SlideShare a Scribd company logo
PRESENTATION OUTLINE
 STEGANOGRAPHY
† Introduction
† History
† Steganogrphy used nowdays ?
† Terms
† Steganography methods
† Image steganography
† Steganography available software
† Advantages of stegnography
† Disadvantages of stegnography
What is Steganography ?
INTRODUCTION
StSteganography is derived from Greek.
Goals :
• To hide a secret message with other object
•Do it such a way that presence of message is not
Steganography from the Greek word Steganos meaning
“covered ” and the Greek word Graphie meaning “ writing ”.
The difference between cryptology
and steganography is one of objective:
•Cryptology takes a message and encrypts it can not be read by
a third party. However the third party is aware of the presence
of the message.
•Steganography goes a step further and hides a message inside
a stego-object (eg: digital sound , images), in such a way that
the presence of the message is undetetcable
• Invisible inks(e.g.: milk ,lemon , jucice ). All of
there liquids dry on the paper such that they can
not be seen, but darken when heated in order to
reveal the hidden message
Steganography used nowdays?
• “ Lately , al-Qaeda operations have been sending hundreds of encrypted
message that have been hidden in files on digital photographs on the
auction site eBay.com..... The volume of the message has nearly doubled
in the past months , Indicating to some U.S intelligence officials that al-
Qaeda is planning another attack.”
-USA today , 10 July 2002
. Authorities also are investigating information from detainees that
suggests al Qaeda members—and possibly even in laden - - are hiding
message inside photographic files on websites.
- CNN,22 July 2002
Terms
•The word cover is used to describe the orignal ,
unaltered media , i.e. Cover image.
•The term embedded is used to denote the
information that hidden inside the cover image.
•The objective Stego is used to describe the
combined product ; a cover image with a text
message embedded within it is called stego-
image.
Steganography Methods
Textual Steganography
Image Steganography
Audio steganography
IMAGE
STEGNOGRAP
HY
Image steganography
Digital images
•In order to understand how steganography is applied to
digital images, one must understand what digital images
are.
Steganography Available
software
Some of the popular programs that use
images file as the cover files are:
•Hide and seek
•White Noise storm
•Mp3 Stego
Hide and Seek
• Runs on window.
• The message is also encrypted before it is
embedded into the cover image.
• It is also best image steganography tool
• The weakness is that it only works with
image of certain dimension. For example:
320×200 or 640×480 pixels.
White Noise Storm
•Runs on DOS.
•It uses image files as it cover medium .
•It is able to embed text message into the
cover file.
•WNS will also encrypt the message
before combining it with the cover
image.
Mp3 Stego
•It uses Mp3 audio files as the cover medium.
•The secret data is compressed and then
encoded into the audio stream as it is being
converted.
•The problem with this techniques is that if an
MP3 file is uncompressed and then re-encoded
, the hidden information will be lost.
Steganalysis
•It is the growing field of detection of
hidden information in possible stego-
objects.
Detection
Reading/Removing
Detection
When the stego object is available for
analysis, There are two categories of
methods that can be used for detecting
hidden messages.
Signature Detection
Blind Detection
Signature Detection
•Involves checking image files for a signature
that is left behind by the program use to create
the stego- image.
•The various algorithm that are used to hide
these messages, leave a general well-known
recognizable signature within the file.
•The downfall of the signature detection is that
any steganography algorithm for which the
signature is not known will go undetected.
Blind Detection
•A company named Wetstone Technologies created
a large database called Steganography Index Library
(SIL)
•They studied a large number of images of different
types that have been encoded with various
steganography algorithm.
•The result show that the clean images contained
unique characteristics that were not found in the
images with hidden message inside.
•The research is still undergoing development
Example
Step-1 select the image which you want to share containing the ” Secret image”
Setp-2 create the text file containing the “secret Msg”
Setp-3 go to run , open commandline by typing “CMD”.
Setp-4 go to path of the directory containing the files.
Setp-5 enter the following command:
“copy /b Image.jpg +secret message.txt newimage.jpg”
Setp-6 Alright, you have done , Now you will see a file named newImage.jpg in the
directory
Setp-7 share the image with all your friends, anywhere. But only tell the intended
person about the secret behind it.
Setp-8 To view the “secret msg” , right click on the newimage.jpg & open it with
notepad.
Setp-9 you will see textual format of image, scroll down to the end of the file.
Setp-10 you will see the “secret msg”
Advantages of Stenganoraphy
oDifficult to detect. Only the receiver can
detect.
oCan be applied differently in digital image
file.
Disadvantages of Stenganoraphy
Apart from advantages there are also
disadvantages too.
oIf this technique is gone in the wrong hands
like hackers, terrorist , criminals then can be
very much dangerous for all.
oUsed by terrorist: in 9/11 attack al-Qaeda
head bin laden used this technology
Conclusion
New techniques are being discovered and implemented. It is
analyzed that time is not far away when its importance
would be realized by organization in general and the arm
forces in particular
Refrences
•https://en.wikipedia.org/wiki/Steganography
•https://www.slideshare.net/yprajapati/stega
nography-11960186
•https://www.techopedia.com/definition/413
1/steganography
Thank you

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography
Humajabeen31
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
steganography
steganographysteganography
steganography
Manika Arora
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
SteganographySteganography
Steganography
Girish Chandra
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
SaloniGoyal45
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 

What's hot (20)

