SlideShare a Scribd company logo
Steganography
What is Steganography?
Greek Words:
STEGANOS ā€“ ā€œCoveredā€
GRAPHIE ā€“ ā€œWritingā€
ļ®

Steganography is the art and science
of writing hidden messages in such a
way that no one apart from the
intended recipient knows of the
existence of the message.

ļ®

This can be achieve by concealing the
existence of information within
seemingly harmless carriers or cover
Branches of Information Hiding
There are two major branches of information hiding, Steganography
and Watermarking

Watermarking:
ļ®
ļ®
ļ®
ļ®

Communication in watermarking is the host signal, with the
embedded data providing copyright protection.
The existence of a watermark is often declared openly.
Any attempt to remove or invalidate the embedded content
renders the host useless.
They are of two types:
Visible watermarking
Invisible watermarking

Once the presence of hidden information is revealed or even
suspected, the purpose of steganography is defeated.
History of Steganography
Demeratus sent a warning about a forthcoming attack to Greece by
writing it on a wooden panel and covering it in wax.
Histiaeus, who shaved the head of his most trusted slave and tattooed
a message on it. After his hair had grown the message was hidden.
The purpose was to instigate a revolt against the Persians.
World War II
Invincible inks
Null ciphers (unencrypted messages):

Apparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on by
products, ejecting suets and vegetable oils.
Sent by a German Spy in WWII, by taking the second letter in each
word the following message emerges:
Pershing sails from NY June 1.
Microdot Technology
Shrinking messages down
to the size of a dot became
a popular method. Since
the microdot could be
placed at the end of a
sentence or above a j or an
i.
ļ‚§
Modern Steganography
Techniques
Masking and Filtering : Is where information is hidden inside of a
image using digital watermarks that include information such as
copyright, ownership, or licenses.
Algorithms and Transformations : This technique hides data in
mathematical functions that are often used in compression
algorithms. The idea of this method is to hide the secret message
in the data bits in the least significant coefficients.
Least Significant Bit Insertion : The most common and popular
method of modern day steganography is to make use of the LSB of
a pictureā€™s pixel information.This technique works best when the
image file is larger then the message file and if the image is
grayscale.
Basics of Modern Steganography

fE:Ā Ā Ā Ā  steganographic function "embedding"
fE-1:Ā Ā Ā steganographic function "extracting"
cover:Ā Ā cover data in which emb will be hidden
emb:Ā Ā Ā Ā message to be hidden
key:Ā Ā Ā Ā parameter of fE
stego:Ā Ā cover data with the hidden message
Important Requirement for
Steganographic System

Security of the hidden communication
ļ® Robustness against statistical attacks
ļ® Robustness against image
manipulations
ļ®
Applications
ļ®

Usage in modern printers

ļ®

Alleged use by terrorists

ļ®

Alleged use by intelligence services
Alleged use by terrorists
Origional

Encrypted Image
Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded
packages is called Steganalysis.
ļ®

Visual Analysis tries to reveal the presence
of secret communication through inspection,
either with the naked eye or with the assistance
of a computer.

ļ®

Statistical (Algorithmic) Analysis reveals
tiny alterations in an image's statistical behavior
caused by steganographic embedding.
ļ®

The nominally universal methods developed to detect
embedded stego-data are generally less effective
than the steganalytic methods aimed at specific types
of embedding.
Steganography Sample Website
ļ®

Here is the link for Sample Steganographic
tool Website:

http://mozaiq.org/
Any Querieries ???

More Related Content

What's hot

Steganography
SteganographySteganography
Steganographykuttycreator
Ā 
Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan Sarkar
Papan Sarkar
Ā 
Steganograpy
SteganograpySteganograpy
Steganograpy
arvind carpenter
Ā 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Taha Malampatti
Ā 
Steganography
SteganographySteganography
Steganography
AhmadThaqifAimanAhma
Ā 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
Ā 
Steganography basic
Steganography basicSteganography basic
Steganography basicSanoj Kumar
Ā 
Steganography
SteganographySteganography
Steganography
Swapnil Bangera
Ā 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
Garima Kulshreshtha
Ā 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)ankitasinghbsc
Ā 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
Ā 
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
IOSR Journals
Ā 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Edureka!
Ā 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
Ā 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
Ā 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
NidhinRaj Saikripa
Ā 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
Ā 

What's hot (20)

Steganography
SteganographySteganography
Steganography
Ā 
Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan Sarkar
Ā 
Steganograpy
SteganograpySteganograpy
Steganograpy
Ā 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Stegnography final
Stegnography finalStegnography final
Stegnography final
Ā 
Steganography basic
Steganography basicSteganography basic
Steganography basic
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
Ā 
Stegnography
StegnographyStegnography
Stegnography
Ā 
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Ā 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Ā 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
Ā 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
Ā 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
Ā 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
Ā 
Steganography
SteganographySteganography
Steganography
Ā 

Viewers also liked

Touch technology in Mobiles
Touch technology in MobilesTouch technology in Mobiles
Touch technology in MobilesDivam Goyal
Ā 
Operating System
Operating SystemOperating System
Operating SystemDivam Goyal
Ā 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
Divam Goyal
Ā 
Visualization
VisualizationVisualization
VisualizationDivam Goyal
Ā 
Blade server
Blade serverBlade server
Blade server
Divam Goyal
Ā 

Viewers also liked (6)

Touch technology in Mobiles
Touch technology in MobilesTouch technology in Mobiles
Touch technology in Mobiles
Ā 
Operating System
Operating SystemOperating System
Operating System
Ā 
Android
AndroidAndroid
Android
Ā 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
Ā 
Visualization
VisualizationVisualization
Visualization
Ā 
Blade server
Blade serverBlade server
Blade server
Ā 

Similar to Steganography

Stegnography
StegnographyStegnography
Stegnography
Mayank Garg
Ā 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
Ā 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab
Ā 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
Ā 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
Ā 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
Ā 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
IJERA Editor
Ā 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
Ā 
Presentation1
Presentation1Presentation1
Presentation1guestb8230c
Ā 
Steganography
Steganography Steganography
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
Ā 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
Ā 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
Ā 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
Kiakaha17
Ā 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganographyPrashant Shukla
Ā 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
Ā 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Bryce Nelson
Ā 

Similar to Steganography (20)

Stegnography
StegnographyStegnography
Stegnography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
Ā 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
Ā 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Ā 
About Steganography
About SteganographyAbout Steganography
About Steganography
Ā 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
Ā 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Ā 
Presentation1
Presentation1Presentation1
Presentation1
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
Steganography.
Steganography.Steganography.
Steganography.
Ā 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
Ā 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Ā 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
Ā 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
Ā 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Ā 

More from Divam Goyal

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
Divam Goyal
Ā 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
Divam Goyal
Ā 
Technology
TechnologyTechnology
Technology
Divam Goyal
Ā 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
Divam Goyal
Ā 
SOPA
SOPASOPA
SOPA
Divam Goyal
Ā 
Input device
Input deviceInput device
Input deviceDivam Goyal
Ā 
New energy resources
New energy resourcesNew energy resources
New energy resourcesDivam Goyal
Ā 
Web Browsers
Web BrowsersWeb Browsers
Web BrowsersDivam Goyal
Ā 
Inflection
InflectionInflection
InflectionDivam Goyal
Ā 
Smart cards
Smart cardsSmart cards
Smart cardsDivam Goyal
Ā 
Biometrics
Biometrics Biometrics
Biometrics Divam Goyal
Ā 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private NetworksDivam Goyal
Ā 
Big bazaar
Big bazaarBig bazaar
Big bazaarDivam Goyal
Ā 
Brain rules
Brain rulesBrain rules
Brain rulesDivam Goyal
Ā 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat SinghDivam Goyal
Ā 
Mc donalds
Mc donalds Mc donalds
Mc donalds Divam Goyal
Ā 
Social networking
Social networkingSocial networking
Social networkingDivam Goyal
Ā 
Number of respondents belongs to selected banks
Number of respondents belongs to selected banksNumber of respondents belongs to selected banks
Number of respondents belongs to selected banksDivam Goyal
Ā 
Palm jumeirah
Palm jumeirah Palm jumeirah
Palm jumeirah Divam Goyal
Ā 

