SlideShare a Scribd company logo
By
P.PRABAKARA PANDIAN
N.SUMATH
OVERVIEW
INTRODUCTION
DIGITAL APPROCHES
REASON FOR USING DIGITAL IMAGES
EXAMPLES OF STEGNOGRAPHY
IMAGE BASED TECHNIQUES
LSB INSERTION
MASKING AND FILTERING
USES
WATERMARKING VS STREGNOGRAPHY
SUMMARY
INTRODUCTION
Greek for “covered writing”.
STEGANOS – “Covered”
GRAPHIE – “Writing”
“The art and science of writing hidden messages in
such a way that no one apart from the intended
recipient even knows that a message has been sent.”
Clandestine Communication
Cryptography
Scrambles the message into cipher
Steganography
Hides the message in unexpected places
Uncompressed Images
Grayscale Bitmap images (bmp)
256 shades of intensity from black to white
Can be obtained from color images
Arranged into a 2-D matrix
Messages are hidden in the least significant
bits (lsb)
Matrix values change slightly
Interested in patterns that form messages
Compressed Images
Grayscale jpeg images (jpg)
Joint Photographic Experts Group (jpeg)
Converts image to YCbCr colorspace
Divides into 8x8 blocks
Uses Discrete Cosine Transform (DCT)
Obtain frequency coefficients
Scaled by quantization to remove some
frequencies
High quality setting will not be noticed
Huffman Coding
Affects the images statistical properties
ENCODING FLOWCHART
DECODING FLOWCHART
DIGITAL APPROACHES
Today, it often exists within digital formats
It makes use of seemingly innocent cover files such as
text, audio, and image files
The embedded message may be anything that can be
encoded in binary
REASONS FOR USING DIGITAL
IMAGES
It is the most widely used medium being used today
Takes advantage of our limited visual perception of
colors
This field is expected to continually grow as computer
graphics power also grows
Many programs are available to apply steganography
EXAMPLES
Tattoos on shaved heads
Wax-covered tablets
Microdots – shrunken pictures
Invisible Inks - milk, fruit juice,
urine
IMAGE-BASED TECHNIQUES
Least Significant Bit Insertion
Masking and Filtering
LSB INSERTION
Replaces least significant bits with the message to be
encoded.
Most popular technique when dealing with images.
Simple, but susceptible to lossy compression.
Example
A sample raster data for 3 pixels (9 bytes)
may be:
Inserting
the binary
value for
A
(10000001)
changes
4 bits
00100111 11101000 11001000
00100110 11001000 11101000
11001001 00100111 11101011
00100111 11101001 11001000
00100111 11001000 11101001
11001000 00100111 11101011
LSB –Continued…
Best to use a grayscale palette or one with gradual
changes in shades.
Otherwise, it is best to use images with “noisy areas”
– areas with sample color variation and without large
areas of solid color.
GRAYSCALE PALETTE
NEBULA PALETTE
“NOISY AREAS” - Example
Renoir
painting
Contaminated Image
MASKING & FILTERING
Masks secret data over the original data by changing
the luminance of particular areas.
During masking, it embed the message within
significant bits of the cover image.
Not susceptible to lossy techniques because image
manipulation does not affect the secret message.
MASKING & FILTERING - Uses
Digital Watermarking – provides identification
pertaining to the owner; i.e. license or copyright
information.
- Invisible vs Visible
Fingerprinting – provides identification of the user;
used to identify and track illegal use of content.
Visible Watermark - Example
UV Watermarking
Watermarking vs Steganography
Goal of steganography
Intruder cannot detect a message
Primarily 1:1 communication
Goal of watermarking
Intruder cannot remove or replace the message
Primarily 1:many communication
Digital Applications of
Steganography
Can be hidden in digital data
 MS Word (doc)
 Web pages (htm)
 Executables (exe)
 Sound files (mp3, wav, cda)
 Video files (mpeg, avi)
 Digital images (bmp, gif, jpg)
SUMMARY
Steganography as a whole has existed in many forms
throughout much of history.
Lossless compression of images with a great deal of
color variation work best as a cover image to embed a
message.
Steganography can be used as benefitial tool for
privacy.
REFERENCES
Wikipedia
Exploring Steganography: Seeing the Unseen – N.
Johnson & S. Jajodia
www.jjtc.com/stegdoc/steg1995.html
Information Hiding: Techniques for Steganography
and Digital Watermarking” – S. Katzenbeisser, F.
Petitcolas
Digital Watermarking – H. Bergel, L. O’Gorman
Steganography

More Related Content

What's hot

Project presentation - Steganographic Application of improved Genetic Shifti...
Project presentation  - Steganographic Application of improved Genetic Shifti...Project presentation  - Steganographic Application of improved Genetic Shifti...
Project presentation - Steganographic Application of improved Genetic Shifti...
Vladislav Kaplan
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
Nikhil Tripathi
 
Steganography
SteganographySteganography
Steganography
Deepak Raj
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
Girish Ram M
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
Lovely Mnadal
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
zaidsalfawzan
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
Kirthan S Holla
 
Steganography: Hiding your secrets with PHP
Steganography: Hiding your secrets with PHPSteganography: Hiding your secrets with PHP
Steganography: Hiding your secrets with PHP
Raul Fraile
 
Steganography
SteganographySteganography
Steganography
Khushbu Chudasama
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
Ritu Agarwal
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
Tejas_srinivas
 

What's hot (20)

Project presentation - Steganographic Application of improved Genetic Shifti...
Project presentation  - Steganographic Application of improved Genetic Shifti...Project presentation  - Steganographic Application of improved Genetic Shifti...
Project presentation - Steganographic Application of improved Genetic Shifti...
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography: Hiding your secrets with PHP
Steganography: Hiding your secrets with PHPSteganography: Hiding your secrets with PHP
Steganography: Hiding your secrets with PHP
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 

