SlideShare a Scribd company logo
CYBER
SECURITY
BITS EDU CAMPUS
COMPUTER SCIENCE DEPARTMENT
TOPIC:
STEGANOGRAPHY
Prepared by:
Shruti Ghelani-140050107031
Taha Malampattiwala-140050107052
Jinal Mayavanshi-140050107056
INFORMATION HIDING
• Information Hiding is a branch of computer science that deals with
concealing the existence of a message
• It is related to cryptography whose intent is to render messages
unreadable except by the intended recipients
• It employs technologies from numerous science disciplines:
• Digital Signal Processing (Images, Audio, Video)
• Cryptography
• Information TheoryCoding Theory
• Data Compression
• Human Visual/Auditory perception
• There are four primary sub-disciplines of Information Hiding
• Steganography
• Watermarking
• Covert Channels
• Anonymity
• Alice and Bob
• Classical names given to the parties wishing to communicate
• Sometimes, you may have a Carol and a Dave
• Eve, an adversary, can listen to but not modify or forge a message
• (think passive eavesdropping)
• Wendy the Warden, another adversary, can monitor, modify, or forge a
message
• A passive warden simply listens (like Eve)
• An active warden may modify a message
• A malicious warden may forge a fake message
BASIC TERMINOLOGY
What is Steganography?
def’n:
the art and science of hiding information by
embedding it in some other data.
cryptography - render message unintelligible
steganography - conceal the existence of the message
• Steganography literally means “covered writing”
• A stegosaurus has a covered back
• Steganography’s primary goal is to hide data within some other data such that
the hidden data cannot be detected even if it is being sought
• Secondary goals:
• prevent extraction from the cover file without destroying the cover
• prevent destruction of the stego-message without destroying the cover
• Most frequently, steganography is applied to images, but many other data or
file types are possible
• Audio
• Video
• Text
• Executable programs
The cover provides a host for transporting the hidden info.
info
embed
-file
extract
info
Digital Steganography
• HTML message as cover?
• computer program as cover?
• network protocol headers
• white space in text
• unused space in buffer
• least significant bits of image
• slight distortion in sound file
• “Easter eggs”
Steganography in Images
Two types of compression:
• lossless (gif)
• lossy (jpeg)
Sometimes concealed message inserted as a comment.
Sometimes the accuracy of the image is sacrificed slightly.
Common Tools
• StegoDOS
• White Noise Storm
• S-tools
• Outguess
• Steghide
APPLICATIONS OF INFORMATION
HIDING• Covert military communications
• Covert police communications
• Criminals have learned that police are nearby when they hear encrypted
communications, so they abate their activity for the moment
• A steganographic system would prevent this detection
• Digital Rights Management – protecting intellectual property such as
images, music, electronic books, etc.
• Embedding textual data in medical images would better ensure that the
picture belongs to a particular patient
• This technique could apply to personal pictures, sounds, and movies
• Tamper proofing – ensuring a data file has not been changed
• Communicating in an oppressive country w/o free speech
NEFARIOUS APPLICATIONS OF INFORMATION HIDING
• You won’t find these applications in the book
• money laundering
• drug running
• child pornography
• spying (good or bad depending upon which side you’re on!)
• terrorism
• Unfortunately, these uses are also possible
• The technology itself isn’t bad, but like many things, it can be (and is)
abused
• Since there are nefarious uses, law enforcement and the military is also
interested in understanding hiding techniques and detecting hidden data
• There are some projects right here at UTSA that have done research for the
Air Force
STEGANALYSIS
• Steganalysis is the detection of data that has been hidden
• It is a cat and mouse game – as one group of researchers come up with
better ways to hide stuff, another group figures out how to detect it or
perhaps just destroy it
• In the summer course last year, one student thought he had a hiding system
that was undetectable
• His lab partner wrote a statistical analysis program that exposed the
hidden message
• The first student modified his program to defeat the attack
• His lab partner modified his analyzer and still found the message
THANKYOU.

More Related Content

What's hot

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
SteganographySteganography
Steganography
Mayank Saxena
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography
SteganographySteganography
Steganography
Neha Sharma
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
steganography
steganographysteganography
steganography
Manika Arora
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Steganography
SteganographySteganography
Steganography
Khushbu Chudasama
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
Om Vishnoi
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
Honeyennyl
 

What's hot (20)

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
steganography
steganographysteganography
steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
HENI BHUNGALIA
 
Cox&king manendra shukla
Cox&king manendra shuklaCox&king manendra shukla
Cox&king manendra shukla
Manendra Shukla
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Vikas Sharma
 
Cox and kings project
Cox and kings projectCox and kings project
Cox and kings project
Muskan Asnani
 
Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)
guest28c6d
 
Internship report
Internship reportInternship report
Internship report
Sajjad Ashraf
 

Viewers also liked (8)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Cox&king manendra shukla
Cox&king manendra shuklaCox&king manendra shukla
Cox&king manendra shukla
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Cox and kings project
Cox and kings projectCox and kings project
Cox and kings project
 
Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)Brand Strategy For Cox & Kings (1)
Brand Strategy For Cox & Kings (1)
 
Internship report
Internship reportInternship report
Internship report
 

Similar to Steganography ppt

Steganography
SteganographySteganography
Steganography
SteganographySteganography
Steganography
ShawaizBajwa
 
Sujit
SujitSujit
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
ekta sharma
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
Vaibhav Khanna
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENS
justtest10
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptx
justtest10
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debate
Kristine Hejna
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
nCircle - a Tripwire Company
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
James Eglinton
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
Brijesh Kukreja
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
Damir Delija
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
Viral Parmar
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
Matt Imrie
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
Milap Oza
 
Threats
ThreatsThreats
Threats
sbmiller87
 

Similar to Steganography ppt (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Sujit
SujitSujit
Sujit
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENS
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptx
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debate
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
Steganography
SteganographySteganography
Steganography
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Threats
ThreatsThreats
Threats
 

More from Taha Malampatti

Lex & yacc
Lex & yaccLex & yacc
Lex & yacc
Taha Malampatti
 
Cultural heritage tourism
Cultural heritage tourismCultural heritage tourism
Cultural heritage tourism
Taha Malampatti
 
Request dispacther interface ppt
Request dispacther interface pptRequest dispacther interface ppt
Request dispacther interface ppt
Taha Malampatti
 
Introduction to Android ppt
Introduction to Android pptIntroduction to Android ppt
Introduction to Android ppt
Taha Malampatti
 
Intodcution to Html
Intodcution to HtmlIntodcution to Html
Intodcution to Html
Taha Malampatti
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to php
Taha Malampatti
 
Database Connectivity in PHP
Database Connectivity in PHPDatabase Connectivity in PHP
Database Connectivity in PHP
Taha Malampatti
 
Cox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial TrainingCox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial Training
Taha Malampatti
 
An application of 8085 register interfacing with LCD
An application  of 8085 register interfacing with LCDAn application  of 8085 register interfacing with LCD
An application of 8085 register interfacing with LCD
Taha Malampatti
 
An application of 8085 register interfacing with LED
An application  of 8085 register interfacing with LEDAn application  of 8085 register interfacing with LED
An application of 8085 register interfacing with LED
Taha Malampatti
 
Java Virtual Machine
Java Virtual MachineJava Virtual Machine
Java Virtual Machine
Taha Malampatti
 
The sunsparc architecture
The sunsparc architectureThe sunsparc architecture
The sunsparc architecture
Taha Malampatti
 
Orthogonal Projection
Orthogonal ProjectionOrthogonal Projection
Orthogonal Projection
Taha Malampatti
 
Apple inc
Apple incApple inc
Apple inc
Taha Malampatti
 
Blood donation
Blood donationBlood donation
Blood donation
Taha Malampatti
 
Compressors and its applications
Compressors and its applicationsCompressors and its applications
Compressors and its applications
Taha Malampatti
 
Laws Of Gravitation
Laws Of GravitationLaws Of Gravitation
Laws Of Gravitation
Taha Malampatti
 

More from Taha Malampatti (17)

Lex & yacc
Lex & yaccLex & yacc
Lex & yacc
 
Cultural heritage tourism
Cultural heritage tourismCultural heritage tourism
Cultural heritage tourism
 
Request dispacther interface ppt
Request dispacther interface pptRequest dispacther interface ppt
Request dispacther interface ppt
 
Introduction to Android ppt
Introduction to Android pptIntroduction to Android ppt
Introduction to Android ppt
 
Intodcution to Html
Intodcution to HtmlIntodcution to Html
Intodcution to Html
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to php
 
Database Connectivity in PHP
Database Connectivity in PHPDatabase Connectivity in PHP
Database Connectivity in PHP
 
