SlideShare a Scribd company logo
1 of 17
Download to read offline
presentatio
non
Prabhu kumar
Bharath university
U11CS098
BY :
• INTRODUCTION
• HISTORY
•ADVANTAGE
•TECHNIQUE
•DATA EMBEDDED SCHEME
•APPLICATION
INTRODUCTION
what is steganography ?
•It is the art of secret character .steganography is a art of
science of writing hidden massage in such a way that no one
apart from the sender and receiver for the information .
•It is a form of security through obscurity
•the word “steganography” is a Greek word means ”secret
writing” from the Greek word “steganos” means “covered for
protected”
•It is also called as the science of hiding information
•The main goal of cryptography is protects the contents of
massage.
•The main goal of steganography is to hide the information
also from the third party.
history
Steganography was first practiced during golden age in
Greece .it describes the melting wax tablets is used for
writing the massage and inscribing a massage in the
underlying wood.
The first recorded of steganography can be tracked by in
440 BC by Herodotus. When he mentioned two example of
steganography .
Herodotus sent a warning massage about forthcoming
attack to Greece by writing it directly
Steganography is researched both for legal and illegal
reasons.
ADVANTAGE
*The advantages of steganography over cryptography
alone is that message don’t attract attention to themselves
*The steganography works the keep secret of information in
computer file .
*The steganography works to hide the massage with the help
of cryptography (cryptography is to make the data unreadable
by the third party)
*In electronic communication may include steganographic
coding inside the transparent layer. such as document file,
image file,wave file.
The advantage is secretly transmitted the massage without
the fact of transmission being discovered.
 PHYSICAL:
During world war III ,The French resistance sent
massage written on the backs of couriers using
indivisible link.
Sometimes massage is written in secret links, under
the other massage and blank part of the other massage
Hidden massage in within Wax Tablets –in ancient
Greece ,People wrote messages on the wood and
covered it with WAX upon which an innocent covering
massage was written.
 Digital:
keeping secret massage within lowest bits of noisy
image and sound file.
sometimes pictures embedded in video materials
(optionally played slow or fast)
Network:
All the information hiding technique that may be used to
exchange stenograms in telecommunication networks.
Typical networks steganography methods involve
modification of the properties of a single network
protocols.
whenever digital steganography output may be in printed
document .
A massage ,the plain text may be encrypted by traditional
meaning ,producing a cipher text .
For example: The letter size
,spacing, type face of other character using by sender can be
manipulated to carry by the hidden message only the receipt
who knows the technique used in cover the message and
they decrypt it.
 It means what will be scheme is used in data
embedding in any file within security
 steganographic robustness is a tool which is used
in steganographic channel.
 steganographic is a key scheme of embedding
massage
 Different –different steganographic has different
level of protection
 The embedding massage is carried out with use of
a key for improving steganographic key can be
used as verification .
c sc E C˄
M
c-container file
F-steganographic channel space
Sc-steganographic system
M-massage
E-embedding method
C^-modified container file
*s-tool :-increased the bandwidth
of whole embedding system is
decreased…
c sc E C˄
M
key
It modified the password in
the top or bottom of the
massage and the distribution
of password to the
steganographic.
c sc E C˄
M
key
F(p ,L )[distributionfunction]
•Where p-maximum no of container
L-step of massage distribution
•According to performance of container
P>=L
F(p ,L )=cycle* L+ step *p
It is the no of the current L
c sc E C˄
M k
F(P,L)
G(Q,N)
Where:
G( q, n)-it is the responsible for massage selecting
F(p, l)-It is the responsible for position in the container
Steganography hide the secret massage in the
physically object which is sent.
The steganography process shows that the cover
image is passed through the embedding function.
The key is usually a password ,so this key is used to
encrypt and decrypt the massage before and after
the embedding.
The information are in covered video,image,text,
audio or more and using tools open from cover
source.
Application
How terriost manually hide secret massage?
Step: Notepad-write massage-Secret.txt
Cmd-type:copycat.jpg+secret.txt secret cat.jpg
“If u will open the picture with the help of s-tool
we have to revealed the picture with the option
And we got the massage written by terriost
“bomb THE assembly at 5pm”
S-Tool
Step: Hide massage
Download s-toolopen
Drag any image with notepad
Where should be written msg.
Step: open the massage
Open the imageextract img-
Click okDrag imgsave in
new imgRevealed the
imgEnter the password and
user name Now u can see
the massage.
S-tool is steganography tools to set that hide file in wave file, Gif file .To
hide the file just drag them in s-tools interface .u can hide multiple files in one
sound/figure using steganographic tool i.e. “Robustness tool”1
THANK YOU
!!!
Wikipedia
Exploring Steganography: Seeing the Unseen – N.
Johnson & S. Jajodia
www.jjtc.com/stegdoc/steg1995.html
Information Hiding: Techniques for Steganography and
Digital Watermarking” – S. Katzenbeisser, F. Petit colas
Digital Watermarking – H. Bergel , L. O’Gorman
Wayner,peter(2002):Disappearing cryptography
information hiding
Network steganography center tutorials
http://www.mozaiq.org/com
References

More Related Content

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
steganography
steganographysteganography
steganography
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 

Viewers also liked

Techniques and technologies used in print production
Techniques and technologies used in print productionTechniques and technologies used in print production
Techniques and technologies used in print productionnicolaou2j
 
SOP for printing production
SOP for printing productionSOP for printing production
SOP for printing productionStewart Ngan
 
Techniques and technologies used in print production
Techniques and technologies used in print productionTechniques and technologies used in print production
Techniques and technologies used in print productionlucyfroud999
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Print production techniques
Print production techniquesPrint production techniques
Print production techniquessophiemason
 
Print Production Process
Print Production Process Print Production Process
Print Production Process Fatima Berete
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Standard Operating Procedures
Standard Operating ProceduresStandard Operating Procedures
Standard Operating Proceduresmtrujillo
 
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsStandard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsRonald Bartels
 

Viewers also liked (11)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Techniques and technologies used in print production
Techniques and technologies used in print productionTechniques and technologies used in print production
Techniques and technologies used in print production
 
SOP for printing production
SOP for printing productionSOP for printing production
SOP for printing production
 
Techniques and technologies used in print production
Techniques and technologies used in print productionTechniques and technologies used in print production
Techniques and technologies used in print production
 
Steganography
SteganographySteganography
Steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Print production techniques
Print production techniquesPrint production techniques
Print production techniques
 
Print Production Process
Print Production Process Print Production Process
Print Production Process
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Standard Operating Procedures
Standard Operating ProceduresStandard Operating Procedures
Standard Operating Procedures
 
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) OperationsStandard Operating Procedure (SOP) for Information Technology (IT) Operations
Standard Operating Procedure (SOP) for Information Technology (IT) Operations
 

Similar to Steganography

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoIJTET Journal
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...AM Publications
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Steganography
SteganographySteganography
SteganographyPavninder
 
Secret Sharing Schemes B.Tech Major Project
Secret Sharing Schemes B.Tech Major ProjectSecret Sharing Schemes B.Tech Major Project
Secret Sharing Schemes B.Tech Major ProjectAnuj Singh
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 

Similar to Steganography (20)

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Steganography
SteganographySteganography
Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in Video
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
 
Steganography.
Steganography.Steganography.
Steganography.
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Steganography
SteganographySteganography
Steganography
 
D010312230
D010312230D010312230
D010312230
 
Secret Sharing Schemes B.Tech Major Project
Secret Sharing Schemes B.Tech Major ProjectSecret Sharing Schemes B.Tech Major Project
Secret Sharing Schemes B.Tech Major Project
 
