SlideShare a Scribd company logo
1 of 25
THE ART OF WAR TEACHES US TO RELY NOT ON THE LIKELIHOOD OF THE
ENEMY’S NOT COMING, BUT ON OUR OWN READINESS TO RECEIVE HIM; NOT
ON THE CHANCE OF HIS NOT ATTACKING, BUT RATHER ON THE FACT THAT WE
HAVE MADE OUR POSITION UNASSAILABLE.
-THE ART OF WAR, SUN TZU
NETWORK SECURITY
THE FIELD OF NETWORK SECURITY CONSISTS OF MEASURES TO DETER, PREVENT, DETECT, AND CORRECT
SECURITY VIOLATIONS THAT INVOLVE THE TRANSMISSION OF INFORMATION.
COMPUTER SECURITY IS THE PROTECTION AFFORDED TO AN AUTOMATED INFORMATION SYSTEM IN ORDER
TO ATTAIN THE APPLICABLE OBJECTIVES OF PRESERVING THE INTEGRITY, AVAILABILITY , AND
CONFIDENTIALITY OF INFORMATION SYSTEM RESOURCES.
TYPES OF NETWORK SECURITY
•CRYPTOGRAPHY
•STEGANOGRAPHY
CRYPTOGRAPHY
• CRYPTOGRAPHY IS A METHOD OF STORING AND TRANSMITTING DATA IN A PARTICULAR FORM SO THAT
ONLY THOSE FOR WHOM IT IS INTENDED CAN READ AND PROCESS IT.
• THE MESSAGE ENCRYPTED USING CRYPTOGRAPHY HAVE NO MEANING UNLESSSOMEONE HAS A PROPER
KEY TO DECODE IT.
STEGANOGRAPHY
• STEGANOGRAPHY IS THE PRACTICE OF CONCEALING A FILE, MESSAGE, IMAGE, OR VIDEO WITHIN
ANOTHER FILE, MESSAGE, IMAGE, OR VIDEO.
• THE WORD STEGANOGRAPHY COMBINES THE GREEK WORD STEGANOS, MEANING“COVERED, CONCEALED,
OR PROTECTED”, AND GRAPHIEN MEANING “WRITING”.
• THE GOAL OF STEGANOGRAPHY IS TO HIDE MESSAGES IN SUCH A WAY THATNO ONE APART FROM THE
INTENDED RECIPIENT EVEN KNOWS THAT A MESSAGE HAS BEEN SENT.
• THIS CAN BE ACHIEVED BY CONCEALING THE EXISTENCE OF INFORMATIONWITHIN SEEMINGLY
HARMLESS CARRIERS OR COVERS.
EXAMPLE
SINCE EVERYONE CAN READ, ENCODING TEXT
IN NEUTRAL SENTENCESS IS DOUBTFULLY EFFECTIVE
SINCE EVERYONE CAN READ, ENCODING TEXT
IN NEUTRAL SENTENCES IS DOUBTFULLY EFFECTIVE
3RD MARCH
DEAR GEORGE,
GREETINGS TO ALL AT OXFORD,. MANY THANKS FOR YOUR
LETTER AND FOR THE SUMMER EXAMINATION PACKAGE.
ALL ENTRY FORMS AND FEES FORMS SHOULD BE READY
FOR FINAL DISPATCH TO THE SYNDICATE BY FRIDAY
20TH OR AT THE VERY LATEST, I’M TOLD BY THE 21ST.
ADMIN HAS IMPROVED HERE, THOUGH THERE’S ROOM
FOR IMPROVEMENT STILL; JUST GIVE US ALL TWO OR THREE
MORE YEARS AND WE’LL REALLY SHOW YOU! PLEASE
DON’T LET THESE WRETCHED 16+ PROPOSALS DESTROY
YOUR BASIC O AND A PATTERN. CERTAINLY THIS
SORT OF CHANGE, IF IMPLEMENTED IMMEDIATELY,
WOULD BRING CHAOS.
SINCERELY YOURS.
DIFFERENCE BETWEEN
CRYPTOGRAPHY AND
