SlideShare uma empresa Scribd logo
1 de 28
1

2/25/2014
OUTLINES
o Introduction
o History
o Steganography V/S Cryptography
o Steps Involved In Steganography
o Stegnography In Various Media

o Digital Watermarking
o Watermarking V/S Steganography
o Steganalysis
o Advantage & Disadvantage

2

2/25/2014
Introduction
o Greek Words: STEGANOS – “Covered”

GRAPHIE – “Writing”
o Advance security is not maintained by the password protection

but it is gained by hiding the existence of the data, which can
only be done by Steganography

o Steganography is the art and science of writing hidden messages

in such a way that no one apart from the intended recipient
knows of the existence of the message

o This can be achieve by concealing the existence of information

within seemingly harmless carriers or cover

o Carrier: text, image, video, audio, etc.

3

2/25/2014
History
o Greeks used it writing message on some material

and later covering it with wax, tattooing messages
on bald head, later growing hair to cover it up.
o In World War II invisible inks were used to write

messages in between the lines of normal text
message.
o Currently, cryptography and steganography are

used to hide and send the secret data.
4

2/25/2014
Steganography V/S
Cryptography
o Cryptography hides the contents of a secret message

from a malicious people, whereas Steganography even
conceals the existence of the message.
o In cryptography, the structure of a message is

scrambled to make it meaningless and unintelligible
unless the decryption key is available.
o Steganography does not alter the structure of the secret

message, but hides it inside a cover-image so it cannot
be seen.
5

2/25/2014
6

2/25/2014
Steps involved in Digital
Steganography

7

2/25/2014
Digital Steganography Under
Various Media
o Steganography In Text/Documents
o Steganography In Images
o Steganography In Audio

8

2/25/2014
Steganography In Text/Documents
 It involves three types of coding:
o Line-Shift Coding : Here, text lines are vertically shifted to

encode the document uniquely.
o Word-Shift Coding : The code words are coded into document

by shifting the horizontal locations of words within text lines, while
maintaining a natural spacing appearance.
o Feature Coding : In feature coding, certain text features are

altered, or not altered, depending on the codeword.
9

2/25/2014
Hiding a Message inside Text
 Partially effective

o randoM capitalosis is a rarE disEase ofTen

contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. Please do not
confuse this disease witH a blatant
attEmpt aT steganogRAPhy.

Reveals: MEET AT THE FRONT OF THE TRAP
10

2/25/2014
Steganography In Images

o

Image Compression:
Image compression offers a solution to large image files. Two kinds of image
compression are lossless and lossy compression. Both methods save storage
space but have differing effects on any uncompressed hidden data in the image.

o

“Lossy”

JPEG(Joint Photographic Experts Group) format files, offers high

compression, but may not maintain the original image's integrity. Hence it is
called “lossy”.


“Lossless” compression maintains the original image data exactly, It is thus more

favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
11

2/25/2014
Image Based Techniques
 Least significant Bit
 Masking And Filtering

12

2/25/2014
L.S.B Steganography
o Replacing least-significant-bits (LSBs) of digital data with

message bits.

110010
00

Embedding
Extracting

o Embedding random message bits in LSBs will not cause

any discernible difference from the cover-signals.
o Easy to implement, High payloads.
o 13
Simple, but susceptible to lossy compression and image
2/25/2014
manipulation.
L.S.B Uses
o Storing passwords and/or other confidential information
o Covert communication of sensitive data
o Speculated uses in terrorist activities
o Being widely used to hide and/or transfer illegal content

14

2/25/2014
WATERMARKING
o A watermark is a form, image or text that is impressed

onto paper, which provides evidence of its authenticity.
o A distinguishing mark impressed on paper during
manufacture; visible when paper is held up to the light.
o EXAMPLEThe presence of specific patterns in currency notes
which are visible only when the note is held to light is a
well known example for watermark.
Courtesy of Blue Spike, Inc.

15

2/25/2014
DIGITAL WATERMARKING
• Digital

watermarking is an extension
watermarking concept in the digital world.

of

• A digital watermark is a pattern of bits inserted into

a digital image, audio or video file that identifies the
file's copyright information (author, rights, etc.).

16

2/25/2014
STEGANOGRAPHY V/S
WATERMARKING
 The

main goal of
steganography is to hide
a message m in some
audio or video (cover)
data d, to obtain new
data
d',
practically
indistinguishable from
d, by people, in such a
way
that
an
eavesdropper
cannot
detect the presence of m
in d'.

