Steganography
-
Upload
neha-sharma -
Category
Technology
-
view
14.579 -
download
2
description
Transcript of Steganography
![Page 1: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/1.jpg)
STEGANOGRAPHY
![Page 2: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/2.jpg)
www.company.com
INTRODUCTION
Art and science of writing hidden
messages
No one apart from the sender and intended recipient, suspects the existence of the
message
A form of security through obscurity
![Page 3: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/3.jpg)
ETYMOLOGY
Steganós
• Covered
Graptos
• Writing
![Page 4: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/4.jpg)
www.company.com
HISTORY OF STEGANOGRAPHY
Current
440 B.C.
![Page 5: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/5.jpg)
EVOLUTION
Watermarking
Cryptography
Steganography
![Page 6: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/6.jpg)
www.company.com
ADVANTAGE OF STEGANOGRAPHY
OVER CRYPTOGRAPHY
Messages do not attract attention to themselvesProtects both messages and communicating parties
![Page 7: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/7.jpg)
www.company.com
TYPES OF STEGANOGRAPH
Y
Steganography In Text/Documents
Steganography In Video
Steganography In Audio
Steganography In Images
![Page 8: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/8.jpg)
STEGANOGRAPHY TERMS
Carrier or Cover File
Stego-Medium
Embedded or Payload
Steganalysis
![Page 9: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/9.jpg)
VIDEO
![Page 10: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/10.jpg)
www.company.comHOW IT WORKS
![Page 11: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/11.jpg)
www.company.com
STEGANOGRAP
HY STEPS
Steganography
Encoding a message Decode a message
![Page 12: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/12.jpg)
MESSAGE
Embed
ded Data
Plain info
MESSAGE
![Page 13: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/13.jpg)
www.company.com
ENCODING
• Prepare cover data
Step1
![Page 14: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/14.jpg)
www.company.com
DECODING
• Steganographic Data
Step1
![Page 15: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/15.jpg)
www.company.com
STEGANALYSIS
Art and Science of detecting hidden messages
Just discover Steganography
Not deals with decrypting the data
![Page 16: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/16.jpg)
STEGANOGRAPHY TECHNIQUES
Line Shift Coding
Word Shift Coding
Feature Coding
Least Significant Bit Insertion
Low bit encoding
Masking and Filtering
![Page 17: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/17.jpg)
www.company.com
STEGANOGRAPHY USING LEAST SIGNIFICANT BIT
![Page 18: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/18.jpg)
PRACTICAL
![Page 19: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/19.jpg)
www.company.comList of some tools for Steganography
Program Image files Audio files Video files Document files
OpenPuff
BMP, JPG, PNG, TGA
Mp3, WAV 3gp, Mp4, MPEG-1,
MPEG-2, VOB, SWF, FLV
MP3Stego - Mp3 - -
OpenStego BMP, PNG - - -
S-Tools BMP, GIF Wav - -
StegFS - - - -
Steganographic Laboratory (VSL)
BMP, PNG, JPG, TIFF
- - -
PHP-Class StreamSteganography
PNG - - -
![Page 20: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/20.jpg)
www.company.com
USAGE IN MODERN
PRINTERS
![Page 21: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/21.jpg)
www.company.com
ILLEGAL USAGE
HACKERS
TERRORISTS
CRIMINALS
![Page 22: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/22.jpg)
CONCLUSION
![Page 23: Steganography](https://reader034.fdocuments.net/reader034/viewer/2022051817/547850f4b4af9f157e8b46a9/html5/thumbnails/23.jpg)
www.company.com
QUERIES
?