SlideShare a Scribd company logo
1 of 16
Steganography
NAME --Santu Chall
Roll No – 001130401005
Dept. – School of Education Technology
Course – Master in Multimedia Development
What is Steganography ?
• Comes from greek
‘steganos’ – covered
‘graphie’ – writing
• Steganography is the art and science of
writing hidden messages in such a way
that no one apart from the intended
recipient knows of the existence of the
message.
• Carrier: text, image, video, audio, etc.
Stegosaurus: a covered lizard
(but not a type of cryptography)
What is Computer Image
• Computer image is an array of pixels
• Pixels represent different light intensities
Are encoded as bit patterns
• Bit-depth
8bit grayscale – 256 levels of gray
24bit RGB – 16,777,216 million colors
Image Compression
• Lossy vs Lossless Compression
• Lossy (JPEG)
Discards excess image data, removes details that are too
small for human eye to differentiate.
Smaller file size.
• Lossless (TIF,BMP,GIF)
No loss of data, uncompressed image bit-by-bit identical
to original.
Larger file size.
Steganography Techniques
• Least-significant bit modifications(LSB)
• Masking and filtering
• Transformations
Least-significant bit
modifications(LSB)
• Most popular technique when dealing with
images
• Replaces least significant bits with the message
to be encoded
• Simple, but susceptible to lossy compression
and image manipulation
Uses of LSB
• Storing passwords and/or other confidential
information
• Covert communication of sensitive data
• Speculated uses in terrorist activities
• Being widely used to hide and/or transfer
illegal content
MASKING & FILTERING
• Masks secret data over the original
data by changing the luminance of
particular areas
• During masking, it embed the
message within significant bits of the
cover image
• Not susceptible to lossy techniques
because image manipulation does not
affect the secret message
Uses of MASKING & FILTERING
• Digital Watermarking – provides
identification pertaining to the owner;
i.e. license or copyright information
- Invisible vs Visible
• Fingerprinting – provides
identification of the user; used to
identify and track illegal use of
content
TRANSFORMATION
• Discrete cosine transformations
(DCT)
• Hiding in Frequency Domain
Uses of TRANSFORMATION
• Harder to implement
• More Robust against attack and
alteration
• Can be used in lossy compression
• Very Hard to detect as changes in
frequency domain are orders of
magnitude smaller than signal
Basics of Modern Steganography
fE: steganographic function "embedding"
fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
DETECTING STEGANOGRAPHY ON
IMAGE
• Most Steganography algorithm are used LSB.
• Uses the Stastical Analysis on the LSB.
• Detect the secret data using the DCT method
while using the loosy format picture.
DRAWBACKS and RECOVER FROM
STEGANOGRAPHY IN IMAGE
• Do not uses loosy compression technique .
• Do not resize images.
• Do not convert to an image to another
format image.
• Do not change the luminance of an image.
SUMMARY
• Steganography as a whole has existed in many
forms throughout much of history.
• Lossless compression of images with a great
deal of color variation work best as a cover
image to embed a message.
• Steganography can be used as beneficial tool
for privacy
1.http://en.wikipedia.org/wiki/Steganography
2.http://www.jjtc.com/stegdoc/index.html
3. C. Kurak, J. McHugh, "A Cautionary Note On
Image Downgrading," IEEE Eighth Annual Computer Security
Applications Conference, 1992.

More Related Content

Similar to SteganographyonImage.ppt

8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptakashkr0802
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.pptRobertCarreonBula
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganographyMrMoliya
 

Similar to SteganographyonImage.ppt (20)

8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 

Recently uploaded

High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 

Recently uploaded (20)

High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 

SteganographyonImage.ppt

  • 1. Steganography NAME --Santu Chall Roll No – 001130401005 Dept. – School of Education Technology Course – Master in Multimedia Development
  • 2. What is Steganography ? • Comes from greek ‘steganos’ – covered ‘graphie’ – writing • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. • Carrier: text, image, video, audio, etc. Stegosaurus: a covered lizard (but not a type of cryptography)
  • 3. What is Computer Image • Computer image is an array of pixels • Pixels represent different light intensities Are encoded as bit patterns • Bit-depth 8bit grayscale – 256 levels of gray 24bit RGB – 16,777,216 million colors
  • 4. Image Compression • Lossy vs Lossless Compression • Lossy (JPEG) Discards excess image data, removes details that are too small for human eye to differentiate. Smaller file size. • Lossless (TIF,BMP,GIF) No loss of data, uncompressed image bit-by-bit identical to original. Larger file size.
  • 5. Steganography Techniques • Least-significant bit modifications(LSB) • Masking and filtering • Transformations
  • 6. Least-significant bit modifications(LSB) • Most popular technique when dealing with images • Replaces least significant bits with the message to be encoded • Simple, but susceptible to lossy compression and image manipulation
  • 7. Uses of LSB • Storing passwords and/or other confidential information • Covert communication of sensitive data • Speculated uses in terrorist activities • Being widely used to hide and/or transfer illegal content
  • 8. MASKING & FILTERING • Masks secret data over the original data by changing the luminance of particular areas • During masking, it embed the message within significant bits of the cover image • Not susceptible to lossy techniques because image manipulation does not affect the secret message
  • 9. Uses of MASKING & FILTERING • Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs Visible • Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 10. TRANSFORMATION • Discrete cosine transformations (DCT) • Hiding in Frequency Domain
  • 11. Uses of TRANSFORMATION • Harder to implement • More Robust against attack and alteration • Can be used in lossy compression • Very Hard to detect as changes in frequency domain are orders of magnitude smaller than signal
  • 12. Basics of Modern Steganography fE: steganographic function "embedding" fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  • 13. DETECTING STEGANOGRAPHY ON IMAGE • Most Steganography algorithm are used LSB. • Uses the Stastical Analysis on the LSB. • Detect the secret data using the DCT method while using the loosy format picture.
  • 14. DRAWBACKS and RECOVER FROM STEGANOGRAPHY IN IMAGE • Do not uses loosy compression technique . • Do not resize images. • Do not convert to an image to another format image. • Do not change the luminance of an image.
  • 15. SUMMARY • Steganography as a whole has existed in many forms throughout much of history. • Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. • Steganography can be used as beneficial tool for privacy
  • 16. 1.http://en.wikipedia.org/wiki/Steganography 2.http://www.jjtc.com/stegdoc/index.html 3. C. Kurak, J. McHugh, "A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992.