SlideShare una empresa de Scribd logo
1 de 17
“steganography”

            BY
SHAIK SHARAF PARVEZ
       09081A0474

  Under the guidance of
 Miss. Geetha(Asst. Proff.)
STEGAN-O-GRAPHY
   “The goal of steganography is to hide messages in such a
    way that no one apart from the intended recipient even
    knows that a message has been sent.”

   This can be achieve by concealing the existence of
    information within seemingly harmless carriers or cover

   It can be understand by the following figure.
   Steganography in “TEXT”


   Steganography in “IMAGES”


   Steganography in “AUDIO”
It involves three types of coding:
Line-Shift      Coding : Here, text lines are vertically shifted to
        encode the document uniquely.

   Word-Shift Coding : The codewords are coded into a
        document by shifting the horizontal locations of words within
        text lines, while maintaining a natural spacing appearance.

   Feature Coding : In feature coding, certain text features are
         altered, or not altered, depending on the codeword.
Image Compression:
   Image compression offers a solution to large image files. Two kinds of image
           compression are lossless and lossy compression. Both methods save
           storage space but have differing effects on any uncompressed hidden data
           in theimage.

   “Lossy”    JPEG(Joint Photographic Experts Group) format files, offers high
compression, but may not maintain the original image's integrity. Hence it is called
“lossy”.
   “Lossless” compression maintains the original image data exactly, It is thus more
           favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
Image Encoding Techniques
    The most common approaches to information hiding in images :

   Least Significant bit insertion :


   Masking and Filtering :


   Algorithms and transformations :
Audio Environments

             Digital representation
   Sample quantization method :
   Temporal sampling rate :
   Another digital representation :
Transmission medium :
            Bender’s transmission environments

   Digital end-to-end environment.

   Increased/decreased resampling environment.

   Analog transmission and resampling.

   ''Over the air'' environment.
Methods of Audio Data Hiding


   Low-bit encoding :


   Phase coding :


   Echo data hiding :
   Steganalysis is the art and science of detecting a
        secret communication.
   Hiding   a   message     will   most   likely    leave
        detectable traces in the cover medium.
   The information hiding process changes the
        statistical properties of the cover, which is a
        steganalyst attempts to detect.
   The process of attempting to detect statistical
        traces is called statistical steganalysis.
IMPORTANT ASPECTS OF STEGANALYSIS


   DETECTING HIDDEN INFORMATION


   DISABLING STEGANOGRAPHY
PPT steganography
PPT steganography
PPT steganography
PPT steganography

Más contenido relacionado

La actualidad más candente

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

La actualidad más candente (20)

Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Steganography
SteganographySteganography
Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Cryptography
CryptographyCryptography
Cryptography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography
CryptographyCryptography
Cryptography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 

Similar a PPT steganography

B03208016
B03208016B03208016
B03208016
inventy
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 

Similar a PPT steganography (20)

Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptx
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Stegnography
StegnographyStegnography
Stegnography
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
K0815660
K0815660K0815660
K0815660
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
B03208016
B03208016B03208016
B03208016
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

PPT steganography

  • 1. “steganography” BY SHAIK SHARAF PARVEZ 09081A0474 Under the guidance of Miss. Geetha(Asst. Proff.)
  • 3. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  It can be understand by the following figure.
  • 4.
  • 5. Steganography in “TEXT”  Steganography in “IMAGES”  Steganography in “AUDIO”
  • 6. It involves three types of coding: Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.  Word-Shift Coding : The codewords are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.  Feature Coding : In feature coding, certain text features are altered, or not altered, depending on the codeword.
  • 7. Image Compression:  Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in theimage.  “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”.  “Lossless” compression maintains the original image data exactly, It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
  • 8. Image Encoding Techniques The most common approaches to information hiding in images :  Least Significant bit insertion :  Masking and Filtering :  Algorithms and transformations :
  • 9. Audio Environments Digital representation  Sample quantization method :  Temporal sampling rate :  Another digital representation :
  • 10. Transmission medium : Bender’s transmission environments  Digital end-to-end environment.  Increased/decreased resampling environment.  Analog transmission and resampling.  ''Over the air'' environment.
  • 11. Methods of Audio Data Hiding  Low-bit encoding :  Phase coding :  Echo data hiding :
  • 12. Steganalysis is the art and science of detecting a secret communication.  Hiding a message will most likely leave detectable traces in the cover medium.  The information hiding process changes the statistical properties of the cover, which is a steganalyst attempts to detect.  The process of attempting to detect statistical traces is called statistical steganalysis.
  • 13. IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAPHY