SlideShare a Scribd company logo
STEGANOGRAPHY
…. A SMART WAY TO HIDE A OBJECT!
PRESENTED BY: PRACHETA BISWAS (16MS1FS032)
DEFINITION AND ORIGIN
“The art of hiding messages in such a way that no
one but the sender and the intended recipient
knows about the very existence of the message “
The strength of the staganography is “stealth”
The word STEGANOGRAPHY is derived from the
Greek word “STEGANOS”=covered &
“GRAPHIE”=writing
EXAMPLES :
Tattoos on shaved heads
Wax covered tablets
Microdots – shrunken picture
Invisible inks – milks, fruit
juice , urine e.tc
HISTORY
The first recorded use of stenography can be traced back to 440 BC when
Herodotus mentions an example of stenography in the histories of
Herodotus.
• Ancient example: one shaved the head of his most trusted slave and tattooed a
message on it. After his hair had grown the message was hidden. The purpose
was to instigate a revolt against the Persians.
During the ‘cold war’ period, US and USSR wanted to hide their sensors in he
enemy's facilities. These devices had to send data to their nations, without being
spotted.
• In October 2001, the New York Times published an article
claiming that Al-Qaeda had used steganography to encode
messages into images and transported these via e-mail and
possibly via USENET to prepare and execute the September
11,2001 terrorist attack.
TYPES OF
STEGANOGRAPHY
STEGANOGRAPHY
IN TEXT OR
DOCUMENT
STEGANOGRAPHY
IN VIDEO
STEGANOGRAPHY
IN AUDIO
STEGANOGRAPHY
IN IMAGE
TEXT/DOCUMENT STEGANOGRAPHY
 Involves 3 types of coding :
1. LINE-SHIFTING CODING: text lines are
vertically shifted to encode the document
uniquely
2. WORD-SHIFT CODING: codeword are coded
into a document by shifting the horizontal
locations of words within text lines, while
maintaining a natural spacing appearance
3. FEATURE CODING: certain text features are
altered ,or not altered, depending on the
codeword.
EXAMPLE OF TEXT STEGANOGRAPHY
WORD SHIFTING
STEGANOGRAPHY IN IMAGES
 1. IMAGE ENCODING TECHNIQUES:
 Least significant bit insertion
 Masking and filtering
 Algorithms and transformations
LSB TECHNIQUE
11010110
01110100 011001101 01110011
01110101
HOW TO STEGANOGRAPH AN IMAGE
IMAGE COMPRESSION
 Image Compression offers a solution to large
image files.
 Save storage space but have differing effects
on any uncompressed hidden data in the
image.
IMAGE COMPRESSION
TYPES OF IMAGE COMPRESSION
• HIGH COMPRESSION
• MAY NOT MAINTAIN THE
ORIGINAL IMAGE’S
INTEGRITY
• JPEG FORMAT FILES
LOSSY
• MAINTAINS HE ORIGINAL
IMAGE DATA EXACTLY
• MORE FAVOURED
• BMP, GIF FOMAT FILES
LOSSLESS
AUDIO STEGANOGRAPHY
 Messages can be hidden in common audio
formatted files or the audio itself. It is more
difficult process than image steganography.
 Methods :
1. Transmitting a message in the human-
inaudible.
2. Digitally embedding a message into an
audio file.
AUDIO STEGANOGRAPHY
METHODS OF AUDIO DATA HIDING
Low-bit
Encoding
