Stenography with Tool

About This Presentation
Title:

Stenography with Tool

Description:

Guest Presentation of Network Security – PowerPoint PPT presentation

Number of Views:65
Slides: 27
Provided by: Username withheld or not provided

less

Transcript and Presenter's Notes

Title: Stenography with Tool


1
Roll No
BSIT-2013-Eve-3045
Section
Evening
Roll No
7th Semester
2
Presentation Outline
  • Steganography
  • Introduction
  • History
  • General diagram
  • Network security Steganography
  • Techniques of Steganography
  • Image steganography
  • Textual steganography
  • Application of steganography
  • Advantages of steganography
  • Disadvantages of steganography

3
What is steganography?
This word or term is derived from combing two
Greek words Stegnos means covered, concealed or
protected and Graphein meaning writing. So
Steganography literally means Covered
Writing Definition

more It us an art and science of hiding
information by combining it in some other
data. Goals To hide a secret message within
other object. Do it in such a way that s presence
of message is not visible.
4
Historical Example
  • Invisible Ink
  • Microdot
  • Dots which are printed on the paper
  • and only visible by using microscope.
  • A Person Head

5
General Diagram Of Steganography
Extract
The cover provides a host for transporting the
hidden info.
6
Steganography-Carriers
  • Most attractive multimedia objects
  • Image Steganography
  • Textual Steganography
  • Audio Steganography

7
Image Steganography
8
Image Attributes
  • Digital images are made up of pixels
  • The arrangements of pixels makes an image
  • 8-bit and 24-bit images are common
  • The larger the image size, the more information
    you can hide.

9
Reasoning For Using Digital Images
  • It is the most widely used medium being used
    today
  • Takes advantages of our limited visual perception
    of colors
  • This field is expected continually grow as
    computer graphics power also grows
  • Many programs are available to apply steganography

10
Image Steganography
  •  
  • Two types of compression
  • Lossless (gif)
  • Lossy (jpeg)
  •  
  • Sometimes concealed message inserted as a comment
  • Sometimes the accuracy of the message is
    sacrificed slightly

11
Techniques Of Digital Steganography
  1. LSB (Least Significant Bit)
  2. Filtering and masking
  3. Algorithms and transformations

12
1.LSB (Least significant digit)
The most common and popular method of modern day
steganography is to make use of the a pictures
information. This technique works best when the
image file is larger then the message file and if
image is grayscale like..
13
We can use images to hide things if we replace
the last bit of every color's byte with a bit
from the message. Message A Image with 3
pixels Pixel 1 11111000 11001001
00000011 Pixel 2 11111000 11001001
00000011 Pixel 3 11111000 11001001
00000011 Now we hide our message in the
image Pixel 1 11111000 11001001 00000010
Pixel 2 11111000 11001000 00000010 Pixel
3 11111000 11001001 00000011 New image
01000001
14
Even if we do this across a big image and with a
really large message, it is still hard to tell
that anything is wrong
Original Image
Informal Image
15
Advantages Of LSB Insertion
  • A major advantage if the LSB algorithm is it is
    quick and easy.
  • LSB insertion is secure.
  • Theoretically, a small change in the least
    significant bit should not affect the overall
    representation if the number significantly.
  • Lossless algorithm
  • No visual change in image.

16
Masking And Filtering
Masking and filtering is where information is
hidden inside of a image using digital watermarks
that includes information such as copyright,
ownership , or licenses. The purpose is
different from traditional steganography since it
is extending the amount if information.
17
Watermark Example
18
Textual steganography
  • It is also called null cipher message.
  • The premise for null cipher is to hide an
    important message within an uninteresting
    innocent message.

19
Apparently neutrals protest is thorougly
discounted and ignored. Isman hard hit. Blockage
issue affects pretext for embargo on by-products,
ejecting suets and vegetable oils.
20
Pershing sails from ny june I
21
Application Of Steganography
It can be used wherever data security is required
Government agencies .. Who store documents
which are very sensitive
Business people Preserve legal and customer
specific financial documents
Banks and other financial institutions ..
safeguard their databases
Privates organizations who want to safeguard
their sensitive information
Privates organizations who want to safeguard
their sensitive information
Digital watermarking Digital signature Digital
linkage ar
22
Advantages of steganography
  • It is in the way of hiding not the information
    but the password to reach that information
  • Difficult to detect, only receiver can detect
  • Can be applied differently in digital image,
    audio video file.
  • It can be done faster with the large no
    softwares.

23
Disadvantages of steganography
  • In sending and receiving information can be
    leaked.
  • The confidentiality if information is maintained
    by the algorithms and if the algorithms are known
    then its all over.
  • If this techniques is gone in the wrong way hands
    like hackers, terrorist, criminals then this can
    be very much dangerous for all.

24
Practical Example Demonstration
25
Thank You
26
More Definitions about Steganography
  • The practice of concealing message or information
    within other non-secret text or data.
  • Steganography is the practice of concealing a
    file, message, image or video within other file,
    message, image or video.

Back
Write a Comment
User Comments (0)