This document provides an overview of steganography, including its history and various techniques. It discusses steganography in text, images, and audio files. Text steganography can hide messages by making minor spelling or grammatical changes. Image steganography embeds data in the least significant bit of image pixels. Audio steganography utilizes properties of human hearing to conceal messages. The document also covers applications, tools, and the future potential of steganography.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
This document discusses enhancing data hiding capacity in audio steganography. It begins by introducing steganography and its use of hiding secret information in carrier files like images, audio and video. Specifically for audio steganography, it hides data in the least significant bits of audio files. The document proposes a method to enhance capacity by using the last 4 least significant bits instead of just 1, allowing more data to be hidden. It describes the basic process of audio steganography including embedding a secret message into an audio file using a key, and then extracting the message from the stego file at the receiving end.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
It is mainly focused today to transfer the messages secretly between two communication parties. The message from the sender to receiver should be kept secret so that the information should not known by anyone. Secret is the important thing today. The technique that is used for secure communication is called as steganography and it means that to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. In this paper will discuss about secret transformation of audio messages. The audio messages are hidden inside a cover image so no one can hack the audio but the audio should be encrypted before hidden inside the image
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
Multimedia Steganography with Cipher Text and Compression
This document discusses steganography techniques for hiding secret messages in various media formats. It describes how to embed messages in text, audio, images, and video files. For text, it explains using data compression like Huffman coding. Audio steganography slightly alters the binary sequence of sound files. Image steganography uses lossless compression to maintain image integrity while embedding data. Video steganography conceals any file within a carrier video. Statistical analysis can detect hidden messages by analyzing frequency distributions in covered files for abnormal patterns introduced during encoding.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
This document discusses enhancing data hiding capacity in audio steganography. It begins by introducing steganography and its use of hiding secret information in carrier files like images, audio and video. Specifically for audio steganography, it hides data in the least significant bits of audio files. The document proposes a method to enhance capacity by using the last 4 least significant bits instead of just 1, allowing more data to be hidden. It describes the basic process of audio steganography including embedding a secret message into an audio file using a key, and then extracting the message from the stego file at the receiving end.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
It is mainly focused today to transfer the messages secretly between two communication parties. The message from the sender to receiver should be kept secret so that the information should not known by anyone. Secret is the important thing today. The technique that is used for secure communication is called as steganography and it means that to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. In this paper will discuss about secret transformation of audio messages. The audio messages are hidden inside a cover image so no one can hack the audio but the audio should be encrypted before hidden inside the image
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
Multimedia Steganography with Cipher Text and Compression
This document discusses steganography techniques for hiding secret messages in various media formats. It describes how to embed messages in text, audio, images, and video files. For text, it explains using data compression like Huffman coding. Audio steganography slightly alters the binary sequence of sound files. Image steganography uses lossless compression to maintain image integrity while embedding data. Video steganography conceals any file within a carrier video. Statistical analysis can detect hidden messages by analyzing frequency distributions in covered files for abnormal patterns introduced during encoding.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Analysis Of Different Types Of SteganographyScott Donald
This document analyzes different types of steganography and the techniques used to embed secret messages in various cover media. It discusses how steganography has evolved from ancient times using physical objects like slaves to modern digital steganography. It classifies steganography based on the cover media used - text, images, audio and video. For each type, it describes the various embedding techniques like LSB insertion for images and modifying frequencies for audio. The document provides an overview of the history and methods of steganography.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes an academic paper on audio steganography techniques using discrete wavelet transformation (DWT) and discrete cosine transformation (DCT). It begins with an abstract of the paper and an introduction to steganography. It then covers classifications of steganography, advantages and disadvantages of audio steganography, applications, and requirements of efficient steganography techniques. Finally, it discusses features of the human auditory system important for audio steganography and describes various audio steganography techniques in both the time and frequency domains.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
Steganography is the art of hiding secret messages within other files so that the existence of the message is concealed. There are various types of steganography that can be used to hide messages in images, audio, video, and text files. The document discusses different steganography techniques such as least significant bit encoding to modify pixel values in images or audio samples. It also compares steganography to encryption, noting that encryption disguises message content while steganography disguises the existence of the message itself.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
Steganography is the art and science of hiding communication. It works by embedding messages within other files like images, audio, or video in a way that is imperceptible or unintelligible without special software. Digital steganography techniques include hiding messages in the lowest bits of noisy files or exploiting redundancies in instruction sets. Detection of steganography, called steganalysis, works by comparing files to known originals or looking for artifacts and signatures of known steganography applications through hashing files.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
The document summarizes an evaluation of different image-based steganography methods. It discusses how steganography works by hiding messages in digital carriers like images and audio files. Seven steganography methods were implemented that manipulate the least significant bits of pixel values or rearrange colors to encode hidden messages. The document also provides background on digital images, describing how they are composed of pixels indexed by x and y coordinates, and how spatial resolution and sampling affect image quality.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
The document discusses steganography, which is the practice of hiding secret messages within other files like images, audio, or video. Some key points covered include:
- Steganography works by replacing bits of unused data in cover files with hidden information.
- Common techniques involve hiding data in the least significant bits of images, masking data in audio files, or embedding data in the headers of network packets.
- Tools exist to perform steganography using various file types, with some providing encryption before hiding the data.
- While steganography keeps the very existence of messages secret, it has disadvantages like low data hiding capacity compared to cryptography. The best security combines both steganography and cryptography.
This document summarizes different types of steganography including image, audio, and video steganography. It describes steganography as hiding a secret message within an ordinary file like an image, audio, or video. For image steganography, it discusses the least significant bit insertion method of hiding text or an image within another image. It also describes audio steganography techniques like least significant bit encoding and an application called STEGA that implements different steganography methods in Python.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Analysis Of Different Types Of SteganographyScott Donald
This document analyzes different types of steganography and the techniques used to embed secret messages in various cover media. It discusses how steganography has evolved from ancient times using physical objects like slaves to modern digital steganography. It classifies steganography based on the cover media used - text, images, audio and video. For each type, it describes the various embedding techniques like LSB insertion for images and modifying frequencies for audio. The document provides an overview of the history and methods of steganography.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes an academic paper on audio steganography techniques using discrete wavelet transformation (DWT) and discrete cosine transformation (DCT). It begins with an abstract of the paper and an introduction to steganography. It then covers classifications of steganography, advantages and disadvantages of audio steganography, applications, and requirements of efficient steganography techniques. Finally, it discusses features of the human auditory system important for audio steganography and describes various audio steganography techniques in both the time and frequency domains.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
Steganography is the art of hiding secret messages within other files so that the existence of the message is concealed. There are various types of steganography that can be used to hide messages in images, audio, video, and text files. The document discusses different steganography techniques such as least significant bit encoding to modify pixel values in images or audio samples. It also compares steganography to encryption, noting that encryption disguises message content while steganography disguises the existence of the message itself.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
Steganography is the art and science of hiding communication. It works by embedding messages within other files like images, audio, or video in a way that is imperceptible or unintelligible without special software. Digital steganography techniques include hiding messages in the lowest bits of noisy files or exploiting redundancies in instruction sets. Detection of steganography, called steganalysis, works by comparing files to known originals or looking for artifacts and signatures of known steganography applications through hashing files.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
The document summarizes an evaluation of different image-based steganography methods. It discusses how steganography works by hiding messages in digital carriers like images and audio files. Seven steganography methods were implemented that manipulate the least significant bits of pixel values or rearrange colors to encode hidden messages. The document also provides background on digital images, describing how they are composed of pixels indexed by x and y coordinates, and how spatial resolution and sampling affect image quality.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
The document discusses steganography, which is the practice of hiding secret messages within other files like images, audio, or video. Some key points covered include:
- Steganography works by replacing bits of unused data in cover files with hidden information.
- Common techniques involve hiding data in the least significant bits of images, masking data in audio files, or embedding data in the headers of network packets.
- Tools exist to perform steganography using various file types, with some providing encryption before hiding the data.
- While steganography keeps the very existence of messages secret, it has disadvantages like low data hiding capacity compared to cryptography. The best security combines both steganography and cryptography.
This document summarizes different types of steganography including image, audio, and video steganography. It describes steganography as hiding a secret message within an ordinary file like an image, audio, or video. For image steganography, it discusses the least significant bit insertion method of hiding text or an image within another image. It also describes audio steganography techniques like least significant bit encoding and an application called STEGA that implements different steganography methods in Python.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Similar to Steganography - Hiding in plain sight.pptx (20)
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
2. OverView
What is Steganography?
