Idea and steganography
-
Upload
hamdard-university-karachi-pakistan -
Category
Technology
-
view
617 -
download
0
Transcript of Idea and steganography
![Page 1: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/1.jpg)
![Page 2: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/2.jpg)
![Page 3: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/3.jpg)
![Page 4: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/4.jpg)
![Page 5: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/5.jpg)
INTRODUCTION
Steganography is the art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity.
![Page 6: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/6.jpg)
Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface.
The first recorded uses of steganography can be traced back to 440 BC
History1 Wax tablets2
![Page 7: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/7.jpg)
Wax Tablet
![Page 8: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/8.jpg)
INTRODUCTION HISTORY TECHNIQUES APPLICATIONS THANK YOU
Physical
Digital
![Page 9: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/9.jpg)
Physical Steganogr-aphy
![Page 10: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/10.jpg)
| Writing on head | writing with secret ink
Physical steganogra-phy techniques used earlier in history
![Page 11: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/11.jpg)
Modern Steganography Techniques
Digital Steganography
![Page 12: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/12.jpg)
Before steganogra-
hy
After steganogra-
phy
Removing all but two
least significant bits of all
color components
![Page 13: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/13.jpg)
And now text steganography
In this type of steganography we hide the text in the image
![Page 14: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/14.jpg)
International Data Encryption Algorithm
History
Structure
Key making
![Page 15: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/15.jpg)
![Page 16: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/16.jpg)
![Page 17: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/17.jpg)
International Data Encryption Algorithm
OPERATION
![Page 18: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/18.jpg)
IDEA operates on 64-bit blocks using a 128-bit key, and
consists of a series of eight identical
transformations (a round, see the illustration) and an output
transformation (the half-round). Bitwise eXclusive OR (denoted
with a blue circled plus ).⊕ Addition modulo 216
(denoted with a Green boxed plus ).⊞
Multiplication modulo 216+1, where the all-zero Word
(0x0000) is interpreted as 216
(denoted by a red circled dot )⊙
![Page 19: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/19.jpg)
![Page 20: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/20.jpg)
International Data Encryption Algorithm
Key Making
![Page 21: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/21.jpg)
Each round uses six 16-bit sub-keys, while the half-round uses four, a total of 52 for 8.5 rounds.
The first eight sub-keys are extracted directly from the key, with K1 from the first round being the lower sixteen bits.
further groups of eight keys are created by rotating the main key left 25 bits between each group of eight
![Page 22: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/22.jpg)
:
Any question???
1009080706050403020100
![Page 23: Idea and steganography](https://reader034.fdocuments.net/reader034/viewer/2022042818/55ad9a5f1a28ab214b8b46f9/html5/thumbnails/23.jpg)