SlideShare a Scribd company logo
Himanshu	Moliya
Steganoid
A	Tool	for	Image	–	Audio	Steganography
Outline
! Overview
! Seven Phase of this Application
! System Model
! Features
! Core concept
! User interface
! Implementation
! Future Scope
Overview : Steganography
• The word steganography comes from the Greek name
“steganos” (hidden or secret) and “graphy” (writing or drawing)
and literally means hidden writing.
• Steganography uses techniques to communicate
information in a way that is hidden.
• Steganography hides the existence of a message by
transmitting information through various carriers. Its goal is to
prevent the detection of a secret message.
• The most common use of steganography is hiding information
from one file within the information of another file.
Cover medium + Hidden information + Stegokey = Stego-medium
Two layer of security
• This application provides two level of security.
1. Steganography
2. AES encryption
Why this?
• This two layer provide high level of security to
prevent attack on stegano image and stegano
audio.
Seven Phase of this Application
1. Image Steganography : User can hide any file inside
the image. It may be Cipher file / Text file Image file,
PDF file,… etc.
2. Audio Steganography : User can hide cipher data
inside the audio.
3. AES Encryption : This application use advanced
Encryption standards internally.
4. Change format: Data must be consistent after
change format of image (e.g. : BMP to PNG)
5. Data minimization: Store data with in same size
image.
6. Attack testing: AES encryption provide security to
prevent visual attack.
7. Digital water marking: This application also use as
Digital water marking application.
Seven Phase of this Application
System Model :
AES Encryption :
Reference: http://www.lightwaveonline.com/articles/2016/01/the-evolution-and-implementation-of-
encryption-across-layer-1-networks.html
Features : Steganoid
1. Image Steganography
2. Audio Steganography
3. Use AES Encryption (Advanced Encryption Standard)
4. Use Symmetric Cryptography / Symmetric key use
5. Data consistently after changing format
6. Data Minimization
7. Test attack : safe data in visual attack
8. Use as Digital water marking Tool.
Security over visual Attack
What is visual attack?
Visual Attacks are simplest form of
steganalysis that involves examining the
stego-image with the naked eye to identify any
kind of degradation.
Visual
Security over visual Attack
• This application also provide security against visual
attack.
How ?
• If someone detect text from the image and
extract it from the image.
• They can’t read it because of encrypted text
(Need to break AES algorithm to read that
data)(i.e very difficult)
Core concept Implementation
Encoding Schema (LSB) : Image
Visual
Decoding Schema (LSB) : Image
Reverse process of encoding : decode text from each pixel.
Encoding Schema (LSB) : Audio
Decoding Schema (LSB) : Audio
User interface :
User interface Guidelines :
• Status Console :
• Provide information how much data you can hide in that
image / audio ? Also provide details of total pixel / sample.
• Display Cipher text.
• Display success message, processing message.
• Password :
• Password for cipher text is used as 2nd layer of
security.
(i.e. can’t easily breakup because it used as key for
AES algorithm.)
• Show password button use to see password text
for user.
File size comparison
Change format :
Data must be safe after changing file format.
Task:
• I have one Setgo image in BMP format with hidden file
ABC.
• now I change format of file to PNG.
Observation :
• Hidden file must be safe after changing format.
• We can easily extract data from PNG file.
• It’s fail in some cases.
(i.e. BMP to JPG or PNG to JPG because of JPG
generate compressed image)
Format Conversion Possibility
BMP BMP YES
PNG
JPEG NO (Due to lossy
algo)
PNG BMP YES
PNG
JPEG NO (Due to lossy
algo)
JPEG BMP YES
PNG
Data consistency : after converting to other format
Data minimization:
Let’s assume we have one user data and it’s contains:
1. 800x600 image with 8bit depth have at most 600 KB size.
2. And all other data (Name, Address, Father name, birthdate(DOB),
Finger print data, etc…) Let’s assume this all have 424 KB (size of all
Another data)
Now,
Total data of this user = Image + Another data = 600 + 424 = 1024 KB
= 1MB.
One user has 1MB data.
But using this model, we can store this 424 KB taxable
data within 600 KB image.
So, we require only 600KB to store one user information
(i.e. image size) instead of 1MB.
Concept: After performing Steganography on BMP file
New file size is same as Old file size.
Data minimization:
Now, try to think this model with 125 crore users,
Before:
To store 125 crore user information 125x107 MB
required (i.e. 1250 TB).
After Applying this model:
We require only 125crore x 600KB, (i.e. 750TB).
Benefits:
As per seen above example we can say we save 500 TB
data. (500 TB = High cost)
User can hide data more than image size:
Implementation
Successfully implemented…
• Language : C#
• Platform : Tested with all windows version(7, 8, 8.1,
10).
• Tools : Microsoft Visual Studio 2015, Microsoft Paint.
DEMO
Youtube Link:
https://www.youtube.com/watch?v=P9obmA9ws2I
Software link (Download and try):
https://github.com/HimanshuMoliya/Steganoid/blob/
master/Steganoid%20-%201.0.exe
Future Scope and real life Application
In, future we add video steganography feature.
• Use as secret message transmission from one
country to another country.
E.g. Indian embassy Pakistan to India.
• Use in Military, CBI, RAW communication.
• Use in business communication and real life
communication.
• As data minimization tool, As digital watermarking
tool.
Thank	You!
Himanshu Moliya
himanshu.moliya@iet.ahduni.edu.in
School of Engineering and Applied
Science
Ahmedabad University