History Of Steganography
Physical And Digital techniques
Comparison Of Secret Communication Techniques
Steganography v/s Cryptography
Evolution
Basic Steganography Model
Steganography Terms
Types of StegoSystems
4. What is Steganography?
Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
The word steganography is of Greek origin and means
"concealed writing" from the Greek words steganos meaning
"covered or protected", and graphein meaning "writing".
“Steganography means hiding one piece of data within
another”.
5. Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
6. History Of Steganography
The first recorded uses of steganography can be traced back to 440 BC
when Herodotus mentions two examples of steganography in his Histories.
Demaratus sent a warning about a forthcoming attack to Greece by writing it
directly on the wooden backing of a wax tablet before applying its beeswax
surface.
Wax tablets were in common use then as reusable writing surfaces, sometimes
used for shorthand.
Ancient Chinese wrote messages on fine silk, which was then crunched into a
tiny ball and covered in wax. The messenger then swallowed the ball of wax.
Special “inks” were important steganographic tools even during Second World
War.
During Second World War a technique was developed to shrink photographically
a page of text into a dot less than one millimeter in diameter, and then hide this
microdot in an apparently innocuous letter. (The first microdot has been spotted
7. Physical Techniques
Physical Techniques
Hidden messages within wax tablets
Hidden messages on messenger's body
Hidden messages on paper written in secret inks
Messages written in Morse code on
knitting yarn and then knitted into a piece of
clothing worn by a courier
Messages written on envelopes in the area
covered by postage stamps.
8. Digital Techniques
Digital Techniques
Concealing messages within the lowest bits
of noisy images or sound files.
Chaffing and winnowing.
Modifying the echo of a sound file (Echo
Steganography)
Including data in ignored sections of a file, such as
after the logical end of the carrier file.
10. Steganography V/s Cryptography
Steganography Cryptography
Unknown message passing Known message passing
Steganography prevents discovery of the
very existence of communication
Encryption prevents an unauthorized party
from discovering the contents of a
communication
Little known technology Common technology
Technology still being develop for certain
formats
Most of algorithm known by all
Once detected message is known
Strong current algorithm are resistant to
attacks ,larger expensive computing power is
required for cracking
Steganography does not alter the structure Cryptography alter the structure of the secret
14. Steganography Terms
Carrier or Cover File - A Original message or a file in which
hidden information will be stored inside of it .
Stego-Medium - The medium in which the information is hidden.
Embedded or Payload - The information which is to be hidden
or concealed.
Steganalysis - The process of detecting hidden information
inside a file.
15. Types Of Stegosystems
There are three basic types of stegosystems
Pure stegosystems - no key is used.
Secret-key stegosystems - secret key is
used.
Public-key stegosystems - public key is
used
16. Text Steganography
Text steganography can be applied in the digital makeup format such as
PDF, digital watermark or information hiding
It is more difficult to realize the information hiding based on text. The
simplest method of information hiding is to select the cover first, adopt given
rules to add the phraseological or spelling mistakes, or replace with
synonymy words.
E.g 1] Textto setups some sentence structure in advance, fills in the empty
location by arranged words,
and then the text doesn’t have phraseological mistakes, but have some word
changes or morphology mistakes.
2] TextHide hides the information in the manner of text overwriting and words’
selection.
17. Text Steganography Methods
Text Steganography in Markup Languages[HTML]
Text Steganography in Specific characters in words
Line shifting Method
Word shifting
Open spaces
Semantic methods
Character Encoding
18. Examples of Text Steganography
An example of a message containing cipher text by
German Spy in World War II:
“Apparently neutral's protest is thoroughly discounted
And ignored. Isman hard hit. Blockade issue affects
Pretext for embargo on by products, ejecting suets and
Vegetable oils. ”
Taking the second letter in each word the following
message emerges:
Pershing sails from NY June 1.
