SlideShare une entreprise Scribd logo
1  sur  13
Steganography
What is Steganography?
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”


Steganography is the art and science
of writing hidden messages in such a
way that no one apart from the
intended recipient knows of the
existence of the message.



This can be achieve by concealing the
existence of information within
seemingly harmless carriers or cover
Branches of Information Hiding
There are two major branches of information hiding, Steganography
and Watermarking

Watermarking:





Communication in watermarking is the host signal, with the
embedded data providing copyright protection.
The existence of a watermark is often declared openly.
Any attempt to remove or invalidate the embedded content
renders the host useless.
They are of two types:
Visible watermarking
Invisible watermarking

Once the presence of hidden information is revealed or even
suspected, the purpose of steganography is defeated.
History of Steganography
Demeratus sent a warning about a forthcoming attack to Greece by
writing it on a wooden panel and covering it in wax.
Histiaeus, who shaved the head of his most trusted slave and tattooed
a message on it. After his hair had grown the message was hidden.
The purpose was to instigate a revolt against the Persians.
World War II
Invincible inks
Null ciphers (unencrypted messages):

Apparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on by
products, ejecting suets and vegetable oils.
Sent by a German Spy in WWII, by taking the second letter in each
word the following message emerges:
Pershing sails from NY June 1.
Microdot Technology
Shrinking messages down
to the size of a dot became
a popular method. Since
the microdot could be
placed at the end of a
sentence or above a j or an
i.

Modern Steganography
Techniques
Masking and Filtering : Is where information is hidden inside of a
image using digital watermarks that include information such as
copyright, ownership, or licenses.
Algorithms and Transformations : This technique hides data in
mathematical functions that are often used in compression
algorithms. The idea of this method is to hide the secret message
in the data bits in the least significant coefficients.
Least Significant Bit Insertion : The most common and popular
method of modern day steganography is to make use of the LSB of
a picture’s pixel information.This technique works best when the
image file is larger then the message file and if the image is
grayscale.
Basics of Modern Steganography

fE:     steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message
Important Requirement for
Steganographic System

Security of the hidden communication
 Robustness against statistical attacks
 Robustness against image
manipulations

Applications


Usage in modern printers



Alleged use by terrorists



Alleged use by intelligence services
Alleged use by terrorists
Origional

Encrypted Image
Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded
packages is called Steganalysis.


Visual Analysis tries to reveal the presence
of secret communication through inspection,
either with the naked eye or with the assistance
of a computer.



Statistical (Algorithmic) Analysis reveals
tiny alterations in an image's statistical behavior
caused by steganographic embedding.


The nominally universal methods developed to detect
embedded stego-data are generally less effective
than the steganalytic methods aimed at specific types
of embedding.
Steganography Sample Website


Here is the link for Sample Steganographic
tool Website:

http://mozaiq.org/
Any Querieries ???

Contenu connexe

Tendances

Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarPapan Sarkar
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
Steganography basic
Steganography basicSteganography basic
Steganography basicSanoj Kumar
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 

Tendances (20)

Steganography
SteganographySteganography
Steganography
 
Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan Sarkar
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography
SteganographySteganography
Steganography
 

En vedette

En vedette (6)

Touch technology in Mobiles
Touch technology in MobilesTouch technology in Mobiles
Touch technology in Mobiles
 
Operating System
Operating SystemOperating System
Operating System
 
Android
AndroidAndroid
Android
 
Mars the red_planet
Mars the red_planetMars the red_planet
Mars the red_planet
 
Visualization
VisualizationVisualization
Visualization
 
Blade server
Blade serverBlade server
Blade server
 

Similaire à Steganography (20)

Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography
Steganography Steganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 

Plus de Divam Goyal

Plus de Divam Goyal (20)

How Social media Effect Social life
How Social media Effect Social lifeHow Social media Effect Social life
How Social media Effect Social life
 
ISO Certificate
ISO CertificateISO Certificate
ISO Certificate
 
Technology
TechnologyTechnology
Technology
 
Piano and keyboard
Piano and keyboardPiano and keyboard
Piano and keyboard
 
SOPA
SOPASOPA
SOPA
 
Input device
Input deviceInput device
Input device
 
New energy resources
New energy resourcesNew energy resources
New energy resources
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Inflection
InflectionInflection
Inflection
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Biometrics
Biometrics Biometrics
Biometrics
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Big bazaar
Big bazaarBig bazaar
Big bazaar
 
Brain rules
Brain rulesBrain rules
Brain rules
 
Bhagat Singh
Bhagat SinghBhagat Singh
Bhagat Singh
 
Apple
AppleApple
Apple
 
Mc donalds
Mc donalds Mc donalds
Mc donalds
 
Social networking
Social networkingSocial networking
Social networking
 
Number of respondents belongs to selected banks
Number of respondents belongs to selected banksNumber of respondents belongs to selected banks
Number of respondents belongs to selected banks
 
Palm jumeirah
Palm jumeirah Palm jumeirah
Palm jumeirah
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Dernier (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Steganography

  • 2. What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover
  • 3. Branches of Information Hiding There are two major branches of information hiding, Steganography and Watermarking Watermarking:     Communication in watermarking is the host signal, with the embedded data providing copyright protection. The existence of a watermark is often declared openly. Any attempt to remove or invalidate the embedded content renders the host useless. They are of two types: Visible watermarking Invisible watermarking Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
  • 4. History of Steganography Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. World War II Invincible inks Null ciphers (unencrypted messages): Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Sent by a German Spy in WWII, by taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 5. Microdot Technology Shrinking messages down to the size of a dot became a popular method. Since the microdot could be placed at the end of a sentence or above a j or an i. 
  • 6. Modern Steganography Techniques Masking and Filtering : Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. Algorithms and Transformations : This technique hides data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients. Least Significant Bit Insertion : The most common and popular method of modern day steganography is to make use of the LSB of a picture’s pixel information.This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 7. Basics of Modern Steganography fE:     steganographic function "embedding" fE-1:   steganographic function "extracting" cover:  cover data in which emb will be hidden emb:    message to be hidden key:    parameter of fE stego:  cover data with the hidden message
  • 8. Important Requirement for Steganographic System Security of the hidden communication  Robustness against statistical attacks  Robustness against image manipulations 
  • 9. Applications  Usage in modern printers  Alleged use by terrorists  Alleged use by intelligence services
  • 10. Alleged use by terrorists Origional Encrypted Image
  • 11. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis.  Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.  Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  • 12. Steganography Sample Website  Here is the link for Sample Steganographic tool Website: http://mozaiq.org/