SlideShare a Scribd company logo
1 of 31
Chameli Devi School Of
Engineering
STEGANOGRAPHY
Submitted By :-
Arvind Carpenter
Guided By :-
Ms. Renu Dangi
MAIN POINTS
 WHAT IS STEGANOGRAPHY?
 HISTORY
 STEGANOGRAPHY
 TOOLS
 STEGANOGRAPHY V/S CRYPTOGRAPHY
 TYPES OF STEGANOGRAPHY
 TECHNIQUES
 PRACTICAL APPROACH
 DETECTION
 ADVANTAGES
 NEGATIVE ASPECTS
 APPLICATIONS
 CONCLUSION
2
WHAT IS STEGANOGRAPHY?
 Definition
 Greek words
 STEGANOS-”Covered”
 GRAPHIE-”Writing”
 It is the process of hiding of secret message within an ordinary message and
extracting with its definition
 Anyone else viewing the message will fail to know it contains encrypted/hidden
data
 Invisible ink is also form of Steganography
 Used in World-War II
3
Steganography
 Modern digital steganography
 data is encrypted
 then inserted and hidden, using a special algorithm which may add and/or
modify the contents of the file
 This technique may simply append the data to the file, or disperse it throughout
 Carefully crafted programs apply the encrypted data such that patterns appear
normal.
4
Steganography-Requirements
 Security of the hidden communication
 Size of payload
 Robustness of malicious and unintentional attack
5
Steganography-Tools
Steganography Tools
 Steganos
 S-Tools (GIF, JPEG)
 StegHide (WAV, BMP)
 Invisible Secrets (JPEG)
 JPHide
 Camouflage
 Hiderman
 Many others…
6
Steganography-Carrier Files
Steganography Carrier Files
 bmp
 jpeg
 gif
 wav
 mp3
 Amongst others…
7
STEGANOGRAPHY TODAY
 Steganography Today, however, is significantly more sophisticated
than the examples above suggest, allowing a user to hide large
amounts of information within image and audio files. These forms of
steganography often are used in conjunction with cryptography so
that the information is doubly protected; first it is encrypted and then
hidden so that an adversary has to first find the information (an
often difficult task in and of itself) and then decrypt it.
8
Steganography v/s Cryptography
 Cryptography hides the contents of a secret message from a
malicious people, whereas Steganography even conceals the
existence of the message
 In cryptography, the structure of a message is scrambled to make it
meaningless and unintelligible unless the decryption key is available
 Steganography does not alter the structure of the secret message,
but hides it inside a cover-image so it cannot be seen.
9
Types of Steganography
 Steganography In Text/Documents
 Steganography In Images
 Steganography In Audio
 Steganography In Video
10
Steganography Techniques
 Injection: Injection is quite a simple method which simply involves
directly injecting the secret information into the carrier file.
 Substitution: Replacement of the least significant bits of information
that determine the meaningful content of the original file with new
data in a way that causes the least amount of distortion.
 Generation: The generation technique, unlike injection and
substitution, requires only a covert file, as it is used to create the
covert file.
11
Modern Steganography Techniques
 Masking and Filtering:
Is where information is hidden inside of a image using digital watermarks that
include information such as copyright, ownership, or licenses. The purpose is different
from traditional steganography since it is adding an attribute to the cover image thus
extending the amount of information presented.
 Algorithms and Transformations:
This technique hides data in mathematical functions that are often used in
compression algorithms. The idea of this method is to hide the secret message in the
data bits in the least significant coefficients.
 Least Significant Bit Insertion:
The most common and popular method of modern day steganography is to
make use of the LSB of a picture’s pixel information. Thus the overall image distortion is
kept to a minimum while the message is spaced out over the pixels in the images. This
technique works best when the image file is larger than the message file and if the
image is grayscale.
12
Images Based Techniques
 Least Significant Technique
 Masking and Filtering
13
Least Significant Bits
 Replaces significant bits with message to be encoded
 Most popular technique when dealing with images
 Simple, but susceptible to lossy compression and manipulation
 Best to use a grayscale palette or one with gradual changes in
shades
 Otherwise, it is best to use images with “noisy areas” – areas with
ample color variation and without large areas of solid color
