You are on page 1of 30

Steganography

B Y:
K ira n G . K .
1 v k 0 6 e c0 3 0
Introduction :
 Advance security is not maintained by the password
protection but it is gained by hiding the existence of the
data, which can only be done by Steganography.
 Steganography is a subject which is rarely touched upon by
most IT Security Enthusiasts .
 Steganographic Systems can hide messages inside of Digital
Objects such as a file that has been concealed inside a
Digital Picture, Video or Audio file.
 The main advantage of Steganography is, it hides the
information in such a way that there is no information
hidden at all.
 This is derived from the name of lizard “Stegosaurs”.

History of Steganography
:
4 4 0 B . C .
 Histiaeus shaved the head of his most trusted slave
and tattooed it with a message which disappeared
after the hair had regrown. To instigate a revolt
against Persians.

1 st and 2 nd World Wars


 German spies used invisible ink to print very small
dots on letters.
 Microdots – Blocks of text or images scaled down to
the size of a regular dot.

Current
 Special inks are used to write a hidden messages
on bank notes.
Evolution :
Etymology :
It comes from the Greek words :










Definition :
Steganography is the art and science of hiding the fact that communication is
taking place.


What is Steganography ?

Steganography is the practice of hiding private or


sensitive information within something that
appears to be nothing out of the usual.

Steganography in the modern day sense of the word


usually refers to information or a file that has
been concealed inside a digital Picture, Video or
Audio file.
Steganography terms
Carrier or Cover File – A Original message or
a file in which hidden information will be stored
inside of it .
Stego - Medium– The medium in which the
information is hidden.
Embedded or Payload – The information which
is to be hidden or concealed.
Steganalysis – The process of detecting hidden
information inside a file.


Types of Steganography
S te g a n o g ra p h y In Te x t/ D o cu m e n ts

Steganography In Images

Steganography In Audio

Steganography In Video


Steganography in Text
Lin e S h ift C o d in g : Lin e s a re ve rtica lly sh ifte d
W o rd S h ift C o d in g : C o d e w o rd s a re H o rizo n ta lly
sh ifte d
Fe a tu re C o d in g : C o d in g d o n e u sin g ce rta in text
fe a tu re s
A lte rn a tive M e th o d s
 S yn ta ctic M e th o d s
 S e m a n tic M e th o d s

Tools :- wbStego

Steganography In
Images
Le a st S ig n ifica n t B it In se rtio n
 C o m m o n a n d S im p le A p p ro a ch
M a skin g a n d Filte rin g
 M a rk a n im a g e in a m a n n e r sim ila r to p a p e r
w a te rm a rks
A lg o rith m s a n d Tra n sfo rm a tio n s
 D CT
 FFT
 W a ve le t Tra n sfo rm
Tools :- JPHide and JPSeek
Steganography In Audio
Low bit encoding method is used to hide
information inside audio files which is some
what similar to LSB that is generally used in
Images.
Spread Spectrum is another method used to
conceal information inside of an audio file.
This method works by adding random noises
to the signal the information is conceal
inside a carrier and spread across the
frequency spectrum.

Steganography In Audio
Echo Data Hiding is yet another method of
hiding information inside an audio file.
This method uses the echoes in sound files in
order to try and hide information.
By simply adding extra sound to an echo inside an
audio file, information can be concealed. The
thing that makes this method of concealing
information inside of audio files better than
other methods is that it can actually improve the
sound of the audio inside an audio file.
Tools :- mp3stego

Steganography in
Videos
S te g a n o g ra p h y in V id e o s is sim ila r to th a t o f
S te g a n o g ra p h y in Im a g e s, a p a rt fro m
in fo rm a tio n is h id d e n in e a ch fra m e o f vid e o .
W h e n o n ly a sm a lla m o u n t o f in fo rm a tio n is
h id d e n in sid e o f vid e o it g e n e ra lly isn ’ t
n o tice a b le a t a ll, h o w e ve r th e m o re in fo rm a tio n
th a t is h id d e n th e m o re n o tice a b le it w ill
b e co m e .

Tools :- msu StegoVideo
How it works :
In this our original data is embed with the
carrier file to form STEGDATA.
Example:
D e te ctin g S te g a n o g ra p h y
:
 The art of detecting Steganography is referred to as
Steganalysis.

 Using different tools like sendsecret, Steganography 8.1


, Stegdetect, Hiderman etc.

 Steganalysis does not deal with trying to decrypt the


hidden information inside of a file, just discovering
it.

 It is mainly done with comparing the encrypted file Information hidden


with the original copy. behind the image.

 It can be done through Histogram technique.



Detecting By histogram
technique :
Applications in Modern
Printers

Used in HP and Xerox brand color Laser
Printers.
Tiny Yellow dots are added to each page.
The dots are barely visible and contain
Encoded printer serial numbers, as well as
date and time stamps.
Machine ID codes in laser
printers

See http://www.eff.org/Privacy/printers/
Machine ID codes in laser
printers
Machine ID codes in laser
printers
Machine ID codes in laser
printers
A d va n ta g e s :
 It is used in the way of hiding not the
Information but the password to
reach that Information.

 Difficult to detect .Only receiver can


detect.

 Can be applied differently in digital


image, audio & video file.

 It can be done faster with the large no


of software's.
D isa d va n ta g e s :
 Huge number of data = huge file size, so
some one can suspect about it.

 In sending and receiving information can


be leaked.

 The confidentiality of information is


maintained by the algorithms, and if the
algorithms are known then its all over.

 If this technique is gone in the wrong


hands like hackers, terrorist ,criminals
then this can be very much dangerous
for all.
C o n clu sio n :
 Though steganography is not implemented in wider ways but it can be the
best security tool.
 The main problem of today's world is to secure their data confidentially, the
techniques used currently are not considered the best which can only be
replaced by Steganography.
 If it gets in the hand of terrorist then it could be even worse than WTC Attack
in which steganography was used.
Bibliography
www.wikipedia.org
http://zone-h.org
h ttp :// w w w . e ffo
. rg / Priva cy / p rin te rs/
N . p ro vo s & P. H o n e ym a n , “ H id e & S e e k : A n
In tro d u ctio n to S te g a n o g ra p h y ,” IE E E
S e cu rity a n d p riva cy
D . A rtz, “ D ig ita lS te g a n o g ra p h y: H id in g D a ta
w ith in D a ta ,” IE E E S e cu rity a n d Priva cy


Thank You

You might also like