The document provides an overview of steganography, which is the practice of hiding secret messages within other innocent messages or files. It discusses the differences between steganography and cryptography, various historical uses of steganography, and modern techniques such as hiding messages in digital images, audio, video and network traffic. The document also briefly outlines tools for steganography, challenges in steganalysis, and concludes with references for further information.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Steganography (US Listeni/ËstÉ.ÉĄĘnËÉË.ÉĄrĘ.fi/, UK /ËstÉÉĄ.ÉnËÉÉĄ.rÉ.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (ĎĎξγινĎĎ), meaning "covered, concealed, or protected", and graphein (ÎłĎÎŹĎξΚν) meaning "writing"
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography (US Listeni/ËstÉ.ÉĄĘnËÉË.ÉĄrĘ.fi/, UK /ËstÉÉĄ.ÉnËÉÉĄ.rÉ.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (ĎĎξγινĎĎ), meaning "covered, concealed, or protected", and graphein (ÎłĎÎŹĎξΚν) meaning "writing"
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
Â
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Â
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHJournal For Research
Â
Image segmentation is often used to distinguish the foreground from the background. Image segmentation is one of the difficult research problems in the machine vision industry and pattern recognition. Thresholding is a simple but effective method to separate objects from the background. A commonly used method, the Otsu method, improves the image segmentation effect obviously. It can be implemented by two different approaches: Iteration approach and Custom approach. In this paper both approaches has been implemented on MATLAB and give the comparison of them and show that both has given almost the same threshold value for segmenting image but the custom approach requires less computations. So if this method will be implemented on hardware in an optimized way then custom approach is the best option.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
Â
In todayâs scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient.
Steganography has been practised for thousands of years, but in the last two decades steganography has been introduced to digital media. Digital steganography techniques typically focus on hiding messages inside image and audio files; in comparison, the amount of research into other digital media formats (such as video) is substantially limited.
In this talk we will discuss the history of steganography and the categories of steganographic technique before briefly discussing image and audio steganography and how to build such tools. The main body of our talk will focus on how video files are coded and the steganographic techniques that can be used to hide messages inside video files.
The principles discussed in this talk will be illustrated with live demos.
Steganography and Its Applications in SecurityIJMER
Â
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using âmultimediaâ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
How to Become a Thought Leader in Your NicheLeslie Samuel
Â
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
Visual Cryptography Concepts like digital steganography, its principles, requirements, the operations involved, its generic model, the evolution of steganography, and about the types of steganography along with some examples. Also about digital watermarking, the requirements of digital water marking and the types of digital watermarking
This presentation provides an introduction to the Data hiding or Steganography topic, it also shows the types of Steganography, advantages and the related applications.
Information and network security 17 steganographyVaibhav Khanna
Â
Steganography is the practice of hiding a secret message inside of (or even on top of) something that is not secret. ... Or hiding a secret message or script inside of a Word or Excel document. The purpose of steganography is to conceal and deceive
Steganography in digital image processing is viewed as a future technology, in processing image and hidden techniques behind sending an image secretly by covering it up something.
With computers having GHz of processing speed, information / data either stored or in
transmission has become more and more vernalable to hostile eavesdropping, theft,
wiretapping etc. This urges us to devise new data hiding techniques to protect and secure data
of vital significance. Steganography is a method of securing data by obscuring the contents in
another media (called Cover) in which it is saved / transmitted. This doctorial thesis proposal will
present a new Steganographic Technique for hiding data in (ASCII) text files together with its
Software implementation, a research area in Steganography which is considered as
toughest among all, to address.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder â active learning and UiPath LLMs for do...UiPathCommunity
Â
đĽ Speed, accuracy, and scaling â discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningâ˘:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing â with little to no training required
Get an exclusive demo of the new family of UiPath LLMs â GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
đ¨âđŤ Andras Palfi, Senior Product Manager, UiPath
đŠâđŤ Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projectsâ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youâre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part âEssentials of Automationâ series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereâs what youâll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weâll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donât miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereâs more:
In a second workflow supporting the same use case, youâll see:
Your campaign sent to target colleagues for approval
If the âApproveâ button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butâif the âRejectâ button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an âinfrastructure container kubernetes guyâ, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefitâs both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. TABLE OF CONTENTS
⢠Introduction
⢠Different Than Cryptography
⢠Historical Perspective
⢠Steganography in Written Text
⢠Modern Steganography
⢠Text In Image
⢠Image in Image
⢠Audio & Video Steganography
⢠UV Watermarking
⢠Network Steganography
⢠Steganalysis
⢠Conclusion
⢠References
2
3. INTRODUCTION
⢠Derived from the Greek words steganos (ĎĎξγινĎĎ) meaning "covered or
protected," and graphei (ÎłĎÎąĎ ÎŽ) meaning "writing."