More Related Content

What's hot

IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET Journal
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
Dr. Amarjeet Singh
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
Satyajit Debnath
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
Vema Reddy
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
NAIM PARVEZ GALIB
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
Puneet Singla
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
Secure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulationSecure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulation
I3E Technologies
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
C010511420
C010511420C010511420
C010511420
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Secure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulationSecure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulation
 
Stegnography
StegnographyStegnography
Stegnography
 

Similar to Steganoid - A tool for steganography

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
Omkar Rane
 
S4501105108
S4501105108S4501105108
S4501105108
IJERA Editor
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
MaddiSujitha
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
1.pdf
1.pdf1.pdf
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
IAEME Publication
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
Ajinkya Nikam
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
IJERA Editor
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
acijjournal
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
International Journal of Engineering Inventions www.ijeijournal.com
 

Similar to Steganoid - A tool for steganography (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
S4501105108
S4501105108S4501105108
S4501105108
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
C3 s
C3 sC3 s
C3 s
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
1.pdf
1.pdf1.pdf
1.pdf
 
BMP Secrets.PPT
BMP Secrets.PPTBMP Secrets.PPT
BMP Secrets.PPT
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 

More from MrMoliya

ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
 ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video... ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
MrMoliya
 
Load balancing in cloud computing.pdf
Load balancing in cloud computing.pdfLoad balancing in cloud computing.pdf
Load balancing in cloud computing.pdf
MrMoliya
 
Ford Fulkerson Algorithm
Ford Fulkerson AlgorithmFord Fulkerson Algorithm
Ford Fulkerson Algorithm
MrMoliya
 
Knowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmapKnowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmap
MrMoliya
 
Artificial intelligence and Machine learning Applications
 Artificial intelligence and Machine learning Applications Artificial intelligence and Machine learning Applications
Artificial intelligence and Machine learning Applications
MrMoliya
 
Data science : R Basics Harvard University
Data science : R Basics Harvard UniversityData science : R Basics Harvard University
Data science : R Basics Harvard University
MrMoliya
 

More from MrMoliya (6)

ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
 ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video... ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
 
Load balancing in cloud computing.pdf
Load balancing in cloud computing.pdfLoad balancing in cloud computing.pdf
Load balancing in cloud computing.pdf
 
Ford Fulkerson Algorithm
Ford Fulkerson AlgorithmFord Fulkerson Algorithm
Ford Fulkerson Algorithm
 
Knowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmapKnowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmap
 
Artificial intelligence and Machine learning Applications
 Artificial intelligence and Machine learning Applications Artificial intelligence and Machine learning Applications
Artificial intelligence and Machine learning Applications
 
Data science : R Basics Harvard University
Data science : R Basics Harvard UniversityData science : R Basics Harvard University
Data science : R Basics Harvard University
 

Recently uploaded

2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Yara Milbes
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 

Recently uploaded (20)

