Stegnography final


Published on

Published in: Technology
  • Be the first to comment

Stegnography final

  1. 1. under the guidance of: Presented by:Miss Surapriya swain Nikhil KumarMR Alok Kumar pani Reg no :0601221172
  2. 2.  Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography, Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuries—for fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.
  3. 3. What is What isSteganography Encryption Converting the dataHiding the fact that into non readableinformation is being . (non perceivable)sent. dataUsually hiding the It’s a way to passdata inside other data so that itdata. become safe.The data is passed in Any unauthorizedan unusual person is not ablecommunication to understand itmanner. 1 2
  4. 4. Fusion Invisible Merge Steganography Encryption
  5. 5. Needs to send Sud get d mesgprivate mesg without anybody sees it
  6. 6. Alice Wendy Bob OriginalSecret Key ImageImage Encryption Stegano Message Secret Normal Image Algorithm Algorithm Retrieval Message Secret Message Secret Key Image Ordinary Image
  7. 7.  Payload: the data that is desirable for transport Carrier: signal, stream or data file into which the payload is hidden Channel: type of input, such as JPEG image Package: the resulting signal, stream or data file which has the payload encoded Encoding density: the percentage of byteswhich are modified to encode the payload,typically as a floating-point number between 0and 1
  8. 8. SteganographicTechniques Genome Steganography Hiding in Text Hiding in the disk space Hiding data in software and circuitry Information Hiding in Images Hiding in network packets Hiding in music files & video
  9. 9. Apparently neutral’s protest is p e r s h i nthoroughly discounted andignored. Isman hard hit. g s a i l s f rBlockade issue affects pretextfor embargo on by-products, o m n yejecting suets and vegetable j u n e ioils. An instace from wwii
  10. 10. p e r sh i ng s a il s f ro m n yj u n ei
  11. 11. How It Work’s in case of images Key Image is an image which under goes in to an Encryption a clone of original This image is Original image is the image generating Algorithm which image which contains the whose clone is created generates a unique encryption hidden encrypted message technique .Key Image Original Image Clone of Original image UniqueAlgorithm Encryption Steganographic Technique Algorithm Message Message is encrypted using Encrypte unique encryption technique d Message
  12. 12. • 28 possible values for each color per pixel• Not much difference in intensity between 11111111 and 11111110• Change to least significant bit of each color yields 3 bits per pixel• One ASCII character can be represented for each 3 pixels• Given the following 8 carrier bytes10010101 00001101 11001001 1001011000001111 11001011 10011111 00010000• Assume we want to insert some payload – the letter ‘G’, in ASCII: 01000111• The resulting bytes are10010100 00001101 11001000 1001011000001110 11001011 10011111 00010001• Only half of the available bytes were affected by our insertion• Change is relatively undetectable
  13. 13. Sample Result Before Stganography After Stganography
  14. 14. Hiding in TCP Places to hide message - Reserved bits Aheader - Sequence number field - Initial Sequence Number (ISN) B oMakes use of three- way handshake in buildup of a TCP/IP connection C
  15. 15. Unused Header BitStuffing Padding Byte Stuffing
  16. 16.  Statistical analysis Analyze frequency of DCT coefficients compressing
  17. 17. Where it can be USED – Applications?Government Agencies: -- Security companies: -- Can USEwho store documents And SELL IBES products as stand alone or as a part of their biggerwhich are very sensitive packageBusiness people: -- Banks and other financialpreserve legal and customer institutions: -- safeguardspecific financial documents their databases Private Organizations: -- who want Digital Watermarking to safeguard their Digital Signature Authentication sensitive information Digital Linkage and Storage
  18. 18. Steganography is a fascinating and effective method ofhiding data that has been used throughout history.Methods that can be employed to uncover suchdevious tactics, but the first step are awareness thatsuch methods even exist. There are many goodreasons as well to use this type of data hiding,including watermarking or a more secure centralstorage method for such things as passwords, or keyprocesses. Regardless, the technology is easy to useand difficult to detect. The more that you know about itsfeatures and functionality, the more ahead you will be inthe game.
  19. 19. Thank you 21