SlideShare a Scribd company logo
1 of 14
 Steganography is the art and science of writing

hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the
existence of the message.
 The word steganography is of Greek origin and means
"concealed writing" from the Greek
words “steganos” meaning "covered or
protected", and ”graphei” meaning "writing".
 Generally, messages will appear to be something else:
images, articles, shopping lists, or some
other covertext.
 Media files are ideal for steganographic transmission

because of their large size.
 As a simple example, a sender might start with an
image file and adjust the color of every “100th” pixel to
correspond to a letter in the alphabet, a change so
subtle that someone not specifically looking for it is
unlikely to notice it.
The advantage of steganography
over cryptography alone is that messages do not attract
attention to themselves. Plainly visible encrypted
messages—no matter how unbreakable—will arouse
suspicion, and may in themselves be incriminating in
countries where encryption is
illegal.Therefore, whereas cryptography protects the
contents of a message, steganography can be said to
protect both messages and communicating parties.
 A steganography software tool allows a user to embed

hidden data inside a carrier file, such as an image or
video, and later extract that data.
 Some common steganography tools are :
a) SNOW
b) S-TOOLS
c) STEALTH
d) HIDE and SEEK
e) PARANOID
• Snow steganography also known as “Whitespace

steganography” is used to conceal messages in ASCII
text by appending the white spaces to the end of the
line.
• As spaces and tabs are generally not visible in text
viewers, the message is effectively hidden from casual
observers.
• Snow exploits the steganographic nature of
whitespace.Locating /trailing whitespace in text is like
finding a polar bear in a snowstorm.
 The snow program runs in two modes - message

concealment, and message extraction.
 During concealment, the following steps are taken:

Message -> optional compression -> optional
encryption -> concealment in text
 Extraction reverses the process:

Extract data from text -> optional decryption ->
optional uncompression -> message
 S-Tools is a program that helps you hide your files and

folders using steganography - it hides your data within
graphics files (BMP, GIF) and WAV files (music) in such a
way that the files are no different from those not
containing any hidden data (that is, the picture can still be
viewed, the music can be listened to).
 Digital files (like *.bmp or *.wav) can be to some extent
modified so that the changes will not affect the quality of
image or sound (i.e. the changes will be virtually
unnoticeable).
 The program not only hides your data within a seemingly
usual file but it enables you to encrypt the hidden data as
well.
 S-Tools is somewhat less powerful in that it lacks

features such as the ability to hide data within HTML
and text files, and irrecoverable data deletion.
You open up a copy of STools and drag pictures
and sounds across to it.
To hide files you just
drag them over open
sound/picture windows.
You can hide multiple
files in one
sound/picture and your
data is compressed
before being encrypted
then hidden.
 Camouflage allows you to hide files by scrambling

them and then attaching them to the file of your
choice. This camouflaged file then looks and behaves
like a normal file, and can be stored, used or emailed
without attracting attention.
 Example, you could create a picture file that looks and
behaves exactly like any other picture file but contains
hidden encrypted files, or you could hide a file inside a
Word document that would not attract attention if
discovered. Such files can later be safely extracted.
 For additional security you can password your

camouflaged file. This password will be required when
extracting the files within.
You can even camouflage files within camouflaged
files.les can later be safely extracted.
 Steganalysis is the art and science of detecting

messages hidden using steganography.
 The goal of steganalysis is to identify suspected
packages, determine whether or not they have a
payload encoded into them, and, if
possible, recover that payload.
 Steganalysis generally starts with a pile of
suspect data files, but little information about
which of the files, if any, contain a payload.
Concealed Writing Techniques

More Related Content

What's hot

Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

What's hot (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography
Steganography Steganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 

Similar to Concealed Writing Techniques

“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 

Similar to Concealed Writing Techniques (20)

“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 

More from Saugata Palit

Sports and mental health
Sports and mental healthSports and mental health
Sports and mental healthSaugata Palit
 
How handwriting communicates
How handwriting communicatesHow handwriting communicates
How handwriting communicatesSaugata Palit
 
Customers Expectation of a Service
Customers Expectation of a ServiceCustomers Expectation of a Service
Customers Expectation of a ServiceSaugata Palit
 
Pepsico Sales Structure
Pepsico Sales StructurePepsico Sales Structure
Pepsico Sales StructureSaugata Palit
 
Vision and Mission statements
Vision and Mission statementsVision and Mission statements
Vision and Mission statementsSaugata Palit
 
Parental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesParental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesSaugata Palit
 
E commerce and supply chain management
E commerce and supply chain managementE commerce and supply chain management
E commerce and supply chain managementSaugata Palit
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Saugata Palit
 
Competitive analysis of jabong and myntra
Competitive analysis of jabong and myntraCompetitive analysis of jabong and myntra
Competitive analysis of jabong and myntraSaugata Palit
 
Manufacturing process of a random company
Manufacturing process of a random companyManufacturing process of a random company
Manufacturing process of a random companySaugata Palit
 
Comparison of the old & new company law
Comparison of the old & new company lawComparison of the old & new company law
Comparison of the old & new company lawSaugata Palit
 