14
• Example : Insert a word TEXT
- T = 01100010
- E = 01101111
- X = 01101101
- T = 01100010
• Image Bits before
• Image Bits after
15
15
LSB uses
 Storing passwords and/or other confidential information
 Covert communication of sensitive data
 Speculated uses in terrorist activities
 Being widely used to hide and/or transfer illegal content
16
Masking and Filtering
 Masks secret data over the original data by changing the
luminance of particular areas
 During masking, it embed the message within significant bits of the
cover image
 Not susceptible to lossy techniques because image manipulation
does not affect the secret message
17
Masking and Filtering-Uses
 Digital Watermarking – provides identification pertaining to the
owner; i.e. license or copyright information
- Invisible vs Visible
 Fingerprinting – provides identification of the user; used to identify
and track illegal use of content
18
Watermark example19
DETECTION
 Steganalysis- Identification of hidden data
 Definition
Identifying the existence of a message
Not extracting the message
Note: Technically, Steganography deals with the
concealment of a message, not the encryption of it
 Goal
 Accuracy
 Consistency
 Minimize false-positives
20
NEED FOR DETECTION
 Growing awareness of data hiding techniques and uses
 Availability and sophistication of shareware and
freeware data hiding software
 Concerns over use to hide serious crimes, e.g., drug
trafficking, pedophilia, terrorism
 Frees resources currently spent on investigating cases
with questionable/unknown payoff
 Legislative calls
21
Steganalysis-Methods Detection
Methods of detecting the use of Steganography
Visual Detection (JPEG, BMP, GIF, etc.)
Audible Detection (WAV, MPEG, etc.)
Statistical Detection (changes in patterns of the pixels
or LSB – Least Significant Bit) or Histogram Analysis
Structural Detection - View file properties/contents
size difference
date/time difference
contents – modifications
checksum
22
STEGANOGRAPHY DETECTION23
Steganalysis-Methods Detection
 Categories
 Anomaly
Histogram analysis
Change in file properties
Statistical Attack
Visually
Audible
 Signature
A pattern consistent with the program used
24
Anomaly-Histogram Analysis
 Histogram analysis can be used to possibly identify a file with a
hidden message
 By comparing histograms, we can see this histogram has a very
noticeable repetitive trend.
25
Steganalysis-Tools
 StegoWatch
 Identifies the presence of steganography through special statistical and analytical
programs.
 Accurate and comprehensive tool.
 Hides files in a video sequence
 Stegdetect :
 Automated tool for detecting steganographic content in images
 jsteg
 jphide (unix and windows) used for jpg
 invisible secrets
 outguess 01.3b
 F5 (header analysis)
 appendX and camouflage
26
Advantages
 It is used in the way of hiding not the Information but the
password to reach that Information.
 Messages do not attract attention to themselves i.e
difficult to detect. Only receiver can detect.
 The proposed technique uses LSB to hide data from a
pre defined position agreed between two parties. Same
position is only used once to enhance security.
 Can be applied differently in digital image, audio &
video file.
27
Negative Aspects
 Huge number of data results in huge file size, so some one can
suspect about it.
 In sending and receiving information can be leaked.
 It is Vulnerable to almost all media transformations.
 If this technique is used in a wrong way then this can be very much
dangerous.
28
Applications
 Confidential communication and secret data storing
 Protection of data alteration
 Used in modern printers
 Used by Terrorist(Al-Qaida hide info in porn videos)
 Protect copyrights, to maintain confidentiality.
 In 2010, the Federal Bureau of Investigation revealed that
the Russian foreign intelligence service uses customized
steganography software for embedding encrypted text
messages inside image files for certain communications with
"illegal agents" (agents under non-diplomatic cover)
stationed abroad
29
Conclusion
 Steganography is in the nascent stage of development.
 The importance of Steganography has not been realized to that
stage where it is preferred over its close rival “Encryption”.
 Steganography can be used as benefitial tool for privacy
 Lossless compression of images with a great deal of color variation
work best as a cover image to embed a message.
30
THANK YOU
31

