SlideShare a Scribd company logo
The “Keys” to the Kingdom

Presented By:
Mustahid ali
Contents
Communication?
What is cryptography?
What is steganography?
Steganography in digital images
Introduction
Communication has always been the need for the social system we live in, the primitive
man use designs, sounds and later on developed the art of speaking and writing
languages, with the purpose of communicating efficiently. And today we find ourselves
surrounded by the jargon of internet which is one of the most efficient and fastest means
of communication throughout the globe.Whenever there is a communication link there
has always been a “Recipient” for whom the message is meant and a “Sender” who is
sending the message. But as is always the case there is a third person called “The
Miscreant” or the “Intruder” trying to intercept the message or block it before it reaches
destination. Ancient Greeks and other civilizations used many forms of simple
techniques to evade the detection of message by hiding it or making it unreadable.
Examples are:
• Tatoos on scalp
• Dots on top of ‘i’ and ‘j’
• Deliberate misspellings or Error
• Writing with invisible ink
Cryptography:
It is the process of converting the message into an unreadable format. A simple method
is to convert the text into binary (based on ASCII value). Now using a key known only
to the sender and recipient we can XOR the data. This is known as a XOR cipher.
Ciphertext := Plaintext (XOR) Key
Plaintext := Ciphertext (XOR) Key
The output would have an unreadable format like the one below:
LDPKD YLQJD JUHDW WLPHK HUHLQ
To an intruder this unreadable or meaningless message will raise alarm and arouse
suspicion,provoking him to decrypt the message or block it from reaching the
destination. In either case the sender being the loser.
Steganography
In Greek steganos means “covered” graphie means “writing”.
The art of hiding information in ways that prevent detection of hidden
messages.
Steganography:
It is the art of hiding information in ways that prevent detection of hidden messages. The
goal of steganography is to conceal the very existence of a message being transmitted.
The idea is to hide the secret message in an “envelope” or “wrapper”. The envelope may
be a text file, an image or a sound file.
• embed text in text/images/sound files
• embed image in text/image/sound files
• embed sound in text/image/sound files
The stegnosystem consists of a cover medium in which the message is hidden based
upon a secret key which is known only to the sender and receiver. The Stego-data output
from the system has no visible distortion (in case of image) or audible distortion (in case
of audio) and appears to be the same as the cover. Any output which shows firsthand
distortion violates the goal of steganography and cannot be used for secret
communication.
Key
Goals of Steganography
Communicate secretly
Mike wants to send a message to Bob without Willie knowing about it.

Idea is to hide the secret message in an “envelope” or
“wrapper”.
Message must not alter the wrapper appreciably.
Medium supported
What to hide
– Texts
– Images
– Sound
• How to hide
– embed text in text/images/sound files
– embed image in text/image/sound files
– embed sound in text/image/sound files
Hiding in Text:
Apparently neutral’s protest is thoroughly discounted and ignored.
Isman hard hit.Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oils

• Hidden Message
- Pershing sails from NY June 1
Information Hiding in Images:
(Least Significant Bit method)
Data to be inserted: character ‘A’: (10000011)
The pixels which would be selected for holding the data are chosen on
the basis of the key which can be a random number.
Ex:
00100111
11101001
11001000
00100111
11001000

11001000
00100111

11101001
11101001

Embedding ‘A’
00100111
00100110
11001001

11101000
11001000
00100111

11001000
11101000
11101001
TOP SECRET

+

=

8-bit (256 grayscale)
images.

Courtesy: http://www.citi.umich.edu/u/provos.html
Sacrificing 5 bits of cover to carry 5 bits of
secret image

Courtesy: http://www.citi.umich.edu/u/provos.html
Stegano-system criteria
Cover data should not be significantly modified i.e
perceptible to human perception system.
Distortion cannot be eliminated so error-correcting codes
need to be included whenever required
The cover Media should be large enough to accommodate
the data to be embedded
Embedded data should be immune to modifications to
cover.
Future Aspects of
Stegnography:
- Genome Steganography: Encoding a hidden message in a strand of human
DNA.
- Hiding in the disk space: Hiding the data in unused or reserved space
- Hiding in network packets: Hidden in packets transmitted through the
Internet.
Modern day applications
Anonymous communication
Security reinforcement layer to cryptography
Defence
Avoid third party snooping
Conclusion
Stegnography has its place in the security. On its own, it won’t serve
much but when used
as a layer of cryptography, it would lead to a greater security.
- Far fetched applications in privacy protection and intellectual
property rights protection.
- Research is going on in both the directions
a. One is how to incorporate hidden or visible copyright information
in various
media, which would be published.
b. At the same time, in opposite direction, researcher are working on
how to detect
the trafficking of illicit material & covert messages published by
certain
outlawed groups
Steganography