STEGANOGRAPHY
THE METHODS OF STEGANOGRAPHY CONCEAL THE EXISTENCE OF THE MESSAGE, WHEREAS THE METHODS OF
CRYPTOGRAPHY RENDER THE MESSAGE UNINTELLIGIBLE TO OUTSIDERS BY VARIOUS TRANSFORMATIONS
OF TEXT.
Secret
Communication
Techniques
Confidentiality Integrity Availability
Encryption Yes No Yes
Steganography Yes/No Yes/No Yes
Steganography Cryptography
Unknown message passing Known message passing
Steganography prevents discovery of the very
existence of communication
Encryption prevents an unauthorized party from
discovering the contents of a communication
Little known Technology Common Technology
Technology still being developed for certain formats Most of algorithm known by all
Once Detected Message is known. Strong current algorithm are resistant to attacks, larger
expensive computer power is required for cracking
Steganography does not alter the structure of the
secret message
Cryptography alters the entire structure of the secret
message
PHYSICAL TECHNIQUES
• CHARACTER MARKING: SELECTED LETTERS OF PRINTED OR TYPEWRITTEN
TEXT ARE OVER WRITTEN IN PENCIL.
• INVISIBLE INK: A NUMBER OF SUBSTANCES CAN BE USED FOR WRITING BUT
LEAVE NO VISIBLE TRACE UNTIL HEAT OR SOME CHEMICALIS APPLIED TO THE
PAPER.
• PIN PUNCTURES: SMALL PIN PUNCTURES ON SELECTED LETTERS ARE
ORDINARILY NOT VISIBLE UNLESS THE PAPER IS HELD UP IN FRONT OF A LIGHT.
DIGITAL TECHNIQUES
• CONCEALING MESSAGES WITHIN THE LOWEST BITS OF NOISY IMAGES OR SOUND FILES.
• MODIFYING THE ECHO OF A SOUND FILE.
• INCLUDING DATA IN THE IGNORED SECTIONS OF A FILE, SUCH AS AFTERTHE LOGICAL END OF THE CARRIER
FILE.
STEGANOGRAPHY TERMS
• CARRIER OR COVER FILE: ORIGINAL MESSAGE OR A FILE IN WHICH HIDDEN
INFORMATION WILL BE STORED.
• STEGO-MEDIUM: THE MEDIUM IN WHICH INFORMATION IS HIDDEN.
• PAYLOAD: THE INFORMATION WHICH IS TO BE HIDDEN OR CONCEALED.
• STEGANALYSIS: THE PROCESS OF DETECTING HIDDEN INFORMATION INSIDE A
FILE.
BASIC STEGANOGRAPHY MODEL
Stegosystem
Encoder
Stegosystem
Decoder
Secret
Message
Cover
Communication
Channel
Stego Object
Estimate of
Secret
Message
Original
Cover
TYPES OF STEGANOGRAPHY
•TEXT STEGANOGRAPHY
•IMAGE STEGANOGRAPHY
•AUDIO STEGANOGRAPHY
•VIDEO STEGANOGRAPHY
TEXT STEGANOGRAPHY
• TEXT STEGANOGRAPHY CAN BE APPLIED IN DIGITAL MAKEUP FORMAT SUCHAS PDF, DIGITAL
WATERMARK OR INFORMATION HIDING.
• IT IS MORE DIFFICULT TO REALIZE THE INFORMATION HIDING BASED ONTEXT. THE SIMPLEST METHOD OF
INFORMATION HIDING IS TO SELECT THE COVER FIRST, ADOPT GIVEN RULES TO ADD THE
PHRASEOLOGICAL OR SPELLING MISTAKES, OR REPLACE WITH SYNONYM WORDS.
• LINE-SHIFT CODING: TEXT LINES ARE VERTICALLY SHIFTED TO ENCODE THE
DOCUMENT UNIQUELY.
• WORD-SHIFT CODING: THE CODEWORDS ARE CODED INTO A DOCUMENT BY
SHIFTING THE HORIZONTAL LOCATIONS OF WORDS WITHIN TEXT LINES, WHILE
MAINTAINING A NATURAL SPACING APPEARANCE.
• FEATURE CODING: CERTAIN TEXT FEATURES ARE ALTERED, NOT ALTERED,
DEPENDING ON THE CODEWORD.
IMAGE, AUDIO & VIDEO
• IMAGE, AUDIO & VIDEO STEGANOGRAPHY TAKES ADVANTAGE OF THE LIMITED CAPABILITIES OF THE
HUMAN VISUAL & AUDITORY SYSTEM.
• IN THIS TYPE THE LEAST SIGNIFICANT BITS (LSB) IS ALTERED WHICH DOES NOT GREATLY AFFECT THE
ORIGINAL QUALITY OF THE FILE.
• THESE LSB CONTAIN THE SECRET MESSAGE.
APPLICATIONS
• CONFIDENTIAL COMMUNICATION AND SECRET DATA STORING.
• PROTECTION OF DATA ALTERATION.
• ACCESS CONTROL SYSTEM FOR DIGITAL CONTENT DISTRIBUTION.
• MEDIA DATABASE SYSTEMS.
ADVANTAGES & DISADVANTAGES
ADVANTAGES:-
• DIFFICULT TO DETECT
• IT CAN BE DONE FASTER WITH LARGE NUMBER OF SOFTWARES
• PROVIDES BETTER SECURITY FOR SHARING DATA IN LAN, MAN & WAN.
DISADVANTAGES:-
• IT REQUIRES A LOTOF OVERHEAD TO HIDE A RELATIVELY FEW BITS OF INFORMATION.
• ONCE THE SYSTEM IS DISCOVERED IT BECOMES WORTHLESS.
COMBINED CRYPTO-
STEGANOGRAPHY
Plain Text Encryption Cipher Text
Cipher Text
Stegosystem
Encoder
DecryptionPlain Text
Cover File
Stegosystem
Decoder
Cover File
Stego File
FUTURE SCOPE
• STEGANOGRAPHY, THOUGH IT IS A FAIRLY NEW IDEA, THERE ARE CONSTANT ADVANCEMENTS IN THE
COMPUTER FIELD SUGGESTING ADVANCEMENTS IN THE FIELD OF STEGANOGRAPHY AS WELL.
STEGANOGRAPHY IS LIKE DETECTING MICROSCOPIC NEEDLE IN A HAYSTACK.
• WHAT IS SCARY IS THAT SUCH A SMALL TEXT FILE OF ONLY ONE OR TWOSENTENCES MAYBE ALL THAT IS
NEEDED TO COMMENCE A TERRORIST ATTACK. IN THE FUTURE, IT IS HOPED THAT THE TECHNIQUE OF
STEGANALYSIS WILL ADVANCE SUCH THAT IT WILL BECOME MUCH EASIER TO DETECT EVEN SMALL
MESSAGES WITHIN AN IMAGE.
CONCLUSION
THE INTENT OF THIS PRESENTATION WAS TO COVER SOME OF THE MORE COMMON METHODS OF DATA
HIDING USING WIDESPREAD FILE FORMATS AND EASILY AVAILABLE TOOLS AS AN INTRODUCTION TO THE
PRIMARY CONCEPTS OF STEGANOGRAPHY.
THANK YOU!

