SlideShare a Scribd company logo
1 of 16
SEMINAR
ON
STEGANOGRAPHY
Submitted By:-
Deepak kumar
Roll no:-15783
Mca[LEET] 2nd
year
Content
 What is Steganography
 What is Cryptography
 Steganography v/s Cryptography
 Evolution
 Types
 Dissecting Steganography
 Steps for Hiding an Image Steganography
 Advantages
 Disadvantages
What is Steganography
Steganography is the art if covered or hidden writing.
The purpose of steganodraphy is covert communication
to hides a message from third party. This differs from
cryptography, the art of secret writing , which is
intended to make a message unreadable bye a third party
but does not hides the existence of the secret
communication
What is cryptography
Cryptography is a greek word. It is derived from
two word “kryptos” and “graphein”. Kryptos
means hidden and graphein means writing.
It is the practice and study of technique for secure
communication in the presence of third party.
Steganography Vs
Cryptography Steganography can be viewed as akin to cryptography.
 Both have been used throughout recorded history as
means to protect information.
 Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood.
 Steganography, an essence, "camouflages" a message to
hide its existence and make it seem "invisible" thus
concealing the fact that a message is being sent altogether.
The cover provides a host for transporting the hidden info.
info
embed
-file
extract
info
Evolution of Steganography
 CODE BREAKERS :- David Kahn's The Code breakers
and Bruce Norman’s Secret Warfare: The Battle of Codes
and Ciphers recounts numerous tales of steganography
 INVISIBLE INK : An innocent letter may contain a very
different message written between the lines with invisible
ink.
 MICRODOTS:- The Germans developed microdot
technology. Microdots are photographs the size of a printed
period having the clarity of standard-sized typewritten
pages. The first microdots were discovered masquerading as
a period on a typed envelope carried by a German agent in
1941.
Types of Steganography
 MESSAGES IN TEXT program is called SPAM MIMIC. Secret
messages can be hidden in text format by reframing the text
of the carrier file, while maintaining the context. On e form
of steganography is a program called Spam Mimic.
 MESSAGES IN IMAGES most popular tool is outguess.
 MESSAGES IN AUDIO data is hidden in layer III of encoding
process of MP3 file. Messages in audio are always sent along
with ambient noise.
 MESSAGES IN VIDEO embedding information into
multimedia data has gained increasing attention lately. The
method of encryption is the same as in audio steganography.
Video files are generally very good carrier files since they
have a lot of irrelevant bits.
Steganography in Images
Two types of compression:
• lossless (gif)
• lossy (jpeg)
Sometimes concealed message inserted as a comment.
Sometimes the accuracy of the image is sacrificed slightly.
Common Tools
StegoDOS
White Noise Storm
S-tools
outguess
steghide
Dissecting Steganography
 Steganography is a term used for hiding messages
within an image. Any color pixel is made of a
combination of red –green-blue mode(RGB) wherein
each RGB component consist of 8 bits. If letters in
ASCII are to be represented within the color pixels,
the rightmost digit, called the least significant bit
(LSB), can be altered.
 Any variation in the value of this bit leads to very
minimal variation in color. If we have to hide the
word ‘digit’ in the image, we take the LSB of every
color and hide each bit of the word in its RGB
combination.
 To insert the letter ‘D’ we modify three color pixels
with three bits in each color pixel, we utilize 14
color pixels to hide the entire word with only 1 bit
in the 14th pixel.
Steps for Hiding an Image Steganography
 Start s-tool and window explorer using the later as drag and
drop interface the software.
 Drag and drop the image to be used as the carrier file from the
explorer onto the actions window in s-tool.
 Drag and drop the data file on the carrier file.
 Give pass phrase and encryption algorithm when prompted.
Pass these to receiver too.
 The hidden file is ready. Receiver has to click on the “reveal”
button to extract the data.
Advantages
 It can be used for safeguarding data, such as in
the field of media where copywriting ensures
authenticity.
 It can be used by intelligence agencies for sending
their secret data.
Disadvantages
Many a terrorist and anti humanist activities have
been carried out cloaked under this technique
Any Query……?
Thank
you…