17

 The

main goal of
watermarking is to hide
a message m in some
audio or video (cover)
data d, to obtain new
data
d',
practically
indistinguishable from
d, by people, in such a
way
that
an
eavesdropper
cannot
remove or replace m in
d'.
2/25/2014
Importance of Digital
Watermarking
o As seen above in Fig, Alice creates an original image

and watermarks it before passing it to Bob. If Bob
claims the image and sells copies to other people Alice
can extract her watermark from the image proving her
copyright to it.

o The caveat here is that Alice will only be able to prove

18

her copyright of the image if Bob hasn’t managed to
modify the image such that the watermark is damaged
enough to be undetectable or added his own watermark
2/25/2014
such that it is impossible to discover which watermark
THE OVER ALL PROCESS

19

2/25/2014
Visible Watermarking
 Visible watermark is a translucent overlaid into an

image and is visible to the viewer. Visible
watermarking is used to indicate ownership and for
copyright protection.

MAHESH Watermark

20

Original Image

Watermarked Image2/25/2014
Invisible watermark
o Invisible watermark is embedded into the data in such a way that the
changes made to the pixel values are perceptually not noticed. Invisible
watermark is used as evidence of ownership and to detect
misappropriated images.

Original Image

21

Watermarked Image

2/25/2014
Steganography In Audio
 Phase coding
 Echo Data Hiding

22

2/25/2014
PHASE CODING:
Phase coding relies on the fact that the phase components of sound
are not as perceptible to the human ear as noise is. Rather than
introducing perturbations, the technique encodes the message bits as
phase shifts in the phase spectrum of a digital signal, achieving an
inaudible encoding .
ECHO-HIDING:
In echo hiding, information is embedded in a sound file by
introducing an echo into the discrete signal. Like the spread spectrum
method, it too provides advantages in that it allows for a high data
transmission rate and provides superior robustness when compared to
the noise inducing methods.

23

2/25/2014
ADVANTAGE & DISADVANTAGE
 ADVANTAGES :
 Difficult to detect and Only receiver can detect
 It can be done faster with large no. of softwares
 Provides better security for sharing data in LAN, MAN & WAN

 DISADVANTAGES:
 The confidentiality of information is maintained by the algorithms, and if the algorithms

are known then this technique is of no use
 Password leakage may occur and it leads to the unauthorized access of data.
 If this technique is gone in the wrong hands like hackers can be very much dangerous for
24

all

2/25/2014
Detecting Steganography :
• The art of detecting Steganography is referred to as

Steganalysis.
• Steganalysis does not deal with trying to decrypt the

hidden information inside of a file, just discovering it.
• It is mainly done with comparing the encrypted file with

the original copy.

25

2/25/2014
REFERENCES
 http://en.wikipedia.org/wiki/Steganography8

 http://computer.howstuffworks.com/file-compression3.htm
 http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steg

anography.pdf
 http://www.sans.org/reading_room/whitepapers/covert/steg

anography-matters-post-911-world_676
 http://www.scribd.com/doc/49683406/1/Steganography-vs-

Cryptography
26

2/25/2014
27

2/25/2014
28

2/25/2014

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Destaque

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Steganography
SteganographySteganography
SteganographySonam M
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domainAshish Kumar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid PresentationShahab Khan
 

Destaque (20)

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
Steganography Steganography
Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography
Steganography Steganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Watermark
WatermarkWatermark
Watermark
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid Presentation
 

Semelhante a digital steganography

Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
B03208016
B03208016B03208016
B03208016inventy
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 

Semelhante a digital steganography (20)

Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Steganography
SteganographySteganography
Steganography
 
1.pdf
1.pdf1.pdf
1.pdf
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
P0460594100
P0460594100P0460594100
P0460594100
 
B03208016
B03208016B03208016
B03208016
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 

Último

定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一fjjwgk
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteshivubhavv
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxGraduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxJobs Finder Hub
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiringkaran651042
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 

Último (20)

定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr pete
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxGraduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Students with Oppositional Defiant Disorder
Students with Oppositional Defiant DisorderStudents with Oppositional Defiant Disorder
Students with Oppositional Defiant Disorder
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiring
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 