Presentation1
Presentation1Presentation1
Presentation1
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 

Recently uploaded

Women in Automation 2024: Career session - explore career paths in automation
Women in Automation 2024: Career session - explore career paths in automationWomen in Automation 2024: Career session - explore career paths in automation
Women in Automation 2024: Career session - explore career paths in automationDianaGray10
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Transport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MITransport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MIRomil Mishra
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Automation Ops Series: Session 3 - Solutions management
Automation Ops Series: Session 3 - Solutions managementAutomation Ops Series: Session 3 - Solutions management
Automation Ops Series: Session 3 - Solutions managementDianaGray10
 
Deliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceDeliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceOpsTree solutions
 
Dublin_mulesoft_meetup_API_specifications.pptx
Dublin_mulesoft_meetup_API_specifications.pptxDublin_mulesoft_meetup_API_specifications.pptx
Dublin_mulesoft_meetup_API_specifications.pptxKunal Gupta
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdf
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdfHCI Lesson 1 - Introduction to Human-Computer Interaction.pdf
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdfROWELL MARQUINA
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerAnchore
 
Tecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureTecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureAntonio de Llamas
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemSafe Software
 
Arti Languages Pre Seed Pitchdeck 2024.pdf
Arti Languages Pre Seed Pitchdeck 2024.pdfArti Languages Pre Seed Pitchdeck 2024.pdf
Arti Languages Pre Seed Pitchdeck 2024.pdfwill854175
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

Women in Automation 2024: Career session - explore career paths in automation
Women in Automation 2024: Career session - explore career paths in automationWomen in Automation 2024: Career session - explore career paths in automation
Women in Automation 2024: Career session - explore career paths in automation
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Transport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MITransport in Open Pits______SM_MI10415MI
Transport in Open Pits______SM_MI10415MI
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Automation Ops Series: Session 3 - Solutions management
Automation Ops Series: Session 3 - Solutions managementAutomation Ops Series: Session 3 - Solutions management
Automation Ops Series: Session 3 - Solutions management
 
Deliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceDeliver Latency Free Customer Experience
Deliver Latency Free Customer Experience
 
Dublin_mulesoft_meetup_API_specifications.pptx
Dublin_mulesoft_meetup_API_specifications.pptxDublin_mulesoft_meetup_API_specifications.pptx
Dublin_mulesoft_meetup_API_specifications.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdf
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdfHCI Lesson 1 - Introduction to Human-Computer Interaction.pdf
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdf
 
Software Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey HightowerSoftware Security in the Real World w/Kelsey Hightower
Software Security in the Real World w/Kelsey Hightower
 
Tecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for RotogravureTecnogravura, Cylinder Engraving for Rotogravure
Tecnogravura, Cylinder Engraving for Rotogravure
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
Arti Languages Pre Seed Pitchdeck 2024.pdf
Arti Languages Pre Seed Pitchdeck 2024.pdfArti Languages Pre Seed Pitchdeck 2024.pdf
Arti Languages Pre Seed Pitchdeck 2024.pdf
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024
Green paths: Learning from publishers’ sustainability journeys - Tech Forum 2024
 
BoSEU24 | Bill Thompson | Talk From Another Century
BoSEU24 | Bill Thompson | Talk From Another CenturyBoSEU24 | Bill Thompson | Talk From Another Century
BoSEU24 | Bill Thompson | Talk From Another Century
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Steganography

  • 3. INTRODUCTION what is steganography ? •It is the art of secret character .steganography is a art of science of writing hidden massage in such a way that no one apart from the sender and receiver for the information . •It is a form of security through obscurity •the word “steganography” is a Greek word means ”secret writing” from the Greek word “steganos” means “covered for protected” •It is also called as the science of hiding information •The main goal of cryptography is protects the contents of massage. •The main goal of steganography is to hide the information also from the third party.
  • 4. history Steganography was first practiced during golden age in Greece .it describes the melting wax tablets is used for writing the massage and inscribing a massage in the underlying wood. The first recorded of steganography can be tracked by in 440 BC by Herodotus. When he mentioned two example of steganography . Herodotus sent a warning massage about forthcoming attack to Greece by writing it directly Steganography is researched both for legal and illegal reasons.
  • 5. ADVANTAGE *The advantages of steganography over cryptography alone is that message don’t attract attention to themselves *The steganography works the keep secret of information in computer file . *The steganography works to hide the massage with the help of cryptography (cryptography is to make the data unreadable by the third party) *In electronic communication may include steganographic coding inside the transparent layer. such as document file, image file,wave file. The advantage is secretly transmitted the massage without the fact of transmission being discovered.
  • 6.  PHYSICAL: During world war III ,The French resistance sent massage written on the backs of couriers using indivisible link. Sometimes massage is written in secret links, under the other massage and blank part of the other massage Hidden massage in within Wax Tablets –in ancient Greece ,People wrote messages on the wood and covered it with WAX upon which an innocent covering massage was written.  Digital: keeping secret massage within lowest bits of noisy image and sound file. sometimes pictures embedded in video materials (optionally played slow or fast)
  • 7. Network: All the information hiding technique that may be used to exchange stenograms in telecommunication networks. Typical networks steganography methods involve modification of the properties of a single network protocols. whenever digital steganography output may be in printed document . A massage ,the plain text may be encrypted by traditional meaning ,producing a cipher text . For example: The letter size ,spacing, type face of other character using by sender can be manipulated to carry by the hidden message only the receipt who knows the technique used in cover the message and they decrypt it.
  • 8.  It means what will be scheme is used in data embedding in any file within security  steganographic robustness is a tool which is used in steganographic channel.  steganographic is a key scheme of embedding massage  Different –different steganographic has different level of protection  The embedding massage is carried out with use of a key for improving steganographic key can be used as verification .
  • 9. c sc E C˄ M c-container file F-steganographic channel space Sc-steganographic system M-massage E-embedding method C^-modified container file *s-tool :-increased the bandwidth of whole embedding system is decreased…
  • 10. c sc E C˄ M key It modified the password in the top or bottom of the massage and the distribution of password to the steganographic.
  • 11. c sc E C˄ M key F(p ,L )[distributionfunction] •Where p-maximum no of container L-step of massage distribution •According to performance of container P>=L F(p ,L )=cycle* L+ step *p It is the no of the current L
  • 12. c sc E C˄ M k F(P,L) G(Q,N) Where: G( q, n)-it is the responsible for massage selecting F(p, l)-It is the responsible for position in the container
  • 13. Steganography hide the secret massage in the physically object which is sent. The steganography process shows that the cover image is passed through the embedding function. The key is usually a password ,so this key is used to encrypt and decrypt the massage before and after the embedding. The information are in covered video,image,text, audio or more and using tools open from cover source.
  • 14. Application How terriost manually hide secret massage? Step: Notepad-write massage-Secret.txt Cmd-type:copycat.jpg+secret.txt secret cat.jpg “If u will open the picture with the help of s-tool we have to revealed the picture with the option And we got the massage written by terriost “bomb THE assembly at 5pm”
  • 15. S-Tool Step: Hide massage Download s-toolopen Drag any image with notepad Where should be written msg. Step: open the massage Open the imageextract img- Click okDrag imgsave in new imgRevealed the imgEnter the password and user name Now u can see the massage. S-tool is steganography tools to set that hide file in wave file, Gif file .To hide the file just drag them in s-tools interface .u can hide multiple files in one sound/figure using steganographic tool i.e. “Robustness tool”1
  • 17. Wikipedia Exploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colas Digital Watermarking – H. Bergel , L. O’Gorman Wayner,peter(2002):Disappearing cryptography information hiding Network steganography center tutorials http://www.mozaiq.org/com References