SlideShare a Scribd company logo
Steganography
Implementation

                 SM




                      1
Contents
•   Introduction
•   History
•   Steganography v/s Cryptograpy
•   Types of Steganography
•   Steps Involved in Steganography
•   Steganography Techniques
•   Digital Images
•   Lossy and Lossless Compression
•   Advantages
•   Negative Aspects
•   Applications
•   Conclusions
                                      2
Introduction
• Greek Words:
       STEGANOS – “Covered”
       GRAPHIE – “Writing”

• Advance security is not maintained by the password protection but it is
  gained by hiding the existence of the data, which can only be done by
  Steganography.

• Steganography is the art and science of writing hidden messages in such a
  way that no one apart from the intended recipient knows of the existence of
  the message.

• This can be achieve by concealing the existence of information within
  seemingly harmless carriers or cover

• Carrier: text, image, video, audio, etc.


                                                                            3
History
• Greeks used it writing message on some material and later covering
  it with wax, tattooing messages on bald head, later growing hair to
  cover it up.


• In World War II invisible inks were used to write messages in
  between the lines of normal text message .


• Currently, cryptography and steganography are used to hide and
  send the secret data.




                                                                        4
Steganography v/s Cryptography
• Cryptography hides the contents of a secret message from a
  malicious people, whereas Steganography even conceals the
  existence of the message

• In cryptography, the structure of a message is scrambled to make it
  meaningless and unintelligible unless the decryption key is available

• Steganography does not alter the structure of the secret
  message, but hides it inside a cover-image so it cannot be seen.




                                                                      5
• Cryptography :-




• Steganography :-




                     6
Types of Steganography

• Steganography In Text/Documents

• Steganography In Images

• Steganography In Audio

• Steganography In Video




                                    7
Steps involved in Steganography




                                  8
Steganography Techniques
• Injection: Injection is quite a simple method which simply involves
  directly injecting the secret information into the carrier file.

• Substitution: Replacement of the least significant bits of
  information that determine the meaningful content of the original
  file with new data in a way that causes the least amount of
  distortion.

• Generation: The generation technique, unlike injection and
  substitution, requires only a covert file, as it is used to create the
  overt file.


                                                                           9
Digital Images
• By digital Images we presume to deal with bits that is 0’s and 1’s.

• Digital Images having 24-bit depth color images are selected using
  RGB color model.

• The idea is to hide text in image with the conditions that the image
  quality is retained along with the size of the image.

• 24-bit BMP is preferred over 24-bit JPEG because it is lossless
  compression.




                                                                         10
Lossy and Lossless Compression
• File compression software looks for redundancies, and eliminates
  those redundancies in order to reduce the size of the file.

•    Lossy compression reduces a file by permanently eliminating
    certain information. When the file is uncompressed, only a part of
    the original information is still there.

•    With lossless compression, every single bit of data that was
    originally in the file remains after the file is uncompressed. All of
    the information is completely restored.




                                                                            11
Least Significant Bit Insertion:
• The most common and popular method of modern day steganography.

•    Overall image distortion is kept to a minimum while the message is
    spaced out over the pixels in the images.

•   This technique works best when the image file is larger then the
    message file and if the image is grayscale.

•   Messages are encoded in LSB of every byte in a image.

•   Value of each pixel change slightly.

• Grey scale palettes due to least pronounced shades are recommended.
                                                                          12
LSB Implementation
• Take T of binary value 11100110.
  To store these 8 bits of character
  T, we will require 8 pixels.

• Each bit is then replaced by LSB
  of each Image byte




                                       13
• Example : Insert a word TEXT
  - T = 01100010
  - E = 01101111
  - X = 01101101
  - T = 01100010
• Image Bits before




• Image Bits after




                                 14
15
Why LSB?
Detecting Steganography :
• The art of detecting Steganography is referred to as Steganalysis.

