SlideShare une entreprise Scribd logo
1  sur  18
www.oeclib.in
SUBMITTED BY:
ODISHA ELECTRONICS CONTROL LIABRAY
Seminar
On
Steganography
Content
What is Steganography
Steganography v/s Cryptography
 Evolution
Types
Dissecting Steganography
Steps for Hiding an Image Steganography
Advantages
Disadvantages
WHAT IS STEGANOGRAPHY
The word steganography literally means covered writing as derived from
Greek. Steganography is the art of concealing the existence of information
within seemingly innocuous carriers. In broad sense, term Steganography is
used for hiding message within an image.
Steganography is the art and science of communicating in a way which
hides the existence of the communication. In contrast to cryptography, where
the "enemy" is allowed to detect, intercept and modify messages without
being able to violate certain security premises guaranteed by a cryptosystem,
the goal of steganography is to hide messages inside other "harmless"
messages in a way that does not allow any "enemy" to even detect that there is
a second secret message present. Steganography is in the (especially military)
literature also referred to as transmission security or short TRANSEC.
STEGANOGRAPHY VS CRYPTOGRAPHY
Steganography can be viewed as akin to cryptography. Both have been used
throughout recorded history as means to protect information. At times these
two technologies seem to converge while the objectives of the two differ.
Cryptographic techniques "scramble" messages so if intercepted, the
messages cannot be understood. Steganography, an essence, "camouflages" a
message to hide its existence and make it seem "invisible" thus concealing the
fact that a message is being sent altogether. An encrypted message may draw
suspicion while an invisible message will not.
Steganography cannot be detected. Therefore, it is used when encryption is
not permitted. Or, more commonly, steganography is used to supplement
encryption. An encrypted file may still hide information using steganography,
so even if the encrypted file is deciphered, the hidden message is not seen.
EVOLUTION OF STEGANOGRAPHY
•CODE BREAKERS : David Kahn's The Code breakers and Bruce Norman’s
Secret Warfare: The Battle of Codes and Ciphers recounts numerous tales of
steganography .
•INVISIBLE INK : An innocent letter may contain a very different message
written between the lines with invisible ink. Common sources for invisible inks
are milk, vinegar, fruit juices and urine. All of these darken when heated. Later
on, more sophisticated inks were developed which react to various chemicals.
•MICRODOTS: The Germans developed microdot technology. Microdots are
photographs the size of a printed period having the clarity of standard-sized
typewritten pages. The first microdots were discovered masquerading as a period
on a typed envelope carried by a German agent in 1941. The message was not
hidden, nor encrypted. It was just so small as to not draw attention to itself (for a
while). Besides being so small, microdots permitted the transmission of large
amounts of data including drawings and photographs
TYPES OF STEGANOGRAPHY
MESSAGES IN TEXT program is called SPAM
MIMIC.
MESSAGES IN STILL IMAGES most popular tool is
outguess.
MESSAGES IN AUDIO data is hidden in layer III of
encoding process of MP3 file. Messages in audio are
always sent along with ambient noise.
MESSAGES IN VIDEO embedding information into
multimedia data has gained increasing attention lately.
AN EXAMPLE
Fishing freshwater bends and saltwater coasts rewards anyone feeling
stressed. Resourceful anglers usually find masterful leapers fun and admit
swordfish rank overwhelming anyday.
“Send lawyers guns and money”
•Most communication channels like telephone lines and radio broadcasts
transmit signals which are always accompanied by some kind of noise. This
noise can be replaced by a secret signal that has been transformed into a
form that is indistinguishable from noise without knowledge of a secret key
and this way, the secret signal can be transmitted undetectable.
DISSECTING STEGANOGRAPHY
Steganography is a term used for hiding messages within an image.
Any color pixel is made of a combination of red –green-blue
mode(RGB) wherein each RGB component consist of 8 bits. If letters
in ASCII are to be represented within the color pixels, the rightmost
digit, called the least significant bit (LSB), can be altered.
Any variation in the value of this bit leads to very minimal
