SlideShare a Scribd company logo
1 of 7
Steganography
Prof. Neeraj Bhargava
Kapil Chauhan
Department of Computer Science
School of Engineering & Systems Sciences
MDS University, Ajmer
Introduction
โ€ข Form of Communication
1. Cryptography
โ€ข Scrambles the message into cipher
2. Steganography
โ€ข Hides the message in unexpected places
โ€ข Digital Applications of Steganography
1. Can be hidden in digital data
โ€ข MS Word (doc)
โ€ข Web pages (htm)
โ€ข Sound files (mp3)
โ€ข Video files (mpeg, avi)
โ€ข Digital images (bmp, gif, jpg)
Background
๏‚—Uncompressed Images
๏‚—Grayscale Bitmap images (bmp)
๏‚— 256 shades of intensity from black to white
๏‚— Can be obtained from color images
๏‚— Arranged into a 2-D matrix
๏‚— Messages are hidden in the least significant bits (lsb)
Introduction
๏‚—Compressed Images
๏‚—Grayscale jpeg images (jpg)
๏‚— Joint Photographic Experts Group (jpeg)
๏‚— Divides into 8x8 blocks
๏‚— Huffman Coding
๏‚— Affects the images statistical properties
Finding and Extracting Messages
from Bitmaps
๏‚—Problem
๏‚—Messages can be hidden
๏‚—May be anywhere in image
๏‚—Cannot see message in image
๏‚—Would take forever to be processed by a human
Finding and Extracting Messages from
Bitmaps
๏‚—Conclusion
๏‚—Messages are detectible and extractible from non-encrypted
uncompressed images.
๏‚—Linear messages can be found in any direction with more
computation
Finding and Extracting Messages from
Bitmaps
๏‚—Conclusion
๏‚—Messages are detectible and extractible from non-encrypted
uncompressed images.
๏‚—Linear messages can be found in any direction with more
computation

More Related Content

Similar to Steganography

Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical PasswordsZhi Guan
ย 
Tim Keefe - DRI Training Series Day UCC: Digitising Your Collection
Tim Keefe - DRI Training Series Day UCC: Digitising Your CollectionTim Keefe - DRI Training Series Day UCC: Digitising Your Collection
Tim Keefe - DRI Training Series Day UCC: Digitising Your Collectiondri_ireland
ย 
Tim Keefe - DRI Training Series: 2. Digitising Your Collection
Tim Keefe - DRI Training Series: 2. Digitising Your CollectionTim Keefe - DRI Training Series: 2. Digitising Your Collection
Tim Keefe - DRI Training Series: 2. Digitising Your Collectiondri_ireland
ย 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
ย 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMIDES Editor
ย 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
ย 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyAly Arman
ย 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
ย 
akashreport
akashreportakashreport
akashreportAkash Goel
ย 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
ย 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.pptSantu Chall
ย 
About Steganography
About SteganographyAbout Steganography
About SteganographySudhansh Gupta
ย 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
ย 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compressionShona Hira
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compressionDom Mike
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compressionDom Mike
ย 

Similar to Steganography (20)

Graphical Passwords
Graphical PasswordsGraphical Passwords
Graphical Passwords
ย 
Tim Keefe - DRI Training Series Day UCC: Digitising Your Collection
Tim Keefe - DRI Training Series Day UCC: Digitising Your CollectionTim Keefe - DRI Training Series Day UCC: Digitising Your Collection
Tim Keefe - DRI Training Series Day UCC: Digitising Your Collection
ย 
Tim Keefe - DRI Training Series: 2. Digitising Your Collection
Tim Keefe - DRI Training Series: 2. Digitising Your CollectionTim Keefe - DRI Training Series: 2. Digitising Your Collection
Tim Keefe - DRI Training Series: 2. Digitising Your Collection
ย 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
ย 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
ย 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
ย 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
ย 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
ย 
akashreport
akashreportakashreport
akashreport
ย 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ย 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
ย 
About Steganography
About SteganographyAbout Steganography
About Steganography
ย 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
ย 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ย 
K0815660
K0815660K0815660
K0815660
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
ย 
Lec6 compression
Lec6 compressionLec6 compression
Lec6 compression
ย 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
ย 
1. IP Introduction.pdf
1. IP Introduction.pdf1. IP Introduction.pdf
1. IP Introduction.pdf
ย 

