SlideShare a Scribd company logo
1 of 29
Steganography a GREEK word it means covered or
secret writing
Stegan -- o -- graphy
Covered Writing
“The goal of steganography is to hide messages in such a
way that no one apart from the intended recipient even
knows that a message has been sent.”
STEGANOGRAPHY UNDER VARIOUS MEDIA
Steganography in “TEXT”
Steganography in “IMAGES”
Steganography in “AUDIO”
A steganography software tool allows a user to embedded
hidden data inside a carrier file, such as an image or video
and later extract that data.
Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
Example of Text
Steganography
An example of message containing cipher text by German Spy
in World War ||
“Apparently neutral’s protest is thoroughly discounted and
ignored . Isman hard hit. Blockade issue affects pretext for
embargo on by products, ejecting suets and vegetable oi/s”
Taking the second letter in each word the following message
emerges:
Pershing sails from NY June 1
Minor Change To
Shapes of Character
Steganography in Image
Using image files as hosts for steganography messages takes
advantage of the limited capabilities of the human visual system
Example Of image steganography
Original Image
Size 56.1KB
Encoded Image
Size 544KB
Hidden Message Is Cyber
security Welcomes You
Steps to Hide text in image
1. Open S-tools.
2. Select image in which we have to hide
text
with .bmp extension.
3. Drag the text file over the image.
4. Alert will come to enter the password
this
same password we have to enter when
end
person wants to reveal the message.
When user wants to reveal the
text.
1. Open the hidden data file.
2. Right click. Select reveal
enter the same password
that was used to hide the
text.
3. A prompt will be display.
With list of file hidden.
4. Save that file(Stegano.txt)
Steganography in Audio
To embed data secretly onto digital audio file there
are few techniques introduced :
– LSB Coding
– Phase Coding
– Parity Coding
– Spread Spectrum
Flowchart Of Audio
Steganography
Example of LSB Method
The message 'HEY' is encoded in
a 16-bit CD quality sample using
the LSB method.
Here the secret information is
‘HEY’ and the cover file is audio
file. HEY is to be embedded
inside the audio file. First the
secret information ‘HEY’ and the
audio file are converted into bit
stream.
The least significant column of
the audio file is replaced by the
bit stream of secret information
‘HEY’. The resulting file after
embedding secret information
‘HEY’ is called Stego-file.
Case On Real Life
Terrorist organizations have mastered the art of
combining steganography with encryption.
Presently most terrorist instructions are also carried out
this same way, but there has been an increase in the use
of photographic images used for steganography.
Others are hiding maps and photographs of terrorist
target and posting instruction for terrorist activities .
Combined Crypto
Steganography
EncryptionPlain Text Crypto Text Cover Image
Stegano Image
Cipher TextDecryptionPlain Text
Covered medium + Hidden data + Stego key = Stego Medium
Who Is He ?
Discussion Of Attack 9/11
According to U.S. officials, in early 2001 Osama
bin Laden posted steganographic material in
sports chat rooms and some other web sites
with instructions for terrorist activities.
US officials and expert say its the latest
method of communication being used by
Osama Bin Laden and his associates to outbox
law enforcement.
Dr Robert Koontz claimed that “CODED
IMAGES” shows plans for massive germs attack
on US killing millions.
Study of 9/11 attack
Says Ankit Fadia a 16 year old boy he was called in to help decrypt message
from Osama Bin Laden shortly after 9/11.
Boy stunned to see the kind of technology they used to communicate.
After 9/11 attack agencies had tracked some emails where few peoples were
