SlideShare a Scribd company logo
Steganography
Presented by:
Chudasama Khushbu
VIII sem-CSE
10ECACS003
Presentation
On
Outlines
What is Steganography?
History of Steganography
Steganography, Cryptography & Watermarking
Types of Digital Steganography
Image based Technique
Security
Use of steganography
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the intended
recipient knows of the existence of the message.
This can be achieve by concealing the existence of
information within seemingly harmless carriers or cover
Carrier: text, image, video, audio, etc
Steganography
Tattoos on shaved heads
Wax-covered tablets
Microdots – shrunken pictures
Invisible Inks - milk, fruit juice, urine
History of Steganography
STEGANOGRAPHY TERMS
Carrier or Cover File
Stego-Medium
Embedded or Payload
Steganalysis
Security
Systems
Cryptography
Information
Hiding
Steganography Watermarking
Steganography, Cryptography
&Watermarking
Major two branches of information
hiding, Steganography and Watermarking.
Steganography and Cryptography are closely
related.
The difference is in their goals.
Conti..
Cryptography
• Science of writing in secret
code and is an ancient art.
• Achieve security by encoding
messages to make them non-
readable.
• Process to convert Plain Text
in to Cipher Text.
• Plain Text: Clear Text
• Cipher Text: Codified Text
Plain Text
Cryptogra
phy Tech
Cipher
Text
Watermarking
• Used to verify the identity and
authenticity of the owner of a digital
image.
• Process in which the information which
verifies the owner is embedded into the
digital image or signal. Signals could be
either videos or pictures or audios.
• Two types; visible watermarking and
invisible watermarking.
Steganography
How It Works
Main difference is..
 Cryptography: although encypted and
unreadable,the existence of
data is not hidden
 Steganography: no knowledge of the existence
of the data
 Watermarking: extending the file with extra
information
Conti..
STEGANOGRAPHY STEPS
ENCODING
Step
3
• Steganographic
data
Step
2
• Encode
embedded data
with cover data
Step1
• Prepare
cover
data
DECODING
• Steganographic
Data
Step1
• Decode
Plain info
Step 2
• Embedded
data
obtained
Step 3
Hiding a Message inside Text
Hiding a Message inside Images
• Most popular technique
Hiding a Message inside Audio and Video
Files
Types of Steganography
Hiding a Message inside Text
 Partially effective
 Example:
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.
Reveals: MEET AT THE FRONT OF THE TRAP
Hiding a Message inside Images
 Most widely used medium today.
 Takes advantage of our limited visual
perception of colors.
 This field is expected to continually grow as
computer graphics power also grows.
Image Attributes:
• Digital images are made up of pixels.
• The arrangement of pixels make up the
image’s “raster data”.
• 8-bit and 24-bit images are common.
• The larger the image size, the more
information you can hide.
Hiding a Message inside Audio and Video
Files
• Embedding secret message in to digital sound
is known as audio & video steganography.
• Large amount of data that can be hidden inside.
• Hard to recognize because of the continuous
flow of information (moving stream of images
and sound).
The most common approaches to information
hiding in images are:
 Least significant bit (LSB) Insertion
 Masking and Filtering Techniques
 Algorithms and Transformations
Image based Technique
 Least Significant Bit (LSB) Insertion
 Most popular technique when dealing with images.
 Replaces least significant bits with the message to be
encoded.
 It is best to use images with “noisy areas” – areas
with ample color variation and without large areas of
solid color.
 Requires on average that only half the bits in image
be changed.
Example:
 example shows how the letter A can be
hidden in the first eight bytes of three
pixels in a 24-bit image.
Pixels:
(00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
A: 10000001
Result:
(00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
 Only three bits that were actually altered.
A only requires eight bytes to hide it in, the ninth
byte of the three pixels can be used to hide the next
character of the hidden message.
 Masking and Filtering
• Uses..
 Digital Watermarking – provides identification
pertaining to the owner;
I.e. license or copyright information
- Invisible & Visible
 Fingerprinting – provides identification of the user;
used to identify and track illegal use of content
Confidentiality: any unauthorized person does
not know that sensitive data exists
Survivability: verifing that the data does not get
destroyed in the transmission
No detection: cannot be easily found out that the
data is hidden in a given file
Visibility: people cannot see any visible changes to
the file in which the data is hidden
Security
Governments
Businesses: Digital Watermarking
Individuals
Uses of Steganography
ILLEGAL USAGE
HACKERS
TERRORISTS
CRIMINALS
U.S. officials said on
5 February 2001 that
Late. Osama bin
Laden was posting
instructions for
terrorist activities.
He was master in
this technology.
The 9/11 attack
heightened our
awareness of
steganography. It is
well published that
Bin Laden and his
terrorist cells use
steganography for
communications
Live Demo:
QUERIES
Steganography

