Professional Documents
Culture Documents
Presented by:
Nikhil Kumar
Reg no :0601221172
Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography, Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuriesfor fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.
What is Steganography
Hiding the fact that information is being sent. Usually hiding the data inside other data. The data is passed in an unusual communication manner.
What is Encryption
Converting the data into non readable . (non perceivable) data Its a way to pass data so that it become safe. Any unauthorized person is not able to understand it
Fusion
Invisible
Merge
Steganography
Encryption
Alice
Wendy
Bob
Original Image
Encryption Algorithm
Stegano Algorithm
Normal Image
Message Retrieval
Secret Message
Secret Message
Payload: the data that is desirable for transport Carrier: signal, stream or data file into which the payload is hidden Channel: type of input, such as JPEG image Package: the resulting signal, stream or data file which has the payload encoded Encoding density: the percentage of bytes which are modified to encode the payload, typically as a floating-point number between 0 and 1
Steganographic Techniques
Genome Steganography Hiding in Text Hiding in the disk space Hiding data in software and circuitry Information Hiding in Images Hiding in network packets Hiding in music files & video
Apparently p neutrals e protest r is s h i n thoroughly discounted and ignored. Isman hard hit. g s a i r Blockade issue affects pretext l s f for on o embargo m y n by-products, ejecting suets u and n vegetable e j i oils.
An instace from wwii
p h g l o j i
e i s s m u n a f y n i
r n r e
Key Image is an image which under goes in to an Encryption This image is a clone of original Original image is the image generating Algorithm which image which contains the whose clone is created generates a unique encryption hidden encrypted message technique .
Key Image
Original Image
Algorithm
Steganographic Algorithm
Message
Encrypte d Message
28
possible values for each color per pixel Not much difference in intensity between 11111111 and 11111110 Change to least significant bit of each color yields 3 bits per pixel One ASCII character can be represented for each 3 pixels Given the following 8 carrier bytes
Sample Result
Before Stganography
After Stganography
Places to hide message - Reserved bits - Sequence number field - Initial Sequence Number (ISN) oMakes use of threeway handshake in buildup of a TCP/IP connection
Statistical analysis
Analyze frequency of DCT coefficients
compressing
Security companies: -- Can USE And SELL IBES products as stand alone or as a part of their bigger package Banks and other financial institutions: -- safeguard their databases
Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.
Thank you
21