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 

What's hot (20)

Steganography
Steganography Steganography
Steganography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Steganography
SteganographySteganography
Steganography
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Steganography
SteganographySteganography
Steganography
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 

Viewers also liked

Viewers also liked (6)

83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
What UX Has Taught Me
What UX Has Taught MeWhat UX Has Taught Me
What UX Has Taught Me
 
Steganography
SteganographySteganography
Steganography
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography

Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyArti Ambokar
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nationlizard4444
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...eSAT Journals
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Importance of theory of computation
Importance of theory of computationImportance of theory of computation
Importance of theory of computationSunil Kafle
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptxChandniA5
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...Big Data Week
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYAM Publications
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxkarthikaparthasarath
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingJose L. Quiñones-Borrero
 

Similar to Steganography (20)

Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Importance of theory of computation
Importance of theory of computationImportance of theory of computation
Importance of theory of computation
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
Packet switching
Packet switchingPacket switching
Packet switching
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
Steganography
SteganographySteganography
Steganography
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 

More from Swapnil Bangera

Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSwapnil Bangera
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 

More from Swapnil Bangera (6)

Shorting post
Shorting postShorting post
Shorting post
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Schelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna SynthesisSchelkunoff Polynomial Method for Antenna Synthesis
Schelkunoff Polynomial Method for Antenna Synthesis
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fading & Doppler Effect
Fading & Doppler EffectFading & Doppler Effect
Fading & Doppler Effect
 
Satellite installation
Satellite installationSatellite installation
Satellite installation
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Steganography

