SlideShare a Scribd company logo
Made by :
Manika Arora
What is Steganography?
• Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the
sender and intended recipient, suspects the existence of
the message, a form of security through obscurity.
• The word steganography is of Greek origin and means
"concealed writing" from the Greek
words steganos meaning "covered or protected",
and graphein meaning "writing".
• “Steganography means hiding one piece of data
within another”.
Typical Scenario
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
History Of Steganography
• Dates back to 400 BC when Histaeus sent a message, by
shaving the head of his most trusted slave, then tattooed a
message on the slave's scalp, to his friend Aristagorus, urging
revolt against the Persians.
• Demaratus tells Athens of Persia’s attack plans by writing the
secret message on a tablet, & covers it with wax.
• Chinese wrote messages on silk and encased them in balls of
wax. The wax ball, "la wan," could then be hidden in the
messenger.
• A more subtle method, nearly as old, is to use invisible
ink( lemon juice, milk, or urine, all of which turn dark when held
over a flame).
• Special “inks” were important steganographic tools even during
Second World War.
Modern steganography
• Hiding one message within another(“container”)
• Most containers are rich media
Images, audio, video are very redundant, can be tweaked without
affecting human eye/ear
US argued that Al_QAIDA implanted instructions within taped
interviews.
• Copyright notices embedded in digital art
Prove ownership(Watermarking)
Serial number embedded to prevent replication
Seek infringements on the web using spiders/crawlers
• Digital cameras EXIF(Exchangeable Image File Format) tags
Not secretive but hidden from the eye
Embed info such as camera type, date, shutter speed, focal length..
• Similarly, possible to embed messages in invisible part of html
pages
Physical techniques
• Physical Techniques Hidden messages within wax
tablets
a) Hidden messages on messenger's body
b) Hidden messages on paper written in secret inks
c) Messages written in Morse code on
knitting yarn and then knitted into a piece of
clothing worn by a courier
d) Messages written on envelopes in the area
covered by postage stamps.
Digital technique
• Digital Techniques
a) Concealing messages within the lowest bits
of noisy images or sound files.
b) Modifying the echo of a sound file (Echo
Steganography)
c) Including data in ignored sections of a file, such
as after the logical end of the carrier file.
Comparison Of Secret Communication
Techniques
Evolution
Cryptography
Steganography
Watermarking
Steganography V/s Cryptography
Steganography Terms
• Carrier or Cover File - A Original message or a file in
which hidden information will be stored inside of it .
• Stego-Medium - The medium in which the information is
hidden.
• Embedded or Payload - The information which is to be
hidden or concealed.
• Steganalysis - The process of detecting hidden
information inside a file.
Basic Steganography Model
Types of steganography
• Steganography In text/documents
• Steganography In images
• Steganography In audio
• Steganography in video
Text Steganography
• Text steganography can be applied in the digital makeup format
such as PDF, digital watermark or information hiding
• It is more difficult to realize the information hiding based on
text. The simplest method of information hiding is to select the
cover first, adopt given rules to add the phraseological or
spelling mistakes, or replace with synonymy words.
• E.g 1] Textto setups some sentence structure in advance, fills
in the empty location by arranged words,
and then the text doesn’t have phraseological mistakes, but
have some word changes or morphology mistakes.
2] TextHide hides the information in the manner of text
overwriting and words’ selection.
Examples of Text Steganography
• An example of a message containing cipher text by
German Spy in World War II:
“Apparently neutral's protest is thoroughly discounted
And ignored. Isman hard hit. Blockade issue affects
Pretext for embargo on by products, ejecting suets and
Vegetable oils. ”
• Taking the second letter in each word the following
message emerges:
Pershing sails from NY June 1.
Examples of Text Steganography
• Minor changes to shapes of characters
Examples of text Steganography
Image Steganography
• Using image files as hosts for steganographic messages
takes advantage of the limited capabilities of the human
visual system
• Some of the more common method for embedding
messages in image files can be categorized into two main
groups, image domain methods and transform domain
methods
Image And Transform Domain
• Image – also known as spatial – domain techniques
embed messages in the intensity of the pixels directly,
while for transform – also known as frequency – domain,
images are first transformed and then the message is
embedded in the image
• Image domain techniques encompass bit-wise methods
that apply bit insertion and noise manipulation and are
sometimes characterised as “simple systems”
• Steganography in the transform domain involves the
manipulation of algorithms and image transforms
Example of image Steganography
Fig:Image in hex editor
Audio Steganography
• Embedding secret messages into digital sound is
known as audio Steganography.
• Audio Steganography methods can embed
messages in WAV, AU, and even MP3 sound
files.
• The properties of the human auditory system
(HAS) are exploited in the process of audio
Steganography
Flowchart Of Audio Steganography
Example of LSB Method
• The message 'HEY' is
encoded in a 16-bit CD
quality sample using the LSB
method.
• Here the secret information is
‘HEY’ and the cover file is
audio file. HEY is to be
embedded inside the audio