variation in color. If we have to hide the word ‘digit’ in the image, we
take the LSB of every color and hide each bit of the word in its RGB
combination.
To insert the letter ‘D’ we modify three color pixels with three bits
in each color pixel, we utilize 14 color pixels to hide the entire word
with only 1 bit in the 14th pixel.
CONTD…………..
00000000 11111111 10101010 ASCII CHARACTER CODE
01010100 01010100 10101010
D-01000100
01010100 01010100 I-
01101001
G-01100111
I-01101001
T-01110100
MSB
AMOUNT OF DATA STORED INSIDE A PICTURE
DISSECTING STEGANOGRAPHY……..
Suppose we have a 24-bit image 1024 x 768 (this is a common
resolution for satellite images, electronic astral photographs and other
high resolution graphics). This may produce a file over 2 megabytes in
size (1024x768x24/8 = 2,359,296 bits). All color variations are
derived from three primary colors, Red, Green and Blue. Each primary
color is represented by 1 byte (8 bits). 24-bit images use 3 bytes per
pixel. If information is stored in the least significant bit (LSB) of each
byte, 3 bits can be a stored in each pixel. The "container" image will
look identical to the human eye, even if viewing the picture side by
side with the original.
DISSECTING STEGANOGRAPHY……..
STEPS FOR HIDING AN IMAGE
USING STEGANOGRAPHY
 Start s-tool and window explorer using the later as drag and drop interface
the software.
 Drag and drop the image to be used as the carrier file from the explorer onto
the actions window in s-tool.
 Drag and drop the data file on the carrier file.
 Give pass phrase and encryption algorithm when prompted. Pass these to
receiver too.
 The hidden file is ready. Receiver has to click on the “reveal” button to
extract the data.
DIGITAL WATERMARKING
Usually carrier file carry hidden data unrelated to the
content in which it is embedded, but digital
watermarking holds information about its carrier
medium.
Information such as a number or a text into a
multimedia file can be added to carrier file through
slight data modification. this process has gained huge
acclaim from the media for enabling copyright for their
products.
Video steganography is more suited to avoiding piracy
and is mostly used for digital watermarking.
Types of digital watermarking
 ROBUST DIGITAL WATERMARKING A robust watermark is
embedded in the file in such a way that even if the file is later
transformed, the watermark will not be removed
 FRAGILE DIGITAL WATERMARKING is similar to fragile
analog watermarks-if the data is altered or copied in exactly, the
watermark is corrupted
For ensuring the integrity of data, digital signatures are
preferred but fragile digital watermarking can detect data tempering
without alerting the culprit. Compatible players refuse to play content
that does not bear a valid watermark.
WHAT IS “STEGANALYSIS”
The art of detecting, decoding and altering messages
hidden via steganography is called steganalysis. It is
easiest when before as well as after steganography
copies of file are present.
Steganalysis can make the hidden data work against
the creator. Any malicious interceptor could alter as
carrier file without the knowledge of sender or the
intended receiver. Hence inaccurate or wrong data could
be passed under identity of the original sender.
SOME OUTSTANDING
FACTS
1. steganos security suite 4 uses powerful 128-bit encryption. It would take 1
billion powerful computers million of years to try every combination to gain
access to your personal information. this software uses steganography along
with encryption to completely secure your data.
2. Blindside is an application of steganography that allows you to conceal a
single file or set of files within a standard computer image. The new image
looks identical to the original, but can contain up to 50k of data. The hidden
files can also be password encrypted to prevent unauthorized access.
3. Mp3stego hides information in mp3 files during the compression process.
The data is first compressed, encrypted and then hidden in the mp3 bit stream.
Although mp3stego was written with steganographic applications in mind, it
can also be used as a copyright marking system for mp3 files.
ADVANTAGES OF
STEGANOGRAPHY
 It can be used for safeguarding data,
such as in the field of media where
copywriting ensures authenticity.
 It can be used by intelligence agencies for
sending their secret data.
DISADVANTAGE OF
STEGANOGRAPHY
Many a terrorist and anti humanist
activities have been carried out cloaked
under this technique.
Thanks

