SlideShare a Scribd company logo
Who am I ?
• My name
• My Background
• My major
Steganography
AND
Stegnalysis
By
Name: zaid alfawzan
Course: Lewis University
University: Capstone
Encryption and Decryption
• What is Encryption
• What is Decryption
Encryption
• What is Encryption ?
Decryption
• What is Decryption
• Steganography and Steganalysis
Proposed research topic Steganography Data Protection & Encryption
through Information Security.
we are going to study detail observation of Steganography technology
and Steganalysis, definition of steganography technique, definition of
data and information detection (Steganalysis)
Introduction
The History of Steganography
• Steganography in the past
The History of Steganography
• Steganography in the current time
The idea of Steganography
Steganography and Steganalysis
• 5
Steganography
Steganography:
Is a technique to hide the written data.
Steganography word is a Greek word
Steganalysis
used to detect and identify the hidden data.
Use special algorithms to identify compressed information.
Steganalysis Approaches
• A) Statistical Approach
• B) Structural Approach
• C) Visual Approach
Steganalysis Approaches
Statistical Approach
some mathematical formulas are applied.
Structural Approach
By steganography the structure of data can be change
and embedded attribute of object.
Visual Approach
• In this method Steganalysis visually
analyze images and find the
difference.
Steganography vs. Cryptography
• Steganography
• Cryptography
Cryptography
• Cryptography
• data encryption cannot be identify and it is protected in steganography.
Main Focus
Main focus of our research Steganography and Steganalysis, as define
in the introduction.
Steganography is scientific technique to hide and protect data and
information from unauthorized user and preforms specific modifications
on the object to protect and hide.
Research is divided into two parts; we can say start and end in starting
portion object or file is going to hide and ending portion the hidden file is
going to reshape into its original form and define as:
First Part:
 What is Steganography?
 How Steganography work?
 What is the methodology of Steganography?
 How algorithms use to perform Steganography?
 During Steganography process which elements are
involve?
Second Part:
 What is Steganalysis?
 How Steganalysis work?
 What is the methodology of Steganalysis?
 How algorithms use to perform Steganalysis?
 During Steganalysis process which elements are
involve?
Images Steganography
Classification of Images Steganography involves the following
 Communication Algorithms
 Insertion Technique Least Significant Bit (LSB)
 Filtering & Masking
Communication Algorithms:
Data and information can embedded into undetected cover
There are three common communication techniques
1. Discrete wavelet transformation technique (DWT)
2. Fast Fourier transformation technique (FFT)
3. Discrete cosine transformation technique (DCT)
Discrete wavelet transformation technique (DWT)
• Hidden secret image S inside cover
C, by using 2 different keys.
Fast Fourier transformation technique (FFT)
• It a signal process
• Used to analysis part of spectrum
Discrete cosine transformation technique (DCT)
• Convert a signal into elementary.
• Used in image compression
Insertion Technique Least Significant Bit (LSB)
• LSB used for transmission of data.
• digital signal processing images.
• Images are of two type 8 bit and 24 bit.
 In 24 bit image 3 bit data embedded.
 In 8 bit image 1 bit data embedded.
Filtering & Masking
• Many signals are mask and the first signal unmask,
• used in watermarking method.
Type of Steganography
• A) Fragile
• B) Robust
Fragile
• Embedded the data in file
Robust
• Hard to embedded the data in file
Categories of Steganography
• A) Statistical aware steganography
• B) Model based steganography
Categories of Steganography
• A) Model based steganography
Achieve the highest embedding
Categories of Steganography
• B) Statistical aware steganography
Stegnalysis used to detect steganography
Categories of Stegnalyisi
• A) Passive
• B) Active
• C)
Categories of Stegnalyisi
• A) passive
• Detect the absence of secret image
Categories of Stegnalyisi
• B) Active
• Extract the propraties
Categories of Stegnalyisi
• C)
LSB
• What is LSB?
Convert image file from JPEG to GIF
or BMP
Images of Stenganlyiss
• Will be divided into two categories
• A) Generic
• B) specific
Images of Stenganlyiss
• A) Generic:
used for steganography
Images of Stenganlyiss
• B) specific
• Used for digital images
• Water marketing , hidden images
• Build content authentication
Technical In Steganography and stegnalysis
• Detecting Steganography content on the Internet.
• Survey of Data mining Technique for stengalysis .
• Using Image quality Metrics in stegnalysis
• Using Image-adaption technique
• The investigation of hidden data/ info
Detecting Steganography content on the
Internet.
• Hidden information over the internet.
The investigation of hidden data/
information
• Used a software to identify the hidden
information
Survey of Data mining Technique
for stengalysis
• Provide a powerful tools to detect
information
Using Image-adaption technique
• It is secure the data during the
transfer
Using Image quality Metrics in stegnalysis
• It is devolved algorithm
Experiment & observations
There are number of research paper demonstrated on steganography in
different ways but our research focuses on core issue of our research
image steganography and one technique with LSB.
Data collection for steganography described different assumptions and
parities related to our topic (image steganography). Water marking and
least significant bit calculated that for image steganography these two
techniques are effective and used as common. In water marking if we
add one image with another image the output must be combination of
these images, it’s very simple phenomena and often observed.
Experiment & observations
Example-1
Most significant bit of image is used for hidden the image in least
significant bit method and steganography.
Example-2
Two images are stored in memory locations one image worked as object
and other is host image.
Host image bits are selected for hide the object image as shown below.
Host image pixels 10110001
Secret image pixels0011111
And the output image pixels 10110011
Experiment & observations
Experiment & observations
One issue explored during experiment by comparing images it is difficult
to prevent attacks.
As 16 bit audio signals are
Audio bit Audio in Binary Audio with encode
output
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1111 0011 1100 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Experiment & observations
In one 8 bit/channel image size is 1000x1400 pixels and compressed by
use Jseg, JPEG image file format used DCT (Discrete cosine transform )
to hide information of image size 8x8 pixel image block into coefficients
of 64 (Discrete cosine transform) and least significant bits of DCT no
longer used inside which the hidden information embedded.
Statistical analysis or test introduced if actual image has changed (alter)
in its original form statistical characteristics accepted.
Steganography and Steganalysis
Steganography and Steganalysis

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography
SteganographySteganography
Steganography
Kirthan S Holla
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 

Viewers also liked

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
Prince Boonlia
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar reportTejas_srinivas
 
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCTLOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
I3E Technologies
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
CSCJournals
 
Thủy vân số
Thủy vân số Thủy vân số
Thủy vân số
Tô Quang Hiền
 
TAEA 2014 "Making Choice Matter"
TAEA 2014 "Making Choice Matter"TAEA 2014 "Making Choice Matter"
TAEA 2014 "Making Choice Matter"
Stephanie Shaffer
 
Life is a choice
Life is a choiceLife is a choice
Life is a choice
Tia Annisa Nurjanah
 
Choice based art instruction for middle years and beyond
Choice based art instruction for middle years and beyondChoice based art instruction for middle years and beyond
Choice based art instruction for middle years and beyond
Dennis Wilson
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
Sougata Das
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
sravanthi mandala
 
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Stefano Fantin
 

Viewers also liked (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCTLOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
bf32-Final_ (2)
bf32-Final_ (2)bf32-Final_ (2)
bf32-Final_ (2)
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Sanjay_Thesis_Defense
Sanjay_Thesis_DefenseSanjay_Thesis_Defense
Sanjay_Thesis_Defense
 
Multimedia Steganography
Multimedia SteganographyMultimedia Steganography
Multimedia Steganography
 
Thủy vân số
Thủy vân số Thủy vân số
Thủy vân số
 
TAEA 2014 "Making Choice Matter"
TAEA 2014 "Making Choice Matter"TAEA 2014 "Making Choice Matter"
TAEA 2014 "Making Choice Matter"
 