Communication in a culturally diverse organization
Communication in a culturally diverse organizationCommunication in a culturally diverse organization
Communication in a culturally diverse organizationSaugata Palit
 
Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Saugata Palit
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for managementSaugata Palit
 
Business Environments
Business EnvironmentsBusiness Environments
Business EnvironmentsSaugata Palit
 
Invoice generation system
Invoice generation systemInvoice generation system
Invoice generation systemSaugata Palit
 
Media is a mixed blessing
Media is a mixed blessingMedia is a mixed blessing
Media is a mixed blessingSaugata Palit
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal CommunicationSaugata Palit
 

More from Saugata Palit (20)

Sports and mental health
Sports and mental healthSports and mental health
Sports and mental health
 
How handwriting communicates
How handwriting communicatesHow handwriting communicates
How handwriting communicates
 
Customers Expectation of a Service
Customers Expectation of a ServiceCustomers Expectation of a Service
Customers Expectation of a Service
 
Pepsico Sales Structure
Pepsico Sales StructurePepsico Sales Structure
Pepsico Sales Structure
 
IPA vs THF
IPA vs THFIPA vs THF
IPA vs THF
 
Vision and Mission statements
Vision and Mission statementsVision and Mission statements
Vision and Mission statements
 
Parental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familesParental Gatekeeping in Diasporic familes
Parental Gatekeeping in Diasporic familes
 
Too old to learn
Too old to learnToo old to learn
Too old to learn
 
E commerce and supply chain management
E commerce and supply chain managementE commerce and supply chain management
E commerce and supply chain management
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
 
Competitive analysis of jabong and myntra
Competitive analysis of jabong and myntraCompetitive analysis of jabong and myntra
Competitive analysis of jabong and myntra
 
Manufacturing process of a random company
Manufacturing process of a random companyManufacturing process of a random company
Manufacturing process of a random company
 
Comparison of the old & new company law
Comparison of the old & new company lawComparison of the old & new company law
Comparison of the old & new company law
 
Communication in a culturally diverse organization
Communication in a culturally diverse organizationCommunication in a culturally diverse organization
Communication in a culturally diverse organization
 
Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)Marketing a product( Example Healthy Pastries)
Marketing a product( Example Healthy Pastries)
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for management
 
Business Environments
Business EnvironmentsBusiness Environments
Business Environments
 
Invoice generation system
Invoice generation systemInvoice generation system
Invoice generation system
 
Media is a mixed blessing
Media is a mixed blessingMedia is a mixed blessing
Media is a mixed blessing
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal Communication
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Concealed Writing Techniques

  • 1.
  • 2.  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.  The word steganography is of Greek origin and means "concealed writing" from the Greek words “steganos” meaning "covered or protected", and ”graphei” meaning "writing".  Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext.
  • 3.  Media files are ideal for steganographic transmission because of their large size.  As a simple example, a sender might start with an image file and adjust the color of every “100th” pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
  • 4. The advantage of steganography over cryptography alone is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.
  • 5.  A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.  Some common steganography tools are : a) SNOW b) S-TOOLS c) STEALTH d) HIDE and SEEK e) PARANOID
  • 6. • Snow steganography also known as “Whitespace steganography” is used to conceal messages in ASCII text by appending the white spaces to the end of the line. • As spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. • Snow exploits the steganographic nature of whitespace.Locating /trailing whitespace in text is like finding a polar bear in a snowstorm.
  • 7.  The snow program runs in two modes - message concealment, and message extraction.  During concealment, the following steps are taken: Message -> optional compression -> optional encryption -> concealment in text  Extraction reverses the process: Extract data from text -> optional decryption -> optional uncompression -> message
  • 8.  S-Tools is a program that helps you hide your files and folders using steganography - it hides your data within graphics files (BMP, GIF) and WAV files (music) in such a way that the files are no different from those not containing any hidden data (that is, the picture can still be viewed, the music can be listened to).  Digital files (like *.bmp or *.wav) can be to some extent modified so that the changes will not affect the quality of image or sound (i.e. the changes will be virtually unnoticeable).  The program not only hides your data within a seemingly usual file but it enables you to encrypt the hidden data as well.
  • 9.  S-Tools is somewhat less powerful in that it lacks features such as the ability to hide data within HTML and text files, and irrecoverable data deletion.
  • 10. You open up a copy of STools and drag pictures and sounds across to it. To hide files you just drag them over open sound/picture windows. You can hide multiple files in one sound/picture and your data is compressed before being encrypted then hidden.
  • 11.  Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.  Example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files, or you could hide a file inside a Word document that would not attract attention if discovered. Such files can later be safely extracted.
  • 12.  For additional security you can password your camouflaged file. This password will be required when extracting the files within. You can even camouflage files within camouflaged files.les can later be safely extracted.
  • 13.  Steganalysis is the art and science of detecting messages hidden using steganography.  The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.  Steganalysis generally starts with a pile of suspect data files, but little information about which of the files, if any, contain a payload.