SlideShare a Scribd company logo
1 of 31
Information and Network Security:17
Steganography
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Steganography
• an alternative to encryption
• hides existence of message
• using only a subset of letters/words in a longer message marked in some way
• using invisible ink
• hiding in LSB in graphic image or sound file
• has drawbacks
• high overhead to hide relatively few info bits
• advantage is can obscure encryption use
Steganography
• Steganography is an alternative to encryption which hides the very
existence of a message by some means. There are a large range of
techniques for doing this.
• Steganography has a number of drawbacks when compared to
encryption. It requires a lot of overhead to hide a relatively few bits of
information.
• Also, once the system is discovered, it becomes virtually worthless,
although a message can be first encrypted and then hidden using
steganography.
• The advantage of steganography is that it can be employed by parties
who have something to lose should the fact of their secret
communication (not necessarily the content) be discovered.
Classes of Information Hiding
• Digital watermarking
• Steganography
• Covert channels
• Anonymous communication
• Protocol obfuscation
4
Principles of assurance: CIA
• Confidentiality
– Keeping data and resources hidden
• Integrity
– Data integrity (integrity)
– Origin integrity (authentication)
• Availability
– Enabling access to data and resources
5
• Confidentiality: a good example is cryptography, which traditionally is used to protect secret
messages. But cryptography is traditionally used to protect data, not resources. Resources are
protected by limiting information, for example by using firewalls or address translation
mechanisms.
• Integrity: a good example here is that of an interrupted database transaction, leaving the
database in an inconsistent state (this foreshadows the Clark-Wilson model). Trustworthiness of
both data and origin affects integrity, as noted in the book’s example. That integrity is tied to
trustworthiness makes it much harder to quantify than confidentiality. Cryptography provides
mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature
can be used to determine if data has changed).
• Availability: this is usually defined in terms of “quality of service,” in which authorized users are
expected to receive a specific level of service (stated in terms of a metric). Denial of service
attacks are attempts to block availability.
Confidentiality
• Encryption is the main tool
• But, sometimes it is not enough!
• Examples:
• Drug dealer
• Military scenario
• Whistle blower
7
Information Hiding
• IH dates back to ancient Greece and Persia
• Well, not this type of hiding
8
• Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny
ball and covered in wax. The messenger then swallowed the ball of wax.
• In the sixteenth century, the Italian scientist Giovanni Porta described how to
conceal a message within a hard-boiled egg by making an ink from a mixture of
one ounce of alum and a pint of vinegar, and then using ink to write on the shell.
The ink penetrated the porous shell, and left the message on the surface of the
hardened egg albumen, which could be read only when the shell was removed.
• Special “inks” were important steganographic tools even during Second World
War.
• During Second World War a technique was developed to shrink photographically
a page of text into a dot less than one millimeter in diameter, and then hide this
microdot in an apparently innocuous letter. (The first microdot has been spotted
by FBI in 1941.)
(Digital) Information Hiding
• Definition: Concealing the very existence of some kind of information
(e.g., a series of data bits, the identity of the communicating party,
etc.) for some specific purpose (e.g., to prove ownership, to remain
untraceable, etc.)
10
Information confidentiality protection
• IH does not intend to hide the contents of information
• Encryption
• Information confidentiality protection tools can be combined with
information hiding techniques
11
Applications, or why we need to hide
information
• Improve confidentiality by hiding the very existence of messages
• Prove ownership on digital media
• Fingerprint media for trace back
• Blocking resistance
• Forensics
• …
12
Classes of Information Hiding
Steganography
Digital watermarking
Covert channels
Anonymous communication
Protocol obfuscation
• Not a class of information hiding:
• Encryption
• There are various classifications
13
Steganography
• Embedding some information (stegotext) within a digital media
(covertext) so that the digital media looks unchanged (imperceptible)
to a human/machine
14
General model
15
Why can we hide?
• Because there are unused/redundant data bits in digital media, that
changing them will be imperceptible
• E.g., image compression significantly reduces the size of an image by
removing some of the redundant information bits.
• The unused/redundant data can be used to hide some digital
information
16
Example
17
Types of Cover Media
• We can hide information in pretty much any digital media:
• Audio
• Image
• Video
• Graphics
• Text files
• Software
• Digital events (e.g., timings)
• Network traffic
18
Classes of Information Hiding
Steganography
Digital watermarking
Covert channels
Anonymous communication
Protocol obfuscation
• Not a class of information hiding:
• Encryption
• There are various classifications
19
Digital watermarking
• Embedding some information (watermark) within a digital media
(covertext) so that the digital media looks unchanged (imperceptible)
to a human/machine
20
Watermarking vs. Steganography
• Watermarking:
• The hidden information itself is not important by itself (no secure), it says
something about the covertext
• Steganography:
• The covertext has no value, it is only there to convey the stegotext. Stegotext
is the valuable information, and is independent of covertext.
21
Applications:
Watermarking vs. Steganography
• Watermarking:
• Authenticity: proof of ownership
• Fingerprinting: piracy tracking
• Integrity: tamper detection
• Data augmentation: add meta-data
• Steganography
• Stealthy communication of messages
• Watermarking usually needs lower data capacity
22
Attacks:
Watermarking vs. Steganography
• Attacker’s objective:
• Watermarking: remove the watermark without distorting the covertext, or
change the covertext without distoring the watermark
• Steganography: detect the presence of the hidden message, and extract it
23
Types of watermarking/steganography
• Fragile vs. robust
• Fragile is expected to destroy with modifications. Robust is expected to
survive noise.
24
Example application: tamper detection
Original Image
Tampered Image
25
Example application: tamper detection
26
Types of watermarking/steganography
• Fragile vs. robust
• Fragile is expected to destroy with modifications. Robust is expected to
survive noise.
• Blind vs. semi-blind vs. non-blind
• Blind needs the original covertext for detection. Semi-blind needs some
information from the insertion, but not the whole covertext.
27
A blind scheme
28
Types of watermarking/steganography
• Fragile vs. robust
• Fragile is expected to destroy with modifications. Robust is expected to
survive noise.
• Blind vs. semi-blind vs. non-blind
• Blind needs the original covertext for detection. Semi-blind needs some
information from the insertion, but not the whole covertext.
• Pure vs. secret key vs. public key
• Pure needs no key for detection. Secret key schemes needs a secret key for
both embedding and detection. Public key schemes use a secret key for
embedding, a secret key for detection.
29
Pure vs. secret key vs. public key
30
Assignment
• Explain the concept and application of Steganography

