SlideShare una empresa de Scribd logo
1 de 16
Steganography
Prepared By : Mr. Abhijeet A. More
Student from ADCET Ashta, Sangli.
Owner Of Perfect Training Center
Steganography
What is Steganography?
History
Steganography today
Steganography tools
Steganography
from the Greek word steganos meaning “covered” and the
Greek word graphie meaning “writing”
Steganography is the process of hiding of a secret
message within an ordinary message and extracting it at its
destination.
Anyone else viewing the message will fail to know it
contains hidden/encrypted data
Steganography (continued)
Modern digital Steganography
data is encrypted
then inserted and hidden, using a special algorithm
which may add and/or modify the contents of the file
This technique may simply append the data to the file,
or disperse it throughout
Carefully crafted programs apply the encrypted data
such that patterns appear normal
Carrier File Carrier File with
Hidden Message
Steganography Carrier files
bmp
jpeg
gif
wav
mp3
Amongst others…
Steganography Tools
Steganos
S-Tools (GIF, JPEG)
StegHide (WAV, BMP)
Invisible Secrets (JPEG)
JPHide
Camouflage
Hiderman
Popular websites
Popular sites for Steganography information
http://www.ise.gmu.edu/~njohnson/Steganography
http://www.rhetoric.umn.edu/Rhetoric/misc/dfrank/
stegsoft.html
http://www.topology.org/crypto.html
Implementation: Steganography
Hiding the file in jpeg without any software.
We can hide the confidential content in jpeg file
Requirements
Winrar
Command prompt
08/11/13
Step 1: - Put all the files you wish to hide in the folder
and put that folder in c:hidden
08/11/13
Step 2:-
Now add those files in rar archieve eg-secret.rar in
folder named hidden.
Step 3:-
Now Look For Any jpeg image and name it
logo.jpeg and put it in the folder hidden.
08/11/13
Step 4:-
Open command prompt make sure your working directory is c:/hidden
08/11/13
Step 5:-
Now type in cmd COPY /b logo.jpeg + secret.rar output.jpeg[logo.jpeg is
the picture you want to show and secret.rar is the file u want to hide and
output.jpeg is the file which contains both.
08/11/13
Step 6:-
After this you will see output.jpeg in c:/hidden.open it and it will
show the picture .now try opening the same file via winrar :)
So In these Way we can stegnograph any king of extension and
hide our sensitive information and make it secrete .
Thank you!!

Más contenido relacionado

La actualidad más candente

Steganography basic
Steganography basicSteganography basic
Steganography basic
Sanoj Kumar
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Michael Belyea
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
ijtsrd
 

La actualidad más candente (20)

Steganography
SteganographySteganography
Steganography
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Steganography
SteganographySteganography
Steganography
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
Steganography
SteganographySteganography
Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Steganography
SteganographySteganography
Steganography
 
C01111519
C01111519C01111519
C01111519
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 

Destacado (6)

Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Steganography
SteganographySteganography
Steganography
 

Similar a Stegnography

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009
ClubHack
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai
 

Similar a Stegnography (20)

HACKING
HACKINGHACKING
HACKING
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Steganography
SteganographySteganography
Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
BMP Secrets.PPT
BMP Secrets.PPTBMP Secrets.PPT
BMP Secrets.PPT
 
steganography
steganographysteganography
steganography
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Stegonography
StegonographyStegonography
Stegonography
 
Steganography
SteganographySteganography
Steganography
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 

Más de Perfect Training Center (8)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography make easy
Cryptography make easyCryptography make easy
Cryptography make easy
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Basics of network
Basics of networkBasics of network
Basics of network
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 

Stegnography