SlideShare a Scribd company logo
1 of 29
PRESENTATION OUTLINE
 STEGANOGRAPHY
† Introduction
† History
† Steganogrphy used nowdays ?
† Terms
† Steganography methods
† Image steganography
† Steganography available software
† Advantages of stegnography
† Disadvantages of stegnography
What is Steganography ?
INTRODUCTION
StSteganography is derived from Greek.
Goals :
• To hide a secret message with other object
•Do it such a way that presence of message is not
Steganography from the Greek word Steganos meaning
“covered ” and the Greek word Graphie meaning “ writing ”.
The difference between cryptology
and steganography is one of objective:
•Cryptology takes a message and encrypts it can not be read by
a third party. However the third party is aware of the presence
of the message.
•Steganography goes a step further and hides a message inside
a stego-object (eg: digital sound , images), in such a way that
the presence of the message is undetetcable
• Invisible inks(e.g.: milk ,lemon , jucice ). All of
there liquids dry on the paper such that they can
not be seen, but darken when heated in order to
reveal the hidden message
Steganography used nowdays?
• “ Lately , al-Qaeda operations have been sending hundreds of encrypted
message that have been hidden in files on digital photographs on the
auction site eBay.com..... The volume of the message has nearly doubled
in the past months , Indicating to some U.S intelligence officials that al-
Qaeda is planning another attack.”
-USA today , 10 July 2002
. Authorities also are investigating information from detainees that
suggests al Qaeda members—and possibly even in laden - - are hiding
message inside photographic files on websites.
- CNN,22 July 2002
Terms
•The word cover is used to describe the orignal ,
unaltered media , i.e. Cover image.
•The term embedded is used to denote the
information that hidden inside the cover image.
•The objective Stego is used to describe the
combined product ; a cover image with a text
message embedded within it is called stego-
image.
Steganography Methods
Textual Steganography
Image Steganography
Audio steganography
IMAGE
STEGNOGRAP
HY
Image steganography
Digital images
•In order to understand how steganography is applied to
digital images, one must understand what digital images
are.
Steganography Available
software
Some of the popular programs that use
images file as the cover files are:
•Hide and seek
•White Noise storm
•Mp3 Stego
Hide and Seek
• Runs on window.
• The message is also encrypted before it is
embedded into the cover image.
• It is also best image steganography tool
• The weakness is that it only works with
image of certain dimension. For example:
320×200 or 640×480 pixels.
White Noise Storm
•Runs on DOS.
•It uses image files as it cover medium .
•It is able to embed text message into the
cover file.
•WNS will also encrypt the message
before combining it with the cover
image.
Mp3 Stego
•It uses Mp3 audio files as the cover medium.
•The secret data is compressed and then
encoded into the audio stream as it is being
converted.
•The problem with this techniques is that if an
MP3 file is uncompressed and then re-encoded
, the hidden information will be lost.
Steganalysis
•It is the growing field of detection of
hidden information in possible stego-
objects.
Detection
Reading/Removing
Detection
When the stego object is available for
analysis, There are two categories of
methods that can be used for detecting
hidden messages.
Signature Detection
Blind Detection
Signature Detection
•Involves checking image files for a signature
that is left behind by the program use to create
the stego- image.
•The various algorithm that are used to hide
these messages, leave a general well-known
recognizable signature within the file.
•The downfall of the signature detection is that
any steganography algorithm for which the
signature is not known will go undetected.
Blind Detection
•A company named Wetstone Technologies created
a large database called Steganography Index Library
(SIL)
•They studied a large number of images of different
types that have been encoded with various
steganography algorithm.
•The result show that the clean images contained
unique characteristics that were not found in the
images with hidden message inside.
•The research is still undergoing development
Example
Step-1 select the image which you want to share containing the ” Secret image”
Setp-2 create the text file containing the “secret Msg”
Setp-3 go to run , open commandline by typing “CMD”.
Setp-4 go to path of the directory containing the files.
Setp-5 enter the following command:
“copy /b Image.jpg +secret message.txt newimage.jpg”
Setp-6 Alright, you have done , Now you will see a file named newImage.jpg in the
directory
Setp-7 share the image with all your friends, anywhere. But only tell the intended
person about the secret behind it.
Setp-8 To view the “secret msg” , right click on the newimage.jpg & open it with
notepad.
Setp-9 you will see textual format of image, scroll down to the end of the file.
Setp-10 you will see the “secret msg”
Advantages of Stenganoraphy
oDifficult to detect. Only the receiver can
detect.
oCan be applied differently in digital image
file.
Disadvantages of Stenganoraphy
Apart from advantages there are also
disadvantages too.
oIf this technique is gone in the wrong hands
like hackers, terrorist , criminals then can be
very much dangerous for all.
oUsed by terrorist: in 9/11 attack al-Qaeda
head bin laden used this technology
Conclusion
New techniques are being discovered and implemented. It is
analyzed that time is not far away when its importance
would be realized by organization in general and the arm
forces in particular
Refrences
•https://en.wikipedia.org/wiki/Steganography
•https://www.slideshare.net/yprajapati/stega
nography-11960186
•https://www.techopedia.com/definition/413
1/steganography
Thank you

More Related Content

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography
SteganographySteganography
Steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography
SteganographySteganography
Steganography
 

