SlideShare a Scribd company logo
1 of 22
Steganography




        Neena S. Hulkoti
         1PI09EC073
INTRODUCTION
 In Greek terminology,
    STEGANOS – “Covered”
    GRAPHIE – “Writing”
 
 Steganography is the art and science of writing hidden messages in
    such a way that no one apart from the intended recipient knows of
    the existence of the message.
 
 This can be achieved by concealing the existence of information
    within seemingly harmless carriers or cover.

 Carrier: text, image, video, audio, etc
History of Steganography
 440 B.C.
  Histiaeus shaved the head of his most trusted slave and tattooed it
  with a message which disappeared after the hair had regrown. To
  instigate a revolt against Persians.

 1st and 2nd World Wars
  German spies used invisible ink to print very small dots on letters.

  A message sent by a German spy during World War II read:
  “Apparently neutral’s protest is thoroughly discounted and ignored.
  Isman hard hit. Blockade issue affects for pretext embargo on by-
  products, ejecting suets and vegetable oils.”
  By taking the second letter of every word the hidden message
  “Pershing sails for NY June 1” can be retrieved
Evolution


       Cryptography



                      Steganography


      Watermarkin
      g
Steganography Terms
 Carrier or Cover File - A Original message or a file in which
  hidden information will be stored inside of it .

 Stego-Medium - The medium in which the information is hidden.


 Embedded or Payload - The information which is to be hidden or
  concealed.

 Steganalysis - The process of detecting hidden information inside a
  file.
Types of Steganography
Steganography in Texts/Documents


Steganography in Images


Steganography in Audio


Steganography in Video
Steganography in text
 Line Shift Coding: Lines are vertically shifted. In line shift coding, shift
  various lines inside the document up or down by a small fraction (such as
  1/300th of an inch).

 Word Shift Coding: Code words are horizontally shifted. The decoding
  technique is measuring the spaces between each word and a left shift
  could represent a 0 bit and a right shift representing a 1 bit.
   The quick brown fox jumps over the lazy dog.
   The quick brown fox jumps over the lazy dog.


 White Space Manipulation: It is done by adding a certain amount of
  white space to the end of lines. The amount of white space corresponds
  to a certain bit value.
Steganography in images
The simplest and most common type of steganography is
 LSB (least significant bit). The one’s bit of a byte is used
 to encode the hidden information.
Suppose we want to encode the letter A (ASCII 65 or
 binary 01000001) in the following 8 bytes of a carrier
 file.

 01011101 11010000 00011100 10101100
 11100111 10000111 01101011 11100011

 becomes

 01011100 11010001 00011100 10101100
 11100110 10000110 01101010 11100011
Variations of LSB


Use password as a seed for pseudo random number
  generator.

Use only those bytes separated by the value of the next
  random number to hide data.

Advantages - More difficult to detect and decode.


Disadvantage – Limits the number of bytes that are
  available for holding the payload.
Least significant bit insertion technique

 4 bits to hide the secret image
 Host Pixel: 10110001
 Secret Pixel: 00111111
 New Image Pixel: 10110011
Steganography in audio

PHASE CODING




SPREAD SPECTRUM
 Makes use of the fact that small changes are more difficult for the
  human eye or ear to detect at high energy levels (loud audio or
  bright video).
The message is hidden in those areas of the carrier file with the
  greatest energy.
Steganography in video

 For video, a combination of sound and image techniques can be used.


 This is due to the fact that video generally has separate inner files for the
  video (consisting of many images) and the sound.

 So techniques can be applied in both areas to hide data. Due to the size of
  video files, the scope for adding lots of data is much greater and therefore
  the chances of hidden data being detected is quite low.
Generic Process of encoding & decoding
APPLICATIONS OF STEGANOGRAPHY
Secure Communication

  • It is a state-of-the-art digital steganography
  software package developed for confidential
  multimedia communication.

  •The software allows the user to select a
  multimedia data file or "container" for
  embedding hidden text, audio sequence, video
  clip, or any form of data file.

  •The contents of the text message are hashed
  with those of the container file to produce a key
  file. The key file is also known as
  a “Stegfile”.
DIGITAL WATERMARKING
Digital watermarking software for copyright protection of
    digital images, music CDs,DVDs, and other forms of
    multimedia data.

How robust a watermark is depends on whether it can survive
    various "attacks" that include contrast changes, cropping,
    scratches, and filtering.

The digital image watermark is able to survive most of these
    attacks.
.
DIGITAL SIGNATURE AUTHENTICATION
•It is a software product specifically developed to prevent malicious tampering of
private and confidential documents.
•This will detect any unwarranted tampering and alert the receiver side
immediately. A digital signature and a multimedia container password are
embedded into the confidential document.
DIGITAL LINKAGE AND STORAGE
  It provides a secure data linkage between a digital image and
   attribute text information.
  The attribute information can be any personal records
  The main function is to securely link the personal record and
   digital photograph together and then create a hash file that can
   be safely stored in a database.
  This hash file is unique and can only be decoded with the
   original photograph and associated personal record.
  An optional password is also available to protect the hash file
   prior to data storage.
Illustrates the operations of StegSafe™ through a data flow diagram
CONCLUSION

Steganography can protect data by hiding it but using it alone may
  not guarantee total protection.

 In case of encryption, by seeing the meaningless appearing
  sequence of bits enemy can detect that some illegal message is
  being sent.

  However, if one uses both methods, this will lead to ‘security in
  depth’. 

