SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Stegano Secrets - Python
Santhosh Baswa
Cyber Security Enthusiast
santhosh.nuz@gmail.com
October 17, 2015
Santhosh Baswa October 17, 2015 1 / 9
Introduction
Steganography
Steganography comes from Greek Word. It means covered or secret
writing.
” Steganography = steganos (covered) + graphein (writing) ”
Main Points
” The goal of steganography is to hide messages in such a way that
no one apart from the intended recipient even knows that a message
has been sent.”
This can be achieve by concealing the existence of information within
seemingly harmless carriers or cover.
Santhosh Baswa October 17, 2015 2 / 9
Block diagram of Steganography
Santhosh Baswa October 17, 2015 3 / 9
Steganography in Images
Image Encoding Techniques
The most common approaches to information hiding in images:
Least Significant bit Insertion
Masking and Filtering
Algorithms and transformations
Where we can use ?
Confidential Communication
Secret Data Storing
Santhosh Baswa October 17, 2015 4 / 9
Practical Session Starts with Python
By Using Python
Python Scripting is most powerful language for Security Professionals.
Syntax is too simple.
Lot of 3rd party modules available.
Python Modules used :
We are mainly using these modules in this session:
binascii (hexify)
getpass
sys , os
simplecrypt
Image,stepic
Santhosh Baswa October 17, 2015 5 / 9
Modules : binascii (hexify) and getpass
hexify
getpass
os and sys (stdin)
Santhosh Baswa October 17, 2015 6 / 9
Modules : simplecrypt
simplecrypt
Santhosh Baswa October 17, 2015 7 / 9
Modules : Image , Stepic
Image - Stepic
Santhosh Baswa October 17, 2015 8 / 9
Final Program Source code
Santhosh Baswa October 17, 2015 9 / 9

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography using lsb
Audio steganography using lsbAudio steganography using lsb
Audio steganography using lsb
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Week13
Week13Week13
Week13
 
16 exercises for part 3
16   exercises for part 316   exercises for part 3
16 exercises for part 3
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Py Vegas - Tales from the crypt
Py Vegas - Tales from the cryptPy Vegas - Tales from the crypt
Py Vegas - Tales from the crypt
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Steganography
SteganographySteganography
Steganography
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
 
Stegnography
Stegnography Stegnography
Stegnography
 

Similar a Steganography

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxSAMPATHKUMARS20
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 

Similar a Steganography (20)

Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography
SteganographySteganography
Steganography
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Steganography

  • 1. Stegano Secrets - Python Santhosh Baswa Cyber Security Enthusiast santhosh.nuz@gmail.com October 17, 2015 Santhosh Baswa October 17, 2015 1 / 9
  • 2. Introduction Steganography Steganography comes from Greek Word. It means covered or secret writing. ” Steganography = steganos (covered) + graphein (writing) ” Main Points ” The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.” This can be achieve by concealing the existence of information within seemingly harmless carriers or cover. Santhosh Baswa October 17, 2015 2 / 9
  • 3. Block diagram of Steganography Santhosh Baswa October 17, 2015 3 / 9
  • 4. Steganography in Images Image Encoding Techniques The most common approaches to information hiding in images: Least Significant bit Insertion Masking and Filtering Algorithms and transformations Where we can use ? Confidential Communication Secret Data Storing Santhosh Baswa October 17, 2015 4 / 9
  • 5. Practical Session Starts with Python By Using Python Python Scripting is most powerful language for Security Professionals. Syntax is too simple. Lot of 3rd party modules available. Python Modules used : We are mainly using these modules in this session: binascii (hexify) getpass sys , os simplecrypt Image,stepic Santhosh Baswa October 17, 2015 5 / 9
  • 6. Modules : binascii (hexify) and getpass hexify getpass os and sys (stdin) Santhosh Baswa October 17, 2015 6 / 9
  • 7. Modules : simplecrypt simplecrypt Santhosh Baswa October 17, 2015 7 / 9
  • 8. Modules : Image , Stepic Image - Stepic Santhosh Baswa October 17, 2015 8 / 9
  • 9. Final Program Source code Santhosh Baswa October 17, 2015 9 / 9