Steganography
Steganography Steganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 

Similar to steganography

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
Nikhil Srivastava
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Stegnography
StegnographyStegnography
Stegnography
Mayank Garg
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
InformationTechnolog44
 
HACKING
HACKINGHACKING
HACKING
KRASHCHAUHAN2
 
Steganography
SteganographySteganography
Steganography
ShawaizBajwa
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
Satyajit Debnath
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IJNSA Journal
 

Similar to steganography (20)

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
Steganography
SteganographySteganography
Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Steganography
SteganographySteganography
Steganography
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

steganography

  • 1.
  • 2.
  • 3. PRESENTATION OUTLINE  STEGANOGRAPHY † Introduction † History † Steganogrphy used nowdays ? † Terms † Steganography methods † Image steganography † Steganography available software † Advantages of stegnography † Disadvantages of stegnography
  • 4. What is Steganography ? INTRODUCTION StSteganography is derived from Greek.
  • 5. Goals : • To hide a secret message with other object •Do it such a way that presence of message is not Steganography from the Greek word Steganos meaning “covered ” and the Greek word Graphie meaning “ writing ”.
  • 6. The difference between cryptology and steganography is one of objective: •Cryptology takes a message and encrypts it can not be read by a third party. However the third party is aware of the presence of the message. •Steganography goes a step further and hides a message inside a stego-object (eg: digital sound , images), in such a way that the presence of the message is undetetcable
  • 7. • Invisible inks(e.g.: milk ,lemon , jucice ). All of there liquids dry on the paper such that they can not be seen, but darken when heated in order to reveal the hidden message
  • 8. Steganography used nowdays? • “ Lately , al-Qaeda operations have been sending hundreds of encrypted message that have been hidden in files on digital photographs on the auction site eBay.com..... The volume of the message has nearly doubled in the past months , Indicating to some U.S intelligence officials that al- Qaeda is planning another attack.” -USA today , 10 July 2002 . Authorities also are investigating information from detainees that suggests al Qaeda members—and possibly even in laden - - are hiding message inside photographic files on websites. - CNN,22 July 2002
  • 9. Terms •The word cover is used to describe the orignal , unaltered media , i.e. Cover image. •The term embedded is used to denote the information that hidden inside the cover image. •The objective Stego is used to describe the combined product ; a cover image with a text message embedded within it is called stego- image.
  • 10. Steganography Methods Textual Steganography Image Steganography Audio steganography
  • 12. Image steganography Digital images •In order to understand how steganography is applied to digital images, one must understand what digital images are.
  • 13. Steganography Available software Some of the popular programs that use images file as the cover files are: •Hide and seek •White Noise storm •Mp3 Stego
  • 14. Hide and Seek • Runs on window. • The message is also encrypted before it is embedded into the cover image. • It is also best image steganography tool • The weakness is that it only works with image of certain dimension. For example: 320×200 or 640×480 pixels.
  • 15. White Noise Storm •Runs on DOS. •It uses image files as it cover medium . •It is able to embed text message into the cover file. •WNS will also encrypt the message before combining it with the cover image.
  • 16. Mp3 Stego •It uses Mp3 audio files as the cover medium. •The secret data is compressed and then encoded into the audio stream as it is being converted. •The problem with this techniques is that if an MP3 file is uncompressed and then re-encoded , the hidden information will be lost.
  • 17. Steganalysis •It is the growing field of detection of hidden information in possible stego- objects. Detection Reading/Removing
  • 18. Detection When the stego object is available for analysis, There are two categories of methods that can be used for detecting hidden messages. Signature Detection Blind Detection
  • 19. Signature Detection •Involves checking image files for a signature that is left behind by the program use to create the stego- image. •The various algorithm that are used to hide these messages, leave a general well-known recognizable signature within the file. •The downfall of the signature detection is that any steganography algorithm for which the signature is not known will go undetected.
  • 20. Blind Detection •A company named Wetstone Technologies created a large database called Steganography Index Library (SIL) •They studied a large number of images of different types that have been encoded with various steganography algorithm. •The result show that the clean images contained unique characteristics that were not found in the images with hidden message inside. •The research is still undergoing development
  • 22.
  • 23. Step-1 select the image which you want to share containing the ” Secret image” Setp-2 create the text file containing the “secret Msg” Setp-3 go to run , open commandline by typing “CMD”. Setp-4 go to path of the directory containing the files. Setp-5 enter the following command: “copy /b Image.jpg +secret message.txt newimage.jpg”
  • 24. Setp-6 Alright, you have done , Now you will see a file named newImage.jpg in the directory Setp-7 share the image with all your friends, anywhere. But only tell the intended person about the secret behind it. Setp-8 To view the “secret msg” , right click on the newimage.jpg & open it with notepad. Setp-9 you will see textual format of image, scroll down to the end of the file. Setp-10 you will see the “secret msg”
  • 25. Advantages of Stenganoraphy oDifficult to detect. Only the receiver can detect. oCan be applied differently in digital image file.
  • 26. Disadvantages of Stenganoraphy Apart from advantages there are also disadvantages too. oIf this technique is gone in the wrong hands like hackers, terrorist , criminals then can be very much dangerous for all. oUsed by terrorist: in 9/11 attack al-Qaeda head bin laden used this technology
  • 27. Conclusion New techniques are being discovered and implemented. It is analyzed that time is not far away when its importance would be realized by organization in general and the arm forces in particular