SlideShare a Scribd company logo
1 of 35
WATERMARKING VS STEGANOGRAPHY
TABLE OF CONTENT
 Information Security
 Watermarking
 Introduction
 Basics of Watermarking
 Properties of Watermarking
 Classification of Watermarking
 Attacks on Digital Image Watermarking
 Application of Watermarking
 Steganography
 Introduction
 Types of Steganography
 Steganography Terminology
 Factors affecting stegnographic method
 Application of Steganography
 Steganography Techniques
 Text Steganography techniques
 Audio Steganography
 Video Steganography
 Image Steganography
 Protocol Steganography
INFORMATION SECURITY
 Information security is a set of strategies
for managing the processes, tools and
policies necessary to prevent, detect,
document and counter threats to digital
and non-digital information. Info security
responsibilities include establishing a set
of business processes that will protect
information assets regardless of how the
information is formatted or whether it is
in transit, is being processed or is at rest
in storage.
WATERMARKING
 Digital watermarking is the process of embedding
secret digital data, signal into the digital media
such as image, video, audio and text.
 It provides security, data validation and copyright
protection of the digital data.
 The basic model of Digital Image Watermarking
consists of two parts:
 Watermark embedding
 Watermark extraction
PROPERTIES OF WATERMARKING
 Robustness
 Fidelity or Imperceptibility
 Capacity or Data payload
 Computation complexity
 Inevitability
CLASSIFICATION OF WATERMARKING
ATTACKS ON DIGITAL IMAGE
WATERMARKING
Geometric
attacks:
Non-Geometric
attacks:
APPLICATION OF WATERMARKING
 Digital Fingerprinting
 Tamper Detection
 Broadcast Monitoring
 Meta-data Insertion
 Content Archiving
 Copyright Protection
STEGANOGRAPHY
 Steganography is a Greek word which
means concealed writing. The word
“steganos” means “covered “ and
“graphial “ means “writing” .
 Steganography is not only the art of
hiding data but also hiding the fact of
transmission of secret data.
TYPES OF STEGANOGRAPHY
 Text Steganography
 Image Steganography
 Audio Steganography
 Video Steganography
 Network or Protocol Steganography
VARIOUS FACTORS
 Robustness
 Imperceptibility
 Payload Capacity
 PSNR (Peak Signal to Noise Ratio)
 MSE (Mean Square Error)
 SNR (Signal to Noise Ratio)
APPLICATION OF STEGANOGRAPHY
 Confidential communication and secret data storing
 Potential capability to hide the existence of confidential data
 Hardness of detecting the hidden (i.e., embedded) data
 Enhancing the secrecy of the encrypted data
 Protection of data alteration
 Access control system for digital content distribution
 Media Database systems
TEXT STEGANOGRAPHY TECHINIQUE
 Text Steganography can
involve anything from
changing the formatting of an
existing text, to changing
words within a text, to
generating random character
sequences or using context-
free grammars to generate
readable texts.
 it can be broadly classified into
three types:
 Format based
 Random and Statistical
generation
 Linguistic methods
FORMAT BASED STEGNOGRAPHY
 Character shifting
 Line-Shift
 Word Shift
 Feature Coding
 Open space methods
 Inter-sentence spacing
 Line spacing
 Inter word spacing
Figure showing Line-Shift steganography
Figure showing Word-Shift steganography
Figure showing Line-Spacing steganography
LINGUISTIC STEGANOGRAPHY
 Lexical Steganography
 Syntactic Steganography
RANDOM AND STATISTICAL GENERATION
 White Steganography
 SNOW Steganography
 Spam Text
 SMS-Texting
 SSCE (Secret Steganographic Code for Embedding)
 Word Mapping
 MS Word Document
 Cricket Match Scorecard
 CSS (Cascading Style Sheet)
AUDIO STEGANOGRAPHY
 The basic model of Audio steganography
consists of Carrier (Audio file), Message and
Password. Carrier is also known as a cover-
file, which conceals the secret information.
 The information hiding process consists of
following two steps.
 Identification of redundant bits in a cover-file.
Redundant bits are those bits that can be
modified without corrupting the quality or
destroying the integrity of the cover-file.
 To embed the secret information in the cover
file, the redundant bits in the cover file is
