Steganography flooding

HENI BHUNGALIA
HENI BHUNGALIAStudent at Sarvajanik College of Engineering & Technology
Steganography a GREEK word it means covered or
secret writing
Stegan -- o -- graphy
Covered Writing
“The goal of steganography is to hide messages in such a
way that no one apart from the intended recipient even
knows that a message has been sent.”
STEGANOGRAPHY UNDER VARIOUS MEDIA
Steganography in “TEXT”
Steganography in “IMAGES”
Steganography in “AUDIO”
A steganography software tool allows a user to embedded
hidden data inside a carrier file, such as an image or video
and later extract that data.
Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
Example of Text
Steganography
An example of message containing cipher text by German Spy
in World War ||
“Apparently neutral’s protest is thoroughly discounted and
ignored . Isman hard hit. Blockade issue affects pretext for
embargo on by products, ejecting suets and vegetable oi/s”
Taking the second letter in each word the following message
emerges:
Pershing sails from NY June 1
Minor Change To
Shapes of Character
Steganography in Image
Using image files as hosts for steganography messages takes
advantage of the limited capabilities of the human visual system
Example Of image steganography
Original Image
Size 56.1KB
Encoded Image
Size 544KB
Hidden Message Is Cyber
security Welcomes You
Steps to Hide text in image
1. Open S-tools.
2. Select image in which we have to hide
text
with .bmp extension.
3. Drag the text file over the image.
4. Alert will come to enter the password
this
same password we have to enter when
end
person wants to reveal the message.
When user wants to reveal the
text.
1. Open the hidden data file.
2. Right click. Select reveal
enter the same password
that was used to hide the
text.
3. A prompt will be display.
With list of file hidden.
4. Save that file(Stegano.txt)
Steganography in Audio
To embed data secretly onto digital audio file there
are few techniques introduced :
– LSB Coding
– Phase Coding
– Parity Coding
– Spread Spectrum
Flowchart Of Audio
Steganography
Example of LSB Method
The message 'HEY' is encoded in
a 16-bit CD quality sample using
the LSB method.
Here the secret information is
‘HEY’ and the cover file is audio
file. HEY is to be embedded
inside the audio file. First the
secret information ‘HEY’ and the
audio file are converted into bit
stream.
The least significant column of
the audio file is replaced by the
bit stream of secret information
‘HEY’. The resulting file after
embedding secret information
‘HEY’ is called Stego-file.
Case On Real Life
Terrorist organizations have mastered the art of
combining steganography with encryption.
Presently most terrorist instructions are also carried out
this same way, but there has been an increase in the use
of photographic images used for steganography.
Others are hiding maps and photographs of terrorist
target and posting instruction for terrorist activities .
Combined Crypto
Steganography
EncryptionPlain Text Crypto Text Cover Image
Stegano Image
Cipher TextDecryptionPlain Text
Covered medium + Hidden data + Stego key = Stego Medium
Who Is He ?
Discussion Of Attack 9/11
According to U.S. officials, in early 2001 Osama
bin Laden posted steganographic material in
sports chat rooms and some other web sites
with instructions for terrorist activities.
US officials and expert say its the latest
method of communication being used by
Osama Bin Laden and his associates to outbox
law enforcement.
Dr Robert Koontz claimed that “CODED
IMAGES” shows plans for massive germs attack
on US killing millions.
Study of 9/11 attack
Says Ankit Fadia a 16 year old boy he was called in to help decrypt message
from Osama Bin Laden shortly after 9/11.
Boy stunned to see the kind of technology they used to communicate.
After 9/11 attack agencies had tracked some emails where few peoples were
frequently exchanging photographs of Canadian rockstar Avril Lavigne.
Steganography-hidden messages that used three customized encryption algorithm
They used technography [sic]to send messages
Digital Watermarking
A watermark is a form, image or text that is impressed onto
paper,
which provides evidence of its authenticity.
Visible Watermarking is used to indicate ownership and for
copyright protection.
Digital Watermarking can be considered as special technique
of steganography.
Life Cycle of Water Marking
Watermarking classification
Original Image
Our Watermark
Watermarked Image
Visible & Invisible Watermarking
Robust & Fragile watermarking
In Robust watermarking modification of watermarked content will not
affect watermark.
In Fragile watermarking watermark get destroyed when watermarked
content is modified or tampered.
Public & Private watermarking
In public watermarking users of content are authorized to detect
watermark.
In private watermarking users not authorized to detect watermark.
Asymmetric & Symmetric
watermarking
In Asymmetric watermarking different keys used for embedding and
detecting watermark.
In Symmetric watermarking same keys are used for embedding and
detecting watermarks.
Steganographic & Non steganographic
watermarking
In Steganographic watermarking user unaware of the presence of a
watermark.
In non steganographic watermarking user aware of the presence of a
watermark
Steganography v/s Watermarking
The main goal of steganography is to hide a message m in some audio or
video (cover) data d, to obtain new data d’ , practically indistinguishable
from d, by people in such a way that an eavesdropper cannot detect the
presence of m in d’.
The main goal of watermarking is to hide a message m in some audio or
video (cover) data d, to obtain new data d’, practically indistinguishable
from d , by people in such a way that an eavesdropper cannot remove or
replace m in d’.
Scenario of Steganography
Modern computer printers use steganography includes HP
& Xerox brand color laser printers.
These printers add tiny yellow dots to each page.
The dots contain encoded printer serial numbers & date &
time stamps.
E-mail Spoofing
A spoofed email is when the sender purposely alters parts of the email to masquerade
as though it was authored by someone else.
Commonly, the sender’s name/address and the body of the message are formatted to
appear from a legitimate source, as though the email came from a bank or a
newspaper or legitimate company on the Web.
Sometimes, the spoofer will make the email appear to come from a private citizen
somewhere.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the
main protocol used in sending e-mail, does not include an
authentication mechanism.
If the precaution is not taken, anyone with the requisite knowledge can connect to
the server and use it to send messages.
To send spoofed e-mail, senders insert commands in headers that will alter message
information.
It is possible to send a message that appears to be from anyone, anywhere, saying
whatever the sender wants it to say. Thus, someone could send spoofed e-mail that
appears to be from you with a message that you didn't write.
For example, spoofed e-mail may purport to be from someone in a position of
authority, asking for sensitive data, such as passwords, credit card numbers, or other
personal information -- any of which can be used for a variety of criminal purposes.
What is main goal
of Email Spoofing
Be aware of
1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure
2. Watch for Spoofed Email Addresses
Changing the name of the sender so that it does not match the sender’s
email address
3. Don’t Give Out Personal Information
4. Avoid Strange Attachments or Unfamiliar Links
5. Seem Too Good To Be True? It is.
Zmail open source software used to send fake mails
https://emkei.cz/
Thank You..!!
1 de 29