⢠It is the art of hiding stuff in stuff so that others canât see your stuff.
⢠Steganography is the practice of hiding data in other data in an effort to keep third
parties from knowing that the intended message is even there !
⢠Encryption's ugly step brother !
⢠It has art aspects since human judgment is involved.
⢠Principle : Principle Of Steganography.mp4
3
4. DIFFERENT THAN CRYPTOGRAPHY
⢠Cryptography is the essence to prepare a message in such a way that unauthorized
parties arenât able to understand it while as Steganography is the essence to
embed secret messages within seemingly innocent carriers such that unauthorized
parties are unaware of the communication.
⢠Cryptography provides privacy, Steganography is intended to provide secrecy.
⢠Steganography
ďâ hide, without altering
ďâ obfuscates the fact of communication, not the data
ďâ preventative - deters attacks
⢠Cryptography
ďâ alter, without hiding
ďâ obfuscates the data, not the fact of communication
ďâ curative - defends attacks
4
5. HISTORICAL PERSPECTIVE
⢠Dates back to 400 BC when Histaeus sent a message, by shaving the
head of his most trusted slave, then tattooed a message on the slave's
scalp, to his friend Aristagorus, urging revolt against the Persians.
⢠Demaratus tells Athens of Persiaâs attack plans by writing the secret
message on a tablet, & covers it with wax.
⢠Chinese wrote messages on silk and encased them in balls of wax. The
wax ball, "la wan," could then be hidden in the messenger.
⢠A more subtle method, nearly as old, is to use invisible ink( lemon juice,
milk, or urine, all of which turn dark when held over a flame).
⢠Microdots used by Germany in WW2 documents shrunk to the size of a
dot & embedded within innocent letters. Inkjet dots smaller than human
eyes can see.
5
Wentworth Miller
[Prison Break Serial]
6. b. Microdot
c. First Publication on Steganography
Also the first book on Steganography was entitled âSteganograpiaâ written by Johannes Trithemius in the
6
XVI century.
7. ⢠Proposed by Girolamo Cardano in XV century.
⢠Carden grille was a sheet of parchment with
apertures for writing text.
⢠Pricking pin holes above or below the letters in a
newspaper or article.
7
⢠Used by Nazi Forces in WW2.
8. PRISONERâS PROBLEM
⢠In 1984 Gustavus Simmons formulated this
problem.
⢠Two accomplices are arrested in separate
cells & are allowed to communicate via
warden who can look into the contents of
their communication.
⢠The prisoners are to agree on an escape
plan without raising suspicion of the warden.
⢠Solution is to create a subliminal
channel(communicate secretly in normal
looking communication over an insecure
channel)
8
9. STEGANOGRAPHY IN WRITTEN TEXT
⢠Covert text can be embedded in printed matter or in text.
⢠Embedding can also be by means of altering the
appearance of text as
a) Skewing
b) Altering
space
c) Offsetting
d) Font color alterations.
9
10. In 2004 it was revealed that several printer manufactures use steganography to hide
information about printer serial numbers and the manufacturing code to track
counterfeits.
Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark,
Ricoh, Toshiba, Xerox
10
11. ⢠An actual message from German spy âread second letter in each wordâ
(example of NULL CIPHER)
âApparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oilsâ.
Pershing sails from NY June 1
⢠We explore new steganographic and cryptographic algorithms and
techniques throughout the world to produce
wide variety and
security in the electronic web called the Internet.
Explore The World Wide Web
⢠Use Different fonts to indicate 0/1 of letter encodings(Francis Bacon
Cipher)
⢠Laser printers can adjust spacing of lines and characters by less
than 1/300th of an inch. To hide a zero, leave a standard space,
and to hide a one leave 1/300th of an inch more than usual. Varying
the spacing over an entire document can hide a short binary
message that is undetectable by the human eye.
11
12. MODERN STEGANOGRAPHY
⢠Hiding one message within another(âcontainerâ)
⢠Most containers are rich media
ď Images, audio, video are very redundant, can be tweaked without affecting human eye/ear
ď US argued that Al_QAIDA implanted instructions within taped interviews.
⢠Copyright notices embedded in digital art
ď Prove ownership(Watermarking)
ď Serial number embedded to prevent replication
ď Seek infringements on the web using spiders/crawlers
⢠Digital cameras EXIF(Exchangeable Image File Format) tags
ď Not secretive but hidden from the eye
ď Embed info such as camera type, date, shutter speed, focal length..
⢠Similarly, possible to embed messages in invisible part of html pages
12
13. TEXT IN IMAGE (2 METHODS)
⢠Consider a 8-bit grey scale image
ď One pixel of information is stored using 8 bits.
ď There are 256 different variations of grey.