  • 1.
  • 2. THE ART OF WAR TEACHES US TO RELY NOT ON THE LIKELIHOOD OF THE ENEMY’S NOT COMING, BUT ON OUR OWN READINESS TO RECEIVE HIM; NOT ON THE CHANCE OF HIS NOT ATTACKING, BUT RATHER ON THE FACT THAT WE HAVE MADE OUR POSITION UNASSAILABLE. -THE ART OF WAR, SUN TZU
  • 3. NETWORK SECURITY THE FIELD OF NETWORK SECURITY CONSISTS OF MEASURES TO DETER, PREVENT, DETECT, AND CORRECT SECURITY VIOLATIONS THAT INVOLVE THE TRANSMISSION OF INFORMATION. COMPUTER SECURITY IS THE PROTECTION AFFORDED TO AN AUTOMATED INFORMATION SYSTEM IN ORDER TO ATTAIN THE APPLICABLE OBJECTIVES OF PRESERVING THE INTEGRITY, AVAILABILITY , AND CONFIDENTIALITY OF INFORMATION SYSTEM RESOURCES.
  • 4. TYPES OF NETWORK SECURITY •CRYPTOGRAPHY •STEGANOGRAPHY
  • 5. CRYPTOGRAPHY • CRYPTOGRAPHY IS A METHOD OF STORING AND TRANSMITTING DATA IN A PARTICULAR FORM SO THAT ONLY THOSE FOR WHOM IT IS INTENDED CAN READ AND PROCESS IT. • THE MESSAGE ENCRYPTED USING CRYPTOGRAPHY HAVE NO MEANING UNLESSSOMEONE HAS A PROPER KEY TO DECODE IT.
  • 6. STEGANOGRAPHY • STEGANOGRAPHY IS THE PRACTICE OF CONCEALING A FILE, MESSAGE, IMAGE, OR VIDEO WITHIN ANOTHER FILE, MESSAGE, IMAGE, OR VIDEO. • THE WORD STEGANOGRAPHY COMBINES THE GREEK WORD STEGANOS, MEANING“COVERED, CONCEALED, OR PROTECTED”, AND GRAPHIEN MEANING “WRITING”. • THE GOAL OF STEGANOGRAPHY IS TO HIDE MESSAGES IN SUCH A WAY THATNO ONE APART FROM THE INTENDED RECIPIENT EVEN KNOWS THAT A MESSAGE HAS BEEN SENT. • THIS CAN BE ACHIEVED BY CONCEALING THE EXISTENCE OF INFORMATIONWITHIN SEEMINGLY HARMLESS CARRIERS OR COVERS.
  • 7. EXAMPLE SINCE EVERYONE CAN READ, ENCODING TEXT IN NEUTRAL SENTENCESS IS DOUBTFULLY EFFECTIVE SINCE EVERYONE CAN READ, ENCODING TEXT IN NEUTRAL SENTENCES IS DOUBTFULLY EFFECTIVE
  • 8. 3RD MARCH DEAR GEORGE, GREETINGS TO ALL AT OXFORD,. MANY THANKS FOR YOUR LETTER AND FOR THE SUMMER EXAMINATION PACKAGE. ALL ENTRY FORMS AND FEES FORMS SHOULD BE READY FOR FINAL DISPATCH TO THE SYNDICATE BY FRIDAY 20TH OR AT THE VERY LATEST, I’M TOLD BY THE 21ST. ADMIN HAS IMPROVED HERE, THOUGH THERE’S ROOM FOR IMPROVEMENT STILL; JUST GIVE US ALL TWO OR THREE MORE YEARS AND WE’LL REALLY SHOW YOU! PLEASE DON’T LET THESE WRETCHED 16+ PROPOSALS DESTROY YOUR BASIC O AND A PATTERN. CERTAINLY THIS SORT OF CHANGE, IF IMPLEMENTED IMMEDIATELY, WOULD BRING CHAOS. SINCERELY YOURS.
  • 9. DIFFERENCE BETWEEN CRYPTOGRAPHY AND STEGANOGRAPHY THE METHODS OF STEGANOGRAPHY CONCEAL THE EXISTENCE OF THE MESSAGE, WHEREAS THE METHODS OF CRYPTOGRAPHY RENDER THE MESSAGE UNINTELLIGIBLE TO OUTSIDERS BY VARIOUS TRANSFORMATIONS OF TEXT. Secret Communication Techniques Confidentiality Integrity Availability Encryption Yes No Yes Steganography Yes/No Yes/No Yes
  • 10. Steganography Cryptography Unknown message passing Known message passing Steganography prevents discovery of the very existence of communication Encryption prevents an unauthorized party from discovering the contents of a communication Little known Technology Common Technology Technology still being developed for certain formats Most of algorithm known by all Once Detected Message is known. Strong current algorithm are resistant to attacks, larger expensive computer power is required for cracking Steganography does not alter the structure of the secret message Cryptography alters the entire structure of the secret message
