You are on page 1of 21

under the guidance of: Miss Surapriya swain MR Alok Kumar pani

Presented by:

Nikhil Kumar

Reg no :0601221172

Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography, Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuriesfor fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.

What is Steganography
Hiding the fact that information is being sent. Usually hiding the data inside other data. The data is passed in an unusual communication manner.

What is Encryption
Converting the data into non readable . (non perceivable) data Its a way to pass data so that it become safe. Any unauthorized person is not able to understand it

Fusion
Invisible

Merge

Steganography

Encryption

Needs to send private mesg

Sud get d mesg without anybody sees it

Alice

Wendy

Bob

Secret Key Image

Original Image

Encryption Algorithm

Stegano Algorithm

Normal Image

Message Retrieval

Secret Message

Secret Message

Secret Key Image Ordinary Image

Payload: the data that is desirable for transport Carrier: signal, stream or data file into which the payload is hidden Channel: type of input, such as JPEG image Package: the resulting signal, stream or data file which has the payload encoded Encoding density: the percentage of bytes which are modified to encode the payload, typically as a floating-point number between 0 and 1

Steganographic Techniques

Genome Steganography Hiding in Text Hiding in the disk space Hiding data in software and circuitry Information Hiding in Images Hiding in network packets Hiding in music files & video

Apparently p neutrals e protest r is s h i n thoroughly discounted and ignored. Isman hard hit. g s a i r Blockade issue affects pretext l s f for on o embargo m y n by-products, ejecting suets u and n vegetable e j i oils.
An instace from wwii

p h g l o j i

e i s s m u n a f y n i

r n r e

How It Works in case of images

Key Image is an image which under goes in to an Encryption This image is a clone of original Original image is the image generating Algorithm which image which contains the whose clone is created generates a unique encryption hidden encrypted message technique .

Key Image

Original Image

Clone of Original image

Algorithm

Unique Encryption Technique

Steganographic Algorithm

Message

Message is encrypted using unique encryption technique

Encrypte d Message

28

possible values for each color per pixel Not much difference in intensity between 11111111 and 11111110 Change to least significant bit of each color yields 3 bits per pixel One ASCII character can be represented for each 3 pixels Given the following 8 carrier bytes

10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000


Assume we want to insert some payload the letter G, in ASCII: 01000111 The resulting bytes are

10010100 00001101 11001000 10010110 00001110 11001011 10011111 00010001


Only half of the available bytes were affected by our insertion Change is relatively undetectable

Sample Result
Before Stganography

After Stganography

Hiding in TCP header

Places to hide message - Reserved bits - Sequence number field - Initial Sequence Number (ISN) oMakes use of threeway handshake in buildup of a TCP/IP connection

Unused Header Bit Stuffing

Padding Byte Stuffing

Statistical analysis
Analyze frequency of DCT coefficients

compressing

Where it can be USED Applications?

Government Agencies: -who store documents which are very sensitive

Security companies: -- Can USE And SELL IBES products as stand alone or as a part of their bigger package Banks and other financial institutions: -- safeguard their databases

Business people: -preserve legal and customer specific financial documents

Private Organizations: -- who want to safeguard their sensitive information

Digital Watermarking Digital Signature Authentication Digital Linkage and Storage

Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.

Thank you

21

You might also like