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
Nikhil Kumar
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
Sanoj Kumar
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography
SteganographySteganography
Steganography
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
C01111519
C01111519C01111519
C01111519
 
Steganography
SteganographySteganography
Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography
SteganographySteganography
Steganography
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 

Viewers also liked

Viewers also liked (10)

6th sense technology
6th sense technology6th sense technology
6th sense technology
 
Biochipss
BiochipssBiochipss
Biochipss
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
3D internet
3D internet3D internet
3D internet
 
Data compession
Data compession Data compession
Data compession
 
Biochips
BiochipsBiochips
Biochips
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
4G Technology
4G Technology4G Technology
4G Technology
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Similar to Steganograpy

LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 

Similar to Steganograpy (20)

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography
SteganographySteganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Steganograpy

  • 1. Chameli Devi School Of Engineering STEGANOGRAPHY Submitted By :- Arvind Carpenter Guided By :- Ms. Renu Dangi
  • 2. MAIN POINTS  WHAT IS STEGANOGRAPHY?  HISTORY  STEGANOGRAPHY  TOOLS  STEGANOGRAPHY V/S CRYPTOGRAPHY  TYPES OF STEGANOGRAPHY  TECHNIQUES  PRACTICAL APPROACH  DETECTION  ADVANTAGES  NEGATIVE ASPECTS  APPLICATIONS  CONCLUSION 2
  • 3. WHAT IS STEGANOGRAPHY?  Definition  Greek words  STEGANOS-”Covered”  GRAPHIE-”Writing”  It is the process of hiding of secret message within an ordinary message and extracting with its definition  Anyone else viewing the message will fail to know it contains encrypted/hidden data  Invisible ink is also form of Steganography  Used in World-War II 3
  • 4. Steganography  Modern digital steganography  data is encrypted  then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file  This technique may simply append the data to the file, or disperse it throughout  Carefully crafted programs apply the encrypted data such that patterns appear normal. 4
  • 5. Steganography-Requirements  Security of the hidden communication  Size of payload  Robustness of malicious and unintentional attack 5
  • 6. Steganography-Tools Steganography Tools  Steganos  S-Tools (GIF, JPEG)  StegHide (WAV, BMP)  Invisible Secrets (JPEG)  JPHide  Camouflage  Hiderman  Many others… 6
  • 7. Steganography-Carrier Files Steganography Carrier Files  bmp  jpeg  gif  wav  mp3  Amongst others… 7
  • 8. STEGANOGRAPHY TODAY  Steganography Today, however, is significantly more sophisticated than the examples above suggest, allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself) and then decrypt it. 8
  • 9. Steganography v/s Cryptography  Cryptography hides the contents of a secret message from a malicious people, whereas Steganography even conceals the existence of the message  In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is available  Steganography does not alter the structure of the secret message, but hides it inside a cover-image so it cannot be seen. 9
  • 10. Types of Steganography  Steganography In Text/Documents  Steganography In Images  Steganography In Audio  Steganography In Video 10
  • 11. Steganography Techniques  Injection: Injection is quite a simple method which simply involves directly injecting the secret information into the carrier file.  Substitution: Replacement of the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion.  Generation: The generation technique, unlike injection and substitution, requires only a covert file, as it is used to create the covert file. 11
  • 12. Modern Steganography Techniques  Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. The purpose is different from traditional steganography since it is adding an attribute to the cover image thus extending the amount of information presented.  Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients.  Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger than the message file and if the image is grayscale. 12
  • 13. Images Based Techniques  Least Significant Technique  Masking and Filtering 13
