0% found this document useful (0 votes)
32 views14 pages

Finalll

Steganography is the art and science of hiding the fact that communication is taking place. By taking the second letter of every word the hidden message "Pershing sails for NY June 1" can be retrieved. The simplest and most common type of stegangraphy is LSB of a picture"s pixel information.

Uploaded by

nagalaxmirk
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views14 pages

Finalll

Steganography is the art and science of hiding the fact that communication is taking place. By taking the second letter of every word the hidden message "Pershing sails for NY June 1" can be retrieved. The simplest and most common type of stegangraphy is LSB of a picture"s pixel information.

Uploaded by

nagalaxmirk
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

Steganography

Nagalaxmi
Vtu.no:3PD08EC045

What is Steganography?

Greek Words:
STEGANOS Covered GRAPHIE Writing

Steganography is the art and science of hiding the fact that communication is taking place.

Evolution

Cryptography

Steganography

Watermarkin g

History of Steganography

In Ancient greece they used to select messengers and shaved their head and tattooed it with a message which disappeared after their hair had regrown.

1st and 2nd World Wars


German spies used invisible ink to print very small dots on letters. A message sent by a German spy during World War II read: Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects for pretext embargo on by-products, ejecting suets and vegetable oils. By taking the second letter of every word the hidden message Pershing sails for NY June 1 can be retrieved

Steganography terms

Carrier or Cover File A Original message or a file in which hidden information will be stored. Embedded or Payload The information which is to be hidden or concealed. Stego-Medium The medium in which the information is hidden.

Steganography under various media

Steganography In Text/Documents Steganography In Images

Steganography In Audio

Steganography in Text

Line Shift Coding: Lines are vertically shifted. In line shift coding, shift various lines inside the document up or down by a small fraction (such as 1/300th of an inch). Word Shift Coding: Code words are horizontally shifted. The decoding technique is measuring the spaces between each word and a left shift could represent a 0 bit and a right shift representing a 1 bit. Alternative Method: White Space Manipulation Feature coding

I. II.

Steganography in image

LSB insertion: The simplest and most common type of steganography is LSB of a pictures pixel information

Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file.

01011101 11010000 00011100 10101100 11100111 10000111 01101011 11100011


becomes 01011100 11010001 00011100 10101100 11100110 10000110 01101010 11100011

Masking and Filtering: Is where information is hidden inside a image using digital watermarks that include information such as copyright, ownership, or licenses.

Alternative Method: Algorithms and Transformations:

Steganography in audio

Low bit encoding :Similarly to how data was stored in the least-significant bit of images, binary data can be stored in the least-significant bit of audio files
Echo Data Hiding :By simply adding extra sound to an echo inside an audio file, information can be concealed.
Alternative Methods:
PHASE CODING SPREAD SPECTRUM

I.
II.

Detection of Steganographic Content


The detection of steganographically encoded packages is called Steganalysis.

Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. Statistical Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.

APPLICATIONS OF STEGANOGRAPHY
I.

Secure Communication It is a state-of-the-art digital steganography software package developed for confidential multimedia communication. The software allows the user to select a multimedia data file or "container" for embedding hidden text, audio, video clip, or any form of data file. The contents of the text message are hashed with those of the container file to produce a key file. The key file is also known as a Stegfile.

II.

III.

CONCLUSION

Steganography can protect data by hiding it but using it alone may not guarantee total protection. In case of encryption, by seeing the meaningless appearing sequence of bits enemy can detect that some illegal message is being sent. However, if one uses both methods, this will lead to security in depth. The message should first be encoded using a strong encryption algorithm and then embedded into a carrier.

I.

II.

III.

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy