Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (1 vote)
46 views

Project Python

This document provides an overview of steganography. It begins by defining steganography as the practice of hiding secret messages within other messages. It then discusses the history of steganography, including ancient Greek techniques. It outlines the main types as audio, text, and image steganography. Modern techniques discussed include least significant bit insertion and algorithms/transformations. Requirements, detection methods, data security, applications, and the future of steganography are also summarized.

Uploaded by

mahe14
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
46 views

Project Python

This document provides an overview of steganography. It begins by defining steganography as the practice of hiding secret messages within other messages. It then discusses the history of steganography, including ancient Greek techniques. It outlines the main types as audio, text, and image steganography. Modern techniques discussed include least significant bit insertion and algorithms/transformations. Requirements, detection methods, data security, applications, and the future of steganography are also summarized.

Uploaded by

mahe14
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Overview

 What is steganography ?
 Historical steganographic techniques
 Types of steganography
 Branches of steganography
 Requirement
 Modern steganographic techniques
 Basics of modern steganographic techniques
 Detection
 Data embedding security schemes
 Advantages of steganography
 Application of steganography
 Future of steganography
 Conclusion
What is Steganography?
Greek Words:
STEGANOS – “Covered” or “protected”
GRAPHIE – “Writing”

Steganography is the art and science of writing hidden


messages in such a way that no one apart from the intended
recipient knows of the existence of the message.
It is art and science of hiding of a message
that is to be keep secret inside other messages.
 It is a type of cryptography in which secret
message is hidden in the digital picture.
Historical steganographic
techniques-
1)Steganography has been widely used in historical
times, especially before cryptographic systems were
developed. Examples of historical usage include:
2)Hidden messages in wax tablets: In ancient Greece,
people wrote messages on the wood, then covered it
with wax so that it looked like an ordinary, unused
tablet(in which covering message was written)
3)During world war, messages written on
envelopes in the area covered by postage
stamps
.

4) In that time, hidden messages is written on paper


in secret inks under other messages or on the blank
parts of other messages.

5) During and after world war microdots were used


to send information back and forth.
Types of Steganography –
It is of 3 types
Audio steganography
Text steganography
Image steganography

Audio steganography- Audio steganography requires


a text or audio secret message to be embedded within a
cover audio message. Due to availability of
redundancy, the cover audio message before
steganography and the stego message after
steganography remains the same.
Text steganography-Text steganography is considered to be
the most difficult type of steganography . It requires less
memory and provides for simpler communication. One
method that could be used for text steganography is data
compression. Data compression encodes information in
one representation, into another representation.

Image steganography-Images are the most popular cover


objects used for steganography. It is a collection of pixels
and numbers that constitute different light intensities in
different areas of the image.
Branches of Steganography -
Watermarking
Cryptography

Watermarking:

Digital watermarking is the process of embedding


information into a digital media in such a way that it is
difficult to remove.

Any attempt to remove or invalidate the embedded


content renders the host useless.
Cryptography-
• It is the art and science of achieving
security by encoding message to make
them non readable.
• In cryptography ,the original message
change in encrypted method.
• It is used to describe the entire field of
secret communications.
• It can be applied to graphics , voice or
anything that can be digitally coded.
Important requirement for steganograhic system-

Security of hidden communication.

Size of payload.

Protect the data from unauthorised user.


Modern Steganography Techniques-
It is entered the world in 1985 with the advent of personal computer being applied to classical steganography
problems .In modern time concealing data within encrypted data .The data is first encrypted before being used.

Masking and Filtering: Information is hidden inside


of a image using digital watermarks that include
information such as copyright, ownership . The
purpose is different from traditional steganography
since it is adding an attribute to the cover image for
extending the amount of information presented.
Algorithms and Transformations: This technique hides data in
mathematical functions that are often used in compression
algorithms. The idea of this method is to hide the secret
message in the data bits in the least significant coefficients.

Least Significant Bit Insertion: The most common and popular


method of modern day steganography is to make use of the
LSB of a picture’s pixel information. Thus the overall image
distortion is kept to a minimum while the message is spaced
out over the pixels in the images. This technique works best
when the image file is larger then the message file and if the
image is grayscale
Basics of Modern Steganography

fE: steganographic function "embedding"


fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded
packages is called Steganalysis.

Visual Analysis tries to reveal the presence of secret


communication through inspection, either with the
naked eye or with the assistance of a computer.

 Algorithmic(statistical) Analysis reveals tiny


alterations in an image's behavior caused by
steganographic embedding.
Data Embedding Security
Schemes-
The first level of protection is
determined only by the choice of
embedding algorithm. This may be
the least significant bits
modification algorithm, or
algorithms for modifying the
frequency.
•The second protection level of the steganographic
system, is the protection of the higher orders, is
characterized by the use of Key (password) via
steganographic modification. An example of a simple
key scheme, which provides a second level of
protection, is to write the unmodified or modified
password in the top or bottom of the message

•The third protection level key scheme is


used it affects the distribution of a
message through the container
•Advantages of Steganography
Over Cryptography
Steganography protects both message and
communicating parties whereas cryptography
protects only the contents of message.

In steganography message is hidden whereas in


cryptography message is not hidden.
Application of Steganography-

Usage in modern printer.

• Usage in digital watermarking-


It can be used for digital watermarking, where a message
(being simply an identifier) is hidden in an image so
that its source can be tracked or verified .

• It is used for finger printing for detection of


unauthorised user and illegally copied material.
It is used to maintain the confidentiality of valuable
information.

It is used for protecting the data from unauthorised


users.
Future scope of Steganography-
Steganography, Though is still a fairly new idea. There are
constant advancements in the computer field .
 It is likely that there will soon be more efficient and more
advanced techniques for steganalysis.
A hopeful advancement is the improved sensitivity to small
message. Knowing how difficult it is to detect the presence of a
fairly large text file within an image, imagine how difficult it is
to detect even one or two sentences embedded in an image.
 In the future, it is hoped that the technique of steganalysis
will advance such that it will become much easier to detect
even small messages within an image.
Conclusion –
This seminar provides an overview of steganalysis and
steganographic software that point signs of
information hiding.
 Too many images exist to be reviewed manually f or
hidden messages so development of a tool to automate
the process will be beneficial to analysis.
 The abundant availability of steganography tools has
law enforcement concerned in trafficking of illicit
material via web page images, audio, and other
transmissions over the Internet.
THANK YOU!

You might also like