SlideShare a Scribd company logo
1 of 6
By
-Ritesh Kumar Kayal
     -Abhi Bhaumik
   -Bappaditya Maji
Steganography
• Steganography () is the art and science of
  writing hidden messages in such a way that no
  one apart from the intended recipient even
  knows that a message has been sent.
• The word steganography is of Greek origin
  and means “covered writing" from the Greek
  words steganos meaning "covered or
  protected", and graphei meaning "writing".
Some common ways of using
            steganography
• Generally, messages will appear to be
  something else: images, articles, shopping
  lists, or some other cover
  text and, classically, the hidden message may
  be in invisible ink between the visible lines of
  a private letter.
• It makes use of seemingly innocent cover files
  such as text, audio, and image files
• The embedded message may be anything that
  can be encoded in binary
Steganography in Digital Images
• It is the most widely used medium being used
  today.
• Takes advantage of our limited visual
  perception of colors.
• This field is expected to continually grow as
  computer graphics power also grows.
• Many programs are available to apply
  steganography.
Image Attributes
• Digital images are made up of pixels.
• The arrangement of pixels make up the
  image’s “raster data”.
• 8-bit and 24-bit images are common.
• The larger the image size, the more
  information you can hide. However, larger
  images may require compression to avoid
  detection.
Image based techniques: LSB Insertion
• Replaces least significant bits with the
  message to be encoded
• Most popular technique when dealing with
  images
• Simple, but susceptible to lossy compression
  and image manipulation

More Related Content

Viewers also liked

Презентация «Системный подход к духовно-нравственному воспитанию учащихсяМБО...
Презентация «Системный подход  к духовно-нравственному воспитанию учащихсяМБО...Презентация «Системный подход  к духовно-нравственному воспитанию учащихсяМБО...
Презентация «Системный подход к духовно-нравственному воспитанию учащихсяМБО...
channa1971
 
принципы менеджмента
принципы менеджментапринципы менеджмента
принципы менеджмента
channa1971
 
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
channa1971
 
список педагогических работников образовательных учреждений конкурс професси...
список педагогических работников образовательных учреждений  конкурс професси...список педагогических работников образовательных учреждений  конкурс професси...
список педагогических работников образовательных учреждений конкурс професси...
channa1971
 
акция «чистый город» мкоусош №70
акция «чистый город» мкоусош №70акция «чистый город» мкоусош №70
акция «чистый город» мкоусош №70
channa1971
 
дохтуров д.с.
дохтуров д.с.дохтуров д.с.
дохтуров д.с.
channa1971
 
повышение качества математического образования в современном обществе балаба...
повышение качества математического образования в современном обществе  балаба...повышение качества математического образования в современном обществе  балаба...
повышение качества математического образования в современном обществе балаба...
channa1971
 
на V форум презентация профессиональный стандарт
на V форум презентация профессиональный стандартна V форум презентация профессиональный стандарт
на V форум презентация профессиональный стандарт
channa1971
 

Viewers also liked (9)

Презентация «Системный подход к духовно-нравственному воспитанию учащихсяМБО...
Презентация «Системный подход  к духовно-нравственному воспитанию учащихсяМБО...Презентация «Системный подход  к духовно-нравственному воспитанию учащихсяМБО...
Презентация «Системный подход к духовно-нравственному воспитанию учащихсяМБО...
 
принципы менеджмента
принципы менеджментапринципы менеджмента
принципы менеджмента
 
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
Члены городской творческой лаборатории «Новые подходы в обучении: системно-де...
 
список педагогических работников образовательных учреждений конкурс професси...
список педагогических работников образовательных учреждений  конкурс професси...список педагогических работников образовательных учреждений  конкурс професси...
список педагогических работников образовательных учреждений конкурс професси...
 
акция «чистый город» мкоусош №70
акция «чистый город» мкоусош №70акция «чистый город» мкоусош №70
акция «чистый город» мкоусош №70
 
дохтуров д.с.
дохтуров д.с.дохтуров д.с.
дохтуров д.с.
 
повышение качества математического образования в современном обществе балаба...
повышение качества математического образования в современном обществе  балаба...повышение качества математического образования в современном обществе  балаба...
повышение качества математического образования в современном обществе балаба...
 
на V форум презентация профессиональный стандарт
на V форум презентация профессиональный стандартна V форум презентация профессиональный стандарт
на V форум презентация профессиональный стандарт
 
Carousel format creative examples April 2015
Carousel format creative examples April 2015Carousel format creative examples April 2015
Carousel format creative examples April 2015
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
Sonam M
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 

Similar to Steganography (20)

Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography Presentation
Steganography PresentationSteganography Presentation
Steganography Presentation
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Steganography

  • 1. By -Ritesh Kumar Kayal -Abhi Bhaumik -Bappaditya Maji
  • 2. Steganography • Steganography () is the art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent. • The word steganography is of Greek origin and means “covered writing" from the Greek words steganos meaning "covered or protected", and graphei meaning "writing".
  • 3. Some common ways of using steganography • Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. • It makes use of seemingly innocent cover files such as text, audio, and image files • The embedded message may be anything that can be encoded in binary
  • 4. Steganography in Digital Images • It is the most widely used medium being used today. • Takes advantage of our limited visual perception of colors. • This field is expected to continually grow as computer graphics power also grows. • Many programs are available to apply steganography.
  • 5. Image Attributes • Digital images are made up of pixels. • The arrangement of pixels make up the image’s “raster data”. • 8-bit and 24-bit images are common. • The larger the image size, the more information you can hide. However, larger images may require compression to avoid detection.
  • 6. Image based techniques: LSB Insertion • Replaces least significant bits with the message to be encoded • Most popular technique when dealing with images • Simple, but susceptible to lossy compression and image manipulation