SlideShare a Scribd company logo
1 of 9
What is Steganography?

Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”

 Steganography is the art and
  science of writing hidden messages
  in such a way that no one apart       Stegosaurus: a covered lizard



  from the intended recipient knows
                                        (but not a type of cryptography)




  of the existence of the message.

 This can be achieve by concealing
  the existence of information
  within seemingly harmless carriers
  or cover

 Carrier: text, image, video, audio,
  etc.
Cryptography
   Cryptography was concerned solely with message
    confidentiality (i.e., encryption)—conversion of message
    from a comprehensible form into an incomprehensible one
    and back again at the other end, rendering it unreadable by
    interceptors or eavesdroppers without secret knowledge
    (namely the key needed for decryption of that message)

Cryptography is secret writing. Anybody can see the message,
  but nobody else can read it. Usually, this is because its letters
  have been re-arranged, or replaced by different letters,
  according to some scheme that only the sender and receiver
  know. Only those who possess a secret key can decrypt the
  message into plain text
DIFFERENCE B/W
CRYPTOGRAPHY AND STEGANOGRAPHY
Steganography deals with composing hidden messages so that
only the sender and the receiver know that the message even
exists. Since, nobody except the sender and the receiver knows
the existence of the message, it does not attract unwanted
attention.
Steganography is hidden writing. The message is there, but
nobody notices it. Once the presence of hidden information is
revealed or even suspected, the purpose of steganography is
defeated.
However, once noticed, it can be read. A common form of
steganography is the use of JPEG files (a computer image) to
hide the message.
The obvious advantage of Steganography over
cryptography is that messages do not attract any
attention
History of Steganography
   Steganography ancient origins can be traced back to 440 BC, from the Histories of
  Herodotus
  Demeratus sent a warning about a forthcoming attack to Greece by writing it on a
  wooden panel and covering it in wax.
    Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it.
  After his hair had grown the message was hidden. The purpose was to instigate a revolt
  against the Persians.
   Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells
  the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the
  hair that afterwards grew over it, and exposed by shaving the head again. The message
  allegedly carried a warning to Greece about Persian invasion plans



World War II
the French Resistance sent some messages written on the backs of couriers using invisible
   ink.
Modern Steganography Technique


Least Significant Bit Insertion: The most common and
  popular method of modern day Steganography is to
  make use of the LSB of a picture’s pixel information.
  Thus the overall image distortion is kept to a minimum
  while the message is spaced out over the pixels in the
  images. This technique works best when the image file
  is larger then the message file and if the image is
  grayscale.
Image of a tree with a steganographically
hidden image. The hidden image is revealed by
removing all but the two least significant bits
of each color component and a subsequent
normalization. The hidden image is shown
below.


                Image of a cat extracted from the tree image
                above.
Basics of Modern Steganography




fE:     steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message
Important Requirement for
           Steganographic System
Security of the hidden communication


size of the payload


Robustness against malicious and unintentional attacks
Detection of Steganographic
        Content/Countermeasures
The detection of steganographically encoded packages is
 called Steganalysis.

  Visual Analysis tries to reveal the presence of secret
    communication through inspection, either with the naked eye
    or with the assistance of a computer.

  Statistical (Algorithmic) Analysis reveals tiny alterations
    in an image's statistical behavior caused by steganographic
    embedding.
     The nominally universal methods developed to detect embedded stego-
      data are generally less effective than the steganalytic methods aimed at
      specific types of embedding.

More Related Content

What's hot

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography
SteganographySteganography
Steganography
Sonam M
 

What's hot (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography
SteganographySteganography
Steganography
 
Project presentation - Steganographic Application of improved Genetic Shifti...
Project presentation  - Steganographic Application of improved Genetic Shifti...Project presentation  - Steganographic Application of improved Genetic Shifti...
Project presentation - Steganographic Application of improved Genetic Shifti...
 
Steganography
SteganographySteganography
Steganography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 

Viewers also liked (14)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Mobile comp
Mobile comp Mobile comp
Mobile comp
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Recent trends in satellite communication
Recent trends in satellite communicationRecent trends in satellite communication
Recent trends in satellite communication
 
Stenographgh[1]
Stenographgh[1]Stenographgh[1]
Stenographgh[1]
 
Big data security
Big data securityBig data security
Big data security
 
Ppt on irrigation
Ppt on irrigationPpt on irrigation
Ppt on irrigation
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentation
 
Irrigation PPT
Irrigation PPTIrrigation PPT
Irrigation PPT
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Satellite communications ppt
Satellite communications pptSatellite communications ppt
Satellite communications ppt
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 

Similar to Steganography ppt

Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 

Similar to Steganography ppt (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Stegnography
StegnographyStegnography
Stegnography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Presentation1
Presentation1Presentation1
Presentation1
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Information hiding
Information hidingInformation hiding
Information hiding
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Steganography
SteganographySteganography
Steganography
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography
Steganography Steganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography
Steganography Steganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Steganography ppt

  • 1. What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart Stegosaurus: a covered lizard from the intended recipient knows (but not a type of cryptography) of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc.
  • 2. Cryptography Cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of message from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message) Cryptography is secret writing. Anybody can see the message, but nobody else can read it. Usually, this is because its letters have been re-arranged, or replaced by different letters, according to some scheme that only the sender and receiver know. Only those who possess a secret key can decrypt the message into plain text
  • 3. DIFFERENCE B/W CRYPTOGRAPHY AND STEGANOGRAPHY Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since, nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. Steganography is hidden writing. The message is there, but nobody notices it. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated. However, once noticed, it can be read. A common form of steganography is the use of JPEG files (a computer image) to hide the message. The obvious advantage of Steganography over cryptography is that messages do not attract any attention
  • 4. History of Steganography Steganography ancient origins can be traced back to 440 BC, from the Histories of Herodotus Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece about Persian invasion plans World War II the French Resistance sent some messages written on the backs of couriers using invisible ink.
  • 5. Modern Steganography Technique Least Significant Bit Insertion: The most common and popular method of modern day Steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 6. Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. The hidden image is shown below. Image of a cat extracted from the tree image above.
  • 7. Basics of Modern Steganography fE:     steganographic function "embedding" fE-1:   steganographic function "extracting" cover:  cover data in which emb will be hidden emb:    message to be hidden key:    parameter of fE stego:  cover data with the hidden message
  • 8. Important Requirement for Steganographic System Security of the hidden communication size of the payload Robustness against malicious and unintentional attacks
  • 9. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego- data are generally less effective than the steganalytic methods aimed at specific types of embedding.