replaced by the bits of the secret information.
AUDIO STEGNOGRAPHY TECHNIQUES
 LSB CODING: Sampling technique followed by Quantization converts
analog audio signal to digital binary sequence.
Sampled Audio Stream (16 bit) ‘A’ in binary Audio stream with encoded message
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1010 0111 1111 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Sampling of the Sine Wave followed by Quantization process.
AUDIO STEGNOGRAPHY TECHNIQUES
 PARITY CODING:
AUDIO STEGNOGRAPHY TECHNIQUES
PHASE CODING
AUDIO STEGNOGRAPHY TECHNIQUES
SPREAD SPECTRUM
AUDIO STEGNOGRAPHY TECHNIQUES
ECHO HIDING
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY TECHNIQUES
 Least Significant Bit Modifications
 Masking And Filtering
VIDEO STEGANOGRAPHY TECHNIQUES
 Transformations
 Non-uniform rectangular partition
 Compressed video steganography
 Anti-forensics technique
IMAGE STEGANOGRAPHY
 A secret data is being embedded
inside a cover image to produce the
stego-image. A key is often needed
in the embedding process.
CLASSIFICATION OF IMAGE
STEGANOGRAPHY
Steganography in images are classified into two categories:
 Spatial-domain based Steganography
 In spatial domain scheme, the secret messages are embedded directly. The pixel
values are altered to get desired enhancement.
 This techniques are particularly useful for directly altering the values of individual
pixels and hence the overall contrast of the entire image.
 Transform domain based Steganography
 The transform domain Steganography technique is used for hiding a large
amount of data and provides high security, a Good invisibility and no loss of
secret message. The goal behind that is to hide information in frequency
domain by altering magnitude of all of discrete cosine transform (DCT)
coefficients of cover image.
IMAGE STEGANOGRAPHY TECHNIQUES
 Spatial-domain based Steganography
 Least significant bit (LSB)
 Pixel value differencing (PVD)
 Edges based data embedding method (EBE)
 Random pixel embedding method (RPE)
 Mapping pixel to hidden data method
 Labeling or connectivity method
 Pixel intensity based method
 Texture based method
 Histogram shifting methods
IMAGE STEGANOGRAPHY TECHNIQUES
 Transform domain based Steganography
 Discrete Fourier transformation technique (DFT)
 Discrete cosine transformation technique (DCT)
 Discrete Wavelet transformation technique (DWT)
 Integer Wavelet Transform (IWT)
 Discrete Curvelet Transform(DCVT)
PERFORMANCE COMPARISION
DIFFERENT IMAGE FORMATS
PROTOCOL STEGANOGRAPHY
 The term protocol steganography refers to the technique of embedding
information within messages and network control protocols used in network
transmission. There are covert channels in the layers of the OSI network model
where steganography can be used.
PROTOCOL STEGANOGRAPHY
TECHNIQUES
 HICCUPS
 LACK
 The voice packets stream is generated at the transmitter.
 One of the voice packets is chosen to be intentionally delayed.
 Chosen voice packets payload is replaced with steganogram and it is delayed.
 After the delay timer expires, delayed voice packet is sent to the receiver.
 Usual receiver treats excessively delayed voice packet as lost and it drops such packet.
 LACK-aware receiver extracts steganogram from delayed voice packet.
 RSTEG
PROTOCOL STEGANOGRAPHY
TECHNIQUES
 SCTP Multistreaming-based Method
 Sender wants to transmit following hidden bits: 10011100.
 First two hidden bits are 10, so a chunk within stream 3 is sent.
 Next a chunk within stream 2 is sent in order to transmit bits 01.
 Then a chunk within stream 4 - bits 11.
 Finally a chunk within stream 1 - bits 00.
 PADSTEG
 TRANSTEG
 For a chosen RTP voice stream, find a codec that will result in a similar voice quality but
smaller voice payload size than the originally selected.
 Then, transcode the voice stream.
 At this step, the original voice payload size is intentionally unaltered and the change of the
codec is not indicated. Instead, after placing the transcoded voice payload, the remaining
free space is filled with hidden data. If Secure Real-time Transport Protocol (SRTP) is utilized
for RTP streams, TranSteg detection is very difficult to perform.
THANKYOU!
QUESTIONS?