Contenu connexe

Tendances

Tendances (20)

Image steganography
Image steganographyImage steganography
Image steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
Steganography Steganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 

En vedette

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and SteganographyPreeti Yadav
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 

En vedette (11)

Steganography
SteganographySteganography
Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
File000133
File000133File000133
File000133
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 

Similaire à Steganography ppt

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 

Similaire à Steganography ppt (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Steganography
SteganographySteganography
Steganography
 

Plus de OECLIB Odisha Electronics Control Library

Plus de OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Dernier

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Steganography ppt

  • 1. www.oeclib.in SUBMITTED BY: ODISHA ELECTRONICS CONTROL LIABRAY Seminar On Steganography
  • 2. Content What is Steganography Steganography v/s Cryptography  Evolution Types Dissecting Steganography Steps for Hiding an Image Steganography Advantages Disadvantages
  • 3. WHAT IS STEGANOGRAPHY The word steganography literally means covered writing as derived from Greek. Steganography is the art of concealing the existence of information within seemingly innocuous carriers. In broad sense, term Steganography is used for hiding message within an image. Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present. Steganography is in the (especially military) literature also referred to as transmission security or short TRANSEC.
  • 4. STEGANOGRAPHY VS CRYPTOGRAPHY Steganography can be viewed as akin to cryptography. Both have been used throughout recorded history as means to protect information. At times these two technologies seem to converge while the objectives of the two differ. Cryptographic techniques "scramble" messages so if intercepted, the messages cannot be understood. Steganography, an essence, "camouflages" a message to hide its existence and make it seem "invisible" thus concealing the fact that a message is being sent altogether. An encrypted message may draw suspicion while an invisible message will not. Steganography cannot be detected. Therefore, it is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
  • 5. EVOLUTION OF STEGANOGRAPHY •CODE BREAKERS : David Kahn's The Code breakers and Bruce Norman’s Secret Warfare: The Battle of Codes and Ciphers recounts numerous tales of steganography . •INVISIBLE INK : An innocent letter may contain a very different message written between the lines with invisible ink. Common sources for invisible inks are milk, vinegar, fruit juices and urine. All of these darken when heated. Later on, more sophisticated inks were developed which react to various chemicals. •MICRODOTS: The Germans developed microdot technology. Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941. The message was not hidden, nor encrypted. It was just so small as to not draw attention to itself (for a while). Besides being so small, microdots permitted the transmission of large amounts of data including drawings and photographs
  • 6. TYPES OF STEGANOGRAPHY MESSAGES IN TEXT program is called SPAM MIMIC. MESSAGES IN STILL IMAGES most popular tool is outguess. MESSAGES IN AUDIO data is hidden in layer III of encoding process of MP3 file. Messages in audio are always sent along with ambient noise. MESSAGES IN VIDEO embedding information into multimedia data has gained increasing attention lately.
  • 7. AN EXAMPLE Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. “Send lawyers guns and money” •Most communication channels like telephone lines and radio broadcasts transmit signals which are always accompanied by some kind of noise. This noise can be replaced by a secret signal that has been transformed into a form that is indistinguishable from noise without knowledge of a secret key and this way, the secret signal can be transmitted undetectable.
  • 8. DISSECTING STEGANOGRAPHY Steganography is a term used for hiding messages within an image. Any color pixel is made of a combination of red –green-blue mode(RGB) wherein each RGB component consist of 8 bits. If letters in ASCII are to be represented within the color pixels, the rightmost digit, called the least significant bit (LSB), can be altered. Any variation in the value of this bit leads to very minimal variation in color. If we have to hide the word ‘digit’ in the image, we take the LSB of every color and hide each bit of the word in its RGB combination. To insert the letter ‘D’ we modify three color pixels with three bits in each color pixel, we utilize 14 color pixels to hide the entire word with only 1 bit in the 14th pixel. CONTD…………..
