STEGANOGRAPHY
*steganography is data hidden within
data.
*Steganography is an encryption
technique that can be used along with
cryptography as an extra-secure method
in which to protect data.
*Steganography techniques can be
applied to images, a video file or an audio
file. Typically
however, steganography is written in characters
including hash marking, but its usage within images is
also common.
At any rate, steganography protects from pirating
copyrighted materials as well as aiding in
unauthorized viewing.
STEP OF CRIME
Information hiding can
also be used by an
attacker during
different attack stages
depending on what
information is being
hidden:
Identities. The
identities of
communicating parties
are hidden by
anonymization
techniques.
Communication. The fact that a communication is
taking place is hidden by steganography techniques.
The characteristics of a network conversation (for
example, a packet flow) can be concealed using traffic-
type obfuscation methods.
Content. Hiding the content of data but not the
transmission or presence of the data itself is achieved
by applying cryptographic algorithms.
Code. The structure of (executable) code is hidden by
(binary) code obfuscation and masquerading
techniques.
STEP OF
CRIME
1.INSERT Your picture and enter the
Secret message
2.Save image
Step of Encode
STEP OF DECODE…..
1.Insert image that u want to
make decode
2.Image will pop up (“kill tarun”)

Steganography

  • 1.
    STEGANOGRAPHY *steganography is datahidden within data. *Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. *Steganography techniques can be applied to images, a video file or an audio file. Typically
  • 2.
    however, steganography iswritten in characters including hash marking, but its usage within images is also common. At any rate, steganography protects from pirating copyrighted materials as well as aiding in unauthorized viewing.
  • 3.
    STEP OF CRIME Informationhiding can also be used by an attacker during different attack stages depending on what information is being hidden: Identities. The identities of communicating parties are hidden by anonymization techniques.
  • 4.
    Communication. The factthat a communication is taking place is hidden by steganography techniques. The characteristics of a network conversation (for example, a packet flow) can be concealed using traffic- type obfuscation methods. Content. Hiding the content of data but not the transmission or presence of the data itself is achieved by applying cryptographic algorithms. Code. The structure of (executable) code is hidden by (binary) code obfuscation and masquerading techniques.
  • 5.
  • 6.
    1.INSERT Your pictureand enter the Secret message 2.Save image Step of Encode
  • 7.
    STEP OF DECODE….. 1.Insertimage that u want to make decode 2.Image will pop up (“kill tarun”)