3. INTRODUCTION
Advance security is not maintained by password
protection but it is gained by hiding the existence
of the data, which can only be done by
steganography
Steganography is a subject which is rarely touched
up on by most IT security enthusiasts
It can hide messages inside of digital objects such
as a file that has been concealed inside a digital
picture, video or audio file
4. DEFINITION
Steganography or stego as it is often
referred to in the IT community, literally
means, “covered writing” which is derived
from the Greek language
It is the art and science of communicating in
a way which hides the existence of the
communication
5. Why it is important?
Steganographic technologies are very important
part of the future of internet security and privacy
Many governments have created laws that either
limit the strength of cryptosystems or prohibit them
completely
The goal of this technology is to hide messages
inside other harmless message in a way that does
not allow any enemy to even detect that there is a
second message present
6. TYPES OF STEGANOGRAPHY
Pure steganography
Secret key steganography
Public key steganography
16. Figure 2: This is the image that was hidden in the previous figure.
Picture-in-picture, if you will.
17. ADVANTAGES
It is used in the way of hiding not the
Information but the password to reach that
Information.
Difficult to detect .Only receiver can detect.
Can be applied differently in digital image,
audio & video file.
It can be done faster with the large no of
software's
18. DISADVANTAGES
Huge number of data = huge file size,
so some one can suspect about it.
In sending and receiving information
can be leaked.
The confidentiality of information is
maintained by the algorithms, and if the
algorithms are known then its all over.
If this technique is gone in the wrong
hands like hackers, terrorist ,criminals
then this can be very much dangerous
for all.
19. CONCLUSION
Though steganography is not implemented in
wider ways but it can be the best security tool.
The main problem of today's world is to secure
their data confidentially, the techniques used
currently are not considered the best which can
only be replaced by Steganography.
If it gets in the hand of terrorist then it could be
even worse than WTC Attack in which
steganography was use