SlideShare a Scribd company logo
1 of 12
Steganography Project
Shivam
Vatshayan
CONTENT
● Introduction
● Example
● Advantage
● Disadvantage
● Techniques
● Image Steganography
● Proposed Model
● References
INTRODUCTION
Steganography is the technique of hiding secret data within an ordinary, non-secret, file
or message in order to avoid detection; the secret data is then extracted at its destination.
● The use of steSteganography is the technique of hiding secret data within an
ordinary, non-secret, file or message in order to avoid detection; the secret data is
then extracted at its destination.
● The use of steganography can be comSteganography is the technique of hiding
secret data within an ordinary, non-secret, file or message in order to avoid detection;
the secret data is then extracted at its destination.
● The use of steSteganography is the technique of hiding secret data within an
ordinary, non-secret, file or message in order to avoid detection; the secret data is
then extracted at its destination.
● The use of steganography can be combined with encryption as an extra step for
PICTORIAL REPRESENTATION
EXAMPLE
There are many ways to conceal information using Steganography. The most common method is by
embedding information into digital images. We all know that digital images say, a JPEG image, contains
several megabytes of data in the form of pixels.
ADVANTAGES
● Difficult to Detect
● Only Receiver can Detect
● It can done faster through large no. of softwares
● Important communication exchange
● Provides better security through LAN, MAN, WAN
● Can be applied differently with audio, video and Image.
● Hide data over encryption is that it helps obscure the fact that there is sensitive data
hidden in the file or other content carrying the hidden text.
DISADVANTAGES
● Only Small size of photos can conceal
● Breaking down of software or server can replicate the Data
● Suspicious Activity Inclusion
● Invalidate Signatures
● Invalidate Hashing
STEGANOGRAPHY TECHNIQUES
● Text Steganography
● Image Steganography
● Video Steganography
● Audio Steganography
● Network Steganography
IMAGE STEGANOGRAPHY
Hiding the data by taking the cover object as the image is known as image steganography. In digital
steganography, images are widely used cover source because there are a huge number of bits present in the
digital representation of an image. There are a lot of ways to hide information inside an image.
● Least Significant Bit Insertion
● Masking and Filtering
● Redundant Pattern Encoding
PROPOSED MODEL
CONCLUSION
● This Software will be Harder and more complex
● Any Shape and Size Image will Hide and Carry Message
● Less Data Reduction
● Image Communication with less time and space complexity
● Active and passive attacks will not easily able to break down the system
REFERENCES
● https://en.wikipedia.org/wiki/Steganography
● https://www.ukessays.com/essays/computer-science/the-types-and-techniques-of-
steganography-computer-science-essay.php
● https://www.ques10.com/p/33259/explain-steganography-and-its-types/
● https://searchsecurity.techtarget.com/definition/steganography#:~:text=Steganograph
y%20is%20the%20technique%20of,for%20hiding%20or%20protecting%20data.
● https://www.spiedigitallibrary.org/conference-proceedings-of-
spie/6074/60740G/Wireless-steganography/10.1117/12.650263.short?SSO=1

More Related Content

Similar to Steganography Project.pptx

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 

Similar to Steganography Project.pptx (20)

Steganograpy
SteganograpySteganograpy
Steganograpy
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
HACKING
HACKINGHACKING
HACKING
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 

Steganography Project.pptx

  • 2. CONTENT ● Introduction ● Example ● Advantage ● Disadvantage ● Techniques ● Image Steganography ● Proposed Model ● References
  • 3. INTRODUCTION Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. ● The use of steSteganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. ● The use of steganography can be comSteganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. ● The use of steSteganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. ● The use of steganography can be combined with encryption as an extra step for
  • 5. EXAMPLE There are many ways to conceal information using Steganography. The most common method is by embedding information into digital images. We all know that digital images say, a JPEG image, contains several megabytes of data in the form of pixels.
  • 6. ADVANTAGES ● Difficult to Detect ● Only Receiver can Detect ● It can done faster through large no. of softwares ● Important communication exchange ● Provides better security through LAN, MAN, WAN ● Can be applied differently with audio, video and Image. ● Hide data over encryption is that it helps obscure the fact that there is sensitive data hidden in the file or other content carrying the hidden text.
  • 7. DISADVANTAGES ● Only Small size of photos can conceal ● Breaking down of software or server can replicate the Data ● Suspicious Activity Inclusion ● Invalidate Signatures ● Invalidate Hashing
  • 8. STEGANOGRAPHY TECHNIQUES ● Text Steganography ● Image Steganography ● Video Steganography ● Audio Steganography ● Network Steganography
  • 9. IMAGE STEGANOGRAPHY Hiding the data by taking the cover object as the image is known as image steganography. In digital steganography, images are widely used cover source because there are a huge number of bits present in the digital representation of an image. There are a lot of ways to hide information inside an image. ● Least Significant Bit Insertion ● Masking and Filtering ● Redundant Pattern Encoding
  • 11. CONCLUSION ● This Software will be Harder and more complex ● Any Shape and Size Image will Hide and Carry Message ● Less Data Reduction ● Image Communication with less time and space complexity ● Active and passive attacks will not easily able to break down the system
  • 12. REFERENCES ● https://en.wikipedia.org/wiki/Steganography ● https://www.ukessays.com/essays/computer-science/the-types-and-techniques-of- steganography-computer-science-essay.php ● https://www.ques10.com/p/33259/explain-steganography-and-its-types/ ● https://searchsecurity.techtarget.com/definition/steganography#:~:text=Steganograph y%20is%20the%20technique%20of,for%20hiding%20or%20protecting%20data. ● https://www.spiedigitallibrary.org/conference-proceedings-of- spie/6074/60740G/Wireless-steganography/10.1117/12.650263.short?SSO=1