SlideShare a Scribd company logo
1 of 11
An Analysis of Steganographic Techniques and  How Terrorists Can Use Them Presenter’s Name: Sohel Imroz Date: May 4, 2004
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brief History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Techniques ,[object Object],[object Object],[object Object],[object Object]
Secret messages in texts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secret messages in images ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secret messages in audio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secret messages in audio (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steganography as a terrorist tool ,[object Object],[object Object],[object Object]
Detecting Steganography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Viewers also liked (20)

Navsarni Bulletin - August 2016
Navsarni Bulletin - August 2016Navsarni Bulletin - August 2016
Navsarni Bulletin - August 2016
 
Manual Instalacion EMU8086
Manual Instalacion EMU8086Manual Instalacion EMU8086
Manual Instalacion EMU8086
 
Urban Data Fusion
Urban Data Fusion Urban Data Fusion
Urban Data Fusion
 
El vigilante
El vigilanteEl vigilante
El vigilante
 
Robert frost slideshare
Robert frost slideshareRobert frost slideshare
Robert frost slideshare
 
UDMS 2004
UDMS 2004UDMS 2004
UDMS 2004
 
Por qué es importante el estudio detallado de la filosofí1
Por qué es importante el estudio detallado de la filosofí1Por qué es importante el estudio detallado de la filosofí1
Por qué es importante el estudio detallado de la filosofí1
 
Nodejesmoriralamor
NodejesmoriralamorNodejesmoriralamor
Nodejesmoriralamor
 
Test
TestTest
Test
 
Ambientes
AmbientesAmbientes
Ambientes
 
Presentacion3
Presentacion3Presentacion3
Presentacion3
 
Pauls amazing travels spanish pda
Pauls amazing travels spanish pdaPauls amazing travels spanish pda
Pauls amazing travels spanish pda
 
Herramientas
HerramientasHerramientas
Herramientas
 
Way of the Cross - Khursachi Vatt
Way of the Cross - Khursachi VattWay of the Cross - Khursachi Vatt
Way of the Cross - Khursachi Vatt
 
Navasarni Nov. 2016
Navasarni Nov. 2016Navasarni Nov. 2016
Navasarni Nov. 2016
 
Flex y bison
Flex y bisonFlex y bison
Flex y bison
 
History of art "THE SARCOPHAGUS OF TUTANKHAMEN"
History of art "THE SARCOPHAGUS OF TUTANKHAMEN"History of art "THE SARCOPHAGUS OF TUTANKHAMEN"
History of art "THE SARCOPHAGUS OF TUTANKHAMEN"
 
mohamed-ezzaouia.cv.en
mohamed-ezzaouia.cv.enmohamed-ezzaouia.cv.en
mohamed-ezzaouia.cv.en
 
Healthy lifestyle ppt
Healthy lifestyle pptHealthy lifestyle ppt
Healthy lifestyle ppt
 
Wawasan 2020
Wawasan 2020Wawasan 2020
Wawasan 2020
 

Similar to Analysis of Steganographic Techniques and How Terrorists Can Use Them

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccPrabhu Prabhu
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 

Similar to Analysis of Steganographic Techniques and How Terrorists Can Use Them (20)

Steganography
Steganography Steganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 

More from stuimrozsm

Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigmastuimrozsm
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforcestuimrozsm
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...stuimrozsm
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfarestuimrozsm
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Information security legislation
Information security legislationInformation security legislation
Information security legislationstuimrozsm
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 

More from stuimrozsm (7)

Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigma
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforce
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Information security legislation
Information security legislationInformation security legislation
Information security legislation
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 

Analysis of Steganographic Techniques and How Terrorists Can Use Them

  • 1. An Analysis of Steganographic Techniques and How Terrorists Can Use Them Presenter’s Name: Sohel Imroz Date: May 4, 2004
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.