Published on

Published in: Technology
1 Comment
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Presented by Viji.A Rollno:42 Bsc(cs)
  2. 2. INTRODUCTION Advance security is not maintained by password protection but it is gained by hiding the existence of the data, which can only be done by steganography Steganography is a subject which is rarely touched up on by most IT security enthusiasts It can hide messages inside of digital objects such as a file that has been concealed inside a digital picture, video or audio file
  3. 3. DEFINITION Steganography or stego as it is often referred to in the IT community, literally means, “covered writing” which is derived from the Greek language It is the art and science of communicating in a way which hides the existence of the communication
  4. 4. Why it is important? Steganographic technologies are very important part of the future of internet security and privacy Many governments have created laws that either limit the strength of cryptosystems or prohibit them completely The goal of this technology is to hide messages inside other harmless message in a way that does not allow any enemy to even detect that there is a second message present
  5. 5. TYPES OF STEGANOGRAPHY Pure steganography Secret key steganography Public key steganography
  6. 6. A STEGANOGRAPHIC SYSTEM Message file Message file Cover file Steganographic tool Steganographic tool Steg file Steg file (with hidden data) (with hidden data)
  7. 7. Examples of steganographyHere’s the butterfly And here’s the fortress, with its guns:
  8. 8. Captured Spies Used Steganography to Send Messages tothe Russian Intelligence Service.
  9. 9. Information is hidden in one of these two images. Can you determine which one?
  10. 10. Figure 2: This is the image that was hidden in the previous figure.Picture-in-picture, if you will.
  11. 11. ADVANTAGES It is used in the way of hiding not the Information but the password to reach that Information. Difficult to detect .Only receiver can detect. Can be applied differently in digital image, audio & video file. It can be done faster with the large no of softwares
  12. 12. DISADVANTAGES Huge number of data = huge file size, so some one can suspect about it. In sending and receiving information can be leaked. The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over. If this technique is gone in the wrong hands like hackers, terrorist ,criminals then this can be very much dangerous for all.
  13. 13. CONCLUSION Though steganography is not implemented in wider ways but it can be the best security tool. The main problem of todays world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography. If it gets in the hand of terrorist then it could be even worse than WTC Attack in which steganography was use