SlideShare une entreprise Scribd logo
1  sur  9
What is Steganography?

Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”

 Steganography is the art and
  science of writing hidden messages
  in such a way that no one apart       Stegosaurus: a covered lizard



  from the intended recipient knows
                                        (but not a type of cryptography)




  of the existence of the message.

 This can be achieve by concealing
  the existence of information
  within seemingly harmless carriers
  or cover

 Carrier: text, image, video, audio,
  etc.
Cryptography
   Cryptography was concerned solely with message
    confidentiality (i.e., encryption)—conversion of message
    from a comprehensible form into an incomprehensible one
    and back again at the other end, rendering it unreadable by
    interceptors or eavesdroppers without secret knowledge
    (namely the key needed for decryption of that message)

Cryptography is secret writing. Anybody can see the message,
  but nobody else can read it. Usually, this is because its letters
  have been re-arranged, or replaced by different letters,
  according to some scheme that only the sender and receiver
  know. Only those who possess a secret key can decrypt the
  message into plain text
DIFFERENCE B/W
CRYPTOGRAPHY AND STEGANOGRAPHY
Steganography deals with composing hidden messages so that
only the sender and the receiver know that the message even
exists. Since, nobody except the sender and the receiver knows
the existence of the message, it does not attract unwanted
attention.
Steganography is hidden writing. The message is there, but
nobody notices it. Once the presence of hidden information is
revealed or even suspected, the purpose of steganography is
defeated.
However, once noticed, it can be read. A common form of
steganography is the use of JPEG files (a computer image) to
hide the message.
The obvious advantage of Steganography over
cryptography is that messages do not attract any
attention
History of Steganography
   Steganography ancient origins can be traced back to 440 BC, from the Histories of
  Herodotus
  Demeratus sent a warning about a forthcoming attack to Greece by writing it on a
  wooden panel and covering it in wax.
    Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it.
  After his hair had grown the message was hidden. The purpose was to instigate a revolt
  against the Persians.
   Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells
  the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the
  hair that afterwards grew over it, and exposed by shaving the head again. The message
  allegedly carried a warning to Greece about Persian invasion plans



World War II
the French Resistance sent some messages written on the backs of couriers using invisible
   ink.
Modern Steganography Technique


Least Significant Bit Insertion: The most common and
  popular method of modern day Steganography is to
  make use of the LSB of a picture’s pixel information.
  Thus the overall image distortion is kept to a minimum
  while the message is spaced out over the pixels in the
  images. This technique works best when the image file
  is larger then the message file and if the image is
  grayscale.
Image of a tree with a steganographically
hidden image. The hidden image is revealed by
removing all but the two least significant bits
of each color component and a subsequent
normalization. The hidden image is shown
below.


                Image of a cat extracted from the tree image
                above.
Basics of Modern Steganography




fE:     steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message
Important Requirement for
           Steganographic System
Security of the hidden communication


size of the payload


Robustness against malicious and unintentional attacks
Detection of Steganographic
        Content/Countermeasures
The detection of steganographically encoded packages is
 called Steganalysis.

  Visual Analysis tries to reveal the presence of secret
    communication through inspection, either with the naked eye
    or with the assistance of a computer.

  Statistical (Algorithmic) Analysis reveals tiny alterations
    in an image's statistical behavior caused by steganographic
    embedding.
     The nominally universal methods developed to detect embedded stego-
      data are generally less effective than the steganalytic methods aimed at
      specific types of embedding.

Contenu connexe

Tendances

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Steganography
SteganographySteganography
Steganography
Sonam M
 

Tendances (20)

Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
cryptography
cryptographycryptography
cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
steganography
steganographysteganography
steganography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 

En vedette

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Recent trends in satellite communication
Recent trends in satellite communicationRecent trends in satellite communication
Recent trends in satellite communication
Suriya Prakash
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentation
Vikas Sharma
 

En vedette (18)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Mobile comp
Mobile comp Mobile comp
Mobile comp
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Recent trends in satellite communication
Recent trends in satellite communicationRecent trends in satellite communication
Recent trends in satellite communication
 
Stenographgh[1]
Stenographgh[1]Stenographgh[1]
Stenographgh[1]
 
Steganography
SteganographySteganography
Steganography
 
Big data security
Big data securityBig data security
Big data security
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Ppt on irrigation
Ppt on irrigationPpt on irrigation
Ppt on irrigation
 
Satellites presentation
Satellites presentationSatellites presentation
Satellites presentation
 
Irrigation PPT
Irrigation PPTIrrigation PPT
Irrigation PPT
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Satellite communications ppt
Satellite communications pptSatellite communications ppt
Satellite communications ppt
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 

Similaire à Steganography ppt

Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 

Similaire à Steganography ppt (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Stegnography
StegnographyStegnography
Stegnography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Presentation1
Presentation1Presentation1
Presentation1
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Information hiding
Information hidingInformation hiding
Information hiding
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Steganography
SteganographySteganography
Steganography
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography
Steganography Steganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 

Dernier

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Steganography ppt

  • 1. What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart Stegosaurus: a covered lizard from the intended recipient knows (but not a type of cryptography) of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc.
  • 2. Cryptography Cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of message from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message) Cryptography is secret writing. Anybody can see the message, but nobody else can read it. Usually, this is because its letters have been re-arranged, or replaced by different letters, according to some scheme that only the sender and receiver know. Only those who possess a secret key can decrypt the message into plain text
  • 3. DIFFERENCE B/W CRYPTOGRAPHY AND STEGANOGRAPHY Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since, nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. Steganography is hidden writing. The message is there, but nobody notices it. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated. However, once noticed, it can be read. A common form of steganography is the use of JPEG files (a computer image) to hide the message. The obvious advantage of Steganography over cryptography is that messages do not attract any attention
  • 4. History of Steganography Steganography ancient origins can be traced back to 440 BC, from the Histories of Herodotus Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece about Persian invasion plans World War II the French Resistance sent some messages written on the backs of couriers using invisible ink.
  • 5. Modern Steganography Technique Least Significant Bit Insertion: The most common and popular method of modern day Steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 6. Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. The hidden image is shown below. Image of a cat extracted from the tree image above.
  • 7. Basics of Modern Steganography fE:     steganographic function "embedding" fE-1:   steganographic function "extracting" cover:  cover data in which emb will be hidden emb:    message to be hidden key:    parameter of fE stego:  cover data with the hidden message
  • 8. Important Requirement for Steganographic System Security of the hidden communication size of the payload Robustness against malicious and unintentional attacks
  • 9. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego- data are generally less effective than the steganalytic methods aimed at specific types of embedding.