SlideShare una empresa de Scribd logo
1 de 20
Presented by
        Viji.A
      Rollno:42
        Bsc(cs)
INTRODUCTION
 Advance security is not maintained by password
  protection but it is gained by hiding the existence
  of the data, which can only be done by
  steganography
 Steganography is a subject which is rarely touched
  up on by most IT security enthusiasts
 It can hide messages inside of digital objects such
  as a file that has been concealed inside a digital
  picture, video or audio file
DEFINITION
 Steganography or stego as it is often
  referred to in the IT community, literally
  means, “covered writing” which is derived
  from the Greek language
 It is the art and science of communicating in
  a way which hides the existence of the
  communication
Why it is important?
 Steganographic technologies are very important
  part of the future of internet security and privacy
 Many governments have created laws that either
  limit the strength of cryptosystems or prohibit them
  completely
 The goal of this technology is to hide messages
  inside other harmless message in a way that does
  not allow any enemy to even detect that there is a
  second message present
TYPES OF STEGANOGRAPHY

 Pure steganography

 Secret key steganography

 Public key steganography
A STEGANOGRAPHIC SYSTEM

 Message file             Message file




             Cover file




 Steganographic tool      Steganographic tool




       Steg file                  Steg file
  (with hidden data)         (with hidden data)
Examples of steganography




Here’s the butterfly
                       And here’s the fortress, with its guns:
Captured Spies Used Steganography to Send Messages to
the Russian Intelligence Service.
Information is hidden in one of these two images. Can you determine which one?
Figure 2: This is the image that was hidden in the previous figure.
Picture-in-picture, if you will.
ADVANTAGES
 It is used in the way of hiding not the
  Information but the password to reach that
  Information.
 Difficult to detect .Only receiver can detect.
 Can be applied differently in digital image,
  audio & video file.
 It can be done faster with the large no of
  software's
DISADVANTAGES
 Huge number of data = huge file size,
  so some one can suspect about it.
 In sending and receiving information
  can be leaked.
 The confidentiality of information is
  maintained by the algorithms, and if the
  algorithms are known then its all over.
 If this technique is gone in the wrong
  hands like hackers, terrorist ,criminals
  then this can be very much dangerous
  for all.
CONCLUSION
 Though steganography is not implemented in
  wider ways but it can be the best security tool.
 The main problem of today's world is to secure
  their data confidentially, the techniques used
  currently are not considered the best which can
  only be replaced by Steganography.
 If it gets in the hand of terrorist then it could be
  even worse than WTC Attack in which
  steganography was use
Steganography Intro: Hiding Messages in Plain Sight

Más contenido relacionado

La actualidad más candente

Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docxUJJWALPAL15
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117Anas Pa
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research IdeasMatlab Simulation
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
 
Week13
Week13Week13
Week13GroupB
 

La actualidad más candente (19)

Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
10.1.1.157.3117
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
C01111519
C01111519C01111519
C01111519
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Steganography
SteganographySteganography
Steganography
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
Week13
Week13Week13
Week13
 

Destacado

Branded Sales Playbooks for Loan Officers
Branded Sales Playbooks for Loan OfficersBranded Sales Playbooks for Loan Officers
Branded Sales Playbooks for Loan OfficersMy Home Pro Network
 
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICA
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICAPRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICA
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICAElizabeth Carhuamaca
 
Responding to common patterns of student thinking in mathematics
Responding to common patterns of student thinking in mathematicsResponding to common patterns of student thinking in mathematics
Responding to common patterns of student thinking in mathematicsxsmseo
 
Statistical Tools for the Quality Control Laboratory and Validation Studies
Statistical Tools for the Quality Control Laboratory and Validation StudiesStatistical Tools for the Quality Control Laboratory and Validation Studies
Statistical Tools for the Quality Control Laboratory and Validation StudiesInstitute of Validation Technology
 
Brand mythology by Joseph Shiffin Joy
Brand mythology by Joseph Shiffin JoyBrand mythology by Joseph Shiffin Joy
Brand mythology by Joseph Shiffin JoyJoseph Shiffin Joy
 
Sw week14 b
Sw week14 bSw week14 b
Sw week14 bs1200016
 
Perry el ornitorrinco blog
Perry el ornitorrinco blogPerry el ornitorrinco blog
Perry el ornitorrinco blogAnonimatoanonimo
 
Sw week14 b
Sw week14 bSw week14 b
Sw week14 bs1200016
 
Management Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementManagement Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementInstitute of Validation Technology
 
Comparative Analysis Of Mutual Funds
Comparative Analysis Of Mutual Funds Comparative Analysis Of Mutual Funds
Comparative Analysis Of Mutual Funds Nikesh Gupta
 
Choreography: Solo Pictures
Choreography: Solo PicturesChoreography: Solo Pictures
Choreography: Solo Pictureschrissie2012
 

Destacado (19)

Planificacion de la unidad
Planificacion de la unidad Planificacion de la unidad
Planificacion de la unidad
 
Branded Sales Playbooks for Loan Officers
Branded Sales Playbooks for Loan OfficersBranded Sales Playbooks for Loan Officers
Branded Sales Playbooks for Loan Officers
 
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICA
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICAPRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICA
PRESENTACIÓN DE COMUNIDAD DE PRÁCTICA PEDAGÓGICA
 
0311 cg biology
0311 cg biology0311 cg biology
0311 cg biology
 
Change control and configuration
Change control and configurationChange control and configuration
Change control and configuration
 
Fda validation inspections
Fda validation inspectionsFda validation inspections
Fda validation inspections
 
Responding to common patterns of student thinking in mathematics
Responding to common patterns of student thinking in mathematicsResponding to common patterns of student thinking in mathematics
Responding to common patterns of student thinking in mathematics
 
Statistical Tools for the Quality Control Laboratory and Validation Studies
Statistical Tools for the Quality Control Laboratory and Validation StudiesStatistical Tools for the Quality Control Laboratory and Validation Studies
Statistical Tools for the Quality Control Laboratory and Validation Studies
 
Brand mythology by Joseph Shiffin Joy
Brand mythology by Joseph Shiffin JoyBrand mythology by Joseph Shiffin Joy
Brand mythology by Joseph Shiffin Joy
 
Affects of
Affects ofAffects of
Affects of
 
Sw week14 b
Sw week14 bSw week14 b
Sw week14 b
 
Perry el ornitorrinco blog
Perry el ornitorrinco blogPerry el ornitorrinco blog
Perry el ornitorrinco blog
 
Yourprezi1
Yourprezi1Yourprezi1
Yourprezi1
 
Sw week14 b
Sw week14 bSw week14 b
Sw week14 b
 
Compliance by Design and Compliance Master Plan
Compliance by Design and Compliance Master PlanCompliance by Design and Compliance Master Plan
Compliance by Design and Compliance Master Plan
 
Management Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementManagement Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality Improvement
 
A WrightWay Venture
A WrightWay VentureA WrightWay Venture
A WrightWay Venture
 
Comparative Analysis Of Mutual Funds
Comparative Analysis Of Mutual Funds Comparative Analysis Of Mutual Funds
Comparative Analysis Of Mutual Funds
 
Choreography: Solo Pictures
Choreography: Solo PicturesChoreography: Solo Pictures
Choreography: Solo Pictures
 

Similar a Steganography Intro: Hiding Messages in Plain Sight

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 

Similar a Steganography Intro: Hiding Messages in Plain Sight (20)

Steganography
Steganography Steganography
Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Steganography
SteganographySteganography
Steganography
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography
Steganography Steganography
Steganography
 
319 325
319 325319 325
319 325
 
Steganography
Steganography Steganography
Steganography
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Steganography Intro: Hiding Messages in Plain Sight

  • 1. Presented by Viji.A Rollno:42 Bsc(cs)
  • 2.
  • 3. INTRODUCTION  Advance security is not maintained by password protection but it is gained by hiding the existence of the data, which can only be done by steganography  Steganography is a subject which is rarely touched up on by most IT security enthusiasts  It can hide messages inside of digital objects such as a file that has been concealed inside a digital picture, video or audio file
  • 4. DEFINITION  Steganography or stego as it is often referred to in the IT community, literally means, “covered writing” which is derived from the Greek language  It is the art and science of communicating in a way which hides the existence of the communication
  • 5. Why it is important?  Steganographic technologies are very important part of the future of internet security and privacy  Many governments have created laws that either limit the strength of cryptosystems or prohibit them completely  The goal of this technology is to hide messages inside other harmless message in a way that does not allow any enemy to even detect that there is a second message present
  • 6. TYPES OF STEGANOGRAPHY  Pure steganography  Secret key steganography  Public key steganography
  • 7. A STEGANOGRAPHIC SYSTEM Message file Message file Cover file Steganographic tool Steganographic tool Steg file Steg file (with hidden data) (with hidden data)
  • 8. Examples of steganography Here’s the butterfly And here’s the fortress, with its guns:
  • 9.
  • 10. Captured Spies Used Steganography to Send Messages to the Russian Intelligence Service.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Information is hidden in one of these two images. Can you determine which one?
  • 16. Figure 2: This is the image that was hidden in the previous figure. Picture-in-picture, if you will.
  • 17. ADVANTAGES  It is used in the way of hiding not the Information but the password to reach that Information.  Difficult to detect .Only receiver can detect.  Can be applied differently in digital image, audio & video file.  It can be done faster with the large no of software's
  • 18. DISADVANTAGES  Huge number of data = huge file size, so some one can suspect about it.  In sending and receiving information can be leaked.  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over.  If this technique is gone in the wrong hands like hackers, terrorist ,criminals then this can be very much dangerous for all.
  • 19. CONCLUSION  Though steganography is not implemented in wider ways but it can be the best security tool.  The main problem of today's world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography.  If it gets in the hand of terrorist then it could be even worse than WTC Attack in which steganography was use