  • 11. PHYSICAL TECHNIQUES • CHARACTER MARKING: SELECTED LETTERS OF PRINTED OR TYPEWRITTEN TEXT ARE OVER WRITTEN IN PENCIL. • INVISIBLE INK: A NUMBER OF SUBSTANCES CAN BE USED FOR WRITING BUT LEAVE NO VISIBLE TRACE UNTIL HEAT OR SOME CHEMICALIS APPLIED TO THE PAPER. • PIN PUNCTURES: SMALL PIN PUNCTURES ON SELECTED LETTERS ARE ORDINARILY NOT VISIBLE UNLESS THE PAPER IS HELD UP IN FRONT OF A LIGHT.
  • 12. DIGITAL TECHNIQUES • CONCEALING MESSAGES WITHIN THE LOWEST BITS OF NOISY IMAGES OR SOUND FILES. • MODIFYING THE ECHO OF A SOUND FILE. • INCLUDING DATA IN THE IGNORED SECTIONS OF A FILE, SUCH AS AFTERTHE LOGICAL END OF THE CARRIER FILE.
  • 13. STEGANOGRAPHY TERMS • CARRIER OR COVER FILE: ORIGINAL MESSAGE OR A FILE IN WHICH HIDDEN INFORMATION WILL BE STORED. • STEGO-MEDIUM: THE MEDIUM IN WHICH INFORMATION IS HIDDEN. • PAYLOAD: THE INFORMATION WHICH IS TO BE HIDDEN OR CONCEALED. • STEGANALYSIS: THE PROCESS OF DETECTING HIDDEN INFORMATION INSIDE A FILE.
  • 15. TYPES OF STEGANOGRAPHY •TEXT STEGANOGRAPHY •IMAGE STEGANOGRAPHY •AUDIO STEGANOGRAPHY •VIDEO STEGANOGRAPHY
  • 16. TEXT STEGANOGRAPHY • TEXT STEGANOGRAPHY CAN BE APPLIED IN DIGITAL MAKEUP FORMAT SUCHAS PDF, DIGITAL WATERMARK OR INFORMATION HIDING. • IT IS MORE DIFFICULT TO REALIZE THE INFORMATION HIDING BASED ONTEXT. THE SIMPLEST METHOD OF INFORMATION HIDING IS TO SELECT THE COVER FIRST, ADOPT GIVEN RULES TO ADD THE PHRASEOLOGICAL OR SPELLING MISTAKES, OR REPLACE WITH SYNONYM WORDS.
  • 17. • LINE-SHIFT CODING: TEXT LINES ARE VERTICALLY SHIFTED TO ENCODE THE DOCUMENT UNIQUELY. • WORD-SHIFT CODING: THE CODEWORDS ARE CODED INTO A DOCUMENT BY SHIFTING THE HORIZONTAL LOCATIONS OF WORDS WITHIN TEXT LINES, WHILE MAINTAINING A NATURAL SPACING APPEARANCE. • FEATURE CODING: CERTAIN TEXT FEATURES ARE ALTERED, NOT ALTERED, DEPENDING ON THE CODEWORD.
  • 18. IMAGE, AUDIO & VIDEO • IMAGE, AUDIO & VIDEO STEGANOGRAPHY TAKES ADVANTAGE OF THE LIMITED CAPABILITIES OF THE HUMAN VISUAL & AUDITORY SYSTEM. • IN THIS TYPE THE LEAST SIGNIFICANT BITS (LSB) IS ALTERED WHICH DOES NOT GREATLY AFFECT THE ORIGINAL QUALITY OF THE FILE. • THESE LSB CONTAIN THE SECRET MESSAGE.
  • 19.
  • 20. APPLICATIONS • CONFIDENTIAL COMMUNICATION AND SECRET DATA STORING. • PROTECTION OF DATA ALTERATION. • ACCESS CONTROL SYSTEM FOR DIGITAL CONTENT DISTRIBUTION. • MEDIA DATABASE SYSTEMS.
  • 21. ADVANTAGES & DISADVANTAGES ADVANTAGES:- • DIFFICULT TO DETECT • IT CAN BE DONE FASTER WITH LARGE NUMBER OF SOFTWARES • PROVIDES BETTER SECURITY FOR SHARING DATA IN LAN, MAN & WAN. DISADVANTAGES:- • IT REQUIRES A LOTOF OVERHEAD TO HIDE A RELATIVELY FEW BITS OF INFORMATION. • ONCE THE SYSTEM IS DISCOVERED IT BECOMES WORTHLESS.
  • 22. COMBINED CRYPTO- STEGANOGRAPHY Plain Text Encryption Cipher Text Cipher Text Stegosystem Encoder DecryptionPlain Text Cover File Stegosystem Decoder Cover File Stego File
  • 23. FUTURE SCOPE • STEGANOGRAPHY, THOUGH IT IS A FAIRLY NEW IDEA, THERE ARE CONSTANT ADVANCEMENTS IN THE COMPUTER FIELD SUGGESTING ADVANCEMENTS IN THE FIELD OF STEGANOGRAPHY AS WELL. STEGANOGRAPHY IS LIKE DETECTING MICROSCOPIC NEEDLE IN A HAYSTACK. • WHAT IS SCARY IS THAT SUCH A SMALL TEXT FILE OF ONLY ONE OR TWOSENTENCES MAYBE ALL THAT IS NEEDED TO COMMENCE A TERRORIST ATTACK. IN THE FUTURE, IT IS HOPED THAT THE TECHNIQUE OF STEGANALYSIS WILL ADVANCE SUCH THAT IT WILL BECOME MUCH EASIER TO DETECT EVEN SMALL MESSAGES WITHIN AN IMAGE.
  • 24. CONCLUSION THE INTENT OF THIS PRESENTATION WAS TO COVER SOME OF THE MORE COMMON METHODS OF DATA HIDING USING WIDESPREAD FILE FORMATS AND EASILY AVAILABLE TOOLS AS AN INTRODUCTION TO THE PRIMARY CONCEPTS OF STEGANOGRAPHY.