Life is a choice
Life is a choiceLife is a choice
Life is a choice
 
Choice based art instruction for middle years and beyond
Choice based art instruction for middle years and beyondChoice based art instruction for middle years and beyond
Choice based art instruction for middle years and beyond
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
 

Similar to Steganography and Steganalysis

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
Information security
Information securityInformation security
Information security
Jay Nagar
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
Muqeed Hussain
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Steganalysis Using Colour Model Conversion
Steganalysis Using Colour Model ConversionSteganalysis Using Colour Model Conversion
Steganalysis Using Colour Model Conversion
sipij
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
Santu Chall
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
acijjournal
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
ssuser50a5ec
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
International Journal of Engineering Inventions www.ijeijournal.com
 
A04020107
A04020107A04020107
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
Nathan Mathis
 

Similar to Steganography and Steganalysis (20)

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Information security
Information securityInformation security
Information security
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Steganalysis Using Colour Model Conversion
Steganalysis Using Colour Model ConversionSteganalysis Using Colour Model Conversion
Steganalysis Using Colour Model Conversion
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Steganography
SteganographySteganography
Steganography
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
K0815660
K0815660K0815660
K0815660
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
A04020107
A04020107A04020107
A04020107
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Steganography and Steganalysis

  • 1. Who am I ? • My name • My Background • My major
  • 2. Steganography AND Stegnalysis By Name: zaid alfawzan Course: Lewis University University: Capstone
  • 3. Encryption and Decryption • What is Encryption • What is Decryption
  • 4. Encryption • What is Encryption ?
  • 6. • Steganography and Steganalysis
  • 7. Proposed research topic Steganography Data Protection & Encryption through Information Security. we are going to study detail observation of Steganography technology and Steganalysis, definition of steganography technique, definition of data and information detection (Steganalysis) Introduction
  • 8. The History of Steganography • Steganography in the past
  • 9. The History of Steganography • Steganography in the current time
  • 10. The idea of Steganography
  • 12. Steganography Steganography: Is a technique to hide the written data. Steganography word is a Greek word
  • 13. Steganalysis used to detect and identify the hidden data. Use special algorithms to identify compressed information.
  • 14. Steganalysis Approaches • A) Statistical Approach • B) Structural Approach • C) Visual Approach
  • 15. Steganalysis Approaches Statistical Approach some mathematical formulas are applied.
  • 16. Structural Approach By steganography the structure of data can be change and embedded attribute of object.
  • 17. Visual Approach • In this method Steganalysis visually analyze images and find the difference.
  • 18. Steganography vs. Cryptography • Steganography • Cryptography
  • 19. Cryptography • Cryptography • data encryption cannot be identify and it is protected in steganography.
  • 20. Main Focus Main focus of our research Steganography and Steganalysis, as define in the introduction. Steganography is scientific technique to hide and protect data and information from unauthorized user and preforms specific modifications on the object to protect and hide. Research is divided into two parts; we can say start and end in starting portion object or file is going to hide and ending portion the hidden file is going to reshape into its original form and define as:
  • 21. First Part:  What is Steganography?  How Steganography work?  What is the methodology of Steganography?  How algorithms use to perform Steganography?  During Steganography process which elements are involve? Second Part:  What is Steganalysis?  How Steganalysis work?  What is the methodology of Steganalysis?  How algorithms use to perform Steganalysis?  During Steganalysis process which elements are involve?
  • 22. Images Steganography Classification of Images Steganography involves the following  Communication Algorithms  Insertion Technique Least Significant Bit (LSB)  Filtering & Masking