file. First the secret
information ‘HEY’ and the
audio file are converted into
bit stream.
• The least significant column
of the audio file is replaced by
the bit stream of secret
information ‘HEY’. The
resulting file after embedding
secret information ‘HEY’ is
called Stego-file.
Steganalysis
• The art and science of steganalysis is intended to detect or estimate
hidden information based on observing some data transfer.
• In some cases, just being caught sending a message can bring
suspicion, or give information to the 3rd party
• Steganalysis techniques can be classified in a similar way as
cryptanalysis methods, largely based on how much prior information
is known.
Steganography-only attack: The steganography medium is the only
item available for analysis.
Known-carrier attack: The carrier and steganography media are
both available for analysis
Steganalysis
 Known-message attack: The hidden message is known.
Chosen-steganography attack: The steganography medium and
algorithm are both known.
Chosen-message attack: A known message and steganography
algorithm are used to create steganography media for future
analysis and comparison.
Known-steganography attack: The carrier and steganography
medium, as well as the steganography algorithm, are known
discipline with few articles appearing before the late 1990s.
Steganography Tools
1. Hide in Picture
2. TextHide
3. Snow
4. Camouflage
5. OpenPuff
Advantages
• Difficult to detect and Only receiver can detect.
• It can be done faster with large no. of software's.
Disadvantage
• The confidentiality of information is maintained by the
algorithms, and if the algorithms are known then this
technique is of no use.
• Password leakage may occur and it leads to the
unauthorized access of data.
• If this technique is gone in the wrong hands like hackers can
be very much dangerous for all.
Applications
• Confidential communication and secret data
storing
• Steganography provides us with:
• Potential capability to hide the existence of
confidential data
• Hardness of detecting the hidden (i.e.Strengthening
of the secrecy of the encrypted data)
• Protection of data alteration
Applications
• Usage in modern printers
• Access control system for digital
content distribution
• Alleged use by terrorists
• Alleged use by intelligence services
Who’s Using It?
• Good question… nobody knows for sure.
• The whole point to steganography is to disguise its use.
• However, anybody can use it to hide data or to protect
anonymity
• Likely users include:
a) Trade fraud
b) Industrial espionage
c) Organized crime
d) Narcotics traffickers
e) Child pornographers
f) Criminal gangs
g) Individuals concerned about perceived government “snooping”
h) Those who want to circumvent restrictive encryption export rules
i) Anyone who wants to communicate covertly and anonymously
Detection
• Can steganography be detected?
• Sometimes…many of the simpler steganographic
techniques produce some discernable change in the file
size, statistics, or both. For image files, these include:
• Color variations
• Loss of resolution or exaggerated noise
• Images larger in size than that to be expected
• Characteristic signatures, e.g., distortions or patterns
• However, detection often requires a priori knowledge of
what the image or file should look like
Detection Challenges
• Lack of tools and techniques to recover the
hidden data
• No commercial products exist for detection
• Custom tools are analyst-intensive
• Few methods beyond visual analysis of graphics
files have been explored
• Usually, no a priori knowledge of existence
• No access to stegokey
• Use of unknown applications
Need for Improved Detection
• Growing awareness of data hiding techniques and uses
• Availability and sophistication of shareware and freeware
data hiding software
• Concerns over use to hide serious crimes, e.g., drug
trafficking, pedophilia, terrorism
• Frees resources currently spent on investigating cases
with questionable/unknown payoff
• Legislative calls
• US Bill H.R. 850, Security and Freedom through Encryption (SAFE)
Act
• UK Revision of Interception of Communications Act 1985
Future Scope
• Steganography, though is still a fairly new idea. There are
constant advancements in the computer field, suggesting
advancements in the field of steganography as well. It is likely
that there will soon be more efficient and more advanced
techniques for Steganalysis. A hopeful advancement is the
improved sensitivity to small messages. Knowing how difficult it
is to detect the presence of a fairly large text file within an
image, imagine how difficult it is to detect even one or two
sentences embedded in an image! It is like finding a
microscopic needle in the ultimate haystack.
• What is scary is that such a small file of only one or two
sentences may be all that is needed to commence a terrorist
attack. In the future, it is hoped that the technique of
Steganalysis will advance such that it will become much easier
to detect even small messages within an image.
Conclusion
• Steganography & Steganalysis are still at an early stage of
research.
• Although in principle secure schemes exist, practical ones with
reasonable capacity are known.
• Notion for security & capacity for steganography needs to be
investigated.
• Since it obvious that no system of data hiding is totally
immune to attacks. However, steganography has its place in
security. It in no way can replace cryptography, but is
intended to supplement it. Its application in watermarking for
use in detection of unauthorized, illegally copied material is
continually being realized and developed.
• The growing number of communication protocols, services
and computing environments offers almost unlimited
opportunities for displaying a whole spectrum of
steganographic methods.
steganography