More Related Content

What's hot

About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
Sanjay Bhoyar
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 

What's hot (20)

About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image steganography
Image steganographyImage steganography
Image steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Xavier Prathap
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
IJERA Editor
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Gerhard Claassen
 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Bryce Nelson
 
B03208016
B03208016B03208016
B03208016inventy
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
IOSRJECE
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
IOSR Journals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Steganography
SteganographySteganography
Steganography
Girish Chandra
 
Steganography
SteganographySteganography
Steganography
Amzad Hossain
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 

Similar to Steganography (20)

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
B03208016
B03208016B03208016
B03208016
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

Steganography

  • 1. Steganography Presented by: Chudasama Khushbu VIII sem-CSE 10ECACS003 Presentation On
  • 2. Outlines What is Steganography? History of Steganography Steganography, Cryptography & Watermarking Types of Digital Steganography Image based Technique Security Use of steganography
  • 3. Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc Steganography
  • 4. Tattoos on shaved heads Wax-covered tablets Microdots – shrunken pictures Invisible Inks - milk, fruit juice, urine History of Steganography
  • 5. STEGANOGRAPHY TERMS Carrier or Cover File Stego-Medium Embedded or Payload Steganalysis
  • 7. Major two branches of information hiding, Steganography and Watermarking. Steganography and Cryptography are closely related. The difference is in their goals. Conti..
  • 8. Cryptography • Science of writing in secret code and is an ancient art. • Achieve security by encoding messages to make them non- readable. • Process to convert Plain Text in to Cipher Text. • Plain Text: Clear Text • Cipher Text: Codified Text Plain Text Cryptogra phy Tech Cipher Text
  • 9. Watermarking • Used to verify the identity and authenticity of the owner of a digital image. • Process in which the information which verifies the owner is embedded into the digital image or signal. Signals could be either videos or pictures or audios. • Two types; visible watermarking and invisible watermarking.
  • 10.
  • 12. Main difference is..  Cryptography: although encypted and unreadable,the existence of data is not hidden  Steganography: no knowledge of the existence of the data  Watermarking: extending the file with extra information Conti..
  • 14. ENCODING Step 3 • Steganographic data Step 2 • Encode embedded data with cover data Step1 • Prepare cover data
  • 15. DECODING • Steganographic Data Step1 • Decode Plain info Step 2 • Embedded data obtained Step 3
  • 16. Hiding a Message inside Text Hiding a Message inside Images • Most popular technique Hiding a Message inside Audio and Video Files Types of Steganography
  • 17. Hiding a Message inside Text  Partially effective  Example: randoM capitalosis is a rarE disEase ofTen contrAcTed by careless inTernet users. tHis sad illnEss causes the aFfected peRsON To randomly capitalize letters in a bOdy oF texT. please do not confuse this disease witH a blatant attEmpt aT steganogRAPhy. Reveals: MEET AT THE FRONT OF THE TRAP
  • 18. Hiding a Message inside Images  Most widely used medium today.  Takes advantage of our limited visual perception of colors.  This field is expected to continually grow as computer graphics power also grows.
  • 19. Image Attributes: • Digital images are made up of pixels. • The arrangement of pixels make up the image’s “raster data”. • 8-bit and 24-bit images are common. • The larger the image size, the more information you can hide.
  • 20. Hiding a Message inside Audio and Video Files • Embedding secret message in to digital sound is known as audio & video steganography. • Large amount of data that can be hidden inside. • Hard to recognize because of the continuous flow of information (moving stream of images and sound).
  • 21. The most common approaches to information hiding in images are:  Least significant bit (LSB) Insertion  Masking and Filtering Techniques  Algorithms and Transformations Image based Technique
  • 22.  Least Significant Bit (LSB) Insertion  Most popular technique when dealing with images.  Replaces least significant bits with the message to be encoded.  It is best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color.  Requires on average that only half the bits in image be changed.
  • 23. Example:  example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001)
  • 24. A: 10000001 Result: (00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001)  Only three bits that were actually altered. A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to hide the next character of the hidden message.
  • 25.  Masking and Filtering • Uses..  Digital Watermarking – provides identification pertaining to the owner; I.e. license or copyright information - Invisible & Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 26. Confidentiality: any unauthorized person does not know that sensitive data exists Survivability: verifing that the data does not get destroyed in the transmission No detection: cannot be easily found out that the data is hidden in a given file Visibility: people cannot see any visible changes to the file in which the data is hidden Security
  • 29. U.S. officials said on 5 February 2001 that Late. Osama bin Laden was posting instructions for terrorist activities. He was master in this technology. The 9/11 attack heightened our awareness of steganography. It is well published that Bin Laden and his terrorist cells use steganography for communications