More Related Content

Similar to Steganography

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Steganography
Steganography Steganography
Steganography
SteganographySteganography
Steganography
Ashenafi Ethio
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
Nikhil Kumar
 
Steganography
SteganographySteganography
Steganography
Bahaa Aladdin
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
Steganography
SteganographySteganography
Steganography
Amzad Hossain
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
Prabhu Prabhu
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Presentation1
Presentation1Presentation1
Presentation1
guestb8230c
 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Steganography
SteganographySteganography
Steganography
Divam Goyal
 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
 
Steganography
SteganographySteganography
Steganography
Divam Goyal
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab
 
Steganography
Steganography Steganography
Steganography
Sagar Kumar
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
ssuser2299e8
 

Similar to Steganography (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography
SteganographySteganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Information hiding
Information hidingInformation hiding
Information hiding
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Presentation1
Presentation1Presentation1
Presentation1
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography
Steganography Steganography
Steganography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 

More from Mustahid Ali

HR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business schoolHR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business school
Mustahid Ali
 
Consumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentationConsumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentation
Mustahid Ali
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
Mustahid Ali
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
Mustahid Ali
 
Lg electronics vendor summer internship report
Lg electronics vendor summer internship reportLg electronics vendor summer internship report
Lg electronics vendor summer internship report
Mustahid Ali
 
Info graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,factsInfo graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,facts
Mustahid Ali
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
Mustahid Ali
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
Mustahid Ali
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
Mustahid Ali
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
Mustahid Ali
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
Mustahid Ali
 
Universal business school
Universal business schoolUniversal business school
Universal business school
Mustahid Ali
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
Mustahid Ali
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
Mustahid Ali
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
Mustahid Ali
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
Mustahid Ali
 
big bazaar retail visit project report
big bazaar retail visit project reportbig bazaar retail visit project report
big bazaar retail visit project report
Mustahid Ali
 
Mercedes its still a car, campaign
Mercedes  its still a car, campaignMercedes  its still a car, campaign
Mercedes its still a car, campaign
Mustahid Ali
 
Carrefour china case study-solution
Carrefour  china case study-solutionCarrefour  china case study-solution
Carrefour china case study-solution
Mustahid Ali
 
Xylys case study solution
Xylys case study  solutionXylys case study  solution
Xylys case study solution
Mustahid Ali
 

More from Mustahid Ali (20)

HR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business schoolHR SYMPOSIUM 2014, Universal business school
HR SYMPOSIUM 2014, Universal business school
 
Consumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentationConsumer Behavior Analysis, Segmentation, demographic segmentation
Consumer Behavior Analysis, Segmentation, demographic segmentation
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
 
Lg electronics vendor summer internship report
Lg electronics vendor summer internship reportLg electronics vendor summer internship report
Lg electronics vendor summer internship report
 
Info graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,factsInfo graphic of Top 10 internet users worlwide,facts
Info graphic of Top 10 internet users worlwide,facts
 
Retail management project, picasso art gallery
Retail management project, picasso art galleryRetail management project, picasso art gallery
Retail management project, picasso art gallery
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
 
Case study culinarian cookware
Case study  culinarian cookwareCase study  culinarian cookware
Case study culinarian cookware
 
Nfl case-digital media strategy presentation
Nfl case-digital media strategy presentationNfl case-digital media strategy presentation
Nfl case-digital media strategy presentation
 
Universal business school
Universal business schoolUniversal business school
Universal business school
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
 
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRYNETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
NETTWERK: DIGITAL MARKETINGIN THE MUSIC INDUSTRY
 
Cadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumourCadbury India : A fight to worm rumour
Cadbury India : A fight to worm rumour
 
big bazaar retail visit project report
big bazaar retail visit project reportbig bazaar retail visit project report
big bazaar retail visit project report
 
Mercedes its still a car, campaign
Mercedes  its still a car, campaignMercedes  its still a car, campaign
Mercedes its still a car, campaign
 
Carrefour china case study-solution
Carrefour  china case study-solutionCarrefour  china case study-solution
Carrefour china case study-solution
 
Xylys case study solution
Xylys case study  solutionXylys case study  solution
Xylys case study solution
 

Recently uploaded

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 

Recently uploaded (20)

