SlideShare a Scribd company logo
1 of 29
Simple Overview of
Steganography
December 2012
Ashenafi Ethio
1
What is Steganography?
It is the art and science of writing hidden
messages in such a way that no one apart from
the intended recipient knows of the existence of
the message.
steganography
steganós
covered
graptos
writing
The art of secret (hidden) writing
2
History of Steganography
An ancient Greek named Histaiaeus was
fomenting revolt against the king of Persia and
needed to pass along a message secretly.
3
History of Steganography
In 5th century B.C. an exiled Greek named
Demaratus wrote a warning that the Persians
planned to attack Sparta.
4
History of Steganography
 When the USS Pueblo was captured by North Korea in
1968, the crew was forced to pose for propaganda
photos to demonstrate they were being well treated.
Their finger gestures are a form of steganography that
sends a message Americans
Fdfdsf
Fdfdsf
Dfdfd
Dsfdsf
Dsfds
5
Steganography Vs. Cryptography
Both have been used as means to protect
information
Cryptographic techniques "scramble" messages so
if intercepted, the messages cannot be
understood.
Steganography, in an essence, "cover-ups" a
message to hide its existence and make it seem
"invisible" thus concealing the fact that a message
is being sent altogether.
6
Steganography Vs. Cryptography
Original Message: Start Attacking at 11:00 Pm.
Steganography: Hiding messages within carrier objects
Cryptography: Encrypting messages
[k>>4]*2^k*257/8,s[j]=k^(k&k*2&34)
7
Steganography and cryptography can be
combined
The message can also be encrypted before it is
hidden inside a cover message. This provides
a double layer of protection.
Encryption will make the existence of the
message more difficult to detect, due to the
fact that some encryption techniques cause
the patterns of the characters in the
encrypted version to be more random than in
the original version.
8
A practical comparison of steganography and
cryptography
Purchasing some books online
 Order the books online
 to pay for the books by supplying our credit card
number(we check to make certain that our browser
has switched into the secure mode)
 Sending our credit number should be secret and it is
our hope that the transmission is encrypted by the
browser.
 Vendor can decrypt the message and read our credit
card number.
In this case, there is no need for steganography because
there is no need to hide the existence of the message.
9
A romantic tryst
Let’s assume that you are sending a message
to Alice (your best friend's wife) to arrange a
romantic tryst.
In this case, you would probably prefer that
neither your wife nor your best friend know
the existence of the message.
(If they learn the secret message, they may not
continue to be your wife and your best friend for
very much longer)
10
A romantic tryst
Use some form of steganography to hide the
existence of the secret message.
It also wouldn't hurt to encrypt the message
using Alice's public key
 That way, even if the existence of the
message is detected, it wouldn't be possible
for your wife or your best friend to read it.
(That may increase your chances of survival even
if the existence of the message is detected)
11
How to send the message to Alice
We can use Steganography
We have different forms of Steganography to
hide the existence of the message.
The easiest way would be to send his latest
set of digital vacation photos to Alice and her
husband by embedding the message in one of
the photos.
12
How to send the message to Alice
Alice could extract and read your message.
 Alice's husband would probably see a set of
vacation photos. The existence of a secret
message would certainly not be obvious in
viewing the photos.
Alice could embed her answer in a digital photo
of her graduation.
 She could send that picture to you and your
wife.
 You could extract and read the message.
 Your wife could say congratulations to Alice.
13
How to send the message to Alice
You and Alice could continue to secretly
communicate in this manner for as long as you
could come up with reasons to exchanges
digital photos.
(That approach might get stale after a while and
you would need to come up with some other
form of steganography to continue the dialog)
14
How Steganography works
15
Cover is the original picture, audio or video file.
 Emb is the message to be embeded.
Key is the parameter which controls the hiding
process of the secret message
Stego is the resultant file that contains the hidden
message.
(We have to be careful that how much information
we try to conceal within the carrier. The longer the
message, the larger the modification of the carrier
image and the higher the probability that the
modifications can be statistically detected )
16
Common techniques in Steganography
Modern day steganography mainly deals with
hiding information within other files such as
Image, Audio, Video files. These files can “contain
perceptually irrelevant or redundant information
that can be substituted for hidden messages
There are three common techniques in use today:
Substitution
Injection
Generation of new files
17
I. Substitution
Every file that is created will contain unused or
insignificant areas of data. These areas can be
replaced without any visible changes to the
visual or audio clarity of the file.
This enables one to conceal sensitive
information within the file and still have the
file appear as though it is the same as the
original unmodified version.
18
I. Substitution
Also called the Least Significant Bit (LSB) method
which replaces the last bit in an 8 bit byte.
E.g. 10010110 01101010 11100101
If we change the most significant bit it would be
likely have a significant effect on the picture and
be easily seen by the naked eye. However, if we
change the last bit (1) in the last byte then
chances are that this change would not be
noticeable.
19
I. Substitution
LSB works best in files that have a lot of ‘noise’
i.e. Pictures that have many colors and shapes
or audio files that have a lot of different
sounds and effects such as echoes.
Substitution method generally does not
increase the size of the file but depending on
the size of the hidden message, it can
eventually cause a noticeable change from the
unmodified version.
20
II. Injection
Injection involves embedding the secret
message directly into the carrier object.
The problem with this approach is that it
generally makes the file larger than the
original unmodified file.
21
II. Generation of New Files
This technique involves taking your message and
using this to generate a new file from scratch.
22
Choice of Carrier
What digital format should we choose to
conceal our private message?
Steganography can be used in just about any
type of file. The most common methods used
are
a. Images
b. Audio
c. Video
23
Detecting the use of Steganography
Steganalysis is identifying the existence of a
hidden message in Steganography.
There are two types of attacks
Active
This involves destroying the hidden message
Passive
Detecting the use of steganography and is an
introduction to actually deciphering the hidden
message.
Viewing the file
Listening to the file
24
Advantages of Steganography
Securely storing sensitive data, such as
hiding system passwords or keys within other
files.
Difficult to detect.
Network surveillance and monitoring
systems will not flag messages or files that
contain Steganography data.
25
Disadvantages of Steganography
if someone knows the message is there, the
message can be easily read.
If you want to send large file like book, it's pretty
hard to hide with steganography
Network surveillance and monitoring systems will
not flag messages or files that contain
steganographic data. Therefore, if someone
attempted to steal confidential data, they could
conceal it within another file and send it in an
innocent looking email.
26
27
Conclusion
steganography as a tool to conceal highly
sensitive information with other digital
information. It is not a replacement for
cryptography but it is other form of hiding
information.
28
Thank You!
29

