This document discusses steganography, which is a method of hiding secret information within other information. It begins by providing background on the rise of the internet and the need for information security. It then explains steganography and how it differs from cryptography by not only encrypting messages but hiding their very existence. The document outlines various types of steganography, including techniques for hiding messages in text, audio, images, and video files. It notes some advantages and disadvantages of steganography and discusses the latest research on improving steganography detection.
2. CONTENTS
Rise of internet
Security
Information security
Methods to provide security to information
What is cryptography
Problems in cryptography
What is steganography
Types of steganography
Advantages of steganography
Disadvantages of steganography
Latest research on steganography
Conclusion
3. RISE OF INTERNET
Since the rise of internet one of the most
important factors of information technology.
Now a days internet became common use. As the
use of internet increases providing security to the
information is also important thing.
5. METHODS OF PROVIDE SECURITY TO
INFORMATION
We have two methods to provide security to the
information. They are:-
● Cryptography
● Steganography
6. WHAT IS CRYPTOGRAPHY
Cryptography is the study of hiding information and it
is used when communicating over an untrusted
medium such as internet, where information needs
to be protected from other third parties.
7. PROBLEMS IN CRYPTOGRAPHY
Encrypt the message, but do not hide the message.
Suspicious (doubtful)
This problems can be overcome by Steganography.
8. WHAT IS STEGANOGRAPHY
Steganography means hiding information in other
information.
The word Steganography is derived from the Greek
words “STEGOS” means „cover‟ and “GRAFIA”
means „writing‟defining it as „covered writing‟.
Anyone else viewing this message will fail to know it
contains hidden/encrypted data.
9. TYPES OF STEGANOGRAPHY
Encoding Secret Messages in Text
Encoding Secret Messages in Audio
Encoding Secret Messages in Images
Encoding Secret Messages in videos
10. TEXT STEGANOGRAPHY
Steganography in text files can be accomplished
through various techniques:--
Line-shift encoding
Word-shift encoding
Feature encoding
11. LINE SHIFT ENCODING:- In this type of
coding, Text lines is shifted up/down.
WORD SHIFT ENCODING:- In this type of
encoding, Word is shifted left to right or vice versa.
FEATURE ENCODING:- In this type of
encoding, minor changes occurs in shapes of
characters.
12. AUDIO STEGANOGRAPHY
Audio steganography embeds the secret message into
the music files having formats.
The different methods are:
Low-bit encoding
Phase coding
Spread spectrum
13. LOW-BIT ENCODING:- In this type of coding, data
was stored in the least significant bit of
images, binary data can be stored in the least
significant bit of audio files.
PHASE CODING:- The phase coding method works
by substituting the phase of an initial audio segment
with a reference phase that represents the data.
SPREAD SPECTRUM:- When using a spread
spectrum technique, however, the encoded data is
spread across as much of the frequency spectrum as
possible.
14. IMAGE STEGANOGRAPHY
Images are composed of dots called PIXELS.
8-bit and 24-bit per pixel image files.
Each pixel gets its own color by combining
percentages of red, green and blue(RGB).
For 8bit each of these colors has value from 0 to 225.
15. Image of a tree
with a
steganographicall
y
hidden image.
17. ADVANTAGES
It is used in the way of hiding not the information
but the password to reach that information.
Difficult to detect. Only receiver can detect.
Can be applied differently in digital image, audio and
video file.
It can be done faster with the large number of
softwares.
18. DISADVANTAGES
Huge number of data, huge file size, so someone can
suspect about it.
If this technique is gone in the wrong hands like
hackers, terrorist, criminals then this can be very
much dangerous for all.
19. LATEST RESEARCH ON STEGANOGRAPHY
The Steganography Analysis and Research Center
(SARC) is a Center of Excellence within Backbone
Security focused exclusively on steganography
research and the development of advanced
steganalysis products and services. The SARC has
developed state-of-the-art steganography detection
and extraction capabilities that address the needs of
computer forensic examiners and information
technology security personnel in law enforcement,
government agencies, military organizations, the
intelligence community, and the private sector.
20. CONCLUSION
Though Steganography is not implemented in wider
ways but it can be the best security tool.
The main problem of today‟s world is to secure their
data confidentially, the techniques used currently are
not considered the best which can only be replaced
by Steganography.