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 

Steganography

  • 1. The “Keys” to the Kingdom Presented By: Mustahid ali
  • 2. Contents Communication? What is cryptography? What is steganography? Steganography in digital images
  • 3. Introduction Communication has always been the need for the social system we live in, the primitive man use designs, sounds and later on developed the art of speaking and writing languages, with the purpose of communicating efficiently. And today we find ourselves surrounded by the jargon of internet which is one of the most efficient and fastest means of communication throughout the globe.Whenever there is a communication link there has always been a “Recipient” for whom the message is meant and a “Sender” who is sending the message. But as is always the case there is a third person called “The Miscreant” or the “Intruder” trying to intercept the message or block it before it reaches destination. Ancient Greeks and other civilizations used many forms of simple techniques to evade the detection of message by hiding it or making it unreadable. Examples are: • Tatoos on scalp • Dots on top of ‘i’ and ‘j’ • Deliberate misspellings or Error • Writing with invisible ink
  • 4. Cryptography: It is the process of converting the message into an unreadable format. A simple method is to convert the text into binary (based on ASCII value). Now using a key known only to the sender and recipient we can XOR the data. This is known as a XOR cipher. Ciphertext := Plaintext (XOR) Key Plaintext := Ciphertext (XOR) Key The output would have an unreadable format like the one below: LDPKD YLQJD JUHDW WLPHK HUHLQ To an intruder this unreadable or meaningless message will raise alarm and arouse suspicion,provoking him to decrypt the message or block it from reaching the destination. In either case the sender being the loser.
  • 5. Steganography In Greek steganos means “covered” graphie means “writing”. The art of hiding information in ways that prevent detection of hidden messages.
  • 6. Steganography: It is the art of hiding information in ways that prevent detection of hidden messages. The goal of steganography is to conceal the very existence of a message being transmitted. The idea is to hide the secret message in an “envelope” or “wrapper”. The envelope may be a text file, an image or a sound file. • embed text in text/images/sound files • embed image in text/image/sound files • embed sound in text/image/sound files The stegnosystem consists of a cover medium in which the message is hidden based upon a secret key which is known only to the sender and receiver. The Stego-data output from the system has no visible distortion (in case of image) or audible distortion (in case of audio) and appears to be the same as the cover. Any output which shows firsthand distortion violates the goal of steganography and cannot be used for secret communication.
  • 7. Key
  • 8. Goals of Steganography Communicate secretly Mike wants to send a message to Bob without Willie knowing about it. Idea is to hide the secret message in an “envelope” or “wrapper”. Message must not alter the wrapper appreciably.
  • 9. Medium supported What to hide – Texts – Images – Sound • How to hide – embed text in text/images/sound files – embed image in text/image/sound files – embed sound in text/image/sound files
  • 10. Hiding in Text: Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit.Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oils • Hidden Message - Pershing sails from NY June 1
  • 11. Information Hiding in Images: (Least Significant Bit method) Data to be inserted: character ‘A’: (10000011) The pixels which would be selected for holding the data are chosen on the basis of the key which can be a random number. Ex: 00100111 11101001 11001000 00100111 11001000 11001000 00100111 11101001 11101001 Embedding ‘A’ 00100111 00100110 11001001 11101000 11001000 00100111 11001000 11101000 11101001
  • 12. TOP SECRET + = 8-bit (256 grayscale) images. Courtesy: http://www.citi.umich.edu/u/provos.html
  • 13. Sacrificing 5 bits of cover to carry 5 bits of secret image Courtesy: http://www.citi.umich.edu/u/provos.html
  • 14. Stegano-system criteria Cover data should not be significantly modified i.e perceptible to human perception system. Distortion cannot be eliminated so error-correcting codes need to be included whenever required The cover Media should be large enough to accommodate the data to be embedded Embedded data should be immune to modifications to cover.
  • 15. Future Aspects of Stegnography: - Genome Steganography: Encoding a hidden message in a strand of human DNA. - Hiding in the disk space: Hiding the data in unused or reserved space - Hiding in network packets: Hidden in packets transmitted through the Internet.
  • 16. Modern day applications Anonymous communication Security reinforcement layer to cryptography Defence Avoid third party snooping
  • 17. Conclusion Stegnography has its place in the security. On its own, it won’t serve much but when used as a layer of cryptography, it would lead to a greater security. - Far fetched applications in privacy protection and intellectual property rights protection. - Research is going on in both the directions a. One is how to incorporate hidden or visible copyright information in various media, which would be published. b. At the same time, in opposite direction, researcher are working on how to detect the trafficking of illicit material & covert messages published by certain outlawed groups