BY
PREM KUMAR
SteganographySteganography
The new age art of hidingThe new age art of hiding
communicationcommunication
BY
A.PREM KUMAR
CONTENTSCONTENTS
 What’s the Steganography ?What’s the Steganography ?
 Why the Steganography ?Why the Steganography ?
 Steganography Tools.Steganography Tools.
 Detection Process.Detection Process.
 Defence.Defence.
What is SteganographyWhat is Steganography ??
The process of hiding data in IMAGESThe process of hiding data in IMAGES
is called Steganography.is called Steganography.
 The most popular method for hiding dataThe most popular method for hiding data
in files is to utilize graphic images asin files is to utilize graphic images as
hiding places.hiding places.
So, Sit back And enjoy the images.So, Sit back And enjoy the images.
How is it Done ?How is it Done ?
What is Steganography?
The Least significant bit of each byte of
the image can be replaced with bits of the
secret message.
This practice does not affect the graphic
enough to be detected.
Steganography does not use algorithms or
keys to encrypt information, but this is a
process to hide data within another object
so no one will detect its presence
STEGANOGRAPHY
TXT
JPG
JPG
What is the POINT ?
 Steganography makes the communication
invisible, that is, deny that the message even
exists!
 Even the most trained security specialist or
forensic analyst may miss this type of
concealment during a forensic review.
An Example
 A Roman general shaved a slave’s head and
tattooed a message on it.
 After the hair grew back, the slave was sent
to deliver the now-hidden message.
 Although such a system might work for a
time, once it is known, it is simple enough to
shave the heads of all the people passing by
to check for hidden messages– ultimately,
such a steganographic system fails.
Modern Steganography
 Modern steganography
attempts to be detectable
only if secret information is
known– namely, a secret.
 For steganography to
remain undetected, the
unmodified cover medium
must be kept secret,
because if it is exposed, a
comparison between the
cover and stego media
immediately reveals the
changes.
Red color
shade
variations
Drastic &
Subtle shade
variations
Gray Scale
shade
variations
Sample palettesSample palettes
The Process :
WHY BARCODING?
• Encoding the natural history collection
data as advanced commercial barcode is
described.
• Textual information associated with other
digital resources such as image, video
files of biological samples encoded as
barcode for faster and accurate retrieval
CURRENT BARCODE CONTENTSCURRENT BARCODE CONTENTS
IN MH PU BSI 121760
COUNTRY
STATE
CITY
INSTITUTE
ID NUMBER
BarCode Format
IN MH PU BSI 121760
CODE 128 (LINEAR)
STEGNOGRAPHY
IMAGE WITH SAFE TEXT
Image and Textual Data
Image and Searchable Textual DataImage and Searchable Textual Data
• 121760;BSI;Pune;#6;INM121760;BSI;Pune;#6;INM
HPUBSI121760;;1;;;;V.P.HPUBSI121760;;1;;;;V.P.
Prasad;173745;;flowerinPrasad;173745;;flowerin
g;India;;5;;;;31/11/1995;3g;India;;5;;;;31/11/1995;3
1/10/1995;;;Head;C.Com1/10/1995;;;Head;C.Com
prerrus;#6;pune;;1;;rao@prerrus;#6;pune;;1;;rao@
hotmail.com;;cyperaceaehotmail.com;;cyperaceae
;5650196;;;3;karnataka;;;5650196;;;3;karnataka;;
Cyperus;Rao;V.P.prasad;Cyperus;Rao;V.P.prasad;
c:sampada/image1;#11;Kc:sampada/image1;#11;K
arwad_beach,N.kannara;arwad_beach,N.kannara;
#5;1;Botanical_survey_of#5;1;Botanical_survey_of
_India;3;;;2;411001;24;;;;_India;3;;;2;411001;24;;;;
Cyperus_comprerrus;;;;cCyperus_comprerrus;;;;c
omprerrus;comprerrus;momprerrus;comprerrus;m
aharashtra;accepted;#20aharashtra;accepted;#20
;5650195;25;;;;1995;;5650195;25;;;;1995;
• 121760;BSI;Pune;#6;INMHPUBSI1217121760;BSI;Pune;#6;INMHPUBSI1217
60;;1;;;;V.P.Prasad;173745;;flowering60;;1;;;;V.P.Prasad;173745;;flowering
;India;;5;;;;31/11/1995;31/10/1995;;;H;India;;5;;;;31/11/1995;31/10/1995;;;H
ead;C.Comprerrus;#6;pune;;1;;rao@head;C.Comprerrus;#6;pune;;1;;rao@h
otmail.com;;cyperaceae;5650196;;;3;kotmail.com;;cyperaceae;5650196;;;3;k
arnataka;;Cyperus;Rao;V.P.prasad;c:arnataka;;Cyperus;Rao;V.P.prasad;c:
sampada/image1;#11;Karwad_beach,sampada/image1;#11;Karwad_beach,
N.kannara;#5;1;Botanical_survey_of_IN.kannara;#5;1;Botanical_survey_of_I
ndia;3;;;2;411001;24;;;;Cyperus_compndia;3;;;2;411001;24;;;;Cyperus_comp
rerrus;;;;comprerrus;comprerrus;maharerrus;;;;comprerrus;comprerrus;maha
rashtra;accepted;#20;5650195;25;;;;1rashtra;accepted;#20;5650195;25;;;;1
995;995;
Steganography Tools
• Nice text (Cipher-text to Innocuous text)
• OutGuess (PNM and JPEG)
• Pretty Good Envelope (Binary into Large Binary)
• Secure Engine (JPEG,BMP,Text)
• Snow (ASCII text)
• Stealth (PGP 2.x)
• Steghide( WAV,BMP,AU,blowfish encryption,
MD5)
Image Hide
 Image Hide is a steganography
program which hides large amounts
of text in images.
 Even after adding bytes of data,
there is no increase in size of the
image.
 Image looks the same to normal
paint packages.
How do you Detect it ?How do you Detect it ?
 Only through a direct, visualOnly through a direct, visual
comparison of the original andcomparison of the original and
processed image can the analystprocessed image can the analyst
detect the possible use ofdetect the possible use of
Steganography.Steganography.
 Because many times the suspectBecause many times the suspect
system only stores the processedsystem only stores the processed
image, the analyst has nothing toimage, the analyst has nothing to
use as a comparison anduse as a comparison and
generally has no way to tell thatgenerally has no way to tell that
the image in question containthe image in question contain
hidden data.hidden data.
Steganography Detection
• Stegdetect is an automated tool for
detecting steganographic content in
images.
• It is capable of detecting different
steganographic methods to embed hidden
information in JPEG images.
THE DEFENCE
Information Security Training.
Strategic Alignment and Execution through
customized and personalized framework
focused on specific risks.
1) Confidential communication and secret
data storing
2) Protection of data alteration
Conclusion
• Clearly, software can not automatically be
executed from images in which it has been
embedded by merely opening them.
• Action is necessary from the user or
application that placed the data in the
picture in the first place.
Steganography

Steganography