SlideShare a Scribd company logo
1 of 18
SEMINAR PRESENTATION
ON
STEGANOGRAPHY
PRESENTED TO:- PRESENTED BY:-
Er. K.P. GANGWAR POOJA PAL
ROLL NO.:-1347610026
BATCH:-CSE(2013-2017)
Overview
• Introduction
• History
• Basic model
• Techniques
• Physical techniques
• Digital techniques
• Steganography vs Cryptography
• Application
• Conclusion
Introduction
• Steganography from the Greek word steganos
meaning “covered” and the Greek word graphie
meaning “writing”.
• Steganography is the science of hiding information.
• This can be achieved by concealing the existence of
information within seemingly harmless carriers or
cover.
• Carrier: Text, Image, Audio, Video, etc.
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
History
• The first recorded uses of steganography can
be traced back to 440BC when Herodotus
mentions two examples in his Histories.
• Demaratus sent a warning about a
forthcoming attack to Greece.
• Herodotus, who shaved the head of his most
trusted slave and tattooed a message on it.
After his hair had grown the message was
hidden.
Steganography Techniques
1. Physical Techniques
2. Digital Techniques
Physical techniques
• Hidden messages within wax tablet.
• Hidden messages on messenger's body.
• Hidden messages on paper written in secret
inks
• Messages written in Morse code on yarn and
then knitted into a piece of clothing worn by a
courier.
• Null ciphers.
Example of null cipher
• PRESIDENT'S EMBARGO RULING SHOULD
HAVE IMMEDIATE NOTICE. GRAVE SITUATION
AFFECTING INTERNATIONAL LAW. STATEMENT
FORESHADOWS RUIN OF MANY NEUTRALS.
YELLOW JOURNALS UNIFYING NATIONAL
EXCITEMENT IMMENSELY.
• PERSHING SAILS FROM NY JUNE I
Digital Techniques
• Concealing messages within the lowest bits
of noisy images or sound files.
• Chaffing and winnowing.
• Pictures embedded in video material.
• Steganography for audio signals.
• Hidden text within Web pages.
Steganography in images
Steganography V/s Cryptography
Steganography
• Unknown message passing
• Steganography prevents
discovery of the very
existence of communication
• Little known technology
• Steganography does not
alter the structure of the
secret message
Cryptography
• Known message passing
• Encryption prevents an
unauthorized party from
discovering the contents of
a communication
• Common technology
• Cryptography alter the
structure of the secret
message
Steganography Terms
• Carrier or Cover File - A Original message or a file in
which hidden information will be stored inside of it .
• Stego-Medium - The medium in which the information
is hidden.
• Embedded or Payload - The information which is to be
hidden or concealed.
• Steganalysis - The process of detecting hidden
information inside a file.
Application
• Confidential communication and secret data
storing
• Protection of data alteration
• Usage in modern printers
• Alleged use by terrorists
• Alleged use by intelligence services
Final2
Final2

More Related Content

What's hot

What's hot (7)

Encryption
EncryptionEncryption
Encryption
 



 
Presentation
PresentationPresentation
Presentation
 
Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)
 
Wave stegano
Wave steganoWave stegano
Wave stegano
 
Dumpster Diving Infographic
Dumpster Diving InfographicDumpster Diving Infographic
Dumpster Diving Infographic
 
Isit1
Isit1Isit1
Isit1
 

Viewers also liked

Viewers also liked (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
31 cidadesportuguesas
31 cidadesportuguesas31 cidadesportuguesas
31 cidadesportuguesas
 
Blackout powerpoint
Blackout powerpointBlackout powerpoint
Blackout powerpoint
 
Developing skills for cv writing
Developing skills for cv writingDeveloping skills for cv writing
Developing skills for cv writing
 
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big StepBiometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big Step
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Historia de la música clásica
Historia de la música clásicaHistoria de la música clásica
Historia de la música clásica
 
Steganography document
Steganography documentSteganography document
Steganography document
 
AutomAPPPS_recent_en_public
AutomAPPPS_recent_en_publicAutomAPPPS_recent_en_public
AutomAPPPS_recent_en_public
 
Fuente dependiente
Fuente dependienteFuente dependiente
Fuente dependiente
 
E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
E ball
E ballE ball
E ball
 
JNTUA R13 REGULATION SYLLABUS
JNTUA R13 REGULATION SYLLABUSJNTUA R13 REGULATION SYLLABUS
JNTUA R13 REGULATION SYLLABUS
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
eCall 2018 vision IMA
eCall 2018 vision IMAeCall 2018 vision IMA
eCall 2018 vision IMA
 
Lección 15 – Gedeón
Lección 15 – GedeónLección 15 – Gedeón
Lección 15 – Gedeón
 

Similar to Final2

Similar to Final2 (20)

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Final2

  • 1. SEMINAR PRESENTATION ON STEGANOGRAPHY PRESENTED TO:- PRESENTED BY:- Er. K.P. GANGWAR POOJA PAL ROLL NO.:-1347610026 BATCH:-CSE(2013-2017)
  • 2. Overview • Introduction • History • Basic model • Techniques • Physical techniques • Digital techniques • Steganography vs Cryptography • Application • Conclusion
  • 3. Introduction • Steganography from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing”. • Steganography is the science of hiding information. • This can be achieved by concealing the existence of information within seemingly harmless carriers or cover. • Carrier: Text, Image, Audio, Video, etc.
  • 4. Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 5. History • The first recorded uses of steganography can be traced back to 440BC when Herodotus mentions two examples in his Histories. • Demaratus sent a warning about a forthcoming attack to Greece. • Herodotus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden.
  • 6.
  • 7. Steganography Techniques 1. Physical Techniques 2. Digital Techniques
  • 8. Physical techniques • Hidden messages within wax tablet. • Hidden messages on messenger's body. • Hidden messages on paper written in secret inks • Messages written in Morse code on yarn and then knitted into a piece of clothing worn by a courier. • Null ciphers.
  • 9.
  • 10. Example of null cipher • PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. • PERSHING SAILS FROM NY JUNE I
  • 11. Digital Techniques • Concealing messages within the lowest bits of noisy images or sound files. • Chaffing and winnowing. • Pictures embedded in video material. • Steganography for audio signals. • Hidden text within Web pages.
  • 13.
  • 14. Steganography V/s Cryptography Steganography • Unknown message passing • Steganography prevents discovery of the very existence of communication • Little known technology • Steganography does not alter the structure of the secret message Cryptography • Known message passing • Encryption prevents an unauthorized party from discovering the contents of a communication • Common technology • Cryptography alter the structure of the secret message
  • 15. Steganography Terms • Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it . • Stego-Medium - The medium in which the information is hidden. • Embedded or Payload - The information which is to be hidden or concealed. • Steganalysis - The process of detecting hidden information inside a file.
  • 16. Application • Confidential communication and secret data storing • Protection of data alteration • Usage in modern printers • Alleged use by terrorists • Alleged use by intelligence services