2. Introduction
• Greek Words:
STEGANOS – “Covered”
GRAPHIE– “Writing”
• Advance security is not maintained by the password protection but it is gained by
hiding the existence of the data, which can only be done by Steganography.
• Steganography is the art and science of writing hidden messages in such a way that no one
apart from the intended recipient knows of the existenceof the message.
• This can be achieve by concealing the existence of informationwithin seemingly
harmless carriers or cover
• Carrier: text, image, video, audio, etc.
3. History
• Greeks used it writing message on some material and later covering it with wax, tattooing
messages on bald head, later growing hair to cover it up.
• In World War II invisible inks were used to write messages in between the lines of
normal text message .
• Currently, cryptography and steganography are used to hide and send the secret data.
4. Steganography
v/s
Cryptography
• Cryptography hides the contents of a
secret message from a malicious
people, whereas Steganography
even conceals the existence of the
message
• In cryptography, the structure of a message
is scrambled to make it meaningless and
unintelligible unless the decryption key is
available
• Steganography does not alter the
structure of the secret message, but
hides it inside a cover-image so it
cannot be seen.
5. Types of Steganography
• Steganography In Text/Documents
• Steganography In Images
• Steganography InAudio
• Steganography In Video
7. Steganalysis
• The art of detecting Steganography is
referred to as Steganalysis.
• Using different tools like
sendsecret, Steganography 8.1 ,
Stegdetect, Hiderman etc.
• Steganalysis does not deal with trying to
decrypt the hidden information inside of a
file, just discovering it.
• It is mainly done with comparing the
encrypted file with the original copy.
8. Pros
• It is used in the way of hiding not the
Information but the password to
reach that Information.
• Messages do not attract attention to
themselves i.e difficult to detect.
Only receiver can detect.
• The proposed technique uses LSB to
hide data from a pre defined
position agreed between two
parties. Same position is only used
once to enhance security.
• Can be applied differently in digital
image, audio & video file.
Cons
• Huge number of data results in
huge file size, so some one can
suspect about it.
• In sending and receiving information
can be leaked.
• It is Vulnerable to almost all media
transformations.
• If this technique is used in a wrong way
then this can be very much dangerous.
9. Applications
• Confidential communication and secret data storing
• Protection of data alteration
• Used in modern printers
• Protect copyrights, to maintain confidentiality.
10. Conclusion
• Steganography is in the nascent stage of development.
• The importance of Steganography has not been realized to that stage where it is
preferred over its close rival “Encryption”.
• New techniques are being discovered and implemented. It is analyzed that time is
not far away when its importance would be realized by organizations in general
and the arm forces in particular.