2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 

Steganoid - A tool for steganography

  • 2. Outline ! Overview ! Seven Phase of this Application ! System Model ! Features ! Core concept ! User interface ! Implementation ! Future Scope
  • 3. Overview : Steganography • The word steganography comes from the Greek name “steganos” (hidden or secret) and “graphy” (writing or drawing) and literally means hidden writing. • Steganography uses techniques to communicate information in a way that is hidden. • Steganography hides the existence of a message by transmitting information through various carriers. Its goal is to prevent the detection of a secret message. • The most common use of steganography is hiding information from one file within the information of another file. Cover medium + Hidden information + Stegokey = Stego-medium
  • 4. Two layer of security • This application provides two level of security. 1. Steganography 2. AES encryption Why this? • This two layer provide high level of security to prevent attack on stegano image and stegano audio.
  • 5. Seven Phase of this Application 1. Image Steganography : User can hide any file inside the image. It may be Cipher file / Text file Image file, PDF file,… etc. 2. Audio Steganography : User can hide cipher data inside the audio. 3. AES Encryption : This application use advanced Encryption standards internally.
  • 6. 4. Change format: Data must be consistent after change format of image (e.g. : BMP to PNG) 5. Data minimization: Store data with in same size image. 6. Attack testing: AES encryption provide security to prevent visual attack. 7. Digital water marking: This application also use as Digital water marking application. Seven Phase of this Application
  • 8. AES Encryption : Reference: http://www.lightwaveonline.com/articles/2016/01/the-evolution-and-implementation-of- encryption-across-layer-1-networks.html
  • 9. Features : Steganoid 1. Image Steganography 2. Audio Steganography 3. Use AES Encryption (Advanced Encryption Standard) 4. Use Symmetric Cryptography / Symmetric key use 5. Data consistently after changing format 6. Data Minimization 7. Test attack : safe data in visual attack 8. Use as Digital water marking Tool.
  • 10. Security over visual Attack What is visual attack? Visual Attacks are simplest form of steganalysis that involves examining the stego-image with the naked eye to identify any kind of degradation.
  • 12. Security over visual Attack • This application also provide security against visual attack. How ? • If someone detect text from the image and extract it from the image. • They can’t read it because of encrypted text (Need to break AES algorithm to read that data)(i.e very difficult)
  • 14. Encoding Schema (LSB) : Image Visual
  • 15. Decoding Schema (LSB) : Image Reverse process of encoding : decode text from each pixel.
  • 19. User interface Guidelines : • Status Console : • Provide information how much data you can hide in that image / audio ? Also provide details of total pixel / sample. • Display Cipher text. • Display success message, processing message. • Password : • Password for cipher text is used as 2nd layer of security. (i.e. can’t easily breakup because it used as key for AES algorithm.) • Show password button use to see password text for user.
  • 21. Change format : Data must be safe after changing file format. Task: • I have one Setgo image in BMP format with hidden file ABC. • now I change format of file to PNG. Observation : • Hidden file must be safe after changing format. • We can easily extract data from PNG file. • It’s fail in some cases. (i.e. BMP to JPG or PNG to JPG because of JPG generate compressed image)
  • 22. Format Conversion Possibility BMP BMP YES PNG JPEG NO (Due to lossy algo) PNG BMP YES PNG JPEG NO (Due to lossy algo) JPEG BMP YES PNG Data consistency : after converting to other format
  • 23. Data minimization: Let’s assume we have one user data and it’s contains: 1. 800x600 image with 8bit depth have at most 600 KB size. 2. And all other data (Name, Address, Father name, birthdate(DOB), Finger print data, etc…) Let’s assume this all have 424 KB (size of all Another data) Now, Total data of this user = Image + Another data = 600 + 424 = 1024 KB = 1MB. One user has 1MB data. But using this model, we can store this 424 KB taxable data within 600 KB image. So, we require only 600KB to store one user information (i.e. image size) instead of 1MB. Concept: After performing Steganography on BMP file New file size is same as Old file size.
  • 24. Data minimization: Now, try to think this model with 125 crore users, Before: To store 125 crore user information 125x107 MB required (i.e. 1250 TB). After Applying this model: We require only 125crore x 600KB, (i.e. 750TB). Benefits: As per seen above example we can say we save 500 TB data. (500 TB = High cost)
  • 25. User can hide data more than image size:
  • 26. Implementation Successfully implemented… • Language : C# • Platform : Tested with all windows version(7, 8, 8.1, 10). • Tools : Microsoft Visual Studio 2015, Microsoft Paint.
  • 27. DEMO Youtube Link: https://www.youtube.com/watch?v=P9obmA9ws2I Software link (Download and try): https://github.com/HimanshuMoliya/Steganoid/blob/ master/Steganoid%20-%201.0.exe
  • 28. Future Scope and real life Application In, future we add video steganography feature. • Use as secret message transmission from one country to another country. E.g. Indian embassy Pakistan to India. • Use in Military, CBI, RAW communication. • Use in business communication and real life communication. • As data minimization tool, As digital watermarking tool.
  • 29. Thank You! Himanshu Moliya himanshu.moliya@iet.ahduni.edu.in School of Engineering and Applied Science Ahmedabad University