SlideShare una empresa de Scribd logo
1 de 21
STEGANOGRAPHY




         BY- MYNK
CONTENTS

 Rise of internet
 Security
 Information security
 Methods to provide security to information
 What is cryptography
 Problems in cryptography
 What is steganography
 Types of steganography
 Advantages of steganography
 Disadvantages of steganography
 Latest research on steganography
 Conclusion
RISE OF INTERNET



 Since the rise of internet one of the most
  important factors of information technology.

 Now a days internet became common use. As the
  use of internet increases providing security to the
  information is also important thing.
INFORMATION SECURITY




Information security means protecting information
  systems from unauthorized
  access, use, disruption, modification, recording or
  destruction.
METHODS OF PROVIDE SECURITY TO
           INFORMATION

We have two methods to provide security to the
 information. They are:-

● Cryptography
● Steganography
WHAT IS CRYPTOGRAPHY




Cryptography is the study of hiding information and it
 is used when communicating over an untrusted
 medium such as internet, where information needs
 to be protected from other third parties.
PROBLEMS IN CRYPTOGRAPHY



 Encrypt the message, but do not hide the message.
 Suspicious (doubtful)




This problems can be overcome by Steganography.
WHAT IS STEGANOGRAPHY

 Steganography means hiding information in other
  information.
 The word Steganography is derived from the Greek
  words “STEGOS” means „cover‟ and “GRAFIA”
  means „writing‟defining it as „covered writing‟.
 Anyone else viewing this message will fail to know it
  contains hidden/encrypted data.
TYPES OF STEGANOGRAPHY

 Encoding Secret Messages in Text


 Encoding Secret Messages in Audio


 Encoding Secret Messages in Images


 Encoding Secret Messages in videos
TEXT STEGANOGRAPHY

Steganography in text files can be accomplished
  through various techniques:--



 Line-shift encoding
 Word-shift encoding
 Feature encoding
 LINE SHIFT ENCODING:- In this type of
 coding, Text lines is shifted up/down.

 WORD SHIFT ENCODING:- In this type of
 encoding, Word is shifted left to right or vice versa.

 FEATURE ENCODING:- In this type of
 encoding, minor changes occurs in shapes of
 characters.
AUDIO STEGANOGRAPHY

Audio steganography embeds the secret message into
 the music files having formats.

The different methods are:

 Low-bit encoding
 Phase coding
 Spread spectrum
 LOW-BIT ENCODING:- In this type of coding, data
  was stored in the least significant bit of
  images, binary data can be stored in the least
  significant bit of audio files.
 PHASE CODING:- The phase coding method works
  by substituting the phase of an initial audio segment
  with a reference phase that represents the data.
 SPREAD SPECTRUM:- When using a spread
  spectrum technique, however, the encoded data is
  spread across as much of the frequency spectrum as
  possible.
IMAGE STEGANOGRAPHY

 Images are composed of dots called PIXELS.
 8-bit and 24-bit per pixel image files.
 Each pixel gets its own color by combining
  percentages of red, green and blue(RGB).
 For 8bit each of these colors has value from 0 to 225.
Image of a tree
     with a
steganographicall
y
hidden image.
VIDEO STEGANOGRAPHY



Video Steganography is a technique to hide
 any kind of files in any extension into a
 carrrying Video file.
ADVANTAGES

 It is used in the way of hiding not the information
 but the password to reach that information.

 Difficult to detect. Only receiver can detect.


 Can be applied differently in digital image, audio and
 video file.

 It can be done faster with the large number of
 softwares.
DISADVANTAGES

 Huge number of data, huge file size, so someone can
 suspect about it.



 If this technique is gone in the wrong hands like
 hackers, terrorist, criminals then this can be very
 much dangerous for all.
LATEST RESEARCH ON STEGANOGRAPHY

 The Steganography Analysis and Research Center
(SARC) is a Center of Excellence within Backbone
Security focused exclusively on steganography
research and the development of advanced
steganalysis products and services. The SARC has
developed state-of-the-art steganography detection
and extraction capabilities that address the needs of
computer forensic examiners and information
technology security personnel in law enforcement,
government agencies, military organizations, the
intelligence community, and the private sector.
CONCLUSION

 Though Steganography is not implemented in wider
 ways but it can be the best security tool.

 The main problem of today‟s world is to secure their
 data confidentially, the techniques used currently are
 not considered the best which can only be replaced
 by Steganography.
THANK YOU……….