• Using different tools like sendsecret, Steganography 8.1 ,
  Stegdetect, Hiderman etc.

• Steganalysis does not deal with trying to decrypt the hidden
  information inside of a file, just discovering it.

• It is mainly done with comparing the encrypted file with the original
  copy.




                                                                       17
Detecting Steganography




                          18
Detecting By histogram technique :




                                     19
Advantages
• It is used in the way of hiding not the Information but the password
  to reach that Information.

• Messages do not attract attention to themselves i.e difficult to detect.
  Only receiver can detect.

• The proposed technique uses LSB to hide data from a pre defined
  position agreed between two parties. Same position is only used
  once to enhance security.

• Can be applied differently in digital image, audio & video file.




                                                                         20
Negative Aspects
• Huge number of data results in huge file size, so some one can
  suspect about it.

• In sending and receiving information can be leaked.

• It is Vulnerable to almost all media transformations.

• If this technique is used in a wrong way then this can be very much
  dangerous.




                                                                        21
Applications
• Confidential communication and secret data storing

• Protection of data alteration

• Used in modern printers

• Protect copyrights, to maintain confidentiality.




                                                       22
Conclusion
• Steganography is in the nascent stage of development.

• The importance of Steganography has not been realized to that stage
  where it is preferred over its close rival “Encryption”.

• New techniques are being discovered and implemented. It is analyzed
  that time is not far away when its importance would be realized by
  organizations in general and the arm forces in particular.




                                                                    23
References :-
 http://en.wikipedia.org/wiki/Steganography8

 http://computer.howstuffworks.com/file-compression3.htm

 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4547669

 http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steganography.pdf

 http://www.sans.org/reading_room/whitepapers/covert/steganography-matters-
  post-911-world_676

 http://www.scribd.com/doc/49683406/1/Steganography-vs-Cryptography




                                                                           24
Thank You!


             25

More Related Content

What's hot

Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Steganography
SteganographySteganography
Steganography
Abhishek Singh
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Steganography ppt
Steganography pptSteganography ppt

What's hot (20)

Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
ShawaizBajwa
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
steganography
steganographysteganography
steganography
shiveverma
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
ThusharaBAmigoz1
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
Santu Chall
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Steganograpy
SteganograpySteganograpy
Steganograpy
arvind carpenter
 
Finalmarch4 th
Finalmarch4 thFinalmarch4 th
Finalmarch4 th
Ashritha Bhagavathi
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatia
Jayant Bhatia
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
SruthiReddy112
 
Steganography
SteganographySteganography
Steganography
Hassan Aftab
 
Information security
Information securityInformation security
Information security
Jay Nagar
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
ShubhamPancheshwar1
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
ssuser4d4e5a
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
SamehShenoda
 

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
steganography
steganographysteganography
steganography
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Image Security
Image SecurityImage Security
Image Security
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Finalmarch4 th
Finalmarch4 thFinalmarch4 th
Finalmarch4 th
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography by jayant bhatia
Steganography by jayant bhatiaSteganography by jayant bhatia
Steganography by jayant bhatia
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
 
Steganography
SteganographySteganography
Steganography
 
Information security
Information securityInformation security
Information security
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 

Steganography

  • 2. Contents • Introduction • History • Steganography v/s Cryptograpy • Types of Steganography • Steps Involved in Steganography • Steganography Techniques • Digital Images • Lossy and Lossless Compression • Advantages • Negative Aspects • Applications • Conclusions 2
  • 3. Introduction • Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” • Advance security is not maintained by the password protection but it is gained by hiding the existence of the data, which can only be done by Steganography. • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. • This can be achieve by concealing the existence of information within seemingly harmless carriers or cover • Carrier: text, image, video, audio, etc. 3
  • 4. History • Greeks used it writing message on some material and later covering it with wax, tattooing messages on bald head, later growing hair to cover it up. • In World War II invisible inks were used to write messages in between the lines of normal text message . • Currently, cryptography and steganography are used to hide and send the secret data. 4
  • 5. Steganography v/s Cryptography • Cryptography hides the contents of a secret message from a malicious people, whereas Steganography even conceals the existence of the message • In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is available • Steganography does not alter the structure of the secret message, but hides it inside a cover-image so it cannot be seen. 5
  • 6. • Cryptography :- • Steganography :- 6
  • 7. Types of Steganography • Steganography In Text/Documents • Steganography In Images • Steganography In Audio • Steganography In Video 7
  • 8. Steps involved in Steganography 8
  • 9. Steganography Techniques • Injection: Injection is quite a simple method which simply involves directly injecting the secret information into the carrier file. • Substitution: Replacement of the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion. • Generation: The generation technique, unlike injection and substitution, requires only a covert file, as it is used to create the overt file. 9
  • 10. Digital Images • By digital Images we presume to deal with bits that is 0’s and 1’s. • Digital Images having 24-bit depth color images are selected using RGB color model. • The idea is to hide text in image with the conditions that the image quality is retained along with the size of the image. • 24-bit BMP is preferred over 24-bit JPEG because it is lossless compression. 10
  • 11. Lossy and Lossless Compression • File compression software looks for redundancies, and eliminates those redundancies in order to reduce the size of the file. • Lossy compression reduces a file by permanently eliminating certain information. When the file is uncompressed, only a part of the original information is still there. • With lossless compression, every single bit of data that was originally in the file remains after the file is uncompressed. All of the information is completely restored. 11
  • 12. Least Significant Bit Insertion: • The most common and popular method of modern day steganography. • Overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. • This technique works best when the image file is larger then the message file and if the image is grayscale. • Messages are encoded in LSB of every byte in a image. • Value of each pixel change slightly. • Grey scale palettes due to least pronounced shades are recommended. 12
  • 13. LSB Implementation • Take T of binary value 11100110. To store these 8 bits of character T, we will require 8 pixels. • Each bit is then replaced by LSB of each Image byte 13
  • 14. • Example : Insert a word TEXT - T = 01100010 - E = 01101111 - X = 01101101 - T = 01100010 • Image Bits before • Image Bits after 14
  • 15. 15
  • 17. Detecting Steganography : • The art of detecting Steganography is referred to as Steganalysis. • Using different tools like sendsecret, Steganography 8.1 , Stegdetect, Hiderman etc. • Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it. • It is mainly done with comparing the encrypted file with the original copy. 17
  • 19. Detecting By histogram technique : 19
  • 20. Advantages • It is used in the way of hiding not the Information but the password to reach that Information. • Messages do not attract attention to themselves i.e difficult to detect. Only receiver can detect. • The proposed technique uses LSB to hide data from a pre defined position agreed between two parties. Same position is only used once to enhance security. • Can be applied differently in digital image, audio & video file. 20
  • 21. Negative Aspects • Huge number of data results in huge file size, so some one can suspect about it. • In sending and receiving information can be leaked. • It is Vulnerable to almost all media transformations. • If this technique is used in a wrong way then this can be very much dangerous. 21
  • 22. Applications • Confidential communication and secret data storing • Protection of data alteration • Used in modern printers • Protect copyrights, to maintain confidentiality. 22
  • 23. Conclusion • Steganography is in the nascent stage of development. • The importance of Steganography has not been realized to that stage where it is preferred over its close rival “Encryption”. • New techniques are being discovered and implemented. It is analyzed that time is not far away when its importance would be realized by organizations in general and the arm forces in particular. 23
  • 24. References :-  http://en.wikipedia.org/wiki/Steganography8  http://computer.howstuffworks.com/file-compression3.htm  http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4547669  http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steganography.pdf  http://www.sans.org/reading_room/whitepapers/covert/steganography-matters- post-911-world_676  http://www.scribd.com/doc/49683406/1/Steganography-vs-Cryptography 24