SlideShare a Scribd company logo
1 of 25
SELF STUDY SEMINAR
Steganography
By
ABTRACT
 To learn and understand what Steganography is and
about its importance.
 How Steganography works.
 Steganographic Methodologies to achieve Covert
Communications.
 Techniques to detect the use of Steganography.
 Comparison with other famous methodology of securing
data like Cryptology.
INTRODUCTION
 What exactly is Steganography?
“Steganography” “Covered or Hidden Writing”
 The art &science of communicating in a way which
hides the existence of the communication.
 Boosts the Concept of Information hiding without altering
or recasting the Information.
 Practiced in data hiding in digital files like document
files, multimedia files and even protocols.
Importance:
 Primary Goal is to hide messages inside other harmless messages.
 Doesn’t allow any other person to detect a secrete message is
being passed.
 Required by an individual as well as Governments and
organizations.
 Protects Intellectual Property Rights of Copyright Owners done via
Watermarking.
The Basic Steganographic Model
Any Steganographic
Methodology will follow the same
model using following :
 Carrier Media
 Encoding
process/Steganographic
Algorithm
 Payload
 Unique Key
 Stego-Media
 The Recovering Process
Steganography In Text Files
Text Steganography is the trickiest due to the deficiency of
redundant information . However the are some methods to achieve it:
 Line Shift Coding
 Vertical shifting of text line position to hide data.
 Word Shift Coding
 Horizontal shifting of words
 Feature Coding
 Alteration of one or more features of the text.
Steganography in Audio Files
 Changing of Individual bits that make up the digital
Audio file.
 A precise control allows the changes to be made to the
binary sequence which are not discernible to human
ears.
 Some of pre-established and effective methods are:
Steganography in Audio Files
 Least Significant Bit Coding
 Replaces the least
significant bit in some
bytes of the cover file to
hide a sequence of byte
containing the hidden
data.
Doesn’t cause quality
degradation.
Steganography in Audio Files
 Least Significant Bit Coding
 Echo Hiding
Introduces Echoes into
discrete signals.
Each block of signal holds
one bit data.
Steganography in Audio Files
 Least Significant Bit Coding
 Echo Coding
 Phase Coding
Replacing the phase of an initial audio segment with
a reference phase to represent data.
Steganography in Images
 8-bit or higher color mages are more preferable than other images.
 In these images each pixel is represented as a single byte, with
pixel value of 0-255.
 Recommended Images are ones using 256 shades of grey as
Palette.
 Shades change very gradually between pixel value.
 Images having large area of solid color should be avoided.
Steganography in Images
 Insertion Technique
The LSB of the cover image are altered.
Pixels: (00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
The Code for letter ‘A’ which is to be hidden: 10000001
After the Insertion technique:
Resultant Pixels: (00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
Steganography over Networks
Methods to implement Steganography over a network are:
 Hiding in an attachment
 Hiding in a Transmission
 Hiding in Overt Protocol
Data Camouflaging
 You take data, put it in normal network traffic, and
modify the data in such a way it looks like a overt
protocol.
Making a text file like a HTML file.
Covert Channels
 Communications paths not designed for transferring
information.
 But these are used for covert communications.
 TCP/IP Headers.
 In IP header, the IP identification number field can be