More from chauhankapil

Gray level transformation
Gray level transformationGray level transformation
Gray level transformationchauhankapil
ย 
Elements of visual perception
Elements of visual perceptionElements of visual perception
Elements of visual perceptionchauhankapil
ย 
JSP Client Request
JSP Client RequestJSP Client Request
JSP Client Requestchauhankapil
ย 
Jsp server response
Jsp   server responseJsp   server response
Jsp server responsechauhankapil
ย 
Markov decision process
Markov decision processMarkov decision process
Markov decision processchauhankapil
ย 
RNN basics in deep learning
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learningchauhankapil
ย 
Introduction to generative adversarial networks (GANs)
Introduction to generative adversarial networks (GANs)Introduction to generative adversarial networks (GANs)
Introduction to generative adversarial networks (GANs)chauhankapil
ย 
Bayesian probabilistic interference
Bayesian probabilistic interferenceBayesian probabilistic interference
Bayesian probabilistic interferencechauhankapil
ย 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in javachauhankapil
ย 
Knowledge acquistion
Knowledge acquistionKnowledge acquistion
Knowledge acquistionchauhankapil
ย 
Knowledge based system
Knowledge based systemKnowledge based system
Knowledge based systemchauhankapil
ย 
Introduction of predicate logics
Introduction of predicate  logicsIntroduction of predicate  logics
Introduction of predicate logicschauhankapil
ย 
Types of inheritance in java
Types of inheritance in javaTypes of inheritance in java
Types of inheritance in javachauhankapil
ย 
Representation of syntax, semantics and Predicate logics
Representation of syntax, semantics and Predicate logicsRepresentation of syntax, semantics and Predicate logics
Representation of syntax, semantics and Predicate logicschauhankapil
ย 
Inheritance in java
Inheritance in javaInheritance in java
Inheritance in javachauhankapil
ย 
Propositional logic
Propositional logicPropositional logic
Propositional logicchauhankapil
ย 
Constructors in java
Constructors in javaConstructors in java
Constructors in javachauhankapil
ย 
Methods in java
Methods in javaMethods in java
Methods in javachauhankapil
ย 
Circular linked list
Circular linked listCircular linked list
Circular linked listchauhankapil
ย 

More from chauhankapil (20)

Gray level transformation
Gray level transformationGray level transformation
Gray level transformation
ย 
Elements of visual perception
Elements of visual perceptionElements of visual perception
Elements of visual perception
ย 
JSP Client Request
JSP Client RequestJSP Client Request
JSP Client Request
ย 
Jsp server response
Jsp   server responseJsp   server response
Jsp server response
ย 
Markov decision process
Markov decision processMarkov decision process
Markov decision process
ย 
RNN basics in deep learning
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learning
ย 
Introduction to generative adversarial networks (GANs)
Introduction to generative adversarial networks (GANs)Introduction to generative adversarial networks (GANs)
Introduction to generative adversarial networks (GANs)
ย 
Bayesian probabilistic interference
Bayesian probabilistic interferenceBayesian probabilistic interference
Bayesian probabilistic interference
ย 
Jsp
JspJsp
Jsp
ย 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
ย 
Knowledge acquistion
Knowledge acquistionKnowledge acquistion
Knowledge acquistion
ย 
Knowledge based system
Knowledge based systemKnowledge based system
Knowledge based system
ย 
Introduction of predicate logics
Introduction of predicate  logicsIntroduction of predicate  logics
Introduction of predicate logics
ย 
Types of inheritance in java
Types of inheritance in javaTypes of inheritance in java
Types of inheritance in java
ย 
Representation of syntax, semantics and Predicate logics
Representation of syntax, semantics and Predicate logicsRepresentation of syntax, semantics and Predicate logics
Representation of syntax, semantics and Predicate logics
ย 
Inheritance in java
Inheritance in javaInheritance in java
Inheritance in java
ย 
Propositional logic
Propositional logicPropositional logic
Propositional logic
ย 
Constructors in java
Constructors in javaConstructors in java
Constructors in java
ย 
Methods in java
Methods in javaMethods in java
Methods in java
ย 
Circular linked list
Circular linked listCircular linked list
Circular linked list
ย 

Recently uploaded

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 

Recently uploaded (20)

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 

Steganography

  • 1. Steganography Prof. Neeraj Bhargava Kapil Chauhan Department of Computer Science School of Engineering & Systems Sciences MDS University, Ajmer
  • 2. Introduction โ€ข Form of Communication 1. Cryptography โ€ข Scrambles the message into cipher 2. Steganography โ€ข Hides the message in unexpected places โ€ข Digital Applications of Steganography 1. Can be hidden in digital data โ€ข MS Word (doc) โ€ข Web pages (htm) โ€ข Sound files (mp3) โ€ข Video files (mpeg, avi) โ€ข Digital images (bmp, gif, jpg)
  • 3. Background ๏‚—Uncompressed Images ๏‚—Grayscale Bitmap images (bmp) ๏‚— 256 shades of intensity from black to white ๏‚— Can be obtained from color images ๏‚— Arranged into a 2-D matrix ๏‚— Messages are hidden in the least significant bits (lsb)
  • 4. Introduction ๏‚—Compressed Images ๏‚—Grayscale jpeg images (jpg) ๏‚— Joint Photographic Experts Group (jpeg) ๏‚— Divides into 8x8 blocks ๏‚— Huffman Coding ๏‚— Affects the images statistical properties
  • 5. Finding and Extracting Messages from Bitmaps ๏‚—Problem ๏‚—Messages can be hidden ๏‚—May be anywhere in image ๏‚—Cannot see message in image ๏‚—Would take forever to be processed by a human
  • 6. Finding and Extracting Messages from Bitmaps ๏‚—Conclusion ๏‚—Messages are detectible and extractible from non-encrypted uncompressed images. ๏‚—Linear messages can be found in any direction with more computation
  • 7. Finding and Extracting Messages from Bitmaps ๏‚—Conclusion ๏‚—Messages are detectible and extractible from non-encrypted uncompressed images. ๏‚—Linear messages can be found in any direction with more computation