws Of Gravitation
Laws Of GravitationLaws Of Gravitation
Laws Of Gravitation
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

Steganography ppt

  • 2. TOPIC: STEGANOGRAPHY Prepared by: Shruti Ghelani-140050107031 Taha Malampattiwala-140050107052 Jinal Mayavanshi-140050107056
  • 3. INFORMATION HIDING • Information Hiding is a branch of computer science that deals with concealing the existence of a message • It is related to cryptography whose intent is to render messages unreadable except by the intended recipients • It employs technologies from numerous science disciplines: • Digital Signal Processing (Images, Audio, Video) • Cryptography • Information TheoryCoding Theory • Data Compression • Human Visual/Auditory perception • There are four primary sub-disciplines of Information Hiding • Steganography • Watermarking • Covert Channels • Anonymity
  • 4. • Alice and Bob • Classical names given to the parties wishing to communicate • Sometimes, you may have a Carol and a Dave • Eve, an adversary, can listen to but not modify or forge a message • (think passive eavesdropping) • Wendy the Warden, another adversary, can monitor, modify, or forge a message • A passive warden simply listens (like Eve) • An active warden may modify a message • A malicious warden may forge a fake message BASIC TERMINOLOGY
  • 5. What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible steganography - conceal the existence of the message
  • 6. • Steganography literally means “covered writing” • A stegosaurus has a covered back • Steganography’s primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought • Secondary goals: • prevent extraction from the cover file without destroying the cover • prevent destruction of the stego-message without destroying the cover • Most frequently, steganography is applied to images, but many other data or file types are possible • Audio • Video • Text • Executable programs
  • 7. The cover provides a host for transporting the hidden info. info embed -file extract info
  • 8. Digital Steganography • HTML message as cover? • computer program as cover? • network protocol headers • white space in text • unused space in buffer • least significant bits of image • slight distortion in sound file • “Easter eggs”
  • 9. Steganography in Images Two types of compression: • lossless (gif) • lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools • StegoDOS • White Noise Storm • S-tools • Outguess • Steghide
  • 10. APPLICATIONS OF INFORMATION HIDING• Covert military communications • Covert police communications • Criminals have learned that police are nearby when they hear encrypted communications, so they abate their activity for the moment • A steganographic system would prevent this detection • Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc. • Embedding textual data in medical images would better ensure that the picture belongs to a particular patient • This technique could apply to personal pictures, sounds, and movies • Tamper proofing – ensuring a data file has not been changed • Communicating in an oppressive country w/o free speech
  • 11. NEFARIOUS APPLICATIONS OF INFORMATION HIDING • You won’t find these applications in the book • money laundering • drug running • child pornography • spying (good or bad depending upon which side you’re on!) • terrorism • Unfortunately, these uses are also possible • The technology itself isn’t bad, but like many things, it can be (and is) abused • Since there are nefarious uses, law enforcement and the military is also interested in understanding hiding techniques and detecting hidden data • There are some projects right here at UTSA that have done research for the Air Force
  • 12. STEGANALYSIS • Steganalysis is the detection of data that has been hidden • It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it • In the summer course last year, one student thought he had a hiding system that was undetectable • His lab partner wrote a statistical analysis program that exposed the hidden message • The first student modified his program to defeat the attack • His lab partner modified his analyzer and still found the message