Echo
Data
Hiding
Phase
Coding
LEAST SIGNIFICANT BIT (LSB)
 Prefix message with identifier string
 Embedded 1 bit of the message as every
LSB
 Does not require original audio track to
recover the message
STEGANOGRAPHY IN VIDEO
 INJECTION
 SUBSTITUTION
 GENERATION
 TRANSFORM DOMAIN
INJECTION
 INJECT DATA INTO REDUNDANT PARTS
OF A FILE
 EXE FILES
 WAV FILES
 LESS SECURE THAN ANY OTHER
TECHNIQUES
SUBSTITUTION
 MODIFIES PRE-EXISTING DATA OF THE
CONTAINER FILE
 THE FILE SIZE OF THE CONTAINER
OBJECT IS PRESERVED
 LIMITS THE STEGANOGRAPHIC
CAPACITY OF THE CONTAINER FILE
GENERATION
 GENERATES A CONTAINER FILE BASED
ON THE COVERT DATA
 THERE IS NO ORIGINAL CONTAINER FILE
STEGANALYSIS
 Steganalysis is the art and science of
detecting a secret communication.
 Hiding a message will most likely leave
detectable traces in the cover medium.
 The information hiding process changes the
statistical properties of the cover, which is a
steganalyst attempts to detect.
 The process of attempting to detect
statistical traces is called STATISTICAL
STEGANALYSIS.
TYPES OF ATTACKS USED BY STEGANALYST
A. STEGO-ONLY ATTACK –
B. KNOWN COVER ATTACK –
C. KNOWN MESSAGE ATTACK –
D. CHOSEN STEGO ATTACK –
E. CHOSEN MESSAGE ATTACK –
F. KNOWN STEGO ATTACK –
IMPORTANT ASPECTS OF STEGANALYSIS
 DETECTING HIDDEN INFORMATION
 DISABLING STEGANOGRAPHY
ADVANTAGES
 DIFFICULT TO DETECT AND ONLY
RECEIVER CAN DETECT
 IT CAN BE DONE FASTER WITH LARGE
NO. OF SOTWARE
 PROVIDES BETTER SECURITY FOR
SHARING DATA IN LAN,MAN AND WAN
DISADVANTAGES
 THE CONFIDENTIALITY OF INFORMATIONIS
MAINTAINED BY THE ALGORITHMS, AND IF
THE AGORITHMS ARE KNOWN THEN THIS
TECHNIQUE IS OF NO USE
 PASSWORD LEAKAGE MAY OCCUR AND IT
LEADS TO THE UNAUTHORIZED ACCESS
OF DATA
 IF THIS TECHNIQUE IS GONE WRONG LIKE
HACKERS CAN BE VERY MUCH
DANGEROUS FOR ALL
APPLICATIONS
I. CONFIDENTIAL COMMUNICATION AND
SECRET DATA SHARING
II. PROTECTION OF DATA ALTERATION
III. ACCESS CONTROL SYSTEM FOR
DIGITAL DISTURBANCE
IV. MEDIA DATABASE SYSTEMS
V. VISUAL CRYPTOGRAPHY AND
STEGANOGRAPHY TECHNIQUES FOR
SECURE E-PAYMENT SCHEME
VI. IMAGE
STEGANOGRAPHY,COMPRESSION AND
IMAGE MORPHING FOR BANKING
STEGANOGRAPH
Y
CRYPTOGRAPHY WATERMARKS
Techniques LSB, spatial,
domain,
Jsteg,outguess
Transposition,
substitution, RSA
Compensated
prediction,DCT
NAKED EYE
IDENTIFICATION
NO, as message is
hidden within the
carriers
YES, as message is
converted in other
way which sough
something is hidden
YES, as actual
image is hiding by
some watermark
CAPACITY Differs as different
technology usually
low hiding capacity
Capacity is so high,
but as message is
long ,it chances to
be decrypt
Depends on the size
of the hidden data
DETECTION Not easy to detect Easier than
steganography
Easier than
steganography
STRENGTH Hides message
without altering the
message, it
conceals information
IMPERCEPTIBILITY High High High
APPLICABILITY Universally Universally Universally
THANK YOU

