2. “The goal of steganography is to hide messages in such a
way that no one apart from the intended recipient even
knows that a message has been sent.”
STEGANOGRAPHY UNDER VARIOUS MEDIA
Steganography in “TEXT”
Steganography in “IMAGES”
Steganography in “AUDIO”
3. A steganography software tool allows a user to embedded
hidden data inside a carrier file, such as an image or video
and later extract that data.
Steganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender and
intended recipient, suspects the existence of the message, a
form of security through obscurity.
4. Example of Text
An example of message containing cipher text by German Spy
in World War ||
“Apparently neutral’s protest is thoroughly discounted and
ignored . Isman hard hit. Blockade issue affects pretext for
embargo on by products, ejecting suets and vegetable oi/s”
Taking the second letter in each word the following message
Pershing sails from NY June 1
6. Steganography in Image
Using image files as hosts for steganography messages takes
advantage of the limited capabilities of the human visual system
Example Of image steganography
Hidden Message Is Cyber
security Welcomes You
7. Steps to Hide text in image
1. Open S-tools.
2. Select image in which we have to hide
with .bmp extension.
3. Drag the text file over the image.
4. Alert will come to enter the password
same password we have to enter when
person wants to reveal the message.
8. When user wants to reveal the
1. Open the hidden data file.
2. Right click. Select reveal
enter the same password
that was used to hide the
3. A prompt will be display.
With list of file hidden.
4. Save that file(Stegano.txt)
9. Steganography in Audio
To embed data secretly onto digital audio file there
are few techniques introduced :
– LSB Coding
– Phase Coding
– Parity Coding
– Spread Spectrum
11. Example of LSB Method
The message 'HEY' is encoded in
a 16-bit CD quality sample using
the LSB method.
Here the secret information is
‘HEY’ and the cover file is audio
file. HEY is to be embedded
inside the audio file. First the
secret information ‘HEY’ and the
audio file are converted into bit
The least significant column of
the audio file is replaced by the
bit stream of secret information
‘HEY’. The resulting file after
embedding secret information
‘HEY’ is called Stego-file.
12. Case On Real Life
Terrorist organizations have mastered the art of
combining steganography with encryption.
Presently most terrorist instructions are also carried out
this same way, but there has been an increase in the use
of photographic images used for steganography.
Others are hiding maps and photographs of terrorist
target and posting instruction for terrorist activities .
14. Who Is He ?
Discussion Of Attack 9/11
According to U.S. officials, in early 2001 Osama
bin Laden posted steganographic material in
sports chat rooms and some other web sites
with instructions for terrorist activities.
US officials and expert say its the latest
method of communication being used by
Osama Bin Laden and his associates to outbox
Dr Robert Koontz claimed that “CODED
IMAGES” shows plans for massive germs attack
on US killing millions.
15. Study of 9/11 attack
Says Ankit Fadia a 16 year old boy he was called in to help decrypt message
from Osama Bin Laden shortly after 9/11.
Boy stunned to see the kind of technology they used to communicate.
After 9/11 attack agencies had tracked some emails where few peoples were
frequently exchanging photographs of Canadian rockstar Avril Lavigne.
Steganography-hidden messages that used three customized encryption algorithm
They used technography [sic]to send messages
16. Digital Watermarking
A watermark is a form, image or text that is impressed onto
which provides evidence of its authenticity.
Visible Watermarking is used to indicate ownership and for
Digital Watermarking can be considered as special technique
20. Robust & Fragile watermarking
In Robust watermarking modification of watermarked content will not
In Fragile watermarking watermark get destroyed when watermarked
content is modified or tampered.
Public & Private watermarking
In public watermarking users of content are authorized to detect
In private watermarking users not authorized to detect watermark.
21. Asymmetric & Symmetric
In Asymmetric watermarking different keys used for embedding and
In Symmetric watermarking same keys are used for embedding and
Steganographic & Non steganographic
In Steganographic watermarking user unaware of the presence of a
In non steganographic watermarking user aware of the presence of a
22. Steganography v/s Watermarking
The main goal of steganography is to hide a message m in some audio or
video (cover) data d, to obtain new data d’ , practically indistinguishable
from d, by people in such a way that an eavesdropper cannot detect the
presence of m in d’.
The main goal of watermarking is to hide a message m in some audio or
video (cover) data d, to obtain new data d’, practically indistinguishable
from d , by people in such a way that an eavesdropper cannot remove or
replace m in d’.
23. Scenario of Steganography
Modern computer printers use steganography includes HP
& Xerox brand color laser printers.
These printers add tiny yellow dots to each page.
The dots contain encoded printer serial numbers & date &
24. E-mail Spoofing
A spoofed email is when the sender purposely alters parts of the email to masquerade
as though it was authored by someone else.
Commonly, the sender’s name/address and the body of the message are formatted to
appear from a legitimate source, as though the email came from a bank or a
newspaper or legitimate company on the Web.
Sometimes, the spoofer will make the email appear to come from a private citizen
25. E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the
main protocol used in sending e-mail, does not include an
If the precaution is not taken, anyone with the requisite knowledge can connect to
the server and use it to send messages.
To send spoofed e-mail, senders insert commands in headers that will alter message
It is possible to send a message that appears to be from anyone, anywhere, saying
whatever the sender wants it to say. Thus, someone could send spoofed e-mail that
appears to be from you with a message that you didn't write.
For example, spoofed e-mail may purport to be from someone in a position of
authority, asking for sensitive data, such as passwords, credit card numbers, or other
personal information -- any of which can be used for a variety of criminal purposes.
27. Be aware of
1. Install Anti-Spam & Anti-Virus Software – Liquid Web’s Mail Secure
2. Watch for Spoofed Email Addresses
Changing the name of the sender so that it does not match the sender’s
3. Don’t Give Out Personal Information
4. Avoid Strange Attachments or Unfamiliar Links
5. Seem Too Good To Be True? It is.