SlideShare une entreprise Scribd logo
1  sur  32
Steganography
Presented by:
Chudasama Khushbu
VIII sem-CSE
10ECACS003
Presentation
On
Outlines
What is Steganography?
History of Steganography
Steganography, Cryptography & Watermarking
Types of Digital Steganography
Image based Technique
Security
Use of steganography
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the intended
recipient knows of the existence of the message.
This can be achieve by concealing the existence of
information within seemingly harmless carriers or cover
Carrier: text, image, video, audio, etc
Steganography
Tattoos on shaved heads
Wax-covered tablets
Microdots – shrunken pictures
Invisible Inks - milk, fruit juice, urine
History of Steganography
STEGANOGRAPHY TERMS
Carrier or Cover File
Stego-Medium
Embedded or Payload
Steganalysis
Security
Systems
Cryptography
Information
Hiding
Steganography Watermarking
Steganography, Cryptography
&Watermarking
Major two branches of information
hiding, Steganography and Watermarking.
Steganography and Cryptography are closely
related.
The difference is in their goals.
Conti..
Cryptography
• Science of writing in secret
code and is an ancient art.
• Achieve security by encoding
messages to make them non-
readable.
• Process to convert Plain Text
in to Cipher Text.
• Plain Text: Clear Text
• Cipher Text: Codified Text
Plain Text
Cryptogra
phy Tech
Cipher
Text
Watermarking
• Used to verify the identity and
authenticity of the owner of a digital
image.
• Process in which the information which
verifies the owner is embedded into the
digital image or signal. Signals could be
either videos or pictures or audios.
• Two types; visible watermarking and
invisible watermarking.
Steganography
How It Works
Main difference is..
 Cryptography: although encypted and
unreadable,the existence of
data is not hidden
 Steganography: no knowledge of the existence
of the data
 Watermarking: extending the file with extra
information
Conti..
STEGANOGRAPHY STEPS
ENCODING
Step
3
• Steganographic
data
Step
2
• Encode
embedded data
with cover data
Step1
• Prepare
cover
data
DECODING
• Steganographic
Data
Step1
• Decode
Plain info
Step 2
• Embedded
data
obtained
Step 3
Hiding a Message inside Text
Hiding a Message inside Images
• Most popular technique
Hiding a Message inside Audio and Video
Files
Types of Steganography
Hiding a Message inside Text
 Partially effective
 Example:
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.
Reveals: MEET AT THE FRONT OF THE TRAP
Hiding a Message inside Images
 Most widely used medium today.
 Takes advantage of our limited visual
perception of colors.
 This field is expected to continually grow as
computer graphics power also grows.
Image Attributes:
• Digital images are made up of pixels.
• The arrangement of pixels make up the
image’s “raster data”.
• 8-bit and 24-bit images are common.
• The larger the image size, the more
information you can hide.
Hiding a Message inside Audio and Video
Files
• Embedding secret message in to digital sound
is known as audio & video steganography.
• Large amount of data that can be hidden inside.
• Hard to recognize because of the continuous
flow of information (moving stream of images
and sound).
The most common approaches to information
hiding in images are:
 Least significant bit (LSB) Insertion
 Masking and Filtering Techniques
 Algorithms and Transformations
Image based Technique
 Least Significant Bit (LSB) Insertion
 Most popular technique when dealing with images.
 Replaces least significant bits with the message to be
encoded.
 It is best to use images with “noisy areas” – areas
with ample color variation and without large areas of
solid color.
 Requires on average that only half the bits in image
be changed.
Example:
 example shows how the letter A can be
hidden in the first eight bytes of three
pixels in a 24-bit image.
Pixels:
(00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
A: 10000001
Result:
(00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
 Only three bits that were actually altered.
A only requires eight bytes to hide it in, the ninth
byte of the three pixels can be used to hide the next
character of the hidden message.
 Masking and Filtering
• Uses..
 Digital Watermarking – provides identification
pertaining to the owner;
I.e. license or copyright information
- Invisible & Visible
 Fingerprinting – provides identification of the user;
used to identify and track illegal use of content
Confidentiality: any unauthorized person does
not know that sensitive data exists
Survivability: verifing that the data does not get
destroyed in the transmission
No detection: cannot be easily found out that the
data is hidden in a given file
Visibility: people cannot see any visible changes to
the file in which the data is hidden
Security
Governments
Businesses: Digital Watermarking
Individuals
Uses of Steganography
ILLEGAL USAGE
HACKERS
TERRORISTS
CRIMINALS
U.S. officials said on
5 February 2001 that
Late. Osama bin
Laden was posting
instructions for
terrorist activities.
He was master in
this technology.
The 9/11 attack
heightened our
awareness of
steganography. It is
well published that
Bin Laden and his
terrorist cells use
steganography for
communications
Live Demo:
QUERIES
Steganography

Contenu connexe

Tendances

Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 

Tendances (20)

Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
steganography
steganographysteganography
steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 

Similaire à Steganography

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
B03208016
B03208016B03208016
B03208016inventy
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 

Similaire à Steganography (20)

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
B03208016
B03208016B03208016
B03208016
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

Dernier

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Dernier (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Steganography

  • 1. Steganography Presented by: Chudasama Khushbu VIII sem-CSE 10ECACS003 Presentation On
  • 2. Outlines What is Steganography? History of Steganography Steganography, Cryptography & Watermarking Types of Digital Steganography Image based Technique Security Use of steganography
  • 3. Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc Steganography
  • 4. Tattoos on shaved heads Wax-covered tablets Microdots – shrunken pictures Invisible Inks - milk, fruit juice, urine History of Steganography
  • 5. STEGANOGRAPHY TERMS Carrier or Cover File Stego-Medium Embedded or Payload Steganalysis
  • 7. Major two branches of information hiding, Steganography and Watermarking. Steganography and Cryptography are closely related. The difference is in their goals. Conti..
  • 8. Cryptography • Science of writing in secret code and is an ancient art. • Achieve security by encoding messages to make them non- readable. • Process to convert Plain Text in to Cipher Text. • Plain Text: Clear Text • Cipher Text: Codified Text Plain Text Cryptogra phy Tech Cipher Text
  • 9. Watermarking • Used to verify the identity and authenticity of the owner of a digital image. • Process in which the information which verifies the owner is embedded into the digital image or signal. Signals could be either videos or pictures or audios. • Two types; visible watermarking and invisible watermarking.
  • 10.
  • 12. Main difference is..  Cryptography: although encypted and unreadable,the existence of data is not hidden  Steganography: no knowledge of the existence of the data  Watermarking: extending the file with extra information Conti..
  • 14. ENCODING Step 3 • Steganographic data Step 2 • Encode embedded data with cover data Step1 • Prepare cover data
  • 15. DECODING • Steganographic Data Step1 • Decode Plain info Step 2 • Embedded data obtained Step 3
  • 16. Hiding a Message inside Text Hiding a Message inside Images • Most popular technique Hiding a Message inside Audio and Video Files Types of Steganography
  • 17. Hiding a Message inside Text  Partially effective  Example: randoM capitalosis is a rarE disEase ofTen contrAcTed by careless inTernet users. tHis sad illnEss causes the aFfected peRsON To randomly capitalize letters in a bOdy oF texT. please do not confuse this disease witH a blatant attEmpt aT steganogRAPhy. Reveals: MEET AT THE FRONT OF THE TRAP
  • 18. Hiding a Message inside Images  Most widely used medium today.  Takes advantage of our limited visual perception of colors.  This field is expected to continually grow as computer graphics power also grows.
  • 19. Image Attributes: • Digital images are made up of pixels. • The arrangement of pixels make up the image’s “raster data”. • 8-bit and 24-bit images are common. • The larger the image size, the more information you can hide.
  • 20. Hiding a Message inside Audio and Video Files • Embedding secret message in to digital sound is known as audio & video steganography. • Large amount of data that can be hidden inside. • Hard to recognize because of the continuous flow of information (moving stream of images and sound).
  • 21. The most common approaches to information hiding in images are:  Least significant bit (LSB) Insertion  Masking and Filtering Techniques  Algorithms and Transformations Image based Technique
  • 22.  Least Significant Bit (LSB) Insertion  Most popular technique when dealing with images.  Replaces least significant bits with the message to be encoded.  It is best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color.  Requires on average that only half the bits in image be changed.
  • 23. Example:  example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image. Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001)
  • 24. A: 10000001 Result: (00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001)  Only three bits that were actually altered. A only requires eight bytes to hide it in, the ninth byte of the three pixels can be used to hide the next character of the hidden message.
  • 25.  Masking and Filtering • Uses..  Digital Watermarking – provides identification pertaining to the owner; I.e. license or copyright information - Invisible & Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 26. Confidentiality: any unauthorized person does not know that sensitive data exists Survivability: verifing that the data does not get destroyed in the transmission No detection: cannot be easily found out that the data is hidden in a given file Visibility: people cannot see any visible changes to the file in which the data is hidden Security
  • 29. U.S. officials said on 5 February 2001 that Late. Osama bin Laden was posting instructions for terrorist activities. He was master in this technology. The 9/11 attack heightened our awareness of steganography. It is well published that Bin Laden and his terrorist cells use steganography for communications