SlideShare una empresa de Scribd logo
1 de 23
STEGANOGRAPHY
INTRODUCTION

                                   No one apart
                                      from the
    Art and            A form of    sender and
 science of             security     intended
writing hidden          through      recipient,
 messages              obscurity   suspects the
                                    existence of
                                   the message


     www.company.com
Steganós   •   Covered

Graptos    •   Writing




ETYMOLOGY
HISTORY OF STEGANOGRAPHY

                    Current


                    1st and 2nd
                    World Wars




                    440 B.C.


  www.company.com
Cryptography


               Steganography

Watermarking


  EVOLUTION
ADVANTAGE OF STEGANOGRAPHY
    OVER CRYPTOGRAPHY



  Messages do not
  attract attention to    Protects both
      themselves         messages and
                         communicating
                             parties


  www.company.com
TYPES OF STEGANOGRAPHY

 Steganography In Text/Documents

 Steganography In Video

 Steganography In Audio

 Steganography In Images
   www.company.com
Carrier or Cover File

           Stego-Medium

        Embedded or Payload

           Steganalysis



STEGANOGRAPHY TERMS
VIDEO
HOW IT WORKS
www.company.com
STEGANOGRAPHY STEPS

                   Steganography




      Encoding a              Decode a
       message                message
 www.company.com
Embedded
  Data



             MESSAGE


Plain info




      MESSAGE
ENCODING

                        Step 2
• Prepare          • Encode
                                       • Steganographic
                                         data
  cover data         embedded
                     data with cover
                     data
    Step1                                   Step 3
     www.company.com
DECODING

                         Step 2
• Steganographic                    • Embedded
  Data               • Decode         data
                       Plain info     obtained

     Step1                             Step 3

       www.company.com
STEGANALYSIS
Art and Science of detecting hidden
            messages


     Just discover Steganography



 Not deals with decrypting the data
www.company.com
Line Shift Coding

                Word Shift Coding

                 Feature Coding

          Least Significant Bit Insertion

                Low bit encoding

             Masking and Filtering




STEGANOGRAPHY TECHNIQUES
STEGANOGRAPHY USING
 LEAST SIGNIFICANT BIT




www.company.com
PRACTICAL
Program          Image files   Audio files    Video files   Document
                                                                   files
                      BMP, JPG,     Mp3, WAV       3gp, Mp4,        Pdf
                      PNG, TGA                      MPEG-1,
     OpenPuff                                     MPEG-2, VOB,
                                                   SWF, FLV
     MP3Stego              -           Mp3             -            -
     OpenStego        BMP, PNG           -              -           -
      S-Tools          BMP, GIF        Wav              -           -
      StegFS               -             -              -           -
   Steganographic     BMP, PNG,          -              -           -
  Laboratory (VSL)    JPG, TIFF

     PHP-Class           PNG             -              -           -
StreamSteganography



List of some tools for Steganography
        www.company.com
USAGE IN MODERN PRINTERS

  Tiny yellow dots are added to each page


Printer serial numbers date and time stamps
         are encoded on yellow dots


EXAMPLE: HP and Xerox color laser printers.
    www.company.com
ILLEGAL USAGE

                   HACKERS



                  TERRORISTS



                  CRIMINALS


www.company.com
CONCLUSION
QUERIES




www.company.com

Más contenido relacionado

La actualidad más candente

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 

La actualidad más candente (20)

Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image steganography
Image steganographyImage steganography
Image steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
Steganography Steganography
Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 

Similar a Steganography

Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 

Similar a Steganography (20)

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
L1803037377
L1803037377L1803037377
L1803037377
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 

Más de Neha Sharma

Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational Research
Neha Sharma
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft Surface
Neha Sharma
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist Attacks
Neha Sharma
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface
Neha Sharma
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality Shows
Neha Sharma
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics Practical
Neha Sharma
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about Maths
Neha Sharma
 

Más de Neha Sharma (9)

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational Research
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft Surface
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist Attacks
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality Shows
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics Practical
 
IPv6
IPv6IPv6
IPv6
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about Maths
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Steganography

  • 2. INTRODUCTION No one apart from the Art and A form of sender and science of security intended writing hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  • 3. Steganós • Covered Graptos • Writing ETYMOLOGY
  • 4. HISTORY OF STEGANOGRAPHY Current 1st and 2nd World Wars 440 B.C. www.company.com
  • 5. Cryptography Steganography Watermarking EVOLUTION
  • 6. ADVANTAGE OF STEGANOGRAPHY OVER CRYPTOGRAPHY Messages do not attract attention to Protects both themselves messages and communicating parties www.company.com
  • 7. TYPES OF STEGANOGRAPHY Steganography In Text/Documents Steganography In Video Steganography In Audio Steganography In Images www.company.com
  • 8. Carrier or Cover File Stego-Medium Embedded or Payload Steganalysis STEGANOGRAPHY TERMS
  • 11. STEGANOGRAPHY STEPS Steganography Encoding a Decode a message message www.company.com
  • 12. Embedded Data MESSAGE Plain info MESSAGE
  • 13. ENCODING Step 2 • Prepare • Encode • Steganographic data cover data embedded data with cover data Step1 Step 3 www.company.com
  • 14. DECODING Step 2 • Steganographic • Embedded Data • Decode data Plain info obtained Step1 Step 3 www.company.com
  • 15. STEGANALYSIS Art and Science of detecting hidden messages Just discover Steganography Not deals with decrypting the data www.company.com
  • 16. Line Shift Coding Word Shift Coding Feature Coding Least Significant Bit Insertion Low bit encoding Masking and Filtering STEGANOGRAPHY TECHNIQUES
  • 17. STEGANOGRAPHY USING LEAST SIGNIFICANT BIT www.company.com
  • 19. Program Image files Audio files Video files Document files BMP, JPG, Mp3, WAV 3gp, Mp4, Pdf PNG, TGA MPEG-1, OpenPuff MPEG-2, VOB, SWF, FLV MP3Stego - Mp3 - - OpenStego BMP, PNG - - - S-Tools BMP, GIF Wav - - StegFS - - - - Steganographic BMP, PNG, - - - Laboratory (VSL) JPG, TIFF PHP-Class PNG - - - StreamSteganography List of some tools for Steganography www.company.com
  • 20. USAGE IN MODERN PRINTERS Tiny yellow dots are added to each page Printer serial numbers date and time stamps are encoded on yellow dots EXAMPLE: HP and Xerox color laser printers. www.company.com
  • 21. ILLEGAL USAGE HACKERS TERRORISTS CRIMINALS www.company.com