digital steganography

  • 2. OUTLINES o Introduction o History o Steganography V/S Cryptography o Steps Involved In Steganography o Stegnography In Various Media o Digital Watermarking o Watermarking V/S Steganography o Steganalysis o Advantage & Disadvantage 2 2/25/2014
  • 3. Introduction o Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” o Advance security is not maintained by the password protection but it is gained by hiding the existence of the data, which can only be done by Steganography o Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message o This can be achieve by concealing the existence of information within seemingly harmless carriers or cover o Carrier: text, image, video, audio, etc. 3 2/25/2014
  • 4. History o Greeks used it writing message on some material and later covering it with wax, tattooing messages on bald head, later growing hair to cover it up. o In World War II invisible inks were used to write messages in between the lines of normal text message. o Currently, cryptography and steganography are used to hide and send the secret data. 4 2/25/2014
  • 5. Steganography V/S Cryptography o Cryptography hides the contents of a secret message from a malicious people, whereas Steganography even conceals the existence of the message. o In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is available. o Steganography does not alter the structure of the secret message, but hides it inside a cover-image so it cannot be seen. 5 2/25/2014
  • 7. Steps involved in Digital Steganography 7 2/25/2014
  • 8. Digital Steganography Under Various Media o Steganography In Text/Documents o Steganography In Images o Steganography In Audio 8 2/25/2014
  • 9. Steganography In Text/Documents  It involves three types of coding: o Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely. o Word-Shift Coding : The code words are coded into document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance. o Feature Coding : In feature coding, certain text features are altered, or not altered, depending on the codeword. 9 2/25/2014
  • 10. Hiding a Message inside Text  Partially effective o randoM capitalosis is a rarE disEase ofTen contrAcTed by careless inTernet users. tHis sad illnEss causes the aFfected peRsON To randomly capitalize letters in a bOdy oF texT. Please do not confuse this disease witH a blatant attEmpt aT steganogRAPhy. Reveals: MEET AT THE FRONT OF THE TRAP 10 2/25/2014
  • 11. Steganography In Images  o Image Compression: Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in the image. o “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”.  “Lossless” compression maintains the original image data exactly, It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats. 11 2/25/2014
  • 12. Image Based Techniques  Least significant Bit  Masking And Filtering 12 2/25/2014
  • 13. L.S.B Steganography o Replacing least-significant-bits (LSBs) of digital data with message bits. 110010 00 Embedding Extracting o Embedding random message bits in LSBs will not cause any discernible difference from the cover-signals. o Easy to implement, High payloads. o 13 Simple, but susceptible to lossy compression and image 2/25/2014 manipulation.
  • 14. L.S.B Uses o Storing passwords and/or other confidential information o Covert communication of sensitive data o Speculated uses in terrorist activities o Being widely used to hide and/or transfer illegal content 14 2/25/2014
  • 15. WATERMARKING o A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. o A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light. o EXAMPLEThe presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark. Courtesy of Blue Spike, Inc. 15 2/25/2014
  • 16. DIGITAL WATERMARKING • Digital watermarking is an extension watermarking concept in the digital world. of • A digital watermark is a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). 16 2/25/2014
  • 17. STEGANOGRAPHY V/S WATERMARKING  The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot detect the presence of m in d'. 17  The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot remove or replace m in d'. 2/25/2014
  • 18. Importance of Digital Watermarking o As seen above in Fig, Alice creates an original image and watermarks it before passing it to Bob. If Bob claims the image and sells copies to other people Alice can extract her watermark from the image proving her copyright to it. o The caveat here is that Alice will only be able to prove 18 her copyright of the image if Bob hasn’t managed to modify the image such that the watermark is damaged enough to be undetectable or added his own watermark 2/25/2014 such that it is impossible to discover which watermark
  • 19. THE OVER ALL PROCESS 19 2/25/2014
  • 20. Visible Watermarking  Visible watermark is a translucent overlaid into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection. MAHESH Watermark 20 Original Image Watermarked Image2/25/2014
  • 21. Invisible watermark o Invisible watermark is embedded into the data in such a way that the changes made to the pixel values are perceptually not noticed. Invisible watermark is used as evidence of ownership and to detect misappropriated images. Original Image 21 Watermarked Image 2/25/2014
  • 22. Steganography In Audio  Phase coding  Echo Data Hiding 22 2/25/2014
  • 23. PHASE CODING: Phase coding relies on the fact that the phase components of sound are not as perceptible to the human ear as noise is. Rather than introducing perturbations, the technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding . ECHO-HIDING: In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal. Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior robustness when compared to the noise inducing methods. 23 2/25/2014
  • 24. ADVANTAGE & DISADVANTAGE  ADVANTAGES :  Difficult to detect and Only receiver can detect  It can be done faster with large no. of softwares  Provides better security for sharing data in LAN, MAN & WAN  DISADVANTAGES:  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use  Password leakage may occur and it leads to the unauthorized access of data.  If this technique is gone in the wrong hands like hackers can be very much dangerous for 24 all 2/25/2014
  • 25. Detecting Steganography : • The art of detecting Steganography is referred to as Steganalysis. • Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it. • It is mainly done with comparing the encrypted file with the original copy. 25 2/25/2014
  • 26. REFERENCES  http://en.wikipedia.org/wiki/Steganography8  http://computer.howstuffworks.com/file-compression3.htm  http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steg anography.pdf  http://www.sans.org/reading_room/whitepapers/covert/steg anography-matters-post-911-world_676  http://www.scribd.com/doc/49683406/1/Steganography-vs- Cryptography 26 2/25/2014