More Related Content

What's hot

PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Steganography ppt
Steganography pptSteganography ppt
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
SteganographySteganography
Steganography
Deepak Raj
 
Steganography
SteganographySteganography
Steganography
Sonam M
 
Steganography
SteganographySteganography
Steganography
Khushbu Chudasama
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
SHAJANA BASHEER
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Steganography
SteganographySteganography
Steganography
Mayank Saxena
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 

What's hot (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography.
Steganography.Steganography.
Steganography.
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 

Viewers also liked

Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
Mohab El-Shishtawy
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography
SteganographySteganography
Steganography
Nikunj Dhameliya
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
ankitasinghbsc
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
ARYA TM
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
NidhinRaj Saikripa
 
Steganography
SteganographySteganography
Steganography
Abhishek Singh
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
Shivam Singh
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
kartikeya upadhyay
 
Steganography
Steganography Steganography
Steganography
Prabakara Pandian
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
Mahmut Yildiz
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
Rajan Yadav
 

Viewers also liked (19)

Steganography
Steganography Steganography
Steganography
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Steganography
SteganographySteganography
Steganography
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
Steganography Steganography
Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 

Similar to steganography

Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Gerhard Claassen
 
Steganography
SteganographySteganography
Steganography
ShawaizBajwa
 
Steganography
SteganographySteganography
Steganography
Bahaa Aladdin
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
Srishti Kakade
 
Final2
Final2Final2
Final2
pooja pal
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
IOSR Journals
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of Steganography
Scott Donald
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
Lisa Brewer
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Bryce Nelson
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
Information security
Information securityInformation security
Information security
Jay Nagar
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
Heena Bohra
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
ThusharaBAmigoz1
 

Similar to steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Final2
Final2Final2
Final2
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Analysis Of Different Types Of Steganography
Analysis Of Different Types Of SteganographyAnalysis Of Different Types Of Steganography
Analysis Of Different Types Of Steganography
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Information security
Information securityInformation security
Information security
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 

Recently uploaded

Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 

Recently uploaded (20)

Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 

steganography

  • 2. What is Steganography? • Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. • The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing". • “Steganography means hiding one piece of data within another”.
  • 4. Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 5. History Of Steganography • Dates back to 400 BC when Histaeus sent a message, by shaving the head of his most trusted slave, then tattooed a message on the slave's scalp, to his friend Aristagorus, urging revolt against the Persians. • Demaratus tells Athens of Persia’s attack plans by writing the secret message on a tablet, & covers it with wax. • Chinese wrote messages on silk and encased them in balls of wax. The wax ball, "la wan," could then be hidden in the messenger. • A more subtle method, nearly as old, is to use invisible ink( lemon juice, milk, or urine, all of which turn dark when held over a flame). • Special “inks” were important steganographic tools even during Second World War.
  • 6. Modern steganography • Hiding one message within another(“container”) • Most containers are rich media Images, audio, video are very redundant, can be tweaked without affecting human eye/ear US argued that Al_QAIDA implanted instructions within taped interviews. • Copyright notices embedded in digital art Prove ownership(Watermarking) Serial number embedded to prevent replication Seek infringements on the web using spiders/crawlers • Digital cameras EXIF(Exchangeable Image File Format) tags Not secretive but hidden from the eye Embed info such as camera type, date, shutter speed, focal length.. • Similarly, possible to embed messages in invisible part of html pages
  • 7. Physical techniques • Physical Techniques Hidden messages within wax tablets a) Hidden messages on messenger's body b) Hidden messages on paper written in secret inks c) Messages written in Morse code on knitting yarn and then knitted into a piece of clothing worn by a courier d) Messages written on envelopes in the area covered by postage stamps.
  • 8. Digital technique • Digital Techniques a) Concealing messages within the lowest bits of noisy images or sound files. b) Modifying the echo of a sound file (Echo Steganography) c) Including data in ignored sections of a file, such as after the logical end of the carrier file.
  • 9. Comparison Of Secret Communication Techniques
  • 12. Steganography Terms • Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it . • Stego-Medium - The medium in which the information is hidden. • Embedded or Payload - The information which is to be hidden or concealed. • Steganalysis - The process of detecting hidden information inside a file.
  • 14. Types of steganography • Steganography In text/documents • Steganography In images • Steganography In audio • Steganography in video
  • 15. Text Steganography • Text steganography can be applied in the digital makeup format such as PDF, digital watermark or information hiding • It is more difficult to realize the information hiding based on text. The simplest method of information hiding is to select the cover first, adopt given rules to add the phraseological or spelling mistakes, or replace with synonymy words. • E.g 1] Textto setups some sentence structure in advance, fills in the empty location by arranged words, and then the text doesn’t have phraseological mistakes, but have some word changes or morphology mistakes. 2] TextHide hides the information in the manner of text overwriting and words’ selection.
  • 16. Examples of Text Steganography • An example of a message containing cipher text by German Spy in World War II: “Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit. Blockade issue affects Pretext for embargo on by products, ejecting suets and Vegetable oils. ” • Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 17. Examples of Text Steganography • Minor changes to shapes of characters
  • 18. Examples of text Steganography
  • 19. Image Steganography • Using image files as hosts for steganographic messages takes advantage of the limited capabilities of the human visual system • Some of the more common method for embedding messages in image files can be categorized into two main groups, image domain methods and transform domain methods
  • 20. Image And Transform Domain • Image – also known as spatial – domain techniques embed messages in the intensity of the pixels directly, while for transform – also known as frequency – domain, images are first transformed and then the message is embedded in the image • Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation and are sometimes characterised as “simple systems” • Steganography in the transform domain involves the manipulation of algorithms and image transforms
  • 21. Example of image Steganography Fig:Image in hex editor
  • 22. Audio Steganography • Embedding secret messages into digital sound is known as audio Steganography. • Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. • The properties of the human auditory system (HAS) are exploited in the process of audio Steganography
  • 23. Flowchart Of Audio Steganography