Más contenido relacionado

La actualidad más candente

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 

La actualidad más candente (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image steganography
Image steganographyImage steganography
Image steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 

Similar a Steganography

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptxAutuag
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 

Similar a Steganography (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 

Más de Mayank Saxena (19)

operating system
operating systemoperating system
operating system
 
operating system
operating systemoperating system
operating system
 
Financial services marketing
Financial services marketingFinancial services marketing
Financial services marketing
 
Introduction to financial service
Introduction to financial serviceIntroduction to financial service
Introduction to financial service
 
il&fs investmart
 il&fs investmart il&fs investmart
il&fs investmart
 
financial services
financial servicesfinancial services
financial services
 
Array
ArrayArray
Array
 
Html tutorial.02
Html tutorial.02Html tutorial.02
Html tutorial.02
 
Introduction html
Introduction htmlIntroduction html
Introduction html
 
Silc
SilcSilc
Silc
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Vlan
VlanVlan
Vlan
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Silc
SilcSilc
Silc
 
Wi fi
Wi fiWi fi
Wi fi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
4 g world
4 g world4 g world
4 g world
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 

Steganography

  • 1. STEGANOGRAPHY BY- MYNK
  • 2. CONTENTS  Rise of internet  Security  Information security  Methods to provide security to information  What is cryptography  Problems in cryptography  What is steganography  Types of steganography  Advantages of steganography  Disadvantages of steganography  Latest research on steganography  Conclusion
  • 3. RISE OF INTERNET  Since the rise of internet one of the most important factors of information technology.  Now a days internet became common use. As the use of internet increases providing security to the information is also important thing.
  • 4. INFORMATION SECURITY Information security means protecting information systems from unauthorized access, use, disruption, modification, recording or destruction.
  • 5. METHODS OF PROVIDE SECURITY TO INFORMATION We have two methods to provide security to the information. They are:- ● Cryptography ● Steganography
  • 6. WHAT IS CRYPTOGRAPHY Cryptography is the study of hiding information and it is used when communicating over an untrusted medium such as internet, where information needs to be protected from other third parties.
  • 7. PROBLEMS IN CRYPTOGRAPHY  Encrypt the message, but do not hide the message.  Suspicious (doubtful) This problems can be overcome by Steganography.
  • 8. WHAT IS STEGANOGRAPHY  Steganography means hiding information in other information.  The word Steganography is derived from the Greek words “STEGOS” means „cover‟ and “GRAFIA” means „writing‟defining it as „covered writing‟.  Anyone else viewing this message will fail to know it contains hidden/encrypted data.
  • 9. TYPES OF STEGANOGRAPHY  Encoding Secret Messages in Text  Encoding Secret Messages in Audio  Encoding Secret Messages in Images  Encoding Secret Messages in videos
  • 10. TEXT STEGANOGRAPHY Steganography in text files can be accomplished through various techniques:--  Line-shift encoding  Word-shift encoding  Feature encoding
  • 11.  LINE SHIFT ENCODING:- In this type of coding, Text lines is shifted up/down.  WORD SHIFT ENCODING:- In this type of encoding, Word is shifted left to right or vice versa.  FEATURE ENCODING:- In this type of encoding, minor changes occurs in shapes of characters.
  • 12. AUDIO STEGANOGRAPHY Audio steganography embeds the secret message into the music files having formats. The different methods are:  Low-bit encoding  Phase coding  Spread spectrum
  • 13.  LOW-BIT ENCODING:- In this type of coding, data was stored in the least significant bit of images, binary data can be stored in the least significant bit of audio files.  PHASE CODING:- The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data.  SPREAD SPECTRUM:- When using a spread spectrum technique, however, the encoded data is spread across as much of the frequency spectrum as possible.
  • 14. IMAGE STEGANOGRAPHY  Images are composed of dots called PIXELS.  8-bit and 24-bit per pixel image files.  Each pixel gets its own color by combining percentages of red, green and blue(RGB).  For 8bit each of these colors has value from 0 to 225.
  • 15. Image of a tree with a steganographicall y hidden image.
  • 16. VIDEO STEGANOGRAPHY Video Steganography is a technique to hide any kind of files in any extension into a carrrying Video file.
  • 17. ADVANTAGES  It is used in the way of hiding not the information but the password to reach that information.  Difficult to detect. Only receiver can detect.  Can be applied differently in digital image, audio and video file.  It can be done faster with the large number of softwares.
  • 18. DISADVANTAGES  Huge number of data, huge file size, so someone can suspect about it.  If this technique is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous for all.
  • 19. LATEST RESEARCH ON STEGANOGRAPHY The Steganography Analysis and Research Center (SARC) is a Center of Excellence within Backbone Security focused exclusively on steganography research and the development of advanced steganalysis products and services. The SARC has developed state-of-the-art steganography detection and extraction capabilities that address the needs of computer forensic examiners and information technology security personnel in law enforcement, government agencies, military organizations, the intelligence community, and the private sector.
  • 20. CONCLUSION  Though Steganography is not implemented in wider ways but it can be the best security tool.  The main problem of today‟s world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography.