SlideShare a Scribd company logo
Evolution 
Cryptography 
Watermarking 
Steganography
Cryptography 
Cryptography derived its name from a Greek 
word called “Kryptos” which means “Hidden 
Secrets”. 
Cryptography is the practice and study of hiding 
information. It is the Art or Science of 
converting a plain text into a data which can’t 
be understood and again retransforming that 
message into its original form. 
It provides Confidentiality, Integrity, Accuracy.
Symmetric Cryptography 
Asymmetric Cryptography
Steganography 
Greek Words : 
STEGANOS – “Covered” 
GRAPHIA – “Writing” 
Steganography is the art and science of writing hidden 
messages in such a way that no one apart from the intended 
recipient knows of the existence of the message. 
Stegosaurus: a covered lizard
Types of Steganography 
Text 
audio 
image 
video 
protocol
Image steganography algorithm 
LSB - Example 
A sample raster data for 3 pixels (9 bytes) 
may be: 
Inserting 
the binary 
value for 
A 
(10000001) 
changes 
4 bits 
00100111 11101001 11001000 
00100111 11001000 11101001 
11001000 00100111 11101011 
00100111 11101000 11001000 
00100110 11001000 11101000 
11001001 00100111 11101011
LSB - Uses 
 Storing passwords and/or other confidential 
information 
 Covert communication of sensitive data 
 Speculated uses in terrorist activities 
 Being widely used to hide and/or transfer 
illegal content
Watermarking 
A watermark is a recognizable image or 
pattern in paper that appears as various 
shades of lightness/darkness when viewed 
by transmitted light (or when viewed by 
reflected light, a top a dark 
background), caused by thickness 
variations in the paper.
Digital Watermarking 
A digital watermark is a digital signal or 
pattern inserted into a digital document such 
as text, graphics or multimedia, and carries 
information unique to the copyright owner, 
the creator of the document or the authorized 
consumer. 
VISIBLE WATERMARKING 
INVISIBLE WATERMARKING
EXAMPLE OF INVISIBLE WATERMARKING
EXAMPLE OF VISIBLE WATERMARKING 
+ =
UV Watermarking
APPLICATION FIELD FOR WATERMARKING 
INTERNET 
TV 
IIII 
INTERNET 
RADIO 
E-Book 
INTERNET 
NEWSPAPER 
EDUCATION 
MATERIAL 
INTERNET 
MAGZINE 
DOCUMENTS 
CERTIFICATES 
AUDIO 
TEXT 
IMAGE 
VIDEO 
GRAPHICS 
WATERMARKING 
TECHNOLOGY
Watermarking Vs. Steganography 
Goal of Steganography 
 Intruder Cannot detect message 
 Primarily 1:1 communication 
 Goal of Watermarking 
 Intruder cannot remove or replace the 
message 
 Primarily 1: many communication
Cryptography vs. Steganography 
Cryptography: although encypted and 
unreadable, the existence of data is not 
hidden 
WHEREAS 
Steganography: no knowledge of the 
existence of the data
REFERENCES 
 http://www.garykessler.net/library/steganography.html 
 http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ 
fsc/july2004/research/2004_03_research01.htm 
 http://stegano.net/tutorial/steg-history.html 
 http://www.strangehorizons.com/2001/20011008/steganography.shtml
QUERIES ?
“For every lock there is a Key… 
It is better to KEEP SAFE YOUR LOCK THAN THE KEY”

More Related Content

What's hot

Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography
SteganographySteganography
SteganographySonam M
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Key management
Key managementKey management
Key management
Sujata Regoti
 

What's hot (20)

Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Steganography
SteganographySteganography
Steganography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Steganography
SteganographySteganography
Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Key management
Key managementKey management
Key management
 

Viewers also liked

Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
Abhishek Mukherjee
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and SteganographyMohammad Amin Amjadi
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zone
Madonna Ranjini
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
Tamás Polyák
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
Alberto Villegas
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
Cryptography
CryptographyCryptography
Cryptography
Tushar Swami
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (13)

Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zone
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
 
Steganography
Steganography Steganography
Steganography
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Cryptography and Steganography with watermarking

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Steganography
SteganographySteganography
Steganography
Divam Goyal
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Bryce Nelson
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117Anas Pa
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
ER Publication.org
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
IJERA Editor
 

Similar to Cryptography and Steganography with watermarking (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Presentation1
Presentation1Presentation1
Presentation1
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Cryptography and Steganography with watermarking

  • 1.
  • 3. Cryptography Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain text into a data which can’t be understood and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 5. Steganography Greek Words : STEGANOS – “Covered” GRAPHIA – “Writing” Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Stegosaurus: a covered lizard
  • 6. Types of Steganography Text audio image video protocol
  • 7. Image steganography algorithm LSB - Example A sample raster data for 3 pixels (9 bytes) may be: Inserting the binary value for A (10000001) changes 4 bits 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011
  • 8. LSB - Uses  Storing passwords and/or other confidential information  Covert communication of sensitive data  Speculated uses in terrorist activities  Being widely used to hide and/or transfer illegal content
  • 9.
  • 10. Watermarking A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, a top a dark background), caused by thickness variations in the paper.
  • 11. Digital Watermarking A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. VISIBLE WATERMARKING INVISIBLE WATERMARKING
  • 12.
  • 13. EXAMPLE OF INVISIBLE WATERMARKING
  • 14. EXAMPLE OF VISIBLE WATERMARKING + =
  • 16. APPLICATION FIELD FOR WATERMARKING INTERNET TV IIII INTERNET RADIO E-Book INTERNET NEWSPAPER EDUCATION MATERIAL INTERNET MAGZINE DOCUMENTS CERTIFICATES AUDIO TEXT IMAGE VIDEO GRAPHICS WATERMARKING TECHNOLOGY
  • 17. Watermarking Vs. Steganography Goal of Steganography  Intruder Cannot detect message  Primarily 1:1 communication  Goal of Watermarking  Intruder cannot remove or replace the message  Primarily 1: many communication
  • 18. Cryptography vs. Steganography Cryptography: although encypted and unreadable, the existence of data is not hidden WHEREAS Steganography: no knowledge of the existence of the data
  • 19. REFERENCES  http://www.garykessler.net/library/steganography.html  http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ fsc/july2004/research/2004_03_research01.htm  http://stegano.net/tutorial/steg-history.html  http://www.strangehorizons.com/2001/20011008/steganography.shtml
  • 21. “For every lock there is a Key… It is better to KEEP SAFE YOUR LOCK THAN THE KEY”