Similar to steganography

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Steganography
SteganographySteganography
SteganographySonam M
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit DebnathSatyajit Debnath
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxSAMPATHKUMARS20
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 

Similar to steganography (20)

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
Steganography
SteganographySteganography
Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
steganography
steganographysteganography
steganography
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Steganography
SteganographySteganography
Steganography
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

steganography

  • 1.
  • 2.
  • 3. PRESENTATION OUTLINE  STEGANOGRAPHY † Introduction † History † Steganogrphy used nowdays ? † Terms † Steganography methods † Image steganography † Steganography available software † Advantages of stegnography † Disadvantages of stegnography
  • 4. What is Steganography ? INTRODUCTION StSteganography is derived from Greek.
  • 5. Goals : • To hide a secret message with other object •Do it such a way that presence of message is not Steganography from the Greek word Steganos meaning “covered ” and the Greek word Graphie meaning “ writing ”.
  • 6. The difference between cryptology and steganography is one of objective: •Cryptology takes a message and encrypts it can not be read by a third party. However the third party is aware of the presence of the message. •Steganography goes a step further and hides a message inside a stego-object (eg: digital sound , images), in such a way that the presence of the message is undetetcable
  • 7. • Invisible inks(e.g.: milk ,lemon , jucice ). All of there liquids dry on the paper such that they can not be seen, but darken when heated in order to reveal the hidden message
  • 8. Steganography used nowdays? • “ Lately , al-Qaeda operations have been sending hundreds of encrypted message that have been hidden in files on digital photographs on the auction site eBay.com..... The volume of the message has nearly doubled in the past months , Indicating to some U.S intelligence officials that al- Qaeda is planning another attack.” -USA today , 10 July 2002 . Authorities also are investigating information from detainees that suggests al Qaeda members—and possibly even in laden - - are hiding message inside photographic files on websites. - CNN,22 July 2002
  • 9. Terms •The word cover is used to describe the orignal , unaltered media , i.e. Cover image. •The term embedded is used to denote the information that hidden inside the cover image. •The objective Stego is used to describe the combined product ; a cover image with a text message embedded within it is called stego- image.
  • 10. Steganography Methods Textual Steganography Image Steganography Audio steganography
  • 12. Image steganography Digital images •In order to understand how steganography is applied to digital images, one must understand what digital images are.
  • 13. Steganography Available software Some of the popular programs that use images file as the cover files are: •Hide and seek •White Noise storm •Mp3 Stego
  • 14. Hide and Seek • Runs on window. • The message is also encrypted before it is embedded into the cover image. • It is also best image steganography tool • The weakness is that it only works with image of certain dimension. For example: 320×200 or 640×480 pixels.
  • 15. White Noise Storm •Runs on DOS. •It uses image files as it cover medium . •It is able to embed text message into the cover file. •WNS will also encrypt the message before combining it with the cover image.
  • 16. Mp3 Stego •It uses Mp3 audio files as the cover medium. •The secret data is compressed and then encoded into the audio stream as it is being converted. •The problem with this techniques is that if an MP3 file is uncompressed and then re-encoded , the hidden information will be lost.
  • 17. Steganalysis •It is the growing field of detection of hidden information in possible stego- objects. Detection Reading/Removing
  • 18. Detection When the stego object is available for analysis, There are two categories of methods that can be used for detecting hidden messages. Signature Detection Blind Detection
  • 19. Signature Detection •Involves checking image files for a signature that is left behind by the program use to create the stego- image. •The various algorithm that are used to hide these messages, leave a general well-known recognizable signature within the file. •The downfall of the signature detection is that any steganography algorithm for which the signature is not known will go undetected.
  • 20. Blind Detection •A company named Wetstone Technologies created a large database called Steganography Index Library (SIL) •They studied a large number of images of different types that have been encoded with various steganography algorithm. •The result show that the clean images contained unique characteristics that were not found in the images with hidden message inside. •The research is still undergoing development
  • 22.
  • 23. Step-1 select the image which you want to share containing the ” Secret image” Setp-2 create the text file containing the “secret Msg” Setp-3 go to run , open commandline by typing “CMD”. Setp-4 go to path of the directory containing the files. Setp-5 enter the following command: “copy /b Image.jpg +secret message.txt newimage.jpg”
  • 24. Setp-6 Alright, you have done , Now you will see a file named newImage.jpg in the directory Setp-7 share the image with all your friends, anywhere. But only tell the intended person about the secret behind it. Setp-8 To view the “secret msg” , right click on the newimage.jpg & open it with notepad. Setp-9 you will see textual format of image, scroll down to the end of the file. Setp-10 you will see the “secret msg”
  • 25. Advantages of Stenganoraphy oDifficult to detect. Only the receiver can detect. oCan be applied differently in digital image file.
  • 26. Disadvantages of Stenganoraphy Apart from advantages there are also disadvantages too. oIf this technique is gone in the wrong hands like hackers, terrorist , criminals then can be very much dangerous for all. oUsed by terrorist: in 9/11 attack al-Qaeda head bin laden used this technology
  • 27. Conclusion New techniques are being discovered and implemented. It is analyzed that time is not far away when its importance would be realized by organization in general and the arm forces in particular