  • 14. Least Significant Bits  Replaces significant bits with message to be encoded  Most popular technique when dealing with images  Simple, but susceptible to lossy compression and manipulation  Best to use a grayscale palette or one with gradual changes in shades  Otherwise, it is best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color 14
  • 15. • Example : Insert a word TEXT - T = 01100010 - E = 01101111 - X = 01101101 - T = 01100010 • Image Bits before • Image Bits after 15 15
  • 16. LSB uses  Storing passwords and/or other confidential information  Covert communication of sensitive data  Speculated uses in terrorist activities  Being widely used to hide and/or transfer illegal content 16
  • 17. Masking and Filtering  Masks secret data over the original data by changing the luminance of particular areas  During masking, it embed the message within significant bits of the cover image  Not susceptible to lossy techniques because image manipulation does not affect the secret message 17
  • 18. Masking and Filtering-Uses  Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content 18
  • 20. DETECTION  Steganalysis- Identification of hidden data  Definition Identifying the existence of a message Not extracting the message Note: Technically, Steganography deals with the concealment of a message, not the encryption of it  Goal  Accuracy  Consistency  Minimize false-positives 20
  • 21. NEED FOR DETECTION  Growing awareness of data hiding techniques and uses  Availability and sophistication of shareware and freeware data hiding software  Concerns over use to hide serious crimes, e.g., drug trafficking, pedophilia, terrorism  Frees resources currently spent on investigating cases with questionable/unknown payoff  Legislative calls 21
  • 22. Steganalysis-Methods Detection Methods of detecting the use of Steganography Visual Detection (JPEG, BMP, GIF, etc.) Audible Detection (WAV, MPEG, etc.) Statistical Detection (changes in patterns of the pixels or LSB – Least Significant Bit) or Histogram Analysis Structural Detection - View file properties/contents size difference date/time difference contents – modifications checksum 22
  • 24. Steganalysis-Methods Detection  Categories  Anomaly Histogram analysis Change in file properties Statistical Attack Visually Audible  Signature A pattern consistent with the program used 24
  • 25. Anomaly-Histogram Analysis  Histogram analysis can be used to possibly identify a file with a hidden message  By comparing histograms, we can see this histogram has a very noticeable repetitive trend. 25
  • 26. Steganalysis-Tools  StegoWatch  Identifies the presence of steganography through special statistical and analytical programs.  Accurate and comprehensive tool.  Hides files in a video sequence  Stegdetect :  Automated tool for detecting steganographic content in images  jsteg  jphide (unix and windows) used for jpg  invisible secrets  outguess 01.3b  F5 (header analysis)  appendX and camouflage 26
  • 27. Advantages  It is used in the way of hiding not the Information but the password to reach that Information.  Messages do not attract attention to themselves i.e difficult to detect. Only receiver can detect.  The proposed technique uses LSB to hide data from a pre defined position agreed between two parties. Same position is only used once to enhance security.  Can be applied differently in digital image, audio & video file. 27
  • 28. Negative Aspects  Huge number of data results in huge file size, so some one can suspect about it.  In sending and receiving information can be leaked.  It is Vulnerable to almost all media transformations.  If this technique is used in a wrong way then this can be very much dangerous. 28
  • 29. Applications  Confidential communication and secret data storing  Protection of data alteration  Used in modern printers  Used by Terrorist(Al-Qaida hide info in porn videos)  Protect copyrights, to maintain confidentiality.  In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad 29
  • 30. Conclusion  Steganography is in the nascent stage of development.  The importance of Steganography has not been realized to that stage where it is preferred over its close rival “Encryption”.  Steganography can be used as benefitial tool for privacy  Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. 30

Editor's Notes

  1. This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010! For more sample templates, click the File tab, and then on the New tab, click Sample Templates.