More Related Content

What's hot

Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Viewers also liked

Annotated lyrics
Annotated lyrics Annotated lyrics
Annotated lyrics downerj
 
Selenium_Automation
Selenium_AutomationSelenium_Automation
Selenium_Automationmadhu g
 
Donde ver halcones peregrinos en la ciudad de zaragoza
Donde ver halcones peregrinos en la ciudad de zaragozaDonde ver halcones peregrinos en la ciudad de zaragoza
Donde ver halcones peregrinos en la ciudad de zaragozajorgemartinezg
 
Software testing
Software testingSoftware testing
Software testingnidhip216
 
Michael mittigaresume.docx (1)
Michael mittigaresume.docx (1)Michael mittigaresume.docx (1)
Michael mittigaresume.docx (1)Michael Mittiga
 
MichaelMittigaResume.docx (1)
MichaelMittigaResume.docx (1)MichaelMittigaResume.docx (1)
MichaelMittigaResume.docx (1)Michael Mittiga
 
Asit hadoop courses
Asit hadoop coursesAsit hadoop courses
Asit hadoop coursesASIT
 
Best social media campaign
Best social media campaignBest social media campaign
Best social media campaignAli Hadi
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis downerj
 
Presentation to AAAEA Technical conference
Presentation to AAAEA Technical conferencePresentation to AAAEA Technical conference
Presentation to AAAEA Technical conferencehbaroudi
 
Satellite sajith
Satellite sajithSatellite sajith
Satellite sajithsajithguru
 
R&B/Soul conventions research
R&B/Soul conventions researchR&B/Soul conventions research
R&B/Soul conventions researchruteBanon
 
MÉTODO APA CORRECTAMENTE REDACTADA 2016
MÉTODO APA CORRECTAMENTE REDACTADA 2016MÉTODO APA CORRECTAMENTE REDACTADA 2016
MÉTODO APA CORRECTAMENTE REDACTADA 2016Anderson Choque
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Cen Paul
 

Viewers also liked (18)

Annotated lyrics
Annotated lyrics Annotated lyrics
Annotated lyrics
 
Selenium_Automation
Selenium_AutomationSelenium_Automation
Selenium_Automation
 
Donde ver halcones peregrinos en la ciudad de zaragoza
Donde ver halcones peregrinos en la ciudad de zaragozaDonde ver halcones peregrinos en la ciudad de zaragoza
Donde ver halcones peregrinos en la ciudad de zaragoza
 
Software testing
Software testingSoftware testing
Software testing
 
alfred- AMX Programming1
alfred- AMX Programming1alfred- AMX Programming1
alfred- AMX Programming1
 
Michael mittigaresume.docx (1)
Michael mittigaresume.docx (1)Michael mittigaresume.docx (1)
Michael mittigaresume.docx (1)
 
MichaelMittigaResume.docx (1)
MichaelMittigaResume.docx (1)MichaelMittigaResume.docx (1)
MichaelMittigaResume.docx (1)
 
Soul codes
Soul codesSoul codes
Soul codes
 
Asit hadoop courses
Asit hadoop coursesAsit hadoop courses
Asit hadoop courses
 
Best social media campaign
Best social media campaignBest social media campaign
Best social media campaign
 
Touchscreen
TouchscreenTouchscreen
Touchscreen
 
Genre Analysis
Genre Analysis Genre Analysis
Genre Analysis
 
Presentation to AAAEA Technical conference
Presentation to AAAEA Technical conferencePresentation to AAAEA Technical conference
Presentation to AAAEA Technical conference
 
Autopsy of pig
Autopsy of pigAutopsy of pig
Autopsy of pig
 
Satellite sajith
Satellite sajithSatellite sajith
Satellite sajith
 
R&B/Soul conventions research
R&B/Soul conventions researchR&B/Soul conventions research
R&B/Soul conventions research
 
MÉTODO APA CORRECTAMENTE REDACTADA 2016
MÉTODO APA CORRECTAMENTE REDACTADA 2016MÉTODO APA CORRECTAMENTE REDACTADA 2016
MÉTODO APA CORRECTAMENTE REDACTADA 2016
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 

