SlideShare a Scribd company logo
1 of 13
Steganography
What is Steganography?What is Steganography?
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
 Steganography is the art and science
of writing hidden messages in such a
way that no one apart from the
intended recipient knows of the
existence of the message.
 This can be achieve by concealing the
existence of information within
seemingly harmless carriers or cover
Branches of Information Hiding
There are two major branches of information hiding, Steganography
and Watermarking
Watermarking:
 Communication in watermarking is the host signal, with the
embedded data providing copyright protection.
 The existence of a watermark is often declared openly.
 Any attempt to remove or invalidate the embedded content
renders the host useless.
 They are of two types:
Visible watermarking
Invisible watermarking
Once the presence of hidden information is revealed or even
suspected, the purpose of steganography is defeated.
History of SteganographyHistory of Steganography
Demeratus sent a warning about a forthcoming attack to Greece by
writing it on a wooden panel and covering it in wax.
Histiaeus, who shaved the head of his most trusted slave and tattooed
a message on it. After his hair had grown the message was hidden.
The purpose was to instigate a revolt against the Persians.
World War II
Invincible inks
Null ciphers (unencrypted messages):
Apparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on by
products, ejecting suets and vegetable oils.
Sent by a German Spy in WWII, by taking the second letter in each
word the following message emerges:
Pershing sails from NY June 1.
Microdot Technology
 Shrinking messages down
to the size of a dot became
a popular method. Since
the microdot could be
placed at the end of a
sentence or above a j or an
i.
Modern Steganography
Techniques
Masking and Filtering: Is where information is hidden inside of a
image using digital watermarks that include information such as
copyright, ownership, or licenses.
Algorithms and Transformations: This technique hides data in
mathematical functions that are often used in compression
algorithms. The idea of this method is to hide the secret message
in the data bits in the least significant coefficients.
Least Significant Bit Insertion: The most common and popular
method of modern day steganography is to make use of the LSB of
a picture’s pixel information.This technique works best when the
image file is larger then the message file and if the image is
grayscale.
Basics of Modern SteganographySteganography
fE:     steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message
Important Requirement forImportant Requirement for
Steganographic SystemSteganographic System
 Security of the hidden communication
 Robustness against statistical attacks
 Robustness against image
manipulations
Applications
 Usage in modern printers
 Alleged use by terrorists
 Alleged use by intelligence services
Alleged use by terrorists
Origional Encrypted Image
Detection of SteganographicDetection of Steganographic
Content/CountermeasuresContent/Countermeasures
The detection of steganographically encoded
packages is called Steganalysis.
 Visual Analysis tries to reveal the presence
of secret communication through inspection,
either with the naked eye or with the assistance
of a computer.
 Statistical (Algorithmic) Analysis reveals
tiny alterations in an image's statistical behavior
caused by steganographic embedding.
 The nominally universal methods developed to detect
embedded stego-data are generally less effective
than the steganalytic methods aimed at specific types
of embedding.
Steganography Sample WebsiteSteganography Sample Website
 Here is the link for Sample Steganographic
tool Website:
http://mozaiq.org/
Any Querieries ???

More Related Content

What's hot

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
 

What's hot (20)

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
Steganography
Steganography Steganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Email security
Email securityEmail security
Email security
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Pgp
PgpPgp
Pgp
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked (18)

Technology
TechnologyTechnology
Technology
 
New energy resources
New energy resourcesNew energy resources
New energy resources
 
Nike
NikeNike
Nike
 
Dealing with difficult people
Dealing with difficult peopleDealing with difficult people
Dealing with difficult people
 
Brain rules
Brain rulesBrain rules
Brain rules
 
123
123123
123
 
Stop reservation
Stop reservationStop reservation
Stop reservation
 
Apple
AppleApple
Apple
 
Speaking tips in the public
Speaking tips in the publicSpeaking tips in the public
Speaking tips in the public
 
Biometrics
Biometrics Biometrics
Biometrics
 
Growth of facebook
Growth of facebookGrowth of facebook
Growth of facebook
 
Ipad with the computer networking - csc1202 - alhanouf alrobea’an
Ipad with the computer networking - csc1202 - alhanouf  alrobea’anIpad with the computer networking - csc1202 - alhanouf  alrobea’an
Ipad with the computer networking - csc1202 - alhanouf alrobea’an
 
Social Networking Effects Social Life
Social Networking Effects Social LifeSocial Networking Effects Social Life
Social Networking Effects Social Life
 
Input device
Input deviceInput device
Input device
 
How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
 
Inflection
InflectionInflection
Inflection
 
Mc donalds
Mc donalds Mc donalds
Mc donalds
 
Burj Khalifa
Burj KhalifaBurj Khalifa
Burj Khalifa
 

Similar to Steganography

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography
SteganographySteganography
Steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
Steganography Steganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography.
Steganography.Steganography.
Steganography.
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

More from Divam Goyal (19)

Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
 
Technology
TechnologyTechnology
Technology
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
Blade server
Blade serverBlade server
Blade server
 
SOPA
SOPASOPA
SOPA
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Operating System
Operating SystemOperating System
Operating System
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Big bazaar
Big bazaarBig bazaar
Big bazaar
 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
 
Android
AndroidAndroid
Android
 
Social networking
Social networkingSocial networking
Social networking
 
Number of respondents belongs to selected banks
Number of respondents belongs to selected banksNumber of respondents belongs to selected banks
Number of respondents belongs to selected banks
 
Palm jumeirah
Palm jumeirah Palm jumeirah
Palm jumeirah
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
Playing videos in html
Playing videos in htmlPlaying videos in html
Playing videos in html
 
Polarization photography
Polarization photographyPolarization photography
Polarization photography
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Steganography

  • 2. What is Steganography?What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover
  • 3. Branches of Information Hiding There are two major branches of information hiding, Steganography and Watermarking Watermarking:  Communication in watermarking is the host signal, with the embedded data providing copyright protection.  The existence of a watermark is often declared openly.  Any attempt to remove or invalidate the embedded content renders the host useless.  They are of two types: Visible watermarking Invisible watermarking Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
  • 4. History of SteganographyHistory of Steganography Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. World War II Invincible inks Null ciphers (unencrypted messages): Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Sent by a German Spy in WWII, by taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 5. Microdot Technology  Shrinking messages down to the size of a dot became a popular method. Since the microdot could be placed at the end of a sentence or above a j or an i.
  • 6. Modern Steganography Techniques Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients. Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information.This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 7. Basics of Modern SteganographySteganography fE:     steganographic function "embedding" fE-1:   steganographic function "extracting" cover:  cover data in which emb will be hidden emb:    message to be hidden key:    parameter of fE stego:  cover data with the hidden message
  • 8. Important Requirement forImportant Requirement for Steganographic SystemSteganographic System  Security of the hidden communication  Robustness against statistical attacks  Robustness against image manipulations
  • 9. Applications  Usage in modern printers  Alleged use by terrorists  Alleged use by intelligence services
  • 10. Alleged use by terrorists Origional Encrypted Image
  • 11. Detection of SteganographicDetection of Steganographic Content/CountermeasuresContent/Countermeasures The detection of steganographically encoded packages is called Steganalysis.  Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.  Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  • 12. Steganography Sample WebsiteSteganography Sample Website  Here is the link for Sample Steganographic tool Website: http://mozaiq.org/