 The message should first be encoded using a strong encryption
  algorithm and then embedded into a carrier.
REFERENCES

 Steganography And Digital Watermarking Jonathan
 Cummins, Patrick Diskin, Samuel Lau and Robert Parlett,
 School of Computer Science, The University of Birmingham.

www.scribd.com/doc/27459895


www.authorstream.com/Presentation/pavankumar
 4b7-473085-steganography/
THANK YOU

More Related Content

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 

Viewers also liked

Viewers also liked (8)

Steganography
SteganographySteganography
Steganography
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
project_final
project_finalproject_final
project_final
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to 83747965 steganography

CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
dokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptxdokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptxShubhamPancheshwar1
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
B03208016
B03208016B03208016
B03208016inventy
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 

Similar to 83747965 steganography (20)

CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography
SteganographySteganography
Steganography
 
dokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptxdokumen.tips_video-steganography-ppt.pptx
dokumen.tips_video-steganography-ppt.pptx
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
B03208016
B03208016B03208016
B03208016
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 

83747965 steganography

  • 1. Steganography Neena S. Hulkoti 1PI09EC073
  • 2. INTRODUCTION  In Greek terminology, STEGANOS – “Covered” GRAPHIE – “Writing”    Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.    This can be achieved by concealing the existence of information within seemingly harmless carriers or cover.  Carrier: text, image, video, audio, etc
  • 3. History of Steganography  440 B.C. Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.  1st and 2nd World Wars German spies used invisible ink to print very small dots on letters. A message sent by a German spy during World War II read: “Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects for pretext embargo on by- products, ejecting suets and vegetable oils.” By taking the second letter of every word the hidden message “Pershing sails for NY June 1” can be retrieved
  • 4. Evolution Cryptography Steganography Watermarkin g
  • 5. Steganography Terms  Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it .  Stego-Medium - The medium in which the information is hidden.  Embedded or Payload - The information which is to be hidden or concealed.  Steganalysis - The process of detecting hidden information inside a file.
  • 6. Types of Steganography Steganography in Texts/Documents Steganography in Images Steganography in Audio Steganography in Video
  • 7. Steganography in text  Line Shift Coding: Lines are vertically shifted. In line shift coding, shift various lines inside the document up or down by a small fraction (such as 1/300th of an inch).  Word Shift Coding: Code words are horizontally shifted. The decoding technique is measuring the spaces between each word and a left shift could represent a 0 bit and a right shift representing a 1 bit. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.  White Space Manipulation: It is done by adding a certain amount of white space to the end of lines. The amount of white space corresponds to a certain bit value.
  • 8. Steganography in images The simplest and most common type of steganography is LSB (least significant bit). The one’s bit of a byte is used to encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file. 01011101 11010000 00011100 10101100 11100111 10000111 01101011 11100011 becomes 01011100 11010001 00011100 10101100 11100110 10000110 01101010 11100011
  • 9. Variations of LSB Use password as a seed for pseudo random number generator. Use only those bytes separated by the value of the next random number to hide data. Advantages - More difficult to detect and decode. Disadvantage – Limits the number of bytes that are available for holding the payload.
  • 10. Least significant bit insertion technique 4 bits to hide the secret image Host Pixel: 10110001 Secret Pixel: 00111111 New Image Pixel: 10110011
  • 11. Steganography in audio PHASE CODING SPREAD SPECTRUM  Makes use of the fact that small changes are more difficult for the human eye or ear to detect at high energy levels (loud audio or bright video). The message is hidden in those areas of the carrier file with the greatest energy.
  • 12. Steganography in video  For video, a combination of sound and image techniques can be used.  This is due to the fact that video generally has separate inner files for the video (consisting of many images) and the sound.  So techniques can be applied in both areas to hide data. Due to the size of video files, the scope for adding lots of data is much greater and therefore the chances of hidden data being detected is quite low.
  • 13. Generic Process of encoding & decoding
  • 14. APPLICATIONS OF STEGANOGRAPHY Secure Communication • It is a state-of-the-art digital steganography software package developed for confidential multimedia communication. •The software allows the user to select a multimedia data file or "container" for embedding hidden text, audio sequence, video clip, or any form of data file. •The contents of the text message are hashed with those of the container file to produce a key file. The key file is also known as a “Stegfile”.
  • 15. DIGITAL WATERMARKING Digital watermarking software for copyright protection of digital images, music CDs,DVDs, and other forms of multimedia data. How robust a watermark is depends on whether it can survive various "attacks" that include contrast changes, cropping, scratches, and filtering. The digital image watermark is able to survive most of these attacks. .
  • 16.
  • 17. DIGITAL SIGNATURE AUTHENTICATION •It is a software product specifically developed to prevent malicious tampering of private and confidential documents. •This will detect any unwarranted tampering and alert the receiver side immediately. A digital signature and a multimedia container password are embedded into the confidential document.
  • 18. DIGITAL LINKAGE AND STORAGE  It provides a secure data linkage between a digital image and attribute text information.  The attribute information can be any personal records  The main function is to securely link the personal record and digital photograph together and then create a hash file that can be safely stored in a database.  This hash file is unique and can only be decoded with the original photograph and associated personal record.  An optional password is also available to protect the hash file prior to data storage.
  • 19. Illustrates the operations of StegSafe™ through a data flow diagram
  • 20. CONCLUSION Steganography can protect data by hiding it but using it alone may not guarantee total protection.  In case of encryption, by seeing the meaningless appearing sequence of bits enemy can detect that some illegal message is being sent.   However, if one uses both methods, this will lead to ‘security in depth’.   The message should first be encoded using a strong encryption algorithm and then embedded into a carrier.
  • 21. REFERENCES  Steganography And Digital Watermarking Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. www.scribd.com/doc/27459895 www.authorstream.com/Presentation/pavankumar 4b7-473085-steganography/