  • 24. Example of LSB Method • The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. • Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. • The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  • 25. Steganalysis • The art and science of steganalysis is intended to detect or estimate hidden information based on observing some data transfer. • In some cases, just being caught sending a message can bring suspicion, or give information to the 3rd party • Steganalysis techniques can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known. Steganography-only attack: The steganography medium is the only item available for analysis. Known-carrier attack: The carrier and steganography media are both available for analysis
  • 26. Steganalysis  Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and algorithm are both known. Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known discipline with few articles appearing before the late 1990s.
  • 27. Steganography Tools 1. Hide in Picture 2. TextHide 3. Snow 4. Camouflage 5. OpenPuff
  • 28. Advantages • Difficult to detect and Only receiver can detect. • It can be done faster with large no. of software's. Disadvantage • The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use. • Password leakage may occur and it leads to the unauthorized access of data. • If this technique is gone in the wrong hands like hackers can be very much dangerous for all.
  • 29. Applications • Confidential communication and secret data storing • Steganography provides us with: • Potential capability to hide the existence of confidential data • Hardness of detecting the hidden (i.e.Strengthening of the secrecy of the encrypted data) • Protection of data alteration
  • 30. Applications • Usage in modern printers • Access control system for digital content distribution • Alleged use by terrorists • Alleged use by intelligence services
  • 31. Who’s Using It? • Good question… nobody knows for sure. • The whole point to steganography is to disguise its use. • However, anybody can use it to hide data or to protect anonymity • Likely users include: a) Trade fraud b) Industrial espionage c) Organized crime d) Narcotics traffickers e) Child pornographers f) Criminal gangs g) Individuals concerned about perceived government “snooping” h) Those who want to circumvent restrictive encryption export rules i) Anyone who wants to communicate covertly and anonymously
  • 32. Detection • Can steganography be detected? • Sometimes…many of the simpler steganographic techniques produce some discernable change in the file size, statistics, or both. For image files, these include: • Color variations • Loss of resolution or exaggerated noise • Images larger in size than that to be expected • Characteristic signatures, e.g., distortions or patterns • However, detection often requires a priori knowledge of what the image or file should look like
  • 33. Detection Challenges • Lack of tools and techniques to recover the hidden data • No commercial products exist for detection • Custom tools are analyst-intensive • Few methods beyond visual analysis of graphics files have been explored • Usually, no a priori knowledge of existence • No access to stegokey • Use of unknown applications
  • 34. Need for Improved Detection • Growing awareness of data hiding techniques and uses • Availability and sophistication of shareware and freeware data hiding software • Concerns over use to hide serious crimes, e.g., drug trafficking, pedophilia, terrorism • Frees resources currently spent on investigating cases with questionable/unknown payoff • Legislative calls • US Bill H.R. 850, Security and Freedom through Encryption (SAFE) Act • UK Revision of Interception of Communications Act 1985
  • 35. Future Scope • Steganography, though is still a fairly new idea. There are constant advancements in the computer field, suggesting advancements in the field of steganography as well. It is likely that there will soon be more efficient and more advanced techniques for Steganalysis. A hopeful advancement is the improved sensitivity to small messages. Knowing how difficult it is to detect the presence of a fairly large text file within an image, imagine how difficult it is to detect even one or two sentences embedded in an image! It is like finding a microscopic needle in the ultimate haystack. • What is scary is that such a small file of only one or two sentences may be all that is needed to commence a terrorist attack. In the future, it is hoped that the technique of Steganalysis will advance such that it will become much easier to detect even small messages within an image.
  • 36. Conclusion • Steganography & Steganalysis are still at an early stage of research. • Although in principle secure schemes exist, practical ones with reasonable capacity are known. • Notion for security & capacity for steganography needs to be investigated. • Since it obvious that no system of data hiding is totally immune to attacks. However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking for use in detection of unauthorized, illegally copied material is continually being realized and developed. • The growing number of communication protocols, services and computing environments offers almost unlimited opportunities for displaying a whole spectrum of steganographic methods.