  • 9. 00000000 11111111 10101010 ASCII CHARACTER CODE 01010100 01010100 10101010 D-01000100 01010100 01010100 I- 01101001 G-01100111 I-01101001 T-01110100 MSB AMOUNT OF DATA STORED INSIDE A PICTURE DISSECTING STEGANOGRAPHY……..
  • 10. Suppose we have a 24-bit image 1024 x 768 (this is a common resolution for satellite images, electronic astral photographs and other high resolution graphics). This may produce a file over 2 megabytes in size (1024x768x24/8 = 2,359,296 bits). All color variations are derived from three primary colors, Red, Green and Blue. Each primary color is represented by 1 byte (8 bits). 24-bit images use 3 bytes per pixel. If information is stored in the least significant bit (LSB) of each byte, 3 bits can be a stored in each pixel. The "container" image will look identical to the human eye, even if viewing the picture side by side with the original. DISSECTING STEGANOGRAPHY……..
  • 11. STEPS FOR HIDING AN IMAGE USING STEGANOGRAPHY  Start s-tool and window explorer using the later as drag and drop interface the software.  Drag and drop the image to be used as the carrier file from the explorer onto the actions window in s-tool.  Drag and drop the data file on the carrier file.  Give pass phrase and encryption algorithm when prompted. Pass these to receiver too.  The hidden file is ready. Receiver has to click on the “reveal” button to extract the data.
  • 12. DIGITAL WATERMARKING Usually carrier file carry hidden data unrelated to the content in which it is embedded, but digital watermarking holds information about its carrier medium. Information such as a number or a text into a multimedia file can be added to carrier file through slight data modification. this process has gained huge acclaim from the media for enabling copyright for their products. Video steganography is more suited to avoiding piracy and is mostly used for digital watermarking.
  • 13. Types of digital watermarking  ROBUST DIGITAL WATERMARKING A robust watermark is embedded in the file in such a way that even if the file is later transformed, the watermark will not be removed  FRAGILE DIGITAL WATERMARKING is similar to fragile analog watermarks-if the data is altered or copied in exactly, the watermark is corrupted For ensuring the integrity of data, digital signatures are preferred but fragile digital watermarking can detect data tempering without alerting the culprit. Compatible players refuse to play content that does not bear a valid watermark.
  • 14. WHAT IS “STEGANALYSIS” The art of detecting, decoding and altering messages hidden via steganography is called steganalysis. It is easiest when before as well as after steganography copies of file are present. Steganalysis can make the hidden data work against the creator. Any malicious interceptor could alter as carrier file without the knowledge of sender or the intended receiver. Hence inaccurate or wrong data could be passed under identity of the original sender.
  • 15. SOME OUTSTANDING FACTS 1. steganos security suite 4 uses powerful 128-bit encryption. It would take 1 billion powerful computers million of years to try every combination to gain access to your personal information. this software uses steganography along with encryption to completely secure your data. 2. Blindside is an application of steganography that allows you to conceal a single file or set of files within a standard computer image. The new image looks identical to the original, but can contain up to 50k of data. The hidden files can also be password encrypted to prevent unauthorized access. 3. Mp3stego hides information in mp3 files during the compression process. The data is first compressed, encrypted and then hidden in the mp3 bit stream. Although mp3stego was written with steganographic applications in mind, it can also be used as a copyright marking system for mp3 files.
  • 16. ADVANTAGES OF STEGANOGRAPHY  It can be used for safeguarding data, such as in the field of media where copywriting ensures authenticity.  It can be used by intelligence agencies for sending their secret data.
  • 17. DISADVANTAGE OF STEGANOGRAPHY Many a terrorist and anti humanist activities have been carried out cloaked under this technique.