More Related Content

What's hot

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Steganography
SteganographySteganography
Steganography
Abhishek Singh
 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
Swapnil Bangera
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar reportTejas_srinivas
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Stegnography
StegnographyStegnography
Stegnography
Mayank Garg
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
NidhinRaj Saikripa
 

What's hot (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 

Viewers also liked

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
Ritu Agarwal
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
Steganography
SteganographySteganography
Steganography
bhaskarnarula
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
Pratik Poddar
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
Girish Ram M
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Saurabh Kaushik
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 

Viewers also liked (10)

Steganography
SteganographySteganography
Steganography
 
File000133
File000133File000133
File000133
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography

art of Steganography
art of Steganography art of Steganography
art of Steganography
Joshpin Bala.B
 
steganography
steganographysteganography
steganography
Manika Arora
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Final2
Final2Final2
Final2
pooja pal
 
Steganography
SteganographySteganography
Steganography
Divam Goyal
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
Bryce Nelson
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
F017253244
F017253244F017253244
F017253244
IOSR Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
ThusharaBAmigoz1
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
Lisa Brewer
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarkingamitchauhan1990
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

Similar to Steganography (20)

art of Steganography
art of Steganography art of Steganography
art of Steganography
 
steganography
steganographysteganography
steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Final2
Final2Final2
Final2
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography
SteganographySteganography
Steganography
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
Steganography Steganography
Steganography
 

Recently uploaded

Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
correoyaya
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 

Recently uploaded (20)

Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 

Steganography

  • 1. STEGANOGRAPHY …. A SMART WAY TO HIDE A OBJECT! PRESENTED BY: PRACHETA BISWAS (16MS1FS032)
  • 2. DEFINITION AND ORIGIN “The art of hiding messages in such a way that no one but the sender and the intended recipient knows about the very existence of the message “ The strength of the staganography is “stealth” The word STEGANOGRAPHY is derived from the Greek word “STEGANOS”=covered & “GRAPHIE”=writing
  • 3. EXAMPLES : Tattoos on shaved heads Wax covered tablets Microdots – shrunken picture Invisible inks – milks, fruit juice , urine e.tc
  • 4.
  • 5.
  • 6. HISTORY The first recorded use of stenography can be traced back to 440 BC when Herodotus mentions an example of stenography in the histories of Herodotus. • Ancient example: one shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. During the ‘cold war’ period, US and USSR wanted to hide their sensors in he enemy's facilities. These devices had to send data to their nations, without being spotted. • In October 2001, the New York Times published an article claiming that Al-Qaeda had used steganography to encode messages into images and transported these via e-mail and possibly via USENET to prepare and execute the September 11,2001 terrorist attack.
  • 7. TYPES OF STEGANOGRAPHY STEGANOGRAPHY IN TEXT OR DOCUMENT STEGANOGRAPHY IN VIDEO STEGANOGRAPHY IN AUDIO STEGANOGRAPHY IN IMAGE
  • 8. TEXT/DOCUMENT STEGANOGRAPHY  Involves 3 types of coding : 1. LINE-SHIFTING CODING: text lines are vertically shifted to encode the document uniquely 2. WORD-SHIFT CODING: codeword are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance 3. FEATURE CODING: certain text features are altered ,or not altered, depending on the codeword.
  • 9. EXAMPLE OF TEXT STEGANOGRAPHY
  • 11. STEGANOGRAPHY IN IMAGES  1. IMAGE ENCODING TECHNIQUES:  Least significant bit insertion  Masking and filtering  Algorithms and transformations
  • 14. IMAGE COMPRESSION  Image Compression offers a solution to large image files.  Save storage space but have differing effects on any uncompressed hidden data in the image.
  • 16. TYPES OF IMAGE COMPRESSION • HIGH COMPRESSION • MAY NOT MAINTAIN THE ORIGINAL IMAGE’S INTEGRITY • JPEG FORMAT FILES LOSSY • MAINTAINS HE ORIGINAL IMAGE DATA EXACTLY • MORE FAVOURED • BMP, GIF FOMAT FILES LOSSLESS
  • 17. AUDIO STEGANOGRAPHY  Messages can be hidden in common audio formatted files or the audio itself. It is more difficult process than image steganography.  Methods : 1. Transmitting a message in the human- inaudible. 2. Digitally embedding a message into an audio file.
  • 19.
  • 20. METHODS OF AUDIO DATA HIDING Low-bit Encoding Echo Data Hiding Phase Coding
  • 21. LEAST SIGNIFICANT BIT (LSB)  Prefix message with identifier string  Embedded 1 bit of the message as every LSB  Does not require original audio track to recover the message
  • 22. STEGANOGRAPHY IN VIDEO  INJECTION  SUBSTITUTION  GENERATION  TRANSFORM DOMAIN
  • 23. INJECTION  INJECT DATA INTO REDUNDANT PARTS OF A FILE  EXE FILES  WAV FILES  LESS SECURE THAN ANY OTHER TECHNIQUES
  • 24. SUBSTITUTION  MODIFIES PRE-EXISTING DATA OF THE CONTAINER FILE  THE FILE SIZE OF THE CONTAINER OBJECT IS PRESERVED  LIMITS THE STEGANOGRAPHIC CAPACITY OF THE CONTAINER FILE
  • 25. GENERATION  GENERATES A CONTAINER FILE BASED ON THE COVERT DATA  THERE IS NO ORIGINAL CONTAINER FILE
  • 26. STEGANALYSIS  Steganalysis is the art and science of detecting a secret communication.  Hiding a message will most likely leave detectable traces in the cover medium.  The information hiding process changes the statistical properties of the cover, which is a steganalyst attempts to detect.  The process of attempting to detect statistical traces is called STATISTICAL STEGANALYSIS.
  • 27. TYPES OF ATTACKS USED BY STEGANALYST A. STEGO-ONLY ATTACK – B. KNOWN COVER ATTACK – C. KNOWN MESSAGE ATTACK – D. CHOSEN STEGO ATTACK – E. CHOSEN MESSAGE ATTACK – F. KNOWN STEGO ATTACK –
  • 28. IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAPHY
  • 29. ADVANTAGES  DIFFICULT TO DETECT AND ONLY RECEIVER CAN DETECT  IT CAN BE DONE FASTER WITH LARGE NO. OF SOTWARE  PROVIDES BETTER SECURITY FOR SHARING DATA IN LAN,MAN AND WAN
  • 30. DISADVANTAGES  THE CONFIDENTIALITY OF INFORMATIONIS MAINTAINED BY THE ALGORITHMS, AND IF THE AGORITHMS ARE KNOWN THEN THIS TECHNIQUE IS OF NO USE  PASSWORD LEAKAGE MAY OCCUR AND IT LEADS TO THE UNAUTHORIZED ACCESS OF DATA  IF THIS TECHNIQUE IS GONE WRONG LIKE HACKERS CAN BE VERY MUCH DANGEROUS FOR ALL
  • 31. APPLICATIONS I. CONFIDENTIAL COMMUNICATION AND SECRET DATA SHARING II. PROTECTION OF DATA ALTERATION III. ACCESS CONTROL SYSTEM FOR DIGITAL DISTURBANCE IV. MEDIA DATABASE SYSTEMS V. VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES FOR SECURE E-PAYMENT SCHEME VI. IMAGE STEGANOGRAPHY,COMPRESSION AND IMAGE MORPHING FOR BANKING
  • 32. STEGANOGRAPH Y CRYPTOGRAPHY WATERMARKS Techniques LSB, spatial, domain, Jsteg,outguess Transposition, substitution, RSA Compensated prediction,DCT NAKED EYE IDENTIFICATION NO, as message is hidden within the carriers YES, as message is converted in other way which sough something is hidden YES, as actual image is hiding by some watermark CAPACITY Differs as different technology usually low hiding capacity Capacity is so high, but as message is long ,it chances to be decrypt Depends on the size of the hidden data DETECTION Not easy to detect Easier than steganography Easier than steganography STRENGTH Hides message without altering the message, it conceals information IMPERCEPTIBILITY High High High APPLICABILITY Universally Universally Universally

Editor's Notes

  1. t