Finalll
Finalll
Nagalaxmi
Vtu.no:3PD08EC045
What is Steganography?
Greek Words:
STEGANOS Covered GRAPHIE Writing
Steganography is the art and science of hiding the fact that communication is taking place.
Evolution
Cryptography
Steganography
Watermarkin g
History of Steganography
In Ancient greece they used to select messengers and shaved their head and tattooed it with a message which disappeared after their hair had regrown.
Steganography terms
Carrier or Cover File A Original message or a file in which hidden information will be stored. Embedded or Payload The information which is to be hidden or concealed. Stego-Medium The medium in which the information is hidden.
Steganography In Audio
Steganography in Text
Line Shift Coding: Lines are vertically shifted. In line shift coding, shift various lines inside the document up or down by a small fraction (such as 1/300th of an inch). Word Shift Coding: Code words are horizontally shifted. The decoding technique is measuring the spaces between each word and a left shift could represent a 0 bit and a right shift representing a 1 bit. Alternative Method: White Space Manipulation Feature coding
I. II.
Steganography in image
LSB insertion: The simplest and most common type of steganography is LSB of a pictures pixel information
Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file.
Masking and Filtering: Is where information is hidden inside a image using digital watermarks that include information such as copyright, ownership, or licenses.
Steganography in audio
Low bit encoding :Similarly to how data was stored in the least-significant bit of images, binary data can be stored in the least-significant bit of audio files
Echo Data Hiding :By simply adding extra sound to an echo inside an audio file, information can be concealed.
Alternative Methods:
PHASE CODING SPREAD SPECTRUM
I.
II.
Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. Statistical Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.
APPLICATIONS OF STEGANOGRAPHY
I.
Secure Communication It is a state-of-the-art digital steganography software package developed for confidential multimedia communication. The software allows the user to select a multimedia data file or "container" for embedding hidden text, audio, video clip, or any form of data file. The contents of the text message are hashed with those of the container file to produce a key file. The key file is also known as a Stegfile.
II.
III.
CONCLUSION
Steganography can protect data by hiding it but using it alone may not guarantee total protection. In case of encryption, by seeing the meaningless appearing sequence of bits enemy can detect that some illegal message is being sent. However, if one uses both methods, this will lead to security in depth. The message should first be encoded using a strong encryption algorithm and then embedded into a carrier.
I.
II.
III.
THANK YOU