SlideShare une entreprise Scribd logo
1  sur  28
1

2/25/2014
OUTLINES
o Introduction
o History
o Steganography V/S Cryptography
o Steps Involved In Steganography
o Stegnography In Various Media

o Digital Watermarking
o Watermarking V/S Steganography
o Steganalysis
o Advantage & Disadvantage

2

2/25/2014
Introduction
o Greek Words: STEGANOS – “Covered”

GRAPHIE – “Writing”
o Advance security is not maintained by the password protection

but it is gained by hiding the existence of the data, which can
only be done by Steganography

o Steganography is the art and science of writing hidden messages

in such a way that no one apart from the intended recipient
knows of the existence of the message

o This can be achieve by concealing the existence of information

within seemingly harmless carriers or cover

o Carrier: text, image, video, audio, etc.

3

2/25/2014
History
o Greeks used it writing message on some material

and later covering it with wax, tattooing messages
on bald head, later growing hair to cover it up.
o In World War II invisible inks were used to write

messages in between the lines of normal text
message.
o Currently, cryptography and steganography are

used to hide and send the secret data.
4

2/25/2014
Steganography V/S
Cryptography
o Cryptography hides the contents of a secret message

from a malicious people, whereas Steganography even
conceals the existence of the message.
o In cryptography, the structure of a message is

scrambled to make it meaningless and unintelligible
unless the decryption key is available.
o Steganography does not alter the structure of the secret

message, but hides it inside a cover-image so it cannot
be seen.
5

2/25/2014
6

2/25/2014
Steps involved in Digital
Steganography

7

2/25/2014
Digital Steganography Under
Various Media
o Steganography In Text/Documents
o Steganography In Images
o Steganography In Audio

8

2/25/2014
Steganography In Text/Documents
 It involves three types of coding:
o Line-Shift Coding : Here, text lines are vertically shifted to

encode the document uniquely.
o Word-Shift Coding : The code words are coded into document

by shifting the horizontal locations of words within text lines, while
maintaining a natural spacing appearance.
o Feature Coding : In feature coding, certain text features are

altered, or not altered, depending on the codeword.
9

2/25/2014
Hiding a Message inside Text
 Partially effective

o randoM capitalosis is a rarE disEase ofTen

contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. Please do not
confuse this disease witH a blatant
attEmpt aT steganogRAPhy.

Reveals: MEET AT THE FRONT OF THE TRAP
10

2/25/2014
Steganography In Images

o

Image Compression:
Image compression offers a solution to large image files. Two kinds of image
compression are lossless and lossy compression. Both methods save storage
space but have differing effects on any uncompressed hidden data in the image.

o

“Lossy”

JPEG(Joint Photographic Experts Group) format files, offers high

compression, but may not maintain the original image's integrity. Hence it is
called “lossy”.


“Lossless” compression maintains the original image data exactly, It is thus more

favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
11

2/25/2014
Image Based Techniques
 Least significant Bit
 Masking And Filtering

12

2/25/2014
L.S.B Steganography
o Replacing least-significant-bits (LSBs) of digital data with

message bits.

110010
00

Embedding
Extracting

o Embedding random message bits in LSBs will not cause

any discernible difference from the cover-signals.
o Easy to implement, High payloads.
o 13
Simple, but susceptible to lossy compression and image
2/25/2014
manipulation.
L.S.B Uses
o Storing passwords and/or other confidential information
o Covert communication of sensitive data
o Speculated uses in terrorist activities
o Being widely used to hide and/or transfer illegal content

14

2/25/2014
WATERMARKING
o A watermark is a form, image or text that is impressed

onto paper, which provides evidence of its authenticity.
o A distinguishing mark impressed on paper during
manufacture; visible when paper is held up to the light.
o EXAMPLEThe presence of specific patterns in currency notes
which are visible only when the note is held to light is a
well known example for watermark.
Courtesy of Blue Spike, Inc.

15

2/25/2014
DIGITAL WATERMARKING
• Digital

watermarking is an extension
watermarking concept in the digital world.

of

• A digital watermark is a pattern of bits inserted into

a digital image, audio or video file that identifies the
file's copyright information (author, rights, etc.).

16

2/25/2014
STEGANOGRAPHY V/S
WATERMARKING
 The

main goal of
steganography is to hide
a message m in some
audio or video (cover)
data d, to obtain new
data
d',
practically
indistinguishable from
d, by people, in such a
way
that
an
eavesdropper
cannot
detect the presence of m
in d'.

17

 The

main goal of
watermarking is to hide
a message m in some
audio or video (cover)
data d, to obtain new
data
d',
practically
indistinguishable from
d, by people, in such a
way
that
an
eavesdropper
cannot
remove or replace m in
d'.
2/25/2014
Importance of Digital
Watermarking
o As seen above in Fig, Alice creates an original image

and watermarks it before passing it to Bob. If Bob
claims the image and sells copies to other people Alice
can extract her watermark from the image proving her
copyright to it.

o The caveat here is that Alice will only be able to prove

18

her copyright of the image if Bob hasn’t managed to
modify the image such that the watermark is damaged
enough to be undetectable or added his own watermark
2/25/2014
such that it is impossible to discover which watermark
THE OVER ALL PROCESS

19

2/25/2014
Visible Watermarking
 Visible watermark is a translucent overlaid into an

image and is visible to the viewer. Visible
watermarking is used to indicate ownership and for
copyright protection.

MAHESH Watermark

20

Original Image

Watermarked Image2/25/2014
Invisible watermark
o Invisible watermark is embedded into the data in such a way that the
changes made to the pixel values are perceptually not noticed. Invisible
watermark is used as evidence of ownership and to detect
misappropriated images.

Original Image

21

Watermarked Image

2/25/2014
Steganography In Audio
 Phase coding
 Echo Data Hiding

22

2/25/2014
PHASE CODING:
Phase coding relies on the fact that the phase components of sound
are not as perceptible to the human ear as noise is. Rather than
introducing perturbations, the technique encodes the message bits as
phase shifts in the phase spectrum of a digital signal, achieving an
inaudible encoding .
ECHO-HIDING:
In echo hiding, information is embedded in a sound file by
introducing an echo into the discrete signal. Like the spread spectrum
method, it too provides advantages in that it allows for a high data
transmission rate and provides superior robustness when compared to
the noise inducing methods.

23

2/25/2014
ADVANTAGE & DISADVANTAGE
 ADVANTAGES :
 Difficult to detect and Only receiver can detect
 It can be done faster with large no. of softwares
 Provides better security for sharing data in LAN, MAN & WAN

 DISADVANTAGES:
 The confidentiality of information is maintained by the algorithms, and if the algorithms

are known then this technique is of no use
 Password leakage may occur and it leads to the unauthorized access of data.
 If this technique is gone in the wrong hands like hackers can be very much dangerous for
24

all

2/25/2014
Detecting Steganography :
• The art of detecting Steganography is referred to as

Steganalysis.
• Steganalysis does not deal with trying to decrypt the

hidden information inside of a file, just discovering it.
• It is mainly done with comparing the encrypted file with

the original copy.

25

2/25/2014
REFERENCES
 http://en.wikipedia.org/wiki/Steganography8

 http://computer.howstuffworks.com/file-compression3.htm
 http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steg

anography.pdf
 http://www.sans.org/reading_room/whitepapers/covert/steg

anography-matters-post-911-world_676
 http://www.scribd.com/doc/49683406/1/Steganography-vs-

Cryptography
26

2/25/2014
27

2/25/2014
28

2/25/2014

Contenu connexe

Tendances

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Tendances (20)

Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Chapter3
Chapter3Chapter3
Chapter3
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cryptography
CryptographyCryptography
Cryptography
 

En vedette

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Steganography
SteganographySteganography
Steganography
Sonam M
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
Ashish Kumar
 

En vedette (20)

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography
Steganography Steganography
Steganography
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Watermark
WatermarkWatermark
Watermark
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
 

Similaire à digital steganography

B03208016
B03208016B03208016
B03208016
inventy
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 

Similaire à digital steganography (20)

Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Steganography
SteganographySteganography
Steganography
 
1.pdf
1.pdf1.pdf
1.pdf
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
P0460594100
P0460594100P0460594100
P0460594100
 
B03208016
B03208016B03208016
B03208016
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 

Dernier

Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night StandCall Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
amitlee9823
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
amitlee9823
 
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night StandCall Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night StandCall Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
amitlee9823
 
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
amitlee9823
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night StandCall Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
poojakaurpk09
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
amitlee9823
 
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
ZurliaSoop
 

Dernier (20)

Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night StandCall Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Chandapura ☎ 7737669865 🥵 Book Your One night Stand
 
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men  🔝Bulandshahr🔝  ...
➥🔝 7737669865 🔝▻ Bulandshahr Call-girls in Women Seeking Men 🔝Bulandshahr🔝 ...
 
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men  🔝Satara🔝   Escorts S...
➥🔝 7737669865 🔝▻ Satara Call-girls in Women Seeking Men 🔝Satara🔝 Escorts S...
 
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night StandCall Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Kengeri Satellite Town ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night StandCall Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Devanahalli ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Bommanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
Chintamani Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ba...
 
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night StandCall Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Madiwala ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hosur Road Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
 
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Sarjapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
 

digital steganography

  • 2. OUTLINES o Introduction o History o Steganography V/S Cryptography o Steps Involved In Steganography o Stegnography In Various Media o Digital Watermarking o Watermarking V/S Steganography o Steganalysis o Advantage & Disadvantage 2 2/25/2014
  • 3. Introduction o Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” o Advance security is not maintained by the password protection but it is gained by hiding the existence of the data, which can only be done by Steganography o Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message o This can be achieve by concealing the existence of information within seemingly harmless carriers or cover o Carrier: text, image, video, audio, etc. 3 2/25/2014
  • 4. History o Greeks used it writing message on some material and later covering it with wax, tattooing messages on bald head, later growing hair to cover it up. o In World War II invisible inks were used to write messages in between the lines of normal text message. o Currently, cryptography and steganography are used to hide and send the secret data. 4 2/25/2014
  • 5. Steganography V/S Cryptography o Cryptography hides the contents of a secret message from a malicious people, whereas Steganography even conceals the existence of the message. o In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is available. o Steganography does not alter the structure of the secret message, but hides it inside a cover-image so it cannot be seen. 5 2/25/2014
  • 7. Steps involved in Digital Steganography 7 2/25/2014
  • 8. Digital Steganography Under Various Media o Steganography In Text/Documents o Steganography In Images o Steganography In Audio 8 2/25/2014
  • 9. Steganography In Text/Documents  It involves three types of coding: o Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely. o Word-Shift Coding : The code words are coded into document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance. o Feature Coding : In feature coding, certain text features are altered, or not altered, depending on the codeword. 9 2/25/2014
  • 10. Hiding a Message inside Text  Partially effective o randoM capitalosis is a rarE disEase ofTen contrAcTed by careless inTernet users. tHis sad illnEss causes the aFfected peRsON To randomly capitalize letters in a bOdy oF texT. Please do not confuse this disease witH a blatant attEmpt aT steganogRAPhy. Reveals: MEET AT THE FRONT OF THE TRAP 10 2/25/2014
  • 11. Steganography In Images  o Image Compression: Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in the image. o “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”.  “Lossless” compression maintains the original image data exactly, It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats. 11 2/25/2014
  • 12. Image Based Techniques  Least significant Bit  Masking And Filtering 12 2/25/2014
  • 13. L.S.B Steganography o Replacing least-significant-bits (LSBs) of digital data with message bits. 110010 00 Embedding Extracting o Embedding random message bits in LSBs will not cause any discernible difference from the cover-signals. o Easy to implement, High payloads. o 13 Simple, but susceptible to lossy compression and image 2/25/2014 manipulation.
  • 14. L.S.B Uses o Storing passwords and/or other confidential information o Covert communication of sensitive data o Speculated uses in terrorist activities o Being widely used to hide and/or transfer illegal content 14 2/25/2014
  • 15. WATERMARKING o A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. o A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light. o EXAMPLEThe presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark. Courtesy of Blue Spike, Inc. 15 2/25/2014
  • 16. DIGITAL WATERMARKING • Digital watermarking is an extension watermarking concept in the digital world. of • A digital watermark is a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). 16 2/25/2014
  • 17. STEGANOGRAPHY V/S WATERMARKING  The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot detect the presence of m in d'. 17  The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot remove or replace m in d'. 2/25/2014
  • 18. Importance of Digital Watermarking o As seen above in Fig, Alice creates an original image and watermarks it before passing it to Bob. If Bob claims the image and sells copies to other people Alice can extract her watermark from the image proving her copyright to it. o The caveat here is that Alice will only be able to prove 18 her copyright of the image if Bob hasn’t managed to modify the image such that the watermark is damaged enough to be undetectable or added his own watermark 2/25/2014 such that it is impossible to discover which watermark
  • 19. THE OVER ALL PROCESS 19 2/25/2014
  • 20. Visible Watermarking  Visible watermark is a translucent overlaid into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection. MAHESH Watermark 20 Original Image Watermarked Image2/25/2014
  • 21. Invisible watermark o Invisible watermark is embedded into the data in such a way that the changes made to the pixel values are perceptually not noticed. Invisible watermark is used as evidence of ownership and to detect misappropriated images. Original Image 21 Watermarked Image 2/25/2014
  • 22. Steganography In Audio  Phase coding  Echo Data Hiding 22 2/25/2014
  • 23. PHASE CODING: Phase coding relies on the fact that the phase components of sound are not as perceptible to the human ear as noise is. Rather than introducing perturbations, the technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding . ECHO-HIDING: In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal. Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior robustness when compared to the noise inducing methods. 23 2/25/2014
  • 24. ADVANTAGE & DISADVANTAGE  ADVANTAGES :  Difficult to detect and Only receiver can detect  It can be done faster with large no. of softwares  Provides better security for sharing data in LAN, MAN & WAN  DISADVANTAGES:  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use  Password leakage may occur and it leads to the unauthorized access of data.  If this technique is gone in the wrong hands like hackers can be very much dangerous for 24 all 2/25/2014
  • 25. Detecting Steganography : • The art of detecting Steganography is referred to as Steganalysis. • Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it. • It is mainly done with comparing the encrypted file with the original copy. 25 2/25/2014
  • 26. REFERENCES  http://en.wikipedia.org/wiki/Steganography8  http://computer.howstuffworks.com/file-compression3.htm  http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steg anography.pdf  http://www.sans.org/reading_room/whitepapers/covert/steg anography-matters-post-911-world_676  http://www.scribd.com/doc/49683406/1/Steganography-vs- Cryptography 26 2/25/2014