Similar to SEMINAR ON STEGANOGRAPHY AND CRYPTOGRAPHY TECHNIQUES

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Steganography
SteganographySteganography
SteganographyPavninder
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 

Similar to SEMINAR ON STEGANOGRAPHY AND CRYPTOGRAPHY TECHNIQUES (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Steganography
Steganography Steganography
Steganography
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
Steganography
Steganography Steganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
Steganography Steganography
Steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Steganography
SteganographySteganography
Steganography
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

SEMINAR ON STEGANOGRAPHY AND CRYPTOGRAPHY TECHNIQUES

  • 2. Content  What is Steganography  What is Cryptography  Steganography v/s Cryptography  Evolution  Types  Dissecting Steganography  Steps for Hiding an Image Steganography  Advantages  Disadvantages
  • 3. What is Steganography Steganography is the art if covered or hidden writing. The purpose of steganodraphy is covert communication to hides a message from third party. This differs from cryptography, the art of secret writing , which is intended to make a message unreadable bye a third party but does not hides the existence of the secret communication
  • 4. What is cryptography Cryptography is a greek word. It is derived from two word “kryptos” and “graphein”. Kryptos means hidden and graphein means writing. It is the practice and study of technique for secure communication in the presence of third party.
  • 5. Steganography Vs Cryptography Steganography can be viewed as akin to cryptography.  Both have been used throughout recorded history as means to protect information.  Cryptographic techniques "scramble" messages so if intercepted, the messages cannot be understood.  Steganography, an essence, "camouflages" a message to hide its existence and make it seem "invisible" thus concealing the fact that a message is being sent altogether.
  • 6. The cover provides a host for transporting the hidden info. info embed -file extract info
  • 7. Evolution of Steganography  CODE BREAKERS :- David Kahn's The Code breakers and Bruce Norman’s Secret Warfare: The Battle of Codes and Ciphers recounts numerous tales of steganography  INVISIBLE INK : An innocent letter may contain a very different message written between the lines with invisible ink.  MICRODOTS:- The Germans developed microdot technology. Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941.
  • 8. Types of Steganography  MESSAGES IN TEXT program is called SPAM MIMIC. Secret messages can be hidden in text format by reframing the text of the carrier file, while maintaining the context. On e form of steganography is a program called Spam Mimic.  MESSAGES IN IMAGES most popular tool is outguess.  MESSAGES IN AUDIO data is hidden in layer III of encoding process of MP3 file. Messages in audio are always sent along with ambient noise.  MESSAGES IN VIDEO embedding information into multimedia data has gained increasing attention lately. The method of encryption is the same as in audio steganography. Video files are generally very good carrier files since they have a lot of irrelevant bits.
  • 9. Steganography in Images Two types of compression: • lossless (gif) • lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools StegoDOS White Noise Storm S-tools outguess steghide
  • 10. Dissecting Steganography  Steganography is a term used for hiding messages within an image. Any color pixel is made of a combination of red –green-blue mode(RGB) wherein each RGB component consist of 8 bits. If letters in ASCII are to be represented within the color pixels, the rightmost digit, called the least significant bit (LSB), can be altered.
  • 11.  Any variation in the value of this bit leads to very minimal variation in color. If we have to hide the word ‘digit’ in the image, we take the LSB of every color and hide each bit of the word in its RGB combination.  To insert the letter ‘D’ we modify three color pixels with three bits in each color pixel, we utilize 14 color pixels to hide the entire word with only 1 bit in the 14th pixel.
  • 12. Steps for Hiding an Image Steganography  Start s-tool and window explorer using the later as drag and drop interface the software.  Drag and drop the image to be used as the carrier file from the explorer onto the actions window in s-tool.  Drag and drop the data file on the carrier file.  Give pass phrase and encryption algorithm when prompted. Pass these to receiver too.  The hidden file is ready. Receiver has to click on the “reveal” button to extract the data.
  • 13. Advantages  It can be used for safeguarding data, such as in the field of media where copywriting ensures authenticity.  It can be used by intelligence agencies for sending their secret data.
  • 14. Disadvantages Many a terrorist and anti humanist activities have been carried out cloaked under this technique