Recomendados

SteganographySecond por
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
806 visualizações22 slides
Stegnography final por
Stegnography finalStegnography final
Stegnography finalHeena Bohra
2.6K visualizações29 slides
10.1.1.157.3117 por
10.1.1.157.311710.1.1.157.3117
10.1.1.157.3117Anas Pa
185 visualizações11 slides
Steganography - A smart way to hide data por
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
1.1K visualizações25 slides
Steganography ppt por
Steganography pptSteganography ppt
Steganography pptVikas Sharma
5.3K visualizações9 slides
steganography por
steganographysteganography
steganographyManika Arora
2.7K visualizações37 slides

Mais conteúdo relacionado

Mais procurados

About Steganography por
About SteganographyAbout Steganography
About SteganographySudhansh Gupta
5.6K visualizações27 slides
Information hiding por
Information hidingInformation hiding
Information hidingTabassumSaifi2
522 visualizações15 slides
Steganography por
SteganographySteganography
SteganographyKhushbu Chudasama
1.2K visualizações32 slides
Steganography por
SteganographySteganography
SteganographySaugata Palit
2.2K visualizações14 slides
Presentation1 por
Presentation1Presentation1
Presentation1guestb8230c
858 visualizações77 slides
Cryptography and Steganography with watermarking por
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
2.5K visualizações21 slides