More Related Content

What's hot

Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESLovely Mnadal
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8RUpaliLohar
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)Suraj Dhalwar
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
Steganography Steganography
Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography.
Steganography.Steganography.
Steganography.
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and SteganographyPreeti Yadav
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 

Viewers also liked (12)

File000133
File000133File000133
File000133
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 

Similar to steganography and watermarking

DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumCSCJournals
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 

Similar to steganography and watermarking (20)

DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Steganography
SteganographySteganography
Steganography
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

steganography and watermarking

  • 2. TABLE OF CONTENT  Information Security  Watermarking  Introduction  Basics of Watermarking  Properties of Watermarking  Classification of Watermarking  Attacks on Digital Image Watermarking  Application of Watermarking  Steganography  Introduction  Types of Steganography  Steganography Terminology  Factors affecting stegnographic method  Application of Steganography  Steganography Techniques  Text Steganography techniques  Audio Steganography  Video Steganography  Image Steganography  Protocol Steganography
  • 3. INFORMATION SECURITY  Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Info security responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
  • 4. WATERMARKING  Digital watermarking is the process of embedding secret digital data, signal into the digital media such as image, video, audio and text.  It provides security, data validation and copyright protection of the digital data.  The basic model of Digital Image Watermarking consists of two parts:  Watermark embedding  Watermark extraction
  • 5. PROPERTIES OF WATERMARKING  Robustness  Fidelity or Imperceptibility  Capacity or Data payload  Computation complexity  Inevitability
  • 7. ATTACKS ON DIGITAL IMAGE WATERMARKING Geometric attacks: Non-Geometric attacks:
  • 8. APPLICATION OF WATERMARKING  Digital Fingerprinting  Tamper Detection  Broadcast Monitoring  Meta-data Insertion  Content Archiving  Copyright Protection
  • 9. STEGANOGRAPHY  Steganography is a Greek word which means concealed writing. The word “steganos” means “covered “ and “graphial “ means “writing” .  Steganography is not only the art of hiding data but also hiding the fact of transmission of secret data.
  • 10. TYPES OF STEGANOGRAPHY  Text Steganography  Image Steganography  Audio Steganography  Video Steganography  Network or Protocol Steganography
  • 11. VARIOUS FACTORS  Robustness  Imperceptibility  Payload Capacity  PSNR (Peak Signal to Noise Ratio)  MSE (Mean Square Error)  SNR (Signal to Noise Ratio)
  • 12. APPLICATION OF STEGANOGRAPHY  Confidential communication and secret data storing  Potential capability to hide the existence of confidential data  Hardness of detecting the hidden (i.e., embedded) data  Enhancing the secrecy of the encrypted data  Protection of data alteration  Access control system for digital content distribution  Media Database systems
  • 13. TEXT STEGANOGRAPHY TECHINIQUE  Text Steganography can involve anything from changing the formatting of an existing text, to changing words within a text, to generating random character sequences or using context- free grammars to generate readable texts.  it can be broadly classified into three types:  Format based  Random and Statistical generation  Linguistic methods
  • 14. FORMAT BASED STEGNOGRAPHY  Character shifting  Line-Shift  Word Shift  Feature Coding  Open space methods  Inter-sentence spacing  Line spacing  Inter word spacing Figure showing Line-Shift steganography Figure showing Word-Shift steganography Figure showing Line-Spacing steganography
  • 15. LINGUISTIC STEGANOGRAPHY  Lexical Steganography  Syntactic Steganography
  • 16. RANDOM AND STATISTICAL GENERATION  White Steganography  SNOW Steganography  Spam Text  SMS-Texting  SSCE (Secret Steganographic Code for Embedding)  Word Mapping  MS Word Document  Cricket Match Scorecard  CSS (Cascading Style Sheet)