changed as the protocols keeps working properly.
 In the TCP headers, the sequence and
acknowledgement number fields are used to hide data.
Steganalysis
 Steganography also poses threat.
 Misuse by anti-social elements to send messages without
being detected.
 There is a need to Detect Stego-Media.
 Steganalysis is the study of detecting messages hidden
using steganography.
 The goal of Steganalysis is to identify suspected
packages, determine whether or not they have a
payload encoded into them, and, if possible, recover
that payload.
Steganalysis
 Correlation Technique:
 A set of unmodified files from same source are inspected with
message file for various statistics.
 The unmodified carrier and the message files are compared in
respect of these statistics.
 If the message file is indeed a Stego-File, the differences will be
seen in the statistics as payload encoded into the file causes
these differences.
 However not every time the unmodified carrier is available.
Steganalysis
 Randomness Technique:
 Using concept of randomness.
 A unmodified carrier will have
no randomness, so its histogram
shows peaks & valleys
 A stego-file will have
randomness and its histogram
shows flatness.
 There is no need for a
unmodified carrier to detect
stego-files.
Applications of Steganography
Digital Watermarking:
 A Digital Watermark is a marker embedded in a noise tolerant multimedia file.
 Uses Steganography techniques to embed data into the carrier media, with one
exception.
 Aims for the robustness of the payload(watermark), even if it results in being
visible or noticeable.
 Can be embedded as long as carrier media doesn’t get distorted.
 Digital watermarking helps in
 Copyright Protection
 Source tracking
 Distribution Monitoring
 Authentication of Media
Tamper Proofing
 To counter the risk of a files being transmitted to be tampered or altered to false
information.
 Just like a Watermark, data can be embedded onto the carrier as a check for
tampering.
 If the file undergoes some tampering, the embedded data will reflect the
changes also.
 Removal of the embedded data is also not a option as the removal will result in
the destruction of the carrier file itself.
In Modern Printers:
 Printers use Steganographic
techniques to embed information
about the document being printed
in every print.
In Biometrics:
 Avoid unauthorized use of
genetically engineered material.
 Hiding secrete messages in DNA
sequences for identification.
Steganography
Only Sender & Receiver knows
the existence of the message.
Prevents Discovery of the very
existence of Communications.
Does not Alter the structure &
content of the message.
Cryptography
The Existence of Message is
Known to all..
Prevents Unauthorized party to
discover the contents of
Communications.
Alters the structure of the
Message.
Steganography is more Advantageous!
vs.
Future of Steganography
 Improved Resistance to Analysis
 Presently, Stego-Media are more prone to be detected.
 Once detected, it will be easy to extract the hidden message.
 Making Stegos undetectable, irretrievable for those not intended
to.
 Higher Encoding Density
 Ability to hide more amount of data.
 Presently encoding density is limited without degrading the
carrier.
CONCLUSION
 Steganography is interesting subject, different than Cryptology and
System Administration.
 Based on the dilemma “YOU NEVER KNOW IF A MESSAGE IS HIDDEN”.
 Not only limited to Data Hiding, but can be put to a more Versatile use.
 Both Steganography and Cryptography together can achieve Data
Hiding.
 Expectation of more advancement in technology & efficiency
 While keeping a check on its illicit use by others.
 Steganoghraphy