Mais procurados(20)

About Steganography por Sudhansh Gupta
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta5.6K visualizações
Information hiding por TabassumSaifi2
Information hidingInformation hiding
Information hiding
TabassumSaifi2522 visualizações
Steganography por Khushbu Chudasama
SteganographySteganography
Steganography
Khushbu Chudasama1.2K visualizações
Steganography por Saugata Palit
SteganographySteganography
Steganography
Saugata Palit2.2K visualizações
Presentation1 por guestb8230c
Presentation1Presentation1
Presentation1
guestb8230c858 visualizações
Cryptography and Steganography with watermarking por Garima Kulshreshtha
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
Garima Kulshreshtha2.5K visualizações
Stegnography por Pratik Farkya
Stegnography Stegnography
Stegnography
Pratik Farkya1.8K visualizações
Presentation On Steganography por TeachMission
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission7.6K visualizações
Computer forensics and steganography por Xavier Prathap
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Xavier Prathap5K visualizações
C0341117 por iosrjournals
C0341117C0341117
C0341117
iosrjournals539 visualizações
Steganography por Neha Sharma
SteganographySteganography
Steganography
Neha Sharma35.6K visualizações
Cryptography por Jasim Jas
CryptographyCryptography
Cryptography
Jasim Jas4.1K visualizações
Steganography por Satyam Sharma
Steganography Steganography
Steganography
Satyam Sharma354 visualizações
Steganography in images por Nikhil Tripathi
Steganography in imagesSteganography in images
Steganography in images
Nikhil Tripathi16.9K visualizações
Demystifying Secure Channel por Viral Parmar
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
Viral Parmar41 visualizações
An analysis of steganographic techniques and terrorists can use them por stuimrozsm
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
stuimrozsm916 visualizações
Novel steganography scheme using Arabic text features in Holy Quran por IJECEIAES
Novel steganography scheme using Arabic text features in Holy QuranNovel steganography scheme using Arabic text features in Holy Quran
Novel steganography scheme using Arabic text features in Holy Quran
IJECEIAES31 visualizações
Steganography por Hassan Aftab
SteganographySteganography
Steganography
Hassan Aftab682 visualizações
Steganography (1) por ankitasinghbsc
Steganography (1)Steganography (1)
Steganography (1)
ankitasinghbsc374 visualizações
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY por ijcisjournal
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal27 visualizações

Similar a Steganography flooding

steganography-252-uzLRCSm.pptx por
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
2 visualizações18 slides
Steganography ppt por
Steganography pptSteganography ppt
Steganography pptOECLIB Odisha Electronics Control Library
1.3K visualizações18 slides
Steganography por
SteganographySteganography
SteganographyBahaa Aladdin
3.6K visualizações39 slides
Stenographgh[1] por
Stenographgh[1]Stenographgh[1]
Stenographgh[1]Abhishek Srivastava
303 visualizações9 slides
83747965 steganography por
83747965 steganography83747965 steganography
83747965 steganographyPrashant Shukla
2.2K visualizações22 slides
Phd T H E S I Sproposal por
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
618 visualizações19 slides

Similar a Steganography flooding(20)

steganography-252-uzLRCSm.pptx por AkashBhosale50
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale502 visualizações
Steganography por Bahaa Aladdin
SteganographySteganography
Steganography
Bahaa Aladdin3.6K visualizações
83747965 steganography por Prashant Shukla
83747965 steganography83747965 steganography
83747965 steganography
Prashant Shukla2.2K visualizações
Phd T H E S I Sproposal por guest6caaab
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab618 visualizações
Steganography por Deepak Raj
SteganographySteganography
Steganography
Deepak Raj468 visualizações
Steganography por Uttam Jain
Steganography Steganography
Steganography
Uttam Jain105.9K visualizações
Steganography chandni verma(cse 4th year) por Chandni Verma
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma2.6K visualizações
Steganography por Ashenafi Ethio
SteganographySteganography
Steganography
Ashenafi Ethio1.1K visualizações
Steganography - The art of hiding data por Sarin Thapa
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa22.5K visualizações
Vanishing Voices Summary por Ashley Thomas
Vanishing Voices SummaryVanishing Voices Summary
Vanishing Voices Summary
Ashley Thomas2 visualizações
Steganography Engineering project report por Rishab Gupta
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta3.8K visualizações
Hi3612991303 por IJERA Editor
Hi3612991303Hi3612991303
Hi3612991303
IJERA Editor301 visualizações
Steganography and Its Applications in Security por IJMER
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER18.8K visualizações
Steganography por Nikunj Dhameliya
SteganographySteganography
Steganography
Nikunj Dhameliya332 visualizações
Stegnography por Sonal Kathel
StegnographyStegnography
Stegnography
Sonal Kathel2.8K visualizações
Steganography por Sagar Kumar
Steganography Steganography
Steganography
Sagar Kumar163 visualizações
yoda at rotary_pune_club por Antz911
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
Antz911296 visualizações

Último

Structure and Functions of Cell.pdf por
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
317 visualizações10 slides
DU Oral Examination Toni Santamaria por
DU Oral Examination Toni SantamariaDU Oral Examination Toni Santamaria
DU Oral Examination Toni SantamariaMIPLM
138 visualizações2 slides
Plastic waste.pdf por
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdfalqaseedae
110 visualizações5 slides
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
457 visualizações18 slides
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}DR .PALLAVI PATHANIA
234 visualizações195 slides
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
501 visualizações6 slides

Último(20)

Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan317 visualizações
DU Oral Examination Toni Santamaria por MIPLM
DU Oral Examination Toni SantamariaDU Oral Examination Toni Santamaria
DU Oral Examination Toni Santamaria
MIPLM138 visualizações
Plastic waste.pdf por alqaseedae
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdf
alqaseedae110 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 457 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA234 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865501 visualizações
Narration lesson plan.docx por TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN99 visualizações
Material del tarjetero LEES Travesías.docx por Norberto Millán Muñoz
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz68 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL81 visualizações
American Psychological Association 7th Edition.pptx por SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi474 visualizações
The Open Access Community Framework (OACF) 2023 (1).pptx por Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc77 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena177 visualizações
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN95 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani182 visualizações
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) por AnshulDewangan3
 Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
AnshulDewangan3275 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1465 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc71 visualizações
discussion post.pdf por jessemercerail
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail106 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri95 visualizações