Viewers also liked

Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Stegnography
StegnographyStegnography
Stegnography
keerthi505
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
Garima Kulshreshtha
 
LSB Brochure ENG.PDF
LSB Brochure ENG.PDFLSB Brochure ENG.PDF
LSB Brochure ENG.PDF
Nadeem Abbas
 
digital steganography
digital steganographydigital steganography
digital steganography
mahesh paliwal
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
eSAT Journals
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniques
abhijeetmi90
 
Stegnography
StegnographyStegnography
Stegnography
Mayank Garg
 
steganography
steganographysteganography
steganography
Manika Arora
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
Sej Visawadia
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Rajiv Ranjan Kumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
Manjesh Kumar
 

Viewers also liked (20)

Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
Steganography Steganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
LSB Brochure ENG.PDF
LSB Brochure ENG.PDFLSB Brochure ENG.PDF
LSB Brochure ENG.PDF
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniques
 
Stegnography
StegnographyStegnography
Stegnography
 
steganography
steganographysteganography
steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
Reshmi Sasidharan
 
review.pptx
review.pptxreview.pptx
review.pptx
TechNest1
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
Sagar Kumar
 
Steganography
SteganographySteganography
Steganography
Aqib Memon
 
Pertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganographyPertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganography
newbie2019
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
ssuser2299e8
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
Pratiksha Patil
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
patisa
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
IJRES Journal
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
ijait
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
Shahid Zargar
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
Santu Chall
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptx
RobertCarreonBula
 
Steganography ppt
Steganography pptSteganography ppt
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
N043020970100
N043020970100N043020970100
N043020970100
ijceronline
 
Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
Imagesteganographydbatuaudi
ABHIJEET KHIRE
 

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
Steganography
SteganographySteganography
Steganography
 
Pertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganographyPertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptx
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
N043020970100
N043020970100N043020970100
N043020970100
 
Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
Imagesteganographydbatuaudi
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 

Steganography

  • 2. OVERVIEW INTRODUCTION DIGITAL APPROCHES REASON FOR USING DIGITAL IMAGES EXAMPLES OF STEGNOGRAPHY IMAGE BASED TECHNIQUES LSB INSERTION MASKING AND FILTERING USES WATERMARKING VS STREGNOGRAPHY SUMMARY
  • 3. INTRODUCTION Greek for “covered writing”. STEGANOS – “Covered” GRAPHIE – “Writing” “The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”
  • 4. Clandestine Communication Cryptography Scrambles the message into cipher Steganography Hides the message in unexpected places
  • 5. Uncompressed Images Grayscale Bitmap images (bmp) 256 shades of intensity from black to white Can be obtained from color images Arranged into a 2-D matrix Messages are hidden in the least significant bits (lsb) Matrix values change slightly Interested in patterns that form messages
  • 6. Compressed Images Grayscale jpeg images (jpg) Joint Photographic Experts Group (jpeg) Converts image to YCbCr colorspace Divides into 8x8 blocks Uses Discrete Cosine Transform (DCT) Obtain frequency coefficients Scaled by quantization to remove some frequencies High quality setting will not be noticed Huffman Coding Affects the images statistical properties
  • 9. DIGITAL APPROACHES Today, it often exists within digital formats It makes use of seemingly innocent cover files such as text, audio, and image files The embedded message may be anything that can be encoded in binary
  • 10. REASONS FOR USING DIGITAL IMAGES It is the most widely used medium being used today Takes advantage of our limited visual perception of colors This field is expected to continually grow as computer graphics power also grows Many programs are available to apply steganography
  • 11. EXAMPLES Tattoos on shaved heads Wax-covered tablets Microdots – shrunken pictures Invisible Inks - milk, fruit juice, urine
  • 12. IMAGE-BASED TECHNIQUES Least Significant Bit Insertion Masking and Filtering
  • 13. LSB INSERTION Replaces least significant bits with the message to be encoded. Most popular technique when dealing with images. Simple, but susceptible to lossy compression.
  • 14. Example A sample raster data for 3 pixels (9 bytes) may be: Inserting the binary value for A (10000001) changes 4 bits 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011
  • 15. LSB –Continued… Best to use a grayscale palette or one with gradual changes in shades. Otherwise, it is best to use images with “noisy areas” – areas with sample color variation and without large areas of solid color.
  • 18. “NOISY AREAS” - Example Renoir painting
  • 20. MASKING & FILTERING Masks secret data over the original data by changing the luminance of particular areas. During masking, it embed the message within significant bits of the cover image. Not susceptible to lossy techniques because image manipulation does not affect the secret message.
  • 21. MASKING & FILTERING - Uses Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information. - Invisible vs Visible Fingerprinting – provides identification of the user; used to identify and track illegal use of content.
  • 24. Watermarking vs Steganography Goal of steganography Intruder cannot detect a message Primarily 1:1 communication Goal of watermarking Intruder cannot remove or replace the message Primarily 1:many communication
  • 25. Digital Applications of Steganography Can be hidden in digital data  MS Word (doc)  Web pages (htm)  Executables (exe)  Sound files (mp3, wav, cda)  Video files (mpeg, avi)  Digital images (bmp, gif, jpg)
  • 26. SUMMARY Steganography as a whole has existed in many forms throughout much of history. Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. Steganography can be used as benefitial tool for privacy.
  • 27. REFERENCES Wikipedia Exploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petitcolas Digital Watermarking – H. Bergel, L. O’Gorman