Steganography
*steganography is data hidden within data.
*Steganography is an encryption technique
that can be used along with cryptography as
an extra-secure method in which to protect
data.
*Steganography techniques can be applied to
images, a video file or an audio file. Typically
 however, steganography is written in characters
including hash marking, but its usage within
images is also common.
 At any rate, steganography protects from pirating
copyrighted materials as well as aiding in
unauthorized viewing.
Step of crime
 Information hiding can
also be used by an
attacker during
different attack stages
depending on what
information is being
hidden:
 Identities. The
identities of
communicating parties
are hidden by
anonymization
techniques.
 Communication. The fact that a communication is taking
place is hidden by steganography techniques.
 The characteristics of a network conversation (for
example, a packet flow) can be concealed using traffic-
type obfuscation methods.
 Content. Hiding the content of data but not the
transmission or presence of the data itself is achieved by
applying cryptographic algorithms.
 Code. The structure of (executable) code is hidden by
(binary) code obfuscation and masquerading techniques.
Step of crime
1.INSERT Your picture and enter the
Secret message
2.Save image
Step of Encode
Step of decode…..
1.Insert image that u want to
make decode
2.Image will pop up (“kill tarun”)

Steganography

  • 1.
    Steganography *steganography is datahidden within data. *Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. *Steganography techniques can be applied to images, a video file or an audio file. Typically
  • 2.
     however, steganographyis written in characters including hash marking, but its usage within images is also common.  At any rate, steganography protects from pirating copyrighted materials as well as aiding in unauthorized viewing.
  • 3.
    Step of crime Information hiding can also be used by an attacker during different attack stages depending on what information is being hidden:  Identities. The identities of communicating parties are hidden by anonymization techniques.
  • 4.
     Communication. Thefact that a communication is taking place is hidden by steganography techniques.  The characteristics of a network conversation (for example, a packet flow) can be concealed using traffic- type obfuscation methods.  Content. Hiding the content of data but not the transmission or presence of the data itself is achieved by applying cryptographic algorithms.  Code. The structure of (executable) code is hidden by (binary) code obfuscation and masquerading techniques.
  • 5.
  • 6.
    1.INSERT Your pictureand enter the Secret message 2.Save image Step of Encode
  • 7.
    Step of decode….. 1.Insertimage that u want to make decode 2.Image will pop up (“kill tarun”)