Steganography flooding

  • 1. Steganography a GREEK word it means covered or secret writing Stegan -- o -- graphy Covered Writing
  • 2. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.” STEGANOGRAPHY UNDER VARIOUS MEDIA Steganography in “TEXT” Steganography in “IMAGES” Steganography in “AUDIO”
  • 3. A steganography software tool allows a user to embedded hidden data inside a carrier file, such as an image or video and later extract that data. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 4. Example of Text Steganography An example of message containing cipher text by German Spy in World War || “Apparently neutral’s protest is thoroughly discounted and ignored . Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oi/s” Taking the second letter in each word the following message emerges: Pershing sails from NY June 1
  • 5. Minor Change To Shapes of Character
  • 6. Steganography in Image Using image files as hosts for steganography messages takes advantage of the limited capabilities of the human visual system Example Of image steganography Original Image Size 56.1KB Encoded Image Size 544KB Hidden Message Is Cyber security Welcomes You
  • 7. Steps to Hide text in image 1. Open S-tools. 2. Select image in which we have to hide text with .bmp extension. 3. Drag the text file over the image. 4. Alert will come to enter the password this same password we have to enter when end person wants to reveal the message.
  • 8. When user wants to reveal the text. 1. Open the hidden data file. 2. Right click. Select reveal enter the same password that was used to hide the text. 3. A prompt will be display. With list of file hidden. 4. Save that file(Stegano.txt)
  • 9. Steganography in Audio To embed data secretly onto digital audio file there are few techniques introduced : – LSB Coding – Phase Coding – Parity Coding – Spread Spectrum
  • 11. Example of LSB Method The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  • 12. Case On Real Life Terrorist organizations have mastered the art of combining steganography with encryption. Presently most terrorist instructions are also carried out this same way, but there has been an increase in the use of photographic images used for steganography. Others are hiding maps and photographs of terrorist target and posting instruction for terrorist activities .
  • 13. Combined Crypto Steganography EncryptionPlain Text Crypto Text Cover Image Stegano Image Cipher TextDecryptionPlain Text Covered medium + Hidden data + Stego key = Stego Medium
  • 14. Who Is He ? Discussion Of Attack 9/11 According to U.S. officials, in early 2001 Osama bin Laden posted steganographic material in sports chat rooms and some other web sites with instructions for terrorist activities. US officials and expert say its the latest method of communication being used by Osama Bin Laden and his associates to outbox law enforcement. Dr Robert Koontz claimed that “CODED IMAGES” shows plans for massive germs attack on US killing millions.
  • 15. Study of 9/11 attack Says Ankit Fadia a 16 year old boy he was called in to help decrypt message from Osama Bin Laden shortly after 9/11. Boy stunned to see the kind of technology they used to communicate. After 9/11 attack agencies had tracked some emails where few peoples were frequently exchanging photographs of Canadian rockstar Avril Lavigne. Steganography-hidden messages that used three customized encryption algorithm They used technography [sic]to send messages
  • 16. Digital Watermarking A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Visible Watermarking is used to indicate ownership and for copyright protection. Digital Watermarking can be considered as special technique of steganography.
  • 17. Life Cycle of Water Marking
  • 19. Original Image Our Watermark Watermarked Image Visible & Invisible Watermarking
  • 20. Robust & Fragile watermarking In Robust watermarking modification of watermarked content will not affect watermark. In Fragile watermarking watermark get destroyed when watermarked content is modified or tampered. Public & Private watermarking In public watermarking users of content are authorized to detect watermark. In private watermarking users not authorized to detect watermark.
  • 21. Asymmetric & Symmetric watermarking In Asymmetric watermarking different keys used for embedding and detecting watermark. In Symmetric watermarking same keys are used for embedding and detecting watermarks. Steganographic & Non steganographic watermarking In Steganographic watermarking user unaware of the presence of a watermark. In non steganographic watermarking user aware of the presence of a watermark
  • 22. Steganography v/s Watermarking The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d’ , practically indistinguishable from d, by people in such a way that an eavesdropper cannot detect the presence of m in d’. The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d’, practically indistinguishable from d , by people in such a way that an eavesdropper cannot remove or replace m in d’.
  • 23. Scenario of Steganography Modern computer printers use steganography includes HP & Xerox brand color laser printers. These printers add tiny yellow dots to each page. The dots contain encoded printer serial numbers & date & time stamps.
  • 24. E-mail Spoofing A spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authored by someone else. Commonly, the sender’s name/address and the body of the message are formatted to appear from a legitimate source, as though the email came from a bank or a newspaper or legitimate company on the Web. Sometimes, the spoofer will make the email appear to come from a private citizen somewhere.
  • 25. E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes.
  • 26. What is main goal of Email Spoofing
  • 27. Be aware of 1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure 2. Watch for Spoofed Email Addresses Changing the name of the sender so that it does not match the sender’s email address 3. Don’t Give Out Personal Information 4. Avoid Strange Attachments or Unfamiliar Links 5. Seem Too Good To Be True? It is.
  • 28. Zmail open source software used to send fake mails https://emkei.cz/