For Documentation and Downloads Visit
In   the   present world, maximum of the world business is going on using “INTERNET” Consequences: Security required for the data, so that no other person can access it illegally. Data should be transferred accurately with out errors.
Two basic mechanisms for security  of the data 1. CRYPTOGRAPHY 2. STEGANOGRAPHY   Steganography 's intent is to hide the existence of the message, while  cryptography  scrambles a message so that it cannot be understood.
 
“ To human eyes, data usually contains known forms like images, e-mail, sounds and text. Most Internet data naturally includes gratuitous headers, too.” The above message is decoded by using steganography technique concerning certain rules, as follows… “ THE DUCK FLIES AT MIDNIGHT”   HOW IS IT DECODED?.......
CONSIDER THE GIVEN DATA  “ T o  h uman  e yes,  d ata  u sually  c ontains  k nown  f orms  l ike  i mages,  e -mail,  s ounds  a nd  t ext.  M ost  I nternet  d ata  n aturally  i ncludes  g ratuitous  h eaders,  t oo.” Here the rule is “considering the first letters of all the words”. The decoding process is done by using the above rule. This is a simple way used in steganography.
Steganography is a means of storing information in such a way that it hides private information and even the existence of the information with in the other medium. The goal of steganography is  “to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present.''
COVER:  The data that is visible to the world . EMBEDDED:  The data to be hidden (not visible to the world)  3. STEGO:   The data contains both cover &embedded data. The data may be audio or video or image…etc In case of audio data the cover is also termed as  host signal , where as in case of image data the cover is termed as  container . The process of hiding the data is known as  Embedding.
This technique is well known to Greeks in 500 B.C itself and efficiently used in World war2 by Germany. One example is “ A p parently n e utral's p r otest i s  t h oroughly d i scounted a n d i g nored. I s man h a rd h i t. B l ockade i s sue a f fects p r etext f o r e m bargo o n  b y -products, e j ecting s u ets a n d v e getable o i ls.” This is given by a German Spy Giving the secret message that “ Pershing sails from NY June 1.” In World war 2.
three basic ways to encode the data in steganography are 1.Image as a carrier 2.Pixel representation in RGB 3.Bandwidth reduced file transfer Practical implementation
It is an efficient technique for steganography, An image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha : degree of transparency Red : intensity of red color Green :  intensity of green color Blue :  intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.
If an image data takes  six mins to transfer between two systems and a text file takes 3 mins. One can use steganography technique in order to reduce the time taking by embedding the text in the image  and the total content will be transferred in six mins. Two basic algorithms used for steganography are 1.Text on Image algorithm. 2. Image on Image algorithm.
IMAGE EMBEDDED  IMAGE FILE
“ ATTACK” --- An attempt to detect the Stegnography messages 1.ACTIVE  ATTACK 2.PASSIVE ATTACK check sum character is embedded into the actual data in order  to indicate the beginning of the stego data, and how much data is tampered will not be known in this process. Audio can be detected by using a specified noise signal.
1. Steganographers need to avoid well-known images for this reason . 2. S teganographer must use caution when choosing certain data hiding techniques to avoid unusual  patterns
The answer is definitely “ BIN LADEN ” The attack on 11 th  September was perfectly preplanned by BIN LADEN  and  AL QA’IDA  by communicating with the  hijackers by sending the pictures and the terrorist targets by using steganography technique. (in the form of pictures of children and in sports chat rooms) The advanced tools used for this purpose by them are 1. White Noise Storm  2. S-Tools  …. Efficient softwares for the steganography of voice, image, data in digitized format.
Internet privacy. 2. Secret communication between the organizations like boarder security force and defense organization. 3. Effective than that of  cryptography .  4. Additional layer for security than cryptography
That message may be an  important one like “ about the safety of a country ”
As  EVERY COIN HAS TWO SIDES, This technology besides having much benefits to make the internet business very safe and transmitting the defense messages secretly, there is a threat to the society if it is used in terrorism(11 th  September),in anti social events. FINALLY, “ It will be more helpful if this technology is used in the proper way. The stegnography e are seeing today is just an ice cap, we have to wait until it melts(developed fully) whether it is helpful to society or becoming threat . ”
 
THANK YOU…
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 WIebvdiCqsOoabK3jEfdGExce63zDI0= =MpRf  CRYPTO CODE: STEGO CODE:
TEXT ON IMAGE  ALGORITHM Password: 9966572497 Hidden Data BACK Cover Stego Data
TEXT ON IMAGE  ALGORITHM BACK Cover Stego Data