19. Examples of Text Steganography
Minor changes to shapes of characters
21. Image Steganography
Using image files as hosts for steganographic messages takes advantage of the limited capabilities of the
human visual system
Some of the more common method for embedding messages in image files can be categorized into two
main groups, image domain methods and transform domain methods
22. Image And Transform Domain
Image – also known as spatial – domain techniques
embed messages in the intensity of the pixels directly,
while for transform – also known as frequency – domain,
images are first transformed and then the message is
embedded in the image
Image domain techniques encompass bit-wise methods
that apply bit insertion and noise manipulation and are
sometimes characterised as “simple systems”
Steganography in the transform domain involves the
manipulation of algorithms and image transforms
23. LSB [Least Significant bit]
Method
Least significant bit (LSB) insertion is a common, simple approach
to embedding information in a cover image
The least significant bit (in other words, the 8th bit) of some or all of
the bytes inside an image is changed to a bit of the secret
message
When using a 24-bit image, a bit of each of the red, green and blue
colour components can be used, since they are each represented
by a byte. In other words, one can store 3 bits in each pixel. An 800
× 600 pixel image, can thus store a total amount of 1,440,000 bits
or 180,000 bytes of embedded data
In its simplest form, LSB makes use of BMP images, since they
use lossless compression
24. Example Of LSB Method
A grid for 3 pixels of a 24-bit image can be as follows:
(00101101 00011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
When the number 200, which binary representation is 11001000, is
embedded into the least significant bits of this part of the image, the
resulting grid is as follows:
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
26. Audio Steganography
Embedding secret messages into digital sound is
known as
audio Steganography.
Audio Steganography methods can embed
messages in WAV, AU, and even MP3 sound files.
The properties of the human auditory system (HAS)
are exploited in the process of audio Steganography
27. Audio Steganography
To embed data secretly onto digital audio file there
are few techniques introduced :
LSB Coding
Phase Coding
Parity Coding
Spread Spectrum
29. Example of LSB Method
The message 'HEY' is encoded in
a 16-bit CD quality sample using
the LSB method.
Here the secret information is
‘HEY’ and the cover file is audio
file. HEY is to be embedded inside
the audio file. First the secret
information ‘HEY’ and the audio
file are converted into bit stream.
The least significant column of the
audio file is replaced by the bit
stream of sectet information ‘HEY’.
The resulting file after embedding
secret information ‘HEY’ is called
Stego-file.
30. Applications
Confidential communication and secret data
storing
Steganography provides us with:
Potential capability to hide the existence of confidential data
Hardness of detecting the hidden (i.e., embedded) data
Strengthening of the secrecy of the encrypted data
Protection of data alteration
Access control system for digital content
distribution
31. Applications
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligence services
33. Future Scope
Steganography, though is still a fairly new idea. There are constant
advancements in the computer field, suggesting advancements in the
field of steganography as well. It is likely that there will soon be more
efficient and more advanced techniques for Steganalysis. A hopeful
advancement is the improved sensitivity to small messages. Knowing
how difficult it is to detect the presence of a fairly large text file within an
image, imagine how difficult it is to detect even one or two sentences
embedded in an image! It is like finding a microscopic needle in the
ultimate haystack.
What is scary is that such a small file of only one or two sentences may
be all that is needed to commence a terrorist attack. In the future, it is
hoped that the technique of Steganalysis will advance such that it will
become much easier to detect even small messages within an image.
34. Conclusion
Interest in the use of steganography in our current digital age can be attributed to
both the desire of individuals to hide communication through a medium rife with
potential listeners, or in the case of digital watermarking, the absolute necessity of
maintaining control over one’s ownership and the integrity of data as it passes
through this medium. This increased interest is evidenced in the sheer number of
available tools to provide easy steganographic techniques to the end user, as well as
the proliferation of research and press on the topic.
The intent of this presentation was to cover some of the more common methods of
data hiding using widespread file formats and easily available tools as an introduction
,to the primary concepts of steganography. These discussions should serve as a
starting point to the exploration of more complex steganographic techniques
involving, for example, the use of network packets and unused hard disk space as
cover medium, or the more complex methodologies used on our standard image and
audio files.
35. References
http://en.wikipedia.org/wiki/Steganography
S. William, Cryptography and Network Security: Principles and Practice, 2nd
edition, Prentice-Hall, Inc., 1999 pp 23-50
Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using
Reference Image.
Bloom,J. A. et al., 2008. Digital watermarking and Steganography. 2nd edition
A. Westfield. "F5 - A Steganographic Algorithm: High Capacity Despite Better
Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302,
2001.
Hide & Seek: An Introduction to Steganography: Niles Provos and Peter
Honey man