5. Goals :
• To hide a secret message with other object
•Do it such a way that presence of message is not
Steganography from the Greek word Steganos meaning
“covered ” and the Greek word Graphie meaning “ writing ”.
6. The difference between cryptology
and steganography is one of objective:
•Cryptology takes a message and encrypts it can not be read by
a third party. However the third party is aware of the presence
of the message.
•Steganography goes a step further and hides a message inside
a stego-object (eg: digital sound , images), in such a way that
the presence of the message is undetetcable
7. • Invisible inks(e.g.: milk ,lemon , jucice ). All of
there liquids dry on the paper such that they can
not be seen, but darken when heated in order to
reveal the hidden message
8. Steganography used nowdays?
• “ Lately , al-Qaeda operations have been sending hundreds of encrypted
message that have been hidden in files on digital photographs on the
auction site eBay.com..... The volume of the message has nearly doubled
in the past months , Indicating to some U.S intelligence officials that al-
Qaeda is planning another attack.”
-USA today , 10 July 2002
. Authorities also are investigating information from detainees that
suggests al Qaeda members—and possibly even in laden - - are hiding
message inside photographic files on websites.
- CNN,22 July 2002
9. Terms
•The word cover is used to describe the orignal ,
unaltered media , i.e. Cover image.
•The term embedded is used to denote the
information that hidden inside the cover image.
•The objective Stego is used to describe the
combined product ; a cover image with a text
message embedded within it is called stego-
image.
14. Hide and Seek
• Runs on window.
• The message is also encrypted before it is
embedded into the cover image.
• It is also best image steganography tool
• The weakness is that it only works with
image of certain dimension. For example:
320×200 or 640×480 pixels.
15. White Noise Storm
•Runs on DOS.
•It uses image files as it cover medium .
•It is able to embed text message into the
cover file.
•WNS will also encrypt the message
before combining it with the cover
image.
16. Mp3 Stego
•It uses Mp3 audio files as the cover medium.
•The secret data is compressed and then
encoded into the audio stream as it is being
converted.
•The problem with this techniques is that if an
MP3 file is uncompressed and then re-encoded
, the hidden information will be lost.
17. Steganalysis
•It is the growing field of detection of
hidden information in possible stego-
objects.
Detection
Reading/Removing
18. Detection
When the stego object is available for
analysis, There are two categories of
methods that can be used for detecting
hidden messages.
Signature Detection
Blind Detection
19. Signature Detection
•Involves checking image files for a signature
that is left behind by the program use to create
the stego- image.
•The various algorithm that are used to hide
these messages, leave a general well-known
recognizable signature within the file.
•The downfall of the signature detection is that
any steganography algorithm for which the
signature is not known will go undetected.
20. Blind Detection
•A company named Wetstone Technologies created
a large database called Steganography Index Library
(SIL)
•They studied a large number of images of different
types that have been encoded with various
steganography algorithm.
•The result show that the clean images contained
unique characteristics that were not found in the
images with hidden message inside.
•The research is still undergoing development
23. Step-1 select the image which you want to share containing the ” Secret image”
Setp-2 create the text file containing the “secret Msg”
Setp-3 go to run , open commandline by typing “CMD”.
Setp-4 go to path of the directory containing the files.
Setp-5 enter the following command:
“copy /b Image.jpg +secret message.txt newimage.jpg”
24. Setp-6 Alright, you have done , Now you will see a file named newImage.jpg in the
directory
Setp-7 share the image with all your friends, anywhere. But only tell the intended
person about the secret behind it.
Setp-8 To view the “secret msg” , right click on the newimage.jpg & open it with
notepad.
Setp-9 you will see textual format of image, scroll down to the end of the file.
Setp-10 you will see the “secret msg”
26. Disadvantages of Stenganoraphy
Apart from advantages there are also
disadvantages too.
oIf this technique is gone in the wrong hands
like hackers, terrorist , criminals then can be
very much dangerous for all.
oUsed by terrorist: in 9/11 attack al-Qaeda
head bin laden used this technology
27. Conclusion
New techniques are being discovered and implemented. It is
analyzed that time is not far away when its importance
would be realized by organization in general and the arm
forces in particular