SlideShare una empresa de Scribd logo
1 de 23
Sandeep Kumar
MCA (6th sem)
Table of Contents :
• Introduction
• History
• Past use
• Modern use
• Advantages
• Disadvantage
• Steganography vs. cryptography
• Conclusion
• Reference
Introduction :
• It is an art of hiding information into any
digital images.
• Only sender and receiver, suspects the
existence of the message.
Introduction (contd.):
• It is mixture of two Greek words :
 Steganos :- Covered or Protected
 Graphei :- Writing
That’s why called Hiding of image or
information or covered writing
• In this we Combine secret image / file with
current image which gives the hidden image.
• The hidden image is difficult to detect without
retrieval.
Can be hidden in digital data
• MS Word (doc)
• Web pages (html)
• Executables (exe)
• Sound files (mp3, wav,)
• Video files (mpeg, avi)
• Digital images (bmp, gif, jpg)
History Of Steganography :
• Steganographic techniques have been used
from ancient ages.
• The aim of steganographic communication
back and now, in modern applications, is the
same i.e. to hide secret data.
Past use :
• Hidden messages within wax tablets — in
ancient Greece, people wrote messages on
the wood, then covered it with wax .
Past use (contd.) :
• Hidden messages on messenger's
body also used in ancient Greece.
• In this the message tattooed on the
shaved head.
• Hidden by the hair that afterwards
grew over it, and exposed by shaving
the head again.
• This method has obvious drawbacks,
such as delayed transmission while
waiting for hair to grow and limited
size also.
Past use (contd.) :
• During World War II, the French sent some
messages written on the backs of couriers using
invisible ink.
• Hidden messages on paper written by secret inks,
under other messages or on the blank parts of
other messages. Which was latterly retrieve by
either rays or fire , etc.
Past use (contd.) :
• Jeremiah Denton repeatedly blinked his eyes in
Morse Code .
• During 1966 televised press conference that he
was forced into as an American POW by his North
Vietnamese captors, spelling out the word, "T-O-
R-T-U-R-E“.
Modern Use :
• Modern steganography entered the world in
1985 when personal computer being applied
to classical steganography problems.
• Here we hide our secret data / messages into :
– Digital Images.
– Audio.
– Video , etc.
Here steganography is done with the help
of Steganography tool.
Steganography In Images :
• Messages are hidden in background.
• May be anywhere in image.
• Cannot see message in image without encryption.
• This is done with the help of least significant bit (LSB).
Original Image :
Encrypted Image : Hidden Image :
This is how modern Steganography Works.
Still Problem !!!
Here we go through live example with Steganography tool.
Advantages :
• Top Secret – No body apart from sender and
receiver can retrieve message.
• Hide messages like – Images , Audio , Video ,
text , etc.
• Used by Intelligence Bureau – To send their
Secret messages.
Disadvantages :
Apart from advantages there are also disadvantage too.
• Used by terrorists : In 9/11 attack al-Qaeda head Bin
Laden used this technology.
• In an image he encoded whole message and then
transport it via e-mail.
Lets see how he done this :
Not exact image .
Just for example.
Is it just an image ?????
No !!!!!
This is much more than an image.
It holds messages in it.
Steganography vs. Cryptography
Steganography Cryptography
Hide the message Does not hide message
Only sender and receiver knows the
existence of message
Everybody knows the existence of
message
End result is stego-media End result is cipher-text
Used from ancient time till modern era Used in modern era
Conclusion
• Hiding information.
• Secret among sender and receiver.
• Having both aspects i.e. good and bad use.
Reference
• http://en.wikipedia.org/wiki/Steganography
• http://www.webopedia.com/TERM/S/stegano
graphy.html - For definition.
• http://www.slideshare.net/
• Steganography- A Data Hiding Technique .pdf
file by - Arvind Kumar and Km. Poona
Assistant Professor Meerut (INDIA).
Steganography
Steganography

Más contenido relacionado

La actualidad más candente

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography
SteganographySteganography
Steganography
Sonam M
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 

La actualidad más candente (20)

Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Data compression techniques
Data compression techniquesData compression techniques
Data compression techniques
 

Destacado

Steganography
Steganography Steganography
Steganography
Uttam Jain
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
vicci4041
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 

Destacado (20)

Steganography
Steganography Steganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
The Message Within - Using McAfee DLP to Detect Hidden Steganographic Content
The Message Within - Using McAfee DLP to Detect Hidden Steganographic ContentThe Message Within - Using McAfee DLP to Detect Hidden Steganographic Content
The Message Within - Using McAfee DLP to Detect Hidden Steganographic Content
 