More Related Content

What's hot

A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Imagesijtsrd
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docxUJJWALPAL15
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data inijwmn
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 

What's hot (20)

Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Steganography
SteganographySteganography
Steganography
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data in
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 

Similar to Information and network security 17 steganography

Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptSudhanshuKarna
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarkingamitchauhan1990
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Steganography
SteganographySteganography
SteganographySonam M
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENSjusttest10
 

Similar to Information and network security 17 steganography (20)

Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Steganography
SteganographySteganography
Steganography
 
Crytography
CrytographyCrytography
Crytography
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENS
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Information and network security 17 steganography

  • 1. Information and Network Security:17 Steganography Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Steganography • an alternative to encryption • hides existence of message • using only a subset of letters/words in a longer message marked in some way • using invisible ink • hiding in LSB in graphic image or sound file • has drawbacks • high overhead to hide relatively few info bits • advantage is can obscure encryption use
  • 3. Steganography • Steganography is an alternative to encryption which hides the very existence of a message by some means. There are a large range of techniques for doing this. • Steganography has a number of drawbacks when compared to encryption. It requires a lot of overhead to hide a relatively few bits of information. • Also, once the system is discovered, it becomes virtually worthless, although a message can be first encrypted and then hidden using steganography. • The advantage of steganography is that it can be employed by parties who have something to lose should the fact of their secret communication (not necessarily the content) be discovered.
  • 4. Classes of Information Hiding • Digital watermarking • Steganography • Covert channels • Anonymous communication • Protocol obfuscation 4
  • 5. Principles of assurance: CIA • Confidentiality – Keeping data and resources hidden • Integrity – Data integrity (integrity) – Origin integrity (authentication) • Availability – Enabling access to data and resources 5
  • 6. • Confidentiality: a good example is cryptography, which traditionally is used to protect secret messages. But cryptography is traditionally used to protect data, not resources. Resources are protected by limiting information, for example by using firewalls or address translation mechanisms. • Integrity: a good example here is that of an interrupted database transaction, leaving the database in an inconsistent state (this foreshadows the Clark-Wilson model). Trustworthiness of both data and origin affects integrity, as noted in the book’s example. That integrity is tied to trustworthiness makes it much harder to quantify than confidentiality. Cryptography provides mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature can be used to determine if data has changed). • Availability: this is usually defined in terms of “quality of service,” in which authorized users are expected to receive a specific level of service (stated in terms of a metric). Denial of service attacks are attempts to block availability.
  • 7. Confidentiality • Encryption is the main tool • But, sometimes it is not enough! • Examples: • Drug dealer • Military scenario • Whistle blower 7
  • 8. Information Hiding • IH dates back to ancient Greece and Persia • Well, not this type of hiding 8
  • 9. • Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and covered in wax. The messenger then swallowed the ball of wax. • In the sixteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using ink to write on the shell. The ink penetrated the porous shell, and left the message on the surface of the hardened egg albumen, which could be read only when the shell was removed. • Special “inks” were important steganographic tools even during Second World War. • During Second World War a technique was developed to shrink photographically a page of text into a dot less than one millimeter in diameter, and then hide this microdot in an apparently innocuous letter. (The first microdot has been spotted by FBI in 1941.)
  • 10. (Digital) Information Hiding • Definition: Concealing the very existence of some kind of information (e.g., a series of data bits, the identity of the communicating party, etc.) for some specific purpose (e.g., to prove ownership, to remain untraceable, etc.) 10
  • 11. Information confidentiality protection • IH does not intend to hide the contents of information • Encryption • Information confidentiality protection tools can be combined with information hiding techniques 11
  • 12. Applications, or why we need to hide information • Improve confidentiality by hiding the very existence of messages • Prove ownership on digital media • Fingerprint media for trace back • Blocking resistance • Forensics • … 12
  • 13. Classes of Information Hiding Steganography Digital watermarking Covert channels Anonymous communication Protocol obfuscation • Not a class of information hiding: • Encryption • There are various classifications 13
  • 14. Steganography • Embedding some information (stegotext) within a digital media (covertext) so that the digital media looks unchanged (imperceptible) to a human/machine 14
  • 16. Why can we hide? • Because there are unused/redundant data bits in digital media, that changing them will be imperceptible • E.g., image compression significantly reduces the size of an image by removing some of the redundant information bits. • The unused/redundant data can be used to hide some digital information 16
  • 18. Types of Cover Media • We can hide information in pretty much any digital media: • Audio • Image • Video • Graphics • Text files • Software • Digital events (e.g., timings) • Network traffic 18
  • 19. Classes of Information Hiding Steganography Digital watermarking Covert channels Anonymous communication Protocol obfuscation • Not a class of information hiding: • Encryption • There are various classifications 19
  • 20. Digital watermarking • Embedding some information (watermark) within a digital media (covertext) so that the digital media looks unchanged (imperceptible) to a human/machine 20
  • 21. Watermarking vs. Steganography • Watermarking: • The hidden information itself is not important by itself (no secure), it says something about the covertext • Steganography: • The covertext has no value, it is only there to convey the stegotext. Stegotext is the valuable information, and is independent of covertext. 21
  • 22. Applications: Watermarking vs. Steganography • Watermarking: • Authenticity: proof of ownership • Fingerprinting: piracy tracking • Integrity: tamper detection • Data augmentation: add meta-data • Steganography • Stealthy communication of messages • Watermarking usually needs lower data capacity 22
  • 23. Attacks: Watermarking vs. Steganography • Attacker’s objective: • Watermarking: remove the watermark without distorting the covertext, or change the covertext without distoring the watermark • Steganography: detect the presence of the hidden message, and extract it 23
  • 24. Types of watermarking/steganography • Fragile vs. robust • Fragile is expected to destroy with modifications. Robust is expected to survive noise. 24
  • 25. Example application: tamper detection Original Image Tampered Image 25
  • 27. Types of watermarking/steganography • Fragile vs. robust • Fragile is expected to destroy with modifications. Robust is expected to survive noise. • Blind vs. semi-blind vs. non-blind • Blind needs the original covertext for detection. Semi-blind needs some information from the insertion, but not the whole covertext. 27
  • 29. Types of watermarking/steganography • Fragile vs. robust • Fragile is expected to destroy with modifications. Robust is expected to survive noise. • Blind vs. semi-blind vs. non-blind • Blind needs the original covertext for detection. Semi-blind needs some information from the insertion, but not the whole covertext. • Pure vs. secret key vs. public key • Pure needs no key for detection. Secret key schemes needs a secret key for both embedding and detection. Public key schemes use a secret key for embedding, a secret key for detection. 29
  • 30. Pure vs. secret key vs. public key 30
  • 31. Assignment • Explain the concept and application of Steganography