Steganography

  • 1.
    For Documentation andDownloads Visit
  • 2.
    In the present world, maximum of the world business is going on using “INTERNET” Consequences: Security required for the data, so that no other person can access it illegally. Data should be transferred accurately with out errors.
  • 3.
    Two basic mechanismsfor security of the data 1. CRYPTOGRAPHY 2. STEGANOGRAPHY Steganography 's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood.
  • 4.
  • 5.
    “ To humaneyes, data usually contains known forms like images, e-mail, sounds and text. Most Internet data naturally includes gratuitous headers, too.” The above message is decoded by using steganography technique concerning certain rules, as follows… “ THE DUCK FLIES AT MIDNIGHT” HOW IS IT DECODED?.......
  • 6.
    CONSIDER THE GIVENDATA “ T o h uman e yes, d ata u sually c ontains k nown f orms l ike i mages, e -mail, s ounds a nd t ext. M ost I nternet d ata n aturally i ncludes g ratuitous h eaders, t oo.” Here the rule is “considering the first letters of all the words”. The decoding process is done by using the above rule. This is a simple way used in steganography.
  • 7.
    Steganography is ameans of storing information in such a way that it hides private information and even the existence of the information with in the other medium. The goal of steganography is “to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present.''
  • 8.
    COVER: Thedata that is visible to the world . EMBEDDED: The data to be hidden (not visible to the world) 3. STEGO: The data contains both cover &embedded data. The data may be audio or video or image…etc In case of audio data the cover is also termed as host signal , where as in case of image data the cover is termed as container . The process of hiding the data is known as Embedding.
  • 9.
    This technique iswell known to Greeks in 500 B.C itself and efficiently used in World war2 by Germany. One example is “ A p parently n e utral's p r otest i s t h oroughly d i scounted a n d i g nored. I s man h a rd h i t. B l ockade i s sue a f fects p r etext f o r e m bargo o n b y -products, e j ecting s u ets a n d v e getable o i ls.” This is given by a German Spy Giving the secret message that “ Pershing sails from NY June 1.” In World war 2.
  • 10.
    three basic waysto encode the data in steganography are 1.Image as a carrier 2.Pixel representation in RGB 3.Bandwidth reduced file transfer Practical implementation
  • 11.
    It is anefficient technique for steganography, An image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha : degree of transparency Red : intensity of red color Green : intensity of green color Blue : intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.
  • 12.
    If an imagedata takes six mins to transfer between two systems and a text file takes 3 mins. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six mins. Two basic algorithms used for steganography are 1.Text on Image algorithm. 2. Image on Image algorithm.
  • 13.
    IMAGE EMBEDDED IMAGE FILE
  • 14.
    “ ATTACK” ---An attempt to detect the Stegnography messages 1.ACTIVE ATTACK 2.PASSIVE ATTACK check sum character is embedded into the actual data in order to indicate the beginning of the stego data, and how much data is tampered will not be known in this process. Audio can be detected by using a specified noise signal.
  • 15.
    1. Steganographers needto avoid well-known images for this reason . 2. S teganographer must use caution when choosing certain data hiding techniques to avoid unusual patterns
  • 16.
    The answer isdefinitely “ BIN LADEN ” The attack on 11 th September was perfectly preplanned by BIN LADEN and AL QA’IDA by communicating with the hijackers by sending the pictures and the terrorist targets by using steganography technique. (in the form of pictures of children and in sports chat rooms) The advanced tools used for this purpose by them are 1. White Noise Storm 2. S-Tools …. Efficient softwares for the steganography of voice, image, data in digitized format.
  • 17.
    Internet privacy. 2.Secret communication between the organizations like boarder security force and defense organization. 3. Effective than that of cryptography . 4. Additional layer for security than cryptography
  • 18.
    That message maybe an important one like “ about the safety of a country ”
  • 19.
    As EVERYCOIN HAS TWO SIDES, This technology besides having much benefits to make the internet business very safe and transmitting the defense messages secretly, there is a threat to the society if it is used in terrorism(11 th September),in anti social events. FINALLY, “ It will be more helpful if this technology is used in the proper way. The stegnography e are seeing today is just an ice cap, we have to wait until it melts(developed fully) whether it is helpful to society or becoming threat . ”
  • 20.
  • 21.
  • 22.
    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 WIebvdiCqsOoabK3jEfdGExce63zDI0= =MpRf CRYPTO CODE: STEGO CODE:
  • 23.
    TEXT ON IMAGE ALGORITHM Password: 9966572497 Hidden Data BACK Cover Stego Data
  • 24.
    TEXT ON IMAGE ALGORITHM BACK Cover Stego Data