Cox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial TrainingCox and Kings Pvt Industrial Training
Cox and Kings Pvt Industrial Training
 
An application of 8085 register interfacing with LCD
An application  of 8085 register interfacing with LCDAn application  of 8085 register interfacing with LCD
An application of 8085 register interfacing with LCD
 
An application of 8085 register interfacing with LED
An application  of 8085 register interfacing with LEDAn application  of 8085 register interfacing with LED
An application of 8085 register interfacing with LED
 
Java Virtual Machine
Java Virtual MachineJava Virtual Machine
Java Virtual Machine
 
The sunsparc architecture
The sunsparc architectureThe sunsparc architecture
The sunsparc architecture
 
Orthogonal Projection
Orthogonal ProjectionOrthogonal Projection
Orthogonal Projection
 
Apple inc
Apple incApple inc
Apple inc
 
Blood donation
Blood donationBlood donation
Blood donation
 
Compressors and its applications
Compressors and its applicationsCompressors and its applications
Compressors and its applications
 
Laws Of Gravitation
Laws Of GravitationLaws Of Gravitation
Laws Of Gravitation
 

Recently uploaded

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 

Recently uploaded (20)

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 

Steganography ppt

  • 2. TOPIC: STEGANOGRAPHY Prepared by: Shruti Ghelani-140050107031 Taha Malampattiwala-140050107052 Jinal Mayavanshi-140050107056
  • 3. INFORMATION HIDING • Information Hiding is a branch of computer science that deals with concealing the existence of a message • It is related to cryptography whose intent is to render messages unreadable except by the intended recipients • It employs technologies from numerous science disciplines: • Digital Signal Processing (Images, Audio, Video) • Cryptography • Information TheoryCoding Theory • Data Compression • Human Visual/Auditory perception • There are four primary sub-disciplines of Information Hiding • Steganography • Watermarking • Covert Channels • Anonymity
  • 4. • Alice and Bob • Classical names given to the parties wishing to communicate • Sometimes, you may have a Carol and a Dave • Eve, an adversary, can listen to but not modify or forge a message • (think passive eavesdropping) • Wendy the Warden, another adversary, can monitor, modify, or forge a message • A passive warden simply listens (like Eve) • An active warden may modify a message • A malicious warden may forge a fake message BASIC TERMINOLOGY
  • 5. What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible steganography - conceal the existence of the message
  • 6. • Steganography literally means “covered writing” • A stegosaurus has a covered back • Steganography’s primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought • Secondary goals: • prevent extraction from the cover file without destroying the cover • prevent destruction of the stego-message without destroying the cover • Most frequently, steganography is applied to images, but many other data or file types are possible • Audio • Video • Text • Executable programs
  • 7. The cover provides a host for transporting the hidden info. info embed -file extract info
  • 8. Digital Steganography • HTML message as cover? • computer program as cover? • network protocol headers • white space in text • unused space in buffer • least significant bits of image • slight distortion in sound file • “Easter eggs”
  • 9. Steganography in Images Two types of compression: • lossless (gif) • lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools • StegoDOS • White Noise Storm • S-tools • Outguess • Steghide
  • 10. APPLICATIONS OF INFORMATION HIDING• Covert military communications • Covert police communications • Criminals have learned that police are nearby when they hear encrypted communications, so they abate their activity for the moment • A steganographic system would prevent this detection • Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc. • Embedding textual data in medical images would better ensure that the picture belongs to a particular patient • This technique could apply to personal pictures, sounds, and movies • Tamper proofing – ensuring a data file has not been changed • Communicating in an oppressive country w/o free speech
  • 11. NEFARIOUS APPLICATIONS OF INFORMATION HIDING • You won’t find these applications in the book • money laundering • drug running • child pornography • spying (good or bad depending upon which side you’re on!) • terrorism • Unfortunately, these uses are also possible • The technology itself isn’t bad, but like many things, it can be (and is) abused • Since there are nefarious uses, law enforcement and the military is also interested in understanding hiding techniques and detecting hidden data • There are some projects right here at UTSA that have done research for the Air Force
  • 12. STEGANALYSIS • Steganalysis is the detection of data that has been hidden • It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it • In the summer course last year, one student thought he had a hiding system that was undetectable • His lab partner wrote a statistical analysis program that exposed the hidden message • The first student modified his program to defeat the attack • His lab partner modified his analyzer and still found the message