SlideShare a Scribd company logo
1 of 18
SEMINAR PRESENTATION
ON
STEGANOGRAPHY
PRESENTED TO:- PRESENTED BY:-
Er. K.P. GANGWAR POOJA PAL
ROLL NO.:-1347610026
BATCH:-CSE(2013-2017)
Overview
• Introduction
• History
• Basic model
• Techniques
• Physical techniques
• Digital techniques
• Steganography vs Cryptography
• Application
• Conclusion
Introduction
• Steganography from the Greek word steganos
meaning “covered” and the Greek word graphie
meaning “writing”.
• Steganography is the science of hiding information.
• This can be achieved by concealing the existence of
information within seemingly harmless carriers or
cover.
• Carrier: Text, Image, Audio, Video, etc.
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
History
• The first recorded uses of steganography can
be traced back to 440BC when Herodotus
mentions two examples in his Histories.
• Demaratus sent a warning about a
forthcoming attack to Greece.
• Herodotus, who shaved the head of his most
trusted slave and tattooed a message on it.
After his hair had grown the message was
hidden.
Steganography Techniques
1. Physical Techniques
2. Digital Techniques
Physical techniques
• Hidden messages within wax tablet.
• Hidden messages on messenger's body.
• Hidden messages on paper written in secret
inks
• Messages written in Morse code on yarn and
then knitted into a piece of clothing worn by a
courier.
• Null ciphers.
Example of null cipher
• PRESIDENT'S EMBARGO RULING SHOULD
HAVE IMMEDIATE NOTICE. GRAVE SITUATION
AFFECTING INTERNATIONAL LAW. STATEMENT
FORESHADOWS RUIN OF MANY NEUTRALS.
YELLOW JOURNALS UNIFYING NATIONAL
EXCITEMENT IMMENSELY.
• PERSHING SAILS FROM NY JUNE I
Digital Techniques
• Concealing messages within the lowest bits
of noisy images or sound files.
• Chaffing and winnowing.
• Pictures embedded in video material.
• Steganography for audio signals.
• Hidden text within Web pages.
Steganography in images
Steganography V/s Cryptography
Steganography
• Unknown message passing
• Steganography prevents
discovery of the very
existence of communication
• Little known technology
• Steganography does not
alter the structure of the
secret message
Cryptography
• Known message passing
• Encryption prevents an
unauthorized party from
discovering the contents of
a communication
• Common technology
• Cryptography alter the
structure of the secret
message
Steganography Terms
• Carrier or Cover File - A Original message or a file in
which hidden information will be stored inside of it .
• Stego-Medium - The medium in which the information
is hidden.
• Embedded or Payload - The information which is to be
hidden or concealed.
• Steganalysis - The process of detecting hidden
information inside a file.
Application
• Confidential communication and secret data
storing
• Protection of data alteration
• Usage in modern printers
• Alleged use by terrorists
• Alleged use by intelligence services
Final2
Final2

More Related Content

What's hot

What's hot (7)

Encryption
EncryptionEncryption
Encryption
 



 
Presentation
PresentationPresentation
Presentation
 
Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)
 
Wave stegano
Wave steganoWave stegano
Wave stegano
 
Dumpster Diving Infographic
Dumpster Diving InfographicDumpster Diving Infographic
Dumpster Diving Infographic
 
Isit1
Isit1Isit1
Isit1
 

Viewers also liked

Viewers also liked (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
31 cidadesportuguesas
31 cidadesportuguesas31 cidadesportuguesas
31 cidadesportuguesas
 
Blackout powerpoint
Blackout powerpointBlackout powerpoint
Blackout powerpoint
 
Developing skills for cv writing
Developing skills for cv writingDeveloping skills for cv writing
Developing skills for cv writing
 
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big StepBiometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big Step
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Historia de la música clásica
Historia de la música clásicaHistoria de la música clásica
Historia de la música clásica
 
Steganography document
Steganography documentSteganography document
Steganography document
 
AutomAPPPS_recent_en_public
AutomAPPPS_recent_en_publicAutomAPPPS_recent_en_public
AutomAPPPS_recent_en_public
 
Fuente dependiente
Fuente dependienteFuente dependiente
Fuente dependiente
 
E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
E ball
E ballE ball
E ball
 
JNTUA R13 REGULATION SYLLABUS
JNTUA R13 REGULATION SYLLABUSJNTUA R13 REGULATION SYLLABUS
JNTUA R13 REGULATION SYLLABUS
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
eCall 2018 vision IMA
eCall 2018 vision IMAeCall 2018 vision IMA
eCall 2018 vision IMA
 
Lección 15 – Gedeón
Lección 15 – GedeónLección 15 – Gedeón
Lección 15 – Gedeón
 

Similar to Final2

Similar to Final2 (20)

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Final2

  • 1. SEMINAR PRESENTATION ON STEGANOGRAPHY PRESENTED TO:- PRESENTED BY:- Er. K.P. GANGWAR POOJA PAL ROLL NO.:-1347610026 BATCH:-CSE(2013-2017)
  • 2. Overview • Introduction • History • Basic model • Techniques • Physical techniques • Digital techniques • Steganography vs Cryptography • Application • Conclusion
  • 3. Introduction • Steganography from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing”. • Steganography is the science of hiding information. • This can be achieved by concealing the existence of information within seemingly harmless carriers or cover. • Carrier: Text, Image, Audio, Video, etc.
  • 4. Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 5. History • The first recorded uses of steganography can be traced back to 440BC when Herodotus mentions two examples in his Histories. • Demaratus sent a warning about a forthcoming attack to Greece. • Herodotus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden.
  • 6.
  • 7. Steganography Techniques 1. Physical Techniques 2. Digital Techniques
  • 8. Physical techniques • Hidden messages within wax tablet. • Hidden messages on messenger's body. • Hidden messages on paper written in secret inks • Messages written in Morse code on yarn and then knitted into a piece of clothing worn by a courier. • Null ciphers.
  • 9.
  • 10. Example of null cipher • PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. • PERSHING SAILS FROM NY JUNE I
  • 11. Digital Techniques • Concealing messages within the lowest bits of noisy images or sound files. • Chaffing and winnowing. • Pictures embedded in video material. • Steganography for audio signals. • Hidden text within Web pages.
  • 13.
  • 14. Steganography V/s Cryptography Steganography • Unknown message passing • Steganography prevents discovery of the very existence of communication • Little known technology • Steganography does not alter the structure of the secret message Cryptography • Known message passing • Encryption prevents an unauthorized party from discovering the contents of a communication • Common technology • Cryptography alter the structure of the secret message
  • 15. Steganography Terms • Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it . • Stego-Medium - The medium in which the information is hidden. • Embedded or Payload - The information which is to be hidden or concealed. • Steganalysis - The process of detecting hidden information inside a file.
  • 16. Application • Confidential communication and secret data storing • Protection of data alteration • Usage in modern printers • Alleged use by terrorists • Alleged use by intelligence services