SlideShare a Scribd company logo
STEGANOGRAPHY
INTRODUCTION

                                   No one apart
                                      from the
    Art and            A form of    sender and
 science of             security     intended
writing hidden          through      recipient,
 messages              obscurity   suspects the
                                    existence of
                                   the message


     www.company.com
Steganós   •   Covered

Graptos    •   Writing




ETYMOLOGY
HISTORY OF STEGANOGRAPHY

                    Current


                    1st and 2nd
                    World Wars




                    440 B.C.


  www.company.com
Cryptography


               Steganography

Watermarking


  EVOLUTION
ADVANTAGE OF STEGANOGRAPHY
    OVER CRYPTOGRAPHY



  Messages do not
  attract attention to    Protects both
      themselves         messages and
                         communicating
                             parties


  www.company.com
TYPES OF STEGANOGRAPHY

 Steganography In Text/Documents

 Steganography In Video

 Steganography In Audio

 Steganography In Images
   www.company.com
Carrier or Cover File

           Stego-Medium

        Embedded or Payload

           Steganalysis



STEGANOGRAPHY TERMS
VIDEO
HOW IT WORKS
www.company.com
STEGANOGRAPHY STEPS

                   Steganography




      Encoding a              Decode a
       message                message
 www.company.com
Embedded
  Data



             MESSAGE


Plain info




      MESSAGE
ENCODING

                        Step 2
• Prepare          • Encode
                                       • Steganographic
                                         data
  cover data         embedded
                     data with cover
                     data
    Step1                                   Step 3
     www.company.com
DECODING

                         Step 2
• Steganographic                    • Embedded
  Data               • Decode         data
                       Plain info     obtained

     Step1                             Step 3

       www.company.com
STEGANALYSIS
Art and Science of detecting hidden
            messages


     Just discover Steganography



 Not deals with decrypting the data
www.company.com
Line Shift Coding

                Word Shift Coding

                 Feature Coding

          Least Significant Bit Insertion

                Low bit encoding

             Masking and Filtering




STEGANOGRAPHY TECHNIQUES
STEGANOGRAPHY USING
 LEAST SIGNIFICANT BIT




www.company.com
PRACTICAL
Program          Image files   Audio files    Video files   Document
                                                                   files
                      BMP, JPG,     Mp3, WAV       3gp, Mp4,        Pdf
                      PNG, TGA                      MPEG-1,
     OpenPuff                                     MPEG-2, VOB,
                                                   SWF, FLV
     MP3Stego              -           Mp3             -            -
     OpenStego        BMP, PNG           -              -           -
      S-Tools          BMP, GIF        Wav              -           -
      StegFS               -             -              -           -
   Steganographic     BMP, PNG,          -              -           -
  Laboratory (VSL)    JPG, TIFF

     PHP-Class           PNG             -              -           -
StreamSteganography



List of some tools for Steganography
        www.company.com
USAGE IN MODERN PRINTERS

  Tiny yellow dots are added to each page


Printer serial numbers date and time stamps
         are encoded on yellow dots


EXAMPLE: HP and Xerox color laser printers.
    www.company.com
ILLEGAL USAGE

                   HACKERS



                  TERRORISTS



                  CRIMINALS


www.company.com
CONCLUSION
QUERIES




www.company.com

More Related Content

What's hot

steganography
steganographysteganography
steganography
Manika Arora
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
Nikhil Tripathi
 
Steganography
Steganography Steganography
Steganography
Humajabeen31
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
Sanjay Bhoyar
 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 

What's hot (20)

steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography
Steganography Steganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Steganography
SteganographySteganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 

Viewers also liked

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 

Viewers also liked (6)

Steganography
Steganography Steganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Steganography

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
InformationTechnolog44
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
richaria
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
Kiakaha17
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Nandani Prakash
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
Srishti Kakade
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Gerhard Claassen
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
SaloniGoyal45
 
HACKING
HACKINGHACKING
HACKING
KRASHCHAUHAN2
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
Matlab Simulation
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
ClubHack
 
L1803037377
L1803037377L1803037377
L1803037377
IOSR Journals
 
Steganography
SteganographySteganography
Steganography
NurulAliza1
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 

Similar to Steganography (20)

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
L1803037377
L1803037377L1803037377
L1803037377
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 

More from Neha Sharma

Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational ResearchNeha Sharma
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft SurfaceNeha Sharma
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist AttacksNeha Sharma
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface Neha Sharma
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality ShowsNeha Sharma
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics PracticalNeha Sharma
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about MathsNeha Sharma
 

More from Neha Sharma (9)

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational Research
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft Surface
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist Attacks
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality Shows
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics Practical
 
IPv6
IPv6IPv6
IPv6
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about Maths
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Steganography

  • 2. INTRODUCTION No one apart from the Art and A form of sender and science of security intended writing hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  • 3. Steganós • Covered Graptos • Writing ETYMOLOGY
  • 4. HISTORY OF STEGANOGRAPHY Current 1st and 2nd World Wars 440 B.C. www.company.com
  • 5. Cryptography Steganography Watermarking EVOLUTION
  • 6. ADVANTAGE OF STEGANOGRAPHY OVER CRYPTOGRAPHY Messages do not attract attention to Protects both themselves messages and communicating parties www.company.com
  • 7. TYPES OF STEGANOGRAPHY Steganography In Text/Documents Steganography In Video Steganography In Audio Steganography In Images www.company.com
  • 8. Carrier or Cover File Stego-Medium Embedded or Payload Steganalysis STEGANOGRAPHY TERMS
  • 11. STEGANOGRAPHY STEPS Steganography Encoding a Decode a message message www.company.com
  • 12. Embedded Data MESSAGE Plain info MESSAGE
  • 13. ENCODING Step 2 • Prepare • Encode • Steganographic data cover data embedded data with cover data Step1 Step 3 www.company.com
  • 14. DECODING Step 2 • Steganographic • Embedded Data • Decode data Plain info obtained Step1 Step 3 www.company.com
  • 15. STEGANALYSIS Art and Science of detecting hidden messages Just discover Steganography Not deals with decrypting the data www.company.com
  • 16. Line Shift Coding Word Shift Coding Feature Coding Least Significant Bit Insertion Low bit encoding Masking and Filtering STEGANOGRAPHY TECHNIQUES
  • 17. STEGANOGRAPHY USING LEAST SIGNIFICANT BIT www.company.com
  • 19. Program Image files Audio files Video files Document files BMP, JPG, Mp3, WAV 3gp, Mp4, Pdf PNG, TGA MPEG-1, OpenPuff MPEG-2, VOB, SWF, FLV MP3Stego - Mp3 - - OpenStego BMP, PNG - - - S-Tools BMP, GIF Wav - - StegFS - - - - Steganographic BMP, PNG, - - - Laboratory (VSL) JPG, TIFF PHP-Class PNG - - - StreamSteganography List of some tools for Steganography www.company.com
  • 20. USAGE IN MODERN PRINTERS Tiny yellow dots are added to each page Printer serial numbers date and time stamps are encoded on yellow dots EXAMPLE: HP and Xerox color laser printers. www.company.com
  • 21. ILLEGAL USAGE HACKERS TERRORISTS CRIMINALS www.company.com