1. Chameli Devi School Of
Engineering
STEGANOGRAPHY
Submitted By :-
Arvind Carpenter
Guided By :-
Ms. Renu Dangi
2. MAIN POINTS
WHAT IS STEGANOGRAPHY?
HISTORY
STEGANOGRAPHY
TOOLS
STEGANOGRAPHY V/S CRYPTOGRAPHY
TYPES OF STEGANOGRAPHY
TECHNIQUES
PRACTICAL APPROACH
DETECTION
ADVANTAGES
NEGATIVE ASPECTS
APPLICATIONS
CONCLUSION
2
3. WHAT IS STEGANOGRAPHY?
Definition
Greek words
STEGANOS-”Covered”
GRAPHIE-”Writing”
It is the process of hiding of secret message within an ordinary message and
extracting with its definition
Anyone else viewing the message will fail to know it contains encrypted/hidden
data
Invisible ink is also form of Steganography
Used in World-War II
3
4. Steganography
Modern digital steganography
data is encrypted
then inserted and hidden, using a special algorithm which may add and/or
modify the contents of the file
This technique may simply append the data to the file, or disperse it throughout
Carefully crafted programs apply the encrypted data such that patterns appear
normal.
4
8. STEGANOGRAPHY TODAY
Steganography Today, however, is significantly more sophisticated
than the examples above suggest, allowing a user to hide large
amounts of information within image and audio files. These forms of
steganography often are used in conjunction with cryptography so
that the information is doubly protected; first it is encrypted and then
hidden so that an adversary has to first find the information (an
often difficult task in and of itself) and then decrypt it.
8
9. Steganography v/s Cryptography
Cryptography hides the contents of a secret message from a
malicious people, whereas Steganography even conceals the
existence of the message
In cryptography, the structure of a message is scrambled to make it
meaningless and unintelligible unless the decryption key is available
Steganography does not alter the structure of the secret message,
but hides it inside a cover-image so it cannot be seen.
9
10. Types of Steganography
Steganography In Text/Documents
Steganography In Images
Steganography In Audio
Steganography In Video
10
11. Steganography Techniques
Injection: Injection is quite a simple method which simply involves
directly injecting the secret information into the carrier file.
Substitution: Replacement of the least significant bits of information
that determine the meaningful content of the original file with new
data in a way that causes the least amount of distortion.
Generation: The generation technique, unlike injection and
substitution, requires only a covert file, as it is used to create the
covert file.
11
12. Modern Steganography Techniques
Masking and Filtering:
Is where information is hidden inside of a image using digital watermarks that
include information such as copyright, ownership, or licenses. The purpose is different
from traditional steganography since it is adding an attribute to the cover image thus
extending the amount of information presented.
Algorithms and Transformations:
This technique hides data in mathematical functions that are often used in
compression algorithms. The idea of this method is to hide the secret message in the
data bits in the least significant coefficients.
Least Significant Bit Insertion:
The most common and popular method of modern day steganography is to
make use of the LSB of a picture’s pixel information. Thus the overall image distortion is
kept to a minimum while the message is spaced out over the pixels in the images. This
technique works best when the image file is larger than the message file and if the
image is grayscale.
12
14. Least Significant Bits
Replaces significant bits with message to be encoded
Most popular technique when dealing with images
Simple, but susceptible to lossy compression and manipulation
Best to use a grayscale palette or one with gradual changes in
shades
Otherwise, it is best to use images with “noisy areas” – areas with
ample color variation and without large areas of solid color
14
15. • Example : Insert a word TEXT
- T = 01100010
- E = 01101111
- X = 01101101
- T = 01100010
• Image Bits before
• Image Bits after
15
15
16. LSB uses
Storing passwords and/or other confidential information
Covert communication of sensitive data
Speculated uses in terrorist activities
Being widely used to hide and/or transfer illegal content
16
17. Masking and Filtering
Masks secret data over the original data by changing the
luminance of particular areas
During masking, it embed the message within significant bits of the
cover image
Not susceptible to lossy techniques because image manipulation
does not affect the secret message
17
18. Masking and Filtering-Uses
Digital Watermarking – provides identification pertaining to the
owner; i.e. license or copyright information
- Invisible vs Visible
Fingerprinting – provides identification of the user; used to identify
and track illegal use of content
18
20. DETECTION
Steganalysis- Identification of hidden data
Definition
Identifying the existence of a message
Not extracting the message
Note: Technically, Steganography deals with the
concealment of a message, not the encryption of it
Goal
Accuracy
Consistency
Minimize false-positives
20
21. NEED FOR DETECTION
Growing awareness of data hiding techniques and uses
Availability and sophistication of shareware and
freeware data hiding software
Concerns over use to hide serious crimes, e.g., drug
trafficking, pedophilia, terrorism
Frees resources currently spent on investigating cases
with questionable/unknown payoff
Legislative calls
21
22. Steganalysis-Methods Detection
Methods of detecting the use of Steganography
Visual Detection (JPEG, BMP, GIF, etc.)
Audible Detection (WAV, MPEG, etc.)
Statistical Detection (changes in patterns of the pixels
or LSB – Least Significant Bit) or Histogram Analysis
Structural Detection - View file properties/contents
size difference
date/time difference
contents – modifications
checksum
22
24. Steganalysis-Methods Detection
Categories
Anomaly
Histogram analysis
Change in file properties
Statistical Attack
Visually
Audible
Signature
A pattern consistent with the program used
24
25. Anomaly-Histogram Analysis
Histogram analysis can be used to possibly identify a file with a
hidden message
By comparing histograms, we can see this histogram has a very
noticeable repetitive trend.
25
26. Steganalysis-Tools
StegoWatch
Identifies the presence of steganography through special statistical and analytical
programs.
Accurate and comprehensive tool.
Hides files in a video sequence
Stegdetect :
Automated tool for detecting steganographic content in images
jsteg
jphide (unix and windows) used for jpg
invisible secrets
outguess 01.3b
F5 (header analysis)
appendX and camouflage
26
27. Advantages
It is used in the way of hiding not the Information but the
password to reach that Information.
Messages do not attract attention to themselves i.e
difficult to detect. Only receiver can detect.
The proposed technique uses LSB to hide data from a
pre defined position agreed between two parties. Same
position is only used once to enhance security.
Can be applied differently in digital image, audio &
video file.
27
28. Negative Aspects
Huge number of data results in huge file size, so some one can
suspect about it.
In sending and receiving information can be leaked.
It is Vulnerable to almost all media transformations.
If this technique is used in a wrong way then this can be very much
dangerous.
28
29. Applications
Confidential communication and secret data storing
Protection of data alteration
Used in modern printers
Used by Terrorist(Al-Qaida hide info in porn videos)
Protect copyrights, to maintain confidentiality.
In 2010, the Federal Bureau of Investigation revealed that
the Russian foreign intelligence service uses customized
steganography software for embedding encrypted text
messages inside image files for certain communications with
"illegal agents" (agents under non-diplomatic cover)
stationed abroad
29
30. Conclusion
Steganography is in the nascent stage of development.
The importance of Steganography has not been realized to that
stage where it is preferred over its close rival “Encryption”.
Steganography can be used as benefitial tool for privacy
Lossless compression of images with a great deal of color variation
work best as a cover image to embed a message.
30
This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010!
For more sample templates, click the File tab, and then on the New tab, click Sample Templates.