⢠As a simple example of least significant bit(LSB) substitution, imagine "hiding" the character 'G'
across the following eight bytes of a carrier file (the least significant bits are underlined):
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000
⢠A 'G' is represented in the American Standard Code for Information Interchange (ASCII) as the binary
string 01000111. These eight bits can be "written" to the least significant bit of each of the eight carrier
bytes as follows:
10010100
00001101
11001000 10010110
00001110
11001011
10011111 00010001
⢠In the sample above, only half of the least significant bits were actually changed (shown above in
italics). This makes some sense when one set of zeros and ones are being substituted with another
13
set of zeros and ones.
14. LSB ADVANTAGES AND DISADVANTAGES
Advantages
⢠Does not change the size of the file
⢠Is harder to detect than other steganography
techniques
Disadvantages
⢠Normally must use the original program to
hide and reveal data
⢠If the picture with the hidden information is
converted to another format, then the hidden
data may be lost
14
15. CAN YOU TELL THE DIFFERENCE
Original
Before Encoding:
255,0,0
FF,00,00
11111111,00000000,00000000
After Encoding â101â:
255,0,1
FF,00,01
11111111,00000001,00000001
Same file with âI should
be able to hold 37
bytes!!!â encoded
15
16. IMAGE IN IMAGE
The Image used for embedding should be 8 times greater than the image which is supposed to be kept
hidden.
16
17. AUDIO & VIDEO STEGANORAPHY
AUDIO
VIDEO
⢠Data is hidden by modifying sample data.
⢠Coding still frames - spatial or frequency
⢠Uncompressed audio formats
⢠data encoded during refresh
ďą â WAV (Waveform Audio File Format)
ďą â BWF (Broadcast Wave Format)
ďą â MBWF (Multichannel Broadcast Wave
Format)
⢠Compressed audio formats
ď closed captioning
⢠visible watermarking
ď used by most networks (logo at bottom-right)
Example : Audio Steganography.mp4
ď Lossy
⢠MP3
⢠Advanced Audio Coding (AAC)
ď Lossless
⢠Free Lossless Audio Codec (FLAC)
⢠Direct Stream Transfer (DST)
17
18. UV WATERMARKING
Spatial domain watermarking
⢠bit flipping
⢠color separation
Frequency domain watermarking
⢠embed signal in select frequency bands (e.g. high frequency areas)
18
19. NETWORK STEGANOGRAPHY
⢠Network Steganography
ď Information hiding techniques which can be utilized to exchange steganograms in telecommunication networks.
ď Can be Intra-protocol or Inter-protocol
ď unused bits in packet headers
ď IP(Type of service, Flags, fragment offset, etc.)
ď TCP(Sequence Number)
⢠LACK(Lost Audio Packet Steganography)
ď Hide information in packet delay.
⢠HICCUPS (Hidden Communication System for Corrupted Networks)
ď Disguise information as natural âdistortionâ or noise.
⢠Operating System
ď unused memory
slack space(Fragmentation issue)
unallocated space
ď hidden partition
ď normally used to hide data from investigators
19
20. STEGANOGRAPHY VS WATERMARKING
Goal of steganography
⢠Intruder cannot detect a message
⢠Primarily 1:1 communication
Goal of Watermarking
⢠Intruder cannot remove or replace the message
⢠Primarily 1:* communication
⢠Example : Watermarks.mp4
20
21. STEGANALYSIS
⢠The art and science of steganalysis is intended to detect or estimate hidden information
based on observing some data transfer.
⢠In some cases, just being caught sending a message can bring suspicion, or give
information to the 3rd party
⢠Why is this person hiding something?
⢠Why all the communication right now?
⢠Steganalysis techniques can be classified in a similar way as cryptanalysis methods, largely
based on how much prior information is known
⢠Steganography-only attack: The steganography medium is the only item available for analysis.
⢠Known-carrier attack: The carrier and steganography media are both available for analysis.
⢠Known-message attack: The hidden message is known.
⢠Chosen-steganography attack: The steganography medium and algorithm are both known.
⢠Chosen-message attack: A known message and steganography algorithm are used to create
steganography media for future analysis and comparison.
⢠Known-steganography attack: The carrier and steganography medium, as well as the
steganography algorithm, are known discipline with few articles appearing before the late 1990s.
21
24. CONCLUSION
⢠Steganography & Steganalysis are still at an early stage of research.
⢠Although in principle secure schemes exist, practical ones with reasonable capacity are known.
⢠Notion for security & capacity for steganography needs to be investigated.
⢠Since it obvious that no system of data hiding is totally immune to attacks. However,
steganography has its place in security. It in no way can replace cryptography, but is
intended to supplement it. Its application in watermarking for use in detection of unauthorized,
illegally copied material is continually being realized and developed.
⢠The growing number of communication protocols, services and computing environments
offers almost unlimited opportunities for displaying a whole spectrum of steganographic
methods.
24