More Related Content

What's hot

Steganography
SteganographySteganography
Steganographysandeipz
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarPapan Sarkar
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Imagesijtsrd
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography
SteganographySteganography
Steganography
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
Steganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan SarkarSteganography Project Presentation By Papan Sarkar
Steganography Project Presentation By Papan Sarkar
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
10.1.1.62.8194
10.1.1.62.819410.1.1.62.8194
10.1.1.62.8194
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography

CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 

Similar to Steganography (20)

Steganography
Steganography Steganography
Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
digital stega
digital stegadigital stega
digital stega
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
Presentation1
Presentation1Presentation1
Presentation1
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Steganography

  • 2. What is Steganography? It is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. steganography steganós covered graptos writing The art of secret (hidden) writing 2
  • 3. History of Steganography An ancient Greek named Histaiaeus was fomenting revolt against the king of Persia and needed to pass along a message secretly. 3
  • 4. History of Steganography In 5th century B.C. an exiled Greek named Demaratus wrote a warning that the Persians planned to attack Sparta. 4
  • 5. History of Steganography  When the USS Pueblo was captured by North Korea in 1968, the crew was forced to pose for propaganda photos to demonstrate they were being well treated. Their finger gestures are a form of steganography that sends a message Americans Fdfdsf Fdfdsf Dfdfd Dsfdsf Dsfds 5
  • 6. Steganography Vs. Cryptography Both have been used as means to protect information Cryptographic techniques "scramble" messages so if intercepted, the messages cannot be understood. Steganography, in an essence, "cover-ups" a message to hide its existence and make it seem "invisible" thus concealing the fact that a message is being sent altogether. 6
  • 7. Steganography Vs. Cryptography Original Message: Start Attacking at 11:00 Pm. Steganography: Hiding messages within carrier objects Cryptography: Encrypting messages [k>>4]*2^k*257/8,s[j]=k^(k&k*2&34) 7
  • 8. Steganography and cryptography can be combined The message can also be encrypted before it is hidden inside a cover message. This provides a double layer of protection. Encryption will make the existence of the message more difficult to detect, due to the fact that some encryption techniques cause the patterns of the characters in the encrypted version to be more random than in the original version. 8
  • 9. A practical comparison of steganography and cryptography Purchasing some books online  Order the books online  to pay for the books by supplying our credit card number(we check to make certain that our browser has switched into the secure mode)  Sending our credit number should be secret and it is our hope that the transmission is encrypted by the browser.  Vendor can decrypt the message and read our credit card number. In this case, there is no need for steganography because there is no need to hide the existence of the message. 9
  • 10. A romantic tryst Let’s assume that you are sending a message to Alice (your best friend's wife) to arrange a romantic tryst. In this case, you would probably prefer that neither your wife nor your best friend know the existence of the message. (If they learn the secret message, they may not continue to be your wife and your best friend for very much longer) 10
  • 11. A romantic tryst Use some form of steganography to hide the existence of the secret message. It also wouldn't hurt to encrypt the message using Alice's public key  That way, even if the existence of the message is detected, it wouldn't be possible for your wife or your best friend to read it. (That may increase your chances of survival even if the existence of the message is detected) 11
  • 12. How to send the message to Alice We can use Steganography We have different forms of Steganography to hide the existence of the message. The easiest way would be to send his latest set of digital vacation photos to Alice and her husband by embedding the message in one of the photos. 12
