2. What is Steganography?
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
• Steganography is the art and science of writing hidden messages in such a way that no
one apart from the intended recipient knows of the existence of the message.
• This can be achieve by concealing the existence of information within seemingly harmless
carriers or cover
• Carrier: text, image, video, audio, etc.
3. Introduction
• Steganography is the dark cousin of cryptography.While cryptography provides
privacy, steganography is intended to provide secrecy.
• Privacy is what you need when you use your credit card on the Internet -- you
don't want your number revealed to the public. For this, you use cryptography,
and send a coded pile of gibberish that only the web site can decipher. Though
your code may be unbreakable, any hacker can look and see you've sent a
message.
• For true secrecy, you don't want anyone to know you're sending a message at all.
4. SteganographyTechniques
Masking and Filtering: Is where information is hidden inside of a image using digital
watermarks that include information such as copyright, ownership, or licenses. Since, it is
adding an attribute to the cover image thus extending the amount of information
presented.
Algorithms andTransformations:This technique hides data in mathematical functions that
are often used in compression algorithms. The idea of this method is to hide the secret
message in the data bits in the least significant coefficients.
Least Significant Bit Insertion:The most common and popular method of modern day
steganography is to make use of the LSB of a picture’s pixel information. Thus the overall
image distortion is kept to a minimum while the message is spaced out over the pixels in
the images. This technique works best when the image file is larger then the message file
and if the image is grayscale.
5. Basics of Steganography
fE: steganography function "embedding"
fE
-1: steganography function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
7. Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded packages is called
Steganalysis.
• Visual Analysis tries to reveal the presence of secret communication
through inspection, either with the naked eye or with the assistance of a
computer.
• Statistical (Algorithmic) Analysis reveals tiny alterations in an image's
statistical behavior caused by steganographic embedding.
• The nominally universal methods developed to detect embedded stego-data are
generally less effective than the steganalytic methods aimed at specific types of
embedding.
9. Example:
• Salutations, Mr. Robertson of CIS 5371.TheFlorida Society of
Math and Cryptography is proud to present you with an small
exam for qualification into our society. The key for passing is
studying. Cryptography is rigorous and only those with patience
in themselves pass. We have an exam PO Box inTallahassee. But
please submit by 12/12.
10. Answer:
• Salutations, Mr. Robertson of CIS 5371. TheFlorida Society of
Math and Cryptography is proud to present you with an small
exam for qualification into our society. The key for passing is
studying. Cryptography is rigorous and only those with patience
in themselves pass. We have an exam PO Box inTallahassee. But
please submit by 12/12.
The Cryptography exam key is in PO Box 1212.