Network Security
Network SecurityNetwork Security
Network Security
 
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence MatrixSteganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar Reprt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Powerpoint: "How to make the first page"
Powerpoint: "How to make the first page"Powerpoint: "How to make the first page"
Powerpoint: "How to make the first page"
 
USER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPTUSER INTERFACE DESIGN PPT
USER INTERFACE DESIGN PPT
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Phishing
PhishingPhishing
Phishing
 

Similar a Steganography

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 

Similar a Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
1.pdf
1.pdf1.pdf
1.pdf
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography
Steganography Steganography
Steganography
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Steganography

  • 2. Table of Contents : • Introduction • History • Past use • Modern use • Advantages • Disadvantage • Steganography vs. cryptography • Conclusion • Reference
  • 3. Introduction : • It is an art of hiding information into any digital images. • Only sender and receiver, suspects the existence of the message.
  • 4. Introduction (contd.): • It is mixture of two Greek words :  Steganos :- Covered or Protected  Graphei :- Writing That’s why called Hiding of image or information or covered writing • In this we Combine secret image / file with current image which gives the hidden image. • The hidden image is difficult to detect without retrieval.
  • 5. Can be hidden in digital data • MS Word (doc) • Web pages (html) • Executables (exe) • Sound files (mp3, wav,) • Video files (mpeg, avi) • Digital images (bmp, gif, jpg)
  • 6. History Of Steganography : • Steganographic techniques have been used from ancient ages. • The aim of steganographic communication back and now, in modern applications, is the same i.e. to hide secret data.
  • 7. Past use : • Hidden messages within wax tablets — in ancient Greece, people wrote messages on the wood, then covered it with wax .
  • 8. Past use (contd.) : • Hidden messages on messenger's body also used in ancient Greece. • In this the message tattooed on the shaved head. • Hidden by the hair that afterwards grew over it, and exposed by shaving the head again. • This method has obvious drawbacks, such as delayed transmission while waiting for hair to grow and limited size also.
  • 9. Past use (contd.) : • During World War II, the French sent some messages written on the backs of couriers using invisible ink. • Hidden messages on paper written by secret inks, under other messages or on the blank parts of other messages. Which was latterly retrieve by either rays or fire , etc.
  • 10. Past use (contd.) : • Jeremiah Denton repeatedly blinked his eyes in Morse Code . • During 1966 televised press conference that he was forced into as an American POW by his North Vietnamese captors, spelling out the word, "T-O- R-T-U-R-E“.
  • 11. Modern Use : • Modern steganography entered the world in 1985 when personal computer being applied to classical steganography problems. • Here we hide our secret data / messages into : – Digital Images. – Audio. – Video , etc. Here steganography is done with the help of Steganography tool.
  • 12. Steganography In Images : • Messages are hidden in background. • May be anywhere in image. • Cannot see message in image without encryption. • This is done with the help of least significant bit (LSB).
  • 13. Original Image : Encrypted Image : Hidden Image :
  • 14. This is how modern Steganography Works. Still Problem !!! Here we go through live example with Steganography tool.
  • 15. Advantages : • Top Secret – No body apart from sender and receiver can retrieve message. • Hide messages like – Images , Audio , Video , text , etc. • Used by Intelligence Bureau – To send their Secret messages.
  • 16. Disadvantages : Apart from advantages there are also disadvantage too. • Used by terrorists : In 9/11 attack al-Qaeda head Bin Laden used this technology. • In an image he encoded whole message and then transport it via e-mail. Lets see how he done this :
  • 17. Not exact image . Just for example. Is it just an image ?????
  • 18. No !!!!! This is much more than an image. It holds messages in it.
  • 19. Steganography vs. Cryptography Steganography Cryptography Hide the message Does not hide message Only sender and receiver knows the existence of message Everybody knows the existence of message End result is stego-media End result is cipher-text Used from ancient time till modern era Used in modern era
  • 20. Conclusion • Hiding information. • Secret among sender and receiver. • Having both aspects i.e. good and bad use.
  • 21. Reference • http://en.wikipedia.org/wiki/Steganography • http://www.webopedia.com/TERM/S/stegano graphy.html - For definition. • http://www.slideshare.net/ • Steganography- A Data Hiding Technique .pdf file by - Arvind Kumar and Km. Poona Assistant Professor Meerut (INDIA).