  • 13. How to send the message to Alice Alice could extract and read your message.  Alice's husband would probably see a set of vacation photos. The existence of a secret message would certainly not be obvious in viewing the photos. Alice could embed her answer in a digital photo of her graduation.  She could send that picture to you and your wife.  You could extract and read the message.  Your wife could say congratulations to Alice. 13
  • 14. How to send the message to Alice You and Alice could continue to secretly communicate in this manner for as long as you could come up with reasons to exchanges digital photos. (That approach might get stale after a while and you would need to come up with some other form of steganography to continue the dialog) 14
  • 16. Cover is the original picture, audio or video file.  Emb is the message to be embeded. Key is the parameter which controls the hiding process of the secret message Stego is the resultant file that contains the hidden message. (We have to be careful that how much information we try to conceal within the carrier. The longer the message, the larger the modification of the carrier image and the higher the probability that the modifications can be statistically detected ) 16
  • 17. Common techniques in Steganography Modern day steganography mainly deals with hiding information within other files such as Image, Audio, Video files. These files can “contain perceptually irrelevant or redundant information that can be substituted for hidden messages There are three common techniques in use today: Substitution Injection Generation of new files 17
  • 18. I. Substitution Every file that is created will contain unused or insignificant areas of data. These areas can be replaced without any visible changes to the visual or audio clarity of the file. This enables one to conceal sensitive information within the file and still have the file appear as though it is the same as the original unmodified version. 18
  • 19. I. Substitution Also called the Least Significant Bit (LSB) method which replaces the last bit in an 8 bit byte. E.g. 10010110 01101010 11100101 If we change the most significant bit it would be likely have a significant effect on the picture and be easily seen by the naked eye. However, if we change the last bit (1) in the last byte then chances are that this change would not be noticeable. 19
  • 20. I. Substitution LSB works best in files that have a lot of ‘noise’ i.e. Pictures that have many colors and shapes or audio files that have a lot of different sounds and effects such as echoes. Substitution method generally does not increase the size of the file but depending on the size of the hidden message, it can eventually cause a noticeable change from the unmodified version. 20
  • 21. II. Injection Injection involves embedding the secret message directly into the carrier object. The problem with this approach is that it generally makes the file larger than the original unmodified file. 21
  • 22. II. Generation of New Files This technique involves taking your message and using this to generate a new file from scratch. 22
  • 23. Choice of Carrier What digital format should we choose to conceal our private message? Steganography can be used in just about any type of file. The most common methods used are a. Images b. Audio c. Video 23
  • 24. Detecting the use of Steganography Steganalysis is identifying the existence of a hidden message in Steganography. There are two types of attacks Active This involves destroying the hidden message Passive Detecting the use of steganography and is an introduction to actually deciphering the hidden message. Viewing the file Listening to the file 24
  • 25. Advantages of Steganography Securely storing sensitive data, such as hiding system passwords or keys within other files. Difficult to detect. Network surveillance and monitoring systems will not flag messages or files that contain Steganography data. 25
  • 26. Disadvantages of Steganography if someone knows the message is there, the message can be easily read. If you want to send large file like book, it's pretty hard to hide with steganography Network surveillance and monitoring systems will not flag messages or files that contain steganographic data. Therefore, if someone attempted to steal confidential data, they could conceal it within another file and send it in an innocent looking email. 26
  • 27. 27
  • 28. Conclusion steganography as a tool to conceal highly sensitive information with other digital information. It is not a replacement for cryptography but it is other form of hiding information. 28