  • 17. AUDIO STEGANOGRAPHY  The basic model of Audio steganography consists of Carrier (Audio file), Message and Password. Carrier is also known as a cover- file, which conceals the secret information.  The information hiding process consists of following two steps.  Identification of redundant bits in a cover-file. Redundant bits are those bits that can be modified without corrupting the quality or destroying the integrity of the cover-file.  To embed the secret information in the cover file, the redundant bits in the cover file is replaced by the bits of the secret information.
  • 18. AUDIO STEGNOGRAPHY TECHNIQUES  LSB CODING: Sampling technique followed by Quantization converts analog audio signal to digital binary sequence. Sampled Audio Stream (16 bit) ‘A’ in binary Audio stream with encoded message 1001 1000 0011 1100 0 1001 1000 0011 1100 1101 1011 0011 1000 1 1101 1011 0011 1001 1011 1100 0011 1101 1 1011 1100 0011 1101 1011 1111 0011 1100 0 1011 1111 0011 1100 1011 1010 0111 1111 0 1011 1010 0111 1110 1111 1000 0011 1100 1 1111 1000 0011 1101 1101 1100 0111 1000 0 1101 1100 0111 1000 1000 1000 0001 1111 1 1000 1000 0001 1111 Sampling of the Sine Wave followed by Quantization process.
  • 24. VIDEO STEGANOGRAPHY TECHNIQUES  Least Significant Bit Modifications  Masking And Filtering
  • 25. VIDEO STEGANOGRAPHY TECHNIQUES  Transformations  Non-uniform rectangular partition  Compressed video steganography  Anti-forensics technique
  • 26. IMAGE STEGANOGRAPHY  A secret data is being embedded inside a cover image to produce the stego-image. A key is often needed in the embedding process.
  • 27. CLASSIFICATION OF IMAGE STEGANOGRAPHY Steganography in images are classified into two categories:  Spatial-domain based Steganography  In spatial domain scheme, the secret messages are embedded directly. The pixel values are altered to get desired enhancement.  This techniques are particularly useful for directly altering the values of individual pixels and hence the overall contrast of the entire image.  Transform domain based Steganography  The transform domain Steganography technique is used for hiding a large amount of data and provides high security, a Good invisibility and no loss of secret message. The goal behind that is to hide information in frequency domain by altering magnitude of all of discrete cosine transform (DCT) coefficients of cover image.
  • 28. IMAGE STEGANOGRAPHY TECHNIQUES  Spatial-domain based Steganography  Least significant bit (LSB)  Pixel value differencing (PVD)  Edges based data embedding method (EBE)  Random pixel embedding method (RPE)  Mapping pixel to hidden data method  Labeling or connectivity method  Pixel intensity based method  Texture based method  Histogram shifting methods
  • 29. IMAGE STEGANOGRAPHY TECHNIQUES  Transform domain based Steganography  Discrete Fourier transformation technique (DFT)  Discrete cosine transformation technique (DCT)  Discrete Wavelet transformation technique (DWT)  Integer Wavelet Transform (IWT)  Discrete Curvelet Transform(DCVT)
  • 32. PROTOCOL STEGANOGRAPHY  The term protocol steganography refers to the technique of embedding information within messages and network control protocols used in network transmission. There are covert channels in the layers of the OSI network model where steganography can be used.
  • 33. PROTOCOL STEGANOGRAPHY TECHNIQUES  HICCUPS  LACK  The voice packets stream is generated at the transmitter.  One of the voice packets is chosen to be intentionally delayed.  Chosen voice packets payload is replaced with steganogram and it is delayed.  After the delay timer expires, delayed voice packet is sent to the receiver.  Usual receiver treats excessively delayed voice packet as lost and it drops such packet.  LACK-aware receiver extracts steganogram from delayed voice packet.  RSTEG
  • 34. PROTOCOL STEGANOGRAPHY TECHNIQUES  SCTP Multistreaming-based Method  Sender wants to transmit following hidden bits: 10011100.  First two hidden bits are 10, so a chunk within stream 3 is sent.  Next a chunk within stream 2 is sent in order to transmit bits 01.  Then a chunk within stream 4 - bits 11.  Finally a chunk within stream 1 - bits 00.  PADSTEG  TRANSTEG  For a chosen RTP voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected.  Then, transcode the voice stream.  At this step, the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. If Secure Real-time Transport Protocol (SRTP) is utilized for RTP streams, TranSteg detection is very difficult to perform.