More from Divam Goyal (20)

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
Ā 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
Ā 
Technology
TechnologyTechnology
Technology
Ā 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
Ā 
SOPA
SOPASOPA
SOPA
Ā 
Input device
Input deviceInput device
Input device
Ā 
New energy resources
New energy resourcesNew energy resources
New energy resources
Ā 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
Ā 
Inflection
InflectionInflection
Inflection
Ā 
Smart cards
Smart cardsSmart cards
Smart cards
Ā 
Biometrics
Biometrics Biometrics
Biometrics
Ā 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
Ā 
Big bazaar
Big bazaarBig bazaar
Big bazaar
Ā 
Brain rules
Brain rulesBrain rules
Brain rules
Ā 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
Ā 
Apple
AppleApple
Apple
Ā 
Mc donalds
Mc donalds Mc donalds
Mc donalds
Ā 
Social networking
Social networkingSocial networking
Social networking
Ā 
Number of respondents belongs to selected banks
Number of respondents belongs to selected banksNumber of respondents belongs to selected banks
Number of respondents belongs to selected banks
Ā 
Palm jumeirah
Palm jumeirah Palm jumeirah
Palm jumeirah
Ā 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
Ā 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
Ā 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
Ā 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
Ā 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
Ā 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
Ā 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
Ā 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
Ā 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
Ā 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
Ā 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
Ā 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
Ā 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
Ā 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
Ā 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Ā 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Ā 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Ā 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
Ā 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Ā 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Ā 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Ā 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
Ā 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
Ā 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Ā 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Ā 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Ā 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
Ā 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
Ā 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
Ā 

Steganography

  • 2. What is Steganography? Greek Words: STEGANOS ā€“ ā€œCoveredā€ GRAPHIE ā€“ ā€œWritingā€ ļ® Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. ļ® This can be achieve by concealing the existence of information within seemingly harmless carriers or cover
  • 3. Branches of Information Hiding There are two major branches of information hiding, Steganography and Watermarking Watermarking: ļ® ļ® ļ® ļ® Communication in watermarking is the host signal, with the embedded data providing copyright protection. The existence of a watermark is often declared openly. Any attempt to remove or invalidate the embedded content renders the host useless. They are of two types: Visible watermarking Invisible watermarking Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
  • 4. History of Steganography Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. World War II Invincible inks Null ciphers (unencrypted messages): Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Sent by a German Spy in WWII, by taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 5. Microdot Technology Shrinking messages down to the size of a dot became a popular method. Since the microdot could be placed at the end of a sentence or above a j or an i. ļ‚§
  • 6. Modern Steganography Techniques Masking and Filtering : Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. Algorithms and Transformations : This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients. Least Significant Bit Insertion : The most common and popular method of modern day steganography is to make use of the LSB of a pictureā€™s pixel information.This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 7. Basics of Modern Steganography fE:Ā Ā Ā Ā  steganographic function "embedding" fE-1:Ā Ā Ā steganographic function "extracting" cover:Ā Ā cover data in which emb will be hidden emb:Ā Ā Ā Ā message to be hidden key:Ā Ā Ā Ā parameter of fE stego:Ā Ā cover data with the hidden message
  • 8. Important Requirement for Steganographic System Security of the hidden communication ļ® Robustness against statistical attacks ļ® Robustness against image manipulations ļ®
  • 9. Applications ļ® Usage in modern printers ļ® Alleged use by terrorists ļ® Alleged use by intelligence services
  • 10. Alleged use by terrorists Origional Encrypted Image
  • 11. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. ļ® Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. ļ® Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding. ļ® The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  • 12. Steganography Sample Website ļ® Here is the link for Sample Steganographic tool Website: http://mozaiq.org/