More Related Content

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
steganography
steganographysteganography
steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganoghraphy

Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 

Similar to Steganoghraphy (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Steganography
SteganographySteganography
Steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
K0815660
K0815660K0815660
K0815660
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Steganoghraphy

  • 2. ABTRACT  To learn and understand what Steganography is and about its importance.  How Steganography works.  Steganographic Methodologies to achieve Covert Communications.  Techniques to detect the use of Steganography.  Comparison with other famous methodology of securing data like Cryptology.
  • 3. INTRODUCTION  What exactly is Steganography? “Steganography” “Covered or Hidden Writing”  The art &science of communicating in a way which hides the existence of the communication.  Boosts the Concept of Information hiding without altering or recasting the Information.  Practiced in data hiding in digital files like document files, multimedia files and even protocols.
  • 4. Importance:  Primary Goal is to hide messages inside other harmless messages.  Doesn’t allow any other person to detect a secrete message is being passed.  Required by an individual as well as Governments and organizations.  Protects Intellectual Property Rights of Copyright Owners done via Watermarking.
  • 5. The Basic Steganographic Model Any Steganographic Methodology will follow the same model using following :  Carrier Media  Encoding process/Steganographic Algorithm  Payload  Unique Key  Stego-Media  The Recovering Process
  • 6. Steganography In Text Files Text Steganography is the trickiest due to the deficiency of redundant information . However the are some methods to achieve it:  Line Shift Coding  Vertical shifting of text line position to hide data.  Word Shift Coding  Horizontal shifting of words  Feature Coding  Alteration of one or more features of the text.
  • 7. Steganography in Audio Files  Changing of Individual bits that make up the digital Audio file.  A precise control allows the changes to be made to the binary sequence which are not discernible to human ears.  Some of pre-established and effective methods are:
  • 8. Steganography in Audio Files  Least Significant Bit Coding  Replaces the least significant bit in some bytes of the cover file to hide a sequence of byte containing the hidden data. Doesn’t cause quality degradation.
  • 9. Steganography in Audio Files  Least Significant Bit Coding  Echo Hiding Introduces Echoes into discrete signals. Each block of signal holds one bit data.
  • 10. Steganography in Audio Files  Least Significant Bit Coding  Echo Coding  Phase Coding Replacing the phase of an initial audio segment with a reference phase to represent data.
  • 11. Steganography in Images  8-bit or higher color mages are more preferable than other images.  In these images each pixel is represented as a single byte, with pixel value of 0-255.  Recommended Images are ones using 256 shades of grey as Palette.  Shades change very gradually between pixel value.  Images having large area of solid color should be avoided.
  • 12. Steganography in Images  Insertion Technique The LSB of the cover image are altered. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) The Code for letter ‘A’ which is to be hidden: 10000001 After the Insertion technique: Resultant Pixels: (00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001)
  • 13. Steganography over Networks Methods to implement Steganography over a network are:  Hiding in an attachment  Hiding in a Transmission  Hiding in Overt Protocol Data Camouflaging  You take data, put it in normal network traffic, and modify the data in such a way it looks like a overt protocol. Making a text file like a HTML file.
  • 14. Covert Channels  Communications paths not designed for transferring information.  But these are used for covert communications.  TCP/IP Headers.  In IP header, the IP identification number field can be changed as the protocols keeps working properly.  In the TCP headers, the sequence and acknowledgement number fields are used to hide data.
  • 15. Steganalysis  Steganography also poses threat.  Misuse by anti-social elements to send messages without being detected.  There is a need to Detect Stego-Media.  Steganalysis is the study of detecting messages hidden using steganography.  The goal of Steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.
  • 16. Steganalysis  Correlation Technique:  A set of unmodified files from same source are inspected with message file for various statistics.  The unmodified carrier and the message files are compared in respect of these statistics.  If the message file is indeed a Stego-File, the differences will be seen in the statistics as payload encoded into the file causes these differences.  However not every time the unmodified carrier is available.
  • 17. Steganalysis  Randomness Technique:  Using concept of randomness.  A unmodified carrier will have no randomness, so its histogram shows peaks & valleys  A stego-file will have randomness and its histogram shows flatness.  There is no need for a unmodified carrier to detect stego-files.
  • 19. Digital Watermarking:  A Digital Watermark is a marker embedded in a noise tolerant multimedia file.  Uses Steganography techniques to embed data into the carrier media, with one exception.  Aims for the robustness of the payload(watermark), even if it results in being visible or noticeable.  Can be embedded as long as carrier media doesn’t get distorted.  Digital watermarking helps in  Copyright Protection  Source tracking  Distribution Monitoring  Authentication of Media
  • 20. Tamper Proofing  To counter the risk of a files being transmitted to be tampered or altered to false information.  Just like a Watermark, data can be embedded onto the carrier as a check for tampering.  If the file undergoes some tampering, the embedded data will reflect the changes also.  Removal of the embedded data is also not a option as the removal will result in the destruction of the carrier file itself.
  • 21. In Modern Printers:  Printers use Steganographic techniques to embed information about the document being printed in every print. In Biometrics:  Avoid unauthorized use of genetically engineered material.  Hiding secrete messages in DNA sequences for identification.
  • 22. Steganography Only Sender & Receiver knows the existence of the message. Prevents Discovery of the very existence of Communications. Does not Alter the structure & content of the message. Cryptography The Existence of Message is Known to all.. Prevents Unauthorized party to discover the contents of Communications. Alters the structure of the Message. Steganography is more Advantageous! vs.
  • 23. Future of Steganography  Improved Resistance to Analysis  Presently, Stego-Media are more prone to be detected.  Once detected, it will be easy to extract the hidden message.  Making Stegos undetectable, irretrievable for those not intended to.  Higher Encoding Density  Ability to hide more amount of data.  Presently encoding density is limited without degrading the carrier.
  • 24. CONCLUSION  Steganography is interesting subject, different than Cryptology and System Administration.  Based on the dilemma “YOU NEVER KNOW IF A MESSAGE IS HIDDEN”.  Not only limited to Data Hiding, but can be put to a more Versatile use.  Both Steganography and Cryptography together can achieve Data Hiding.  Expectation of more advancement in technology & efficiency  While keeping a check on its illicit use by others.