  • 23. Communication Algorithms: Data and information can embedded into undetected cover There are three common communication techniques 1. Discrete wavelet transformation technique (DWT) 2. Fast Fourier transformation technique (FFT) 3. Discrete cosine transformation technique (DCT)
  • 24. Discrete wavelet transformation technique (DWT) • Hidden secret image S inside cover C, by using 2 different keys.
  • 25. Fast Fourier transformation technique (FFT) • It a signal process • Used to analysis part of spectrum
  • 26. Discrete cosine transformation technique (DCT) • Convert a signal into elementary. • Used in image compression
  • 27. Insertion Technique Least Significant Bit (LSB) • LSB used for transmission of data. • digital signal processing images. • Images are of two type 8 bit and 24 bit.  In 24 bit image 3 bit data embedded.  In 8 bit image 1 bit data embedded.
  • 28. Filtering & Masking • Many signals are mask and the first signal unmask, • used in watermarking method.
  • 29. Type of Steganography • A) Fragile • B) Robust
  • 30. Fragile • Embedded the data in file
  • 31. Robust • Hard to embedded the data in file
  • 32. Categories of Steganography • A) Statistical aware steganography • B) Model based steganography
  • 33. Categories of Steganography • A) Model based steganography Achieve the highest embedding
  • 34. Categories of Steganography • B) Statistical aware steganography Stegnalysis used to detect steganography
  • 35. Categories of Stegnalyisi • A) Passive • B) Active • C)
  • 36. Categories of Stegnalyisi • A) passive • Detect the absence of secret image
  • 37. Categories of Stegnalyisi • B) Active • Extract the propraties
  • 39. LSB • What is LSB? Convert image file from JPEG to GIF or BMP
  • 40. Images of Stenganlyiss • Will be divided into two categories • A) Generic • B) specific
  • 41. Images of Stenganlyiss • A) Generic: used for steganography
  • 42. Images of Stenganlyiss • B) specific • Used for digital images
  • 43. • Water marketing , hidden images • Build content authentication
  • 44. Technical In Steganography and stegnalysis • Detecting Steganography content on the Internet. • Survey of Data mining Technique for stengalysis . • Using Image quality Metrics in stegnalysis • Using Image-adaption technique • The investigation of hidden data/ info
  • 45. Detecting Steganography content on the Internet. • Hidden information over the internet.
  • 46. The investigation of hidden data/ information • Used a software to identify the hidden information
  • 47. Survey of Data mining Technique for stengalysis • Provide a powerful tools to detect information
  • 48. Using Image-adaption technique • It is secure the data during the transfer
  • 49. Using Image quality Metrics in stegnalysis • It is devolved algorithm
  • 50. Experiment & observations There are number of research paper demonstrated on steganography in different ways but our research focuses on core issue of our research image steganography and one technique with LSB. Data collection for steganography described different assumptions and parities related to our topic (image steganography). Water marking and least significant bit calculated that for image steganography these two techniques are effective and used as common. In water marking if we add one image with another image the output must be combination of these images, it’s very simple phenomena and often observed.
  • 51. Experiment & observations Example-1 Most significant bit of image is used for hidden the image in least significant bit method and steganography.
  • 52. Example-2 Two images are stored in memory locations one image worked as object and other is host image. Host image bits are selected for hide the object image as shown below. Host image pixels 10110001 Secret image pixels0011111 And the output image pixels 10110011 Experiment & observations
  • 53. Experiment & observations One issue explored during experiment by comparing images it is difficult to prevent attacks. As 16 bit audio signals are Audio bit Audio in Binary Audio with encode output 1001 1000 0011 1100 0 1001 1000 0011 1100 1101 1011 0011 1000 1 1101 1011 0011 1001 1011 1100 0011 1101 1 1011 1100 0011 1101 1011 1111 0011 1100 0 1011 1111 0011 1100 1011 1111 0011 1100 0 1011 1010 0111 1110 1111 1000 0011 1100 1 1111 1000 0011 1101 1101 1100 0111 1000 0 1101 1100 0111 1000 1000 1000 0001 1111 1 1000 1000 0001 1111
  • 54. Experiment & observations In one 8 bit/channel image size is 1000x1400 pixels and compressed by use Jseg, JPEG image file format used DCT (Discrete cosine transform ) to hide information of image size 8x8 pixel image block into coefficients of 64 (Discrete cosine transform) and least significant bits of DCT no longer used inside which the hidden information embedded. Statistical analysis or test introduced if actual image has changed (alter) in its original form statistical characteristics accepted.