frequently exchanging photographs of Canadian rockstar Avril Lavigne.
Steganography-hidden messages that used three customized encryption algorithm
They used technography [sic]to send messages
Digital Watermarking
A watermark is a form, image or text that is impressed onto
paper,
which provides evidence of its authenticity.
Visible Watermarking is used to indicate ownership and for
copyright protection.
Digital Watermarking can be considered as special technique
of steganography.
Life Cycle of Water Marking
Watermarking classification
Original Image
Our Watermark
Watermarked Image
Visible & Invisible Watermarking
Robust & Fragile watermarking
In Robust watermarking modification of watermarked content will not
affect watermark.
In Fragile watermarking watermark get destroyed when watermarked
content is modified or tampered.
Public & Private watermarking
In public watermarking users of content are authorized to detect
watermark.
In private watermarking users not authorized to detect watermark.
Asymmetric & Symmetric
watermarking
In Asymmetric watermarking different keys used for embedding and
detecting watermark.
In Symmetric watermarking same keys are used for embedding and
detecting watermarks.
Steganographic & Non steganographic
watermarking
In Steganographic watermarking user unaware of the presence of a
watermark.
In non steganographic watermarking user aware of the presence of a
watermark
Steganography v/s Watermarking
The main goal of steganography is to hide a message m in some audio or
video (cover) data d, to obtain new data d’ , practically indistinguishable
from d, by people in such a way that an eavesdropper cannot detect the
presence of m in d’.
The main goal of watermarking is to hide a message m in some audio or
video (cover) data d, to obtain new data d’, practically indistinguishable
from d , by people in such a way that an eavesdropper cannot remove or
replace m in d’.
Scenario of Steganography
Modern computer printers use steganography includes HP
& Xerox brand color laser printers.
These printers add tiny yellow dots to each page.
The dots contain encoded printer serial numbers & date &
time stamps.
E-mail Spoofing
A spoofed email is when the sender purposely alters parts of the email to masquerade
as though it was authored by someone else.
Commonly, the sender’s name/address and the body of the message are formatted to
appear from a legitimate source, as though the email came from a bank or a
newspaper or legitimate company on the Web.
Sometimes, the spoofer will make the email appear to come from a private citizen
somewhere.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the
main protocol used in sending e-mail, does not include an
authentication mechanism.
If the precaution is not taken, anyone with the requisite knowledge can connect to
the server and use it to send messages.
To send spoofed e-mail, senders insert commands in headers that will alter message
information.
It is possible to send a message that appears to be from anyone, anywhere, saying
whatever the sender wants it to say. Thus, someone could send spoofed e-mail that
appears to be from you with a message that you didn't write.
For example, spoofed e-mail may purport to be from someone in a position of
authority, asking for sensitive data, such as passwords, credit card numbers, or other
personal information -- any of which can be used for a variety of criminal purposes.
What is main goal
of Email Spoofing
Be aware of
1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure
2. Watch for Spoofed Email Addresses
Changing the name of the sender so that it does not match the sender’s
email address
3. Don’t Give Out Personal Information
4. Avoid Strange Attachments or Unfamiliar Links
5. Seem Too Good To Be True? It is.
Zmail open source software used to send fake mails
https://emkei.cz/
Thank You..!!

