SlideShare a Scribd company logo
Steganography
NAME --Santu Chall
Roll No – 001130401005
Dept. – School of Education Technology
Course – Master in Multimedia Development
What is Steganography ?
• Comes from greek
‘steganos’ – covered
‘graphie’ – writing
• Steganography is the art and science of
writing hidden messages in such a way
that no one apart from the intended
recipient knows of the existence of the
message.
• Carrier: text, image, video, audio, etc.
Stegosaurus: a covered lizard
(but not a type of cryptography)
What is Computer Image
• Computer image is an array of pixels
• Pixels represent different light intensities
Are encoded as bit patterns
• Bit-depth
8bit grayscale – 256 levels of gray
24bit RGB – 16,777,216 million colors
Image Compression
• Lossy vs Lossless Compression
• Lossy (JPEG)
Discards excess image data, removes details that are too
small for human eye to differentiate.
Smaller file size.
• Lossless (TIF,BMP,GIF)
No loss of data, uncompressed image bit-by-bit identical
to original.
Larger file size.
Steganography Techniques
• Least-significant bit modifications(LSB)
• Masking and filtering
• Transformations
Least-significant bit
modifications(LSB)
• Most popular technique when dealing with
images
• Replaces least significant bits with the message
to be encoded
• Simple, but susceptible to lossy compression
and image manipulation
Uses of LSB
• Storing passwords and/or other confidential
information
• Covert communication of sensitive data
• Speculated uses in terrorist activities
• Being widely used to hide and/or transfer
illegal content
MASKING & FILTERING
• Masks secret data over the original
data by changing the luminance of
particular areas
• During masking, it embed the
message within significant bits of the
cover image
• Not susceptible to lossy techniques
because image manipulation does not
affect the secret message
Uses of MASKING & FILTERING
• Digital Watermarking – provides
identification pertaining to the owner;
i.e. license or copyright information
- Invisible vs Visible
• Fingerprinting – provides
identification of the user; used to
identify and track illegal use of
content
TRANSFORMATION
• Discrete cosine transformations
(DCT)
• Hiding in Frequency Domain
Uses of TRANSFORMATION
• Harder to implement
• More Robust against attack and
alteration
• Can be used in lossy compression
• Very Hard to detect as changes in
frequency domain are orders of
magnitude smaller than signal
Basics of Modern Steganography
fE: steganographic function "embedding"
fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
DETECTING STEGANOGRAPHY ON
IMAGE
• Most Steganography algorithm are used LSB.
• Uses the Stastical Analysis on the LSB.
• Detect the secret data using the DCT method
while using the loosy format picture.
DRAWBACKS and RECOVER FROM
STEGANOGRAPHY IN IMAGE
• Do not uses loosy compression technique .
• Do not resize images.
• Do not convert to an image to another
format image.
• Do not change the luminance of an image.
SUMMARY
• Steganography as a whole has existed in many
forms throughout much of history.
• Lossless compression of images with a great
deal of color variation work best as a cover
image to embed a message.
• Steganography can be used as beneficial tool
for privacy
1.http://en.wikipedia.org/wiki/Steganography
2.http://www.jjtc.com/stegdoc/index.html
3. C. Kurak, J. McHugh, "A Cautionary Note On
Image Downgrading," IEEE Eighth Annual Computer Security
Applications Conference, 1992.

More Related Content

Similar to SteganographyonImage.ppt

8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptakashkr0802
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.pptRobertCarreonBula
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganographyMrMoliya
 

Similar to SteganographyonImage.ppt (20)

8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 

Recently uploaded

一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单vcaxypu
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...correoyaya
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单enxupq
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIAlejandraGmez176757
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .NABLAS株式会社
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样axoqas
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxbenishzehra469
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesStarCompliance.io
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationBoston Institute of Analytics
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...elinavihriala
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sMAQIB18
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单vcaxypu
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单ewymefz
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单ewymefz
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatheahmadsaood
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhArpitMalhotra16
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Subhajit Sahu
 

Recently uploaded (20)

一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 

SteganographyonImage.ppt

  • 1. Steganography NAME --Santu Chall Roll No – 001130401005 Dept. – School of Education Technology Course – Master in Multimedia Development
  • 2. What is Steganography ? • Comes from greek ‘steganos’ – covered ‘graphie’ – writing • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. • Carrier: text, image, video, audio, etc. Stegosaurus: a covered lizard (but not a type of cryptography)
  • 3. What is Computer Image • Computer image is an array of pixels • Pixels represent different light intensities Are encoded as bit patterns • Bit-depth 8bit grayscale – 256 levels of gray 24bit RGB – 16,777,216 million colors
  • 4. Image Compression • Lossy vs Lossless Compression • Lossy (JPEG) Discards excess image data, removes details that are too small for human eye to differentiate. Smaller file size. • Lossless (TIF,BMP,GIF) No loss of data, uncompressed image bit-by-bit identical to original. Larger file size.
  • 5. Steganography Techniques • Least-significant bit modifications(LSB) • Masking and filtering • Transformations
  • 6. Least-significant bit modifications(LSB) • Most popular technique when dealing with images • Replaces least significant bits with the message to be encoded • Simple, but susceptible to lossy compression and image manipulation
  • 7. Uses of LSB • Storing passwords and/or other confidential information • Covert communication of sensitive data • Speculated uses in terrorist activities • Being widely used to hide and/or transfer illegal content
  • 8. MASKING & FILTERING • Masks secret data over the original data by changing the luminance of particular areas • During masking, it embed the message within significant bits of the cover image • Not susceptible to lossy techniques because image manipulation does not affect the secret message
  • 9. Uses of MASKING & FILTERING • Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs Visible • Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 10. TRANSFORMATION • Discrete cosine transformations (DCT) • Hiding in Frequency Domain
  • 11. Uses of TRANSFORMATION • Harder to implement • More Robust against attack and alteration • Can be used in lossy compression • Very Hard to detect as changes in frequency domain are orders of magnitude smaller than signal
  • 12. Basics of Modern Steganography fE: steganographic function "embedding" fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  • 13. DETECTING STEGANOGRAPHY ON IMAGE • Most Steganography algorithm are used LSB. • Uses the Stastical Analysis on the LSB. • Detect the secret data using the DCT method while using the loosy format picture.
  • 14. DRAWBACKS and RECOVER FROM STEGANOGRAPHY IN IMAGE • Do not uses loosy compression technique . • Do not resize images. • Do not convert to an image to another format image. • Do not change the luminance of an image.
  • 15. SUMMARY • Steganography as a whole has existed in many forms throughout much of history. • Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. • Steganography can be used as beneficial tool for privacy
  • 16. 1.http://en.wikipedia.org/wiki/Steganography 2.http://www.jjtc.com/stegdoc/index.html 3. C. Kurak, J. McHugh, "A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992.