More Related Content

What's hot

Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themstuimrozsm
 
Novel steganography scheme using Arabic text features in Holy Quran
Novel steganography scheme using Arabic text features in Holy QuranNovel steganography scheme using Arabic text features in Holy Quran
Novel steganography scheme using Arabic text features in Holy QuranIJECEIAES
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 

What's hot (20)

About Steganography
About SteganographyAbout Steganography
About Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Stegnography
Stegnography Stegnography
Stegnography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
C0341117
C0341117C0341117
C0341117
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
Steganography Steganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
 
Novel steganography scheme using Arabic text features in Holy Quran
Novel steganography scheme using Arabic text features in Holy QuranNovel steganography scheme using Arabic text features in Holy Quran
Novel steganography scheme using Arabic text features in Holy Quran
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 

Similar to Steganography flooding

Similar to Steganography flooding (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Stenographgh[1]
Stenographgh[1]Stenographgh[1]
Stenographgh[1]
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
Steganography Steganography
Steganography
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Steganography flooding

  • 1. Steganography a GREEK word it means covered or secret writing Stegan -- o -- graphy Covered Writing
  • 2. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.” STEGANOGRAPHY UNDER VARIOUS MEDIA Steganography in “TEXT” Steganography in “IMAGES” Steganography in “AUDIO”
  • 3. A steganography software tool allows a user to embedded hidden data inside a carrier file, such as an image or video and later extract that data. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 4. Example of Text Steganography An example of message containing cipher text by German Spy in World War || “Apparently neutral’s protest is thoroughly discounted and ignored . Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oi/s” Taking the second letter in each word the following message emerges: Pershing sails from NY June 1
  • 5. Minor Change To Shapes of Character
  • 6. Steganography in Image Using image files as hosts for steganography messages takes advantage of the limited capabilities of the human visual system Example Of image steganography Original Image Size 56.1KB Encoded Image Size 544KB Hidden Message Is Cyber security Welcomes You
  • 7. Steps to Hide text in image 1. Open S-tools. 2. Select image in which we have to hide text with .bmp extension. 3. Drag the text file over the image. 4. Alert will come to enter the password this same password we have to enter when end person wants to reveal the message.
  • 8. When user wants to reveal the text. 1. Open the hidden data file. 2. Right click. Select reveal enter the same password that was used to hide the text. 3. A prompt will be display. With list of file hidden. 4. Save that file(Stegano.txt)
  • 9. Steganography in Audio To embed data secretly onto digital audio file there are few techniques introduced : – LSB Coding – Phase Coding – Parity Coding – Spread Spectrum
  • 11. Example of LSB Method The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  • 12. Case On Real Life Terrorist organizations have mastered the art of combining steganography with encryption. Presently most terrorist instructions are also carried out this same way, but there has been an increase in the use of photographic images used for steganography. Others are hiding maps and photographs of terrorist target and posting instruction for terrorist activities .
  • 13. Combined Crypto Steganography EncryptionPlain Text Crypto Text Cover Image Stegano Image Cipher TextDecryptionPlain Text Covered medium + Hidden data + Stego key = Stego Medium
  • 14. Who Is He ? Discussion Of Attack 9/11 According to U.S. officials, in early 2001 Osama bin Laden posted steganographic material in sports chat rooms and some other web sites with instructions for terrorist activities. US officials and expert say its the latest method of communication being used by Osama Bin Laden and his associates to outbox law enforcement. Dr Robert Koontz claimed that “CODED IMAGES” shows plans for massive germs attack on US killing millions.
  • 15. Study of 9/11 attack Says Ankit Fadia a 16 year old boy he was called in to help decrypt message from Osama Bin Laden shortly after 9/11. Boy stunned to see the kind of technology they used to communicate. After 9/11 attack agencies had tracked some emails where few peoples were frequently exchanging photographs of Canadian rockstar Avril Lavigne. Steganography-hidden messages that used three customized encryption algorithm They used technography [sic]to send messages
  • 16. Digital Watermarking A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Visible Watermarking is used to indicate ownership and for copyright protection. Digital Watermarking can be considered as special technique of steganography.
  • 17. Life Cycle of Water Marking
  • 19. Original Image Our Watermark Watermarked Image Visible & Invisible Watermarking
  • 20. Robust & Fragile watermarking In Robust watermarking modification of watermarked content will not affect watermark. In Fragile watermarking watermark get destroyed when watermarked content is modified or tampered. Public & Private watermarking In public watermarking users of content are authorized to detect watermark. In private watermarking users not authorized to detect watermark.
  • 21. Asymmetric & Symmetric watermarking In Asymmetric watermarking different keys used for embedding and detecting watermark. In Symmetric watermarking same keys are used for embedding and detecting watermarks. Steganographic & Non steganographic watermarking In Steganographic watermarking user unaware of the presence of a watermark. In non steganographic watermarking user aware of the presence of a watermark
  • 22. Steganography v/s Watermarking The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d’ , practically indistinguishable from d, by people in such a way that an eavesdropper cannot detect the presence of m in d’. The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d’, practically indistinguishable from d , by people in such a way that an eavesdropper cannot remove or replace m in d’.
  • 23. Scenario of Steganography Modern computer printers use steganography includes HP & Xerox brand color laser printers. These printers add tiny yellow dots to each page. The dots contain encoded printer serial numbers & date & time stamps.
  • 24. E-mail Spoofing A spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authored by someone else. Commonly, the sender’s name/address and the body of the message are formatted to appear from a legitimate source, as though the email came from a bank or a newspaper or legitimate company on the Web. Sometimes, the spoofer will make the email appear to come from a private citizen somewhere.
  • 25. E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes.
  • 26. What is main goal of Email Spoofing
  • 27. Be aware of 1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure 2. Watch for Spoofed Email Addresses Changing the name of the sender so that it does not match the sender’s email address 3. Don’t Give Out Personal Information 4. Avoid Strange Attachments or Unfamiliar Links 5. Seem Too Good To Be True? It is.
  • 28. Zmail open source software used to send fake mails https://emkei.cz/