Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use...
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
Size: 713.33 KB
Language: en
Added: Feb 03, 2017
Slides: 20 pages
Slide Content
Presentation on
STEGANOGRAPHY
By
UMANG VYAS
(CEO-TEACHMISSION)
IN THE PRESNTATION
What is Steganography?
Physical And Digital techniques
Steganography v/s Cryptography
Basic Steganography Model
Evolution
Steganography Terms
Types Of Steganography
Applications
What is Steganography?
Steganographyistheartandscienceofwritinghiddenmessagesin
suchawaythatnoone,apartfromthesenderandintendedrecipient,
suspectstheexistenceofthemessage,aformofsecuritythrough
obscurity.
ThewordsteganographyisofGreekoriginandmeans"concealed
writing"fromtheGreekwordssteganosmeaning"coveredor
protected",andgrapheinmeaning"writing".
“Steganographymeanshidingonepieceofdatawithinanother”.
Physical Techniques
Physical Techniques
Hidden messages withinwax tablets
Hidden messages on messenger's body
Hidden messages on paper written insecret inks
Messages written inMorse codeon knittingyarnand
then knitted into a piece of clothing worn by a courier
Messages written on envelopes in the area covered
bypostage stamps.
Digital Techniques
Digital Techniques
Concealing messages within the lowest bits ofnoisyimages
or sound files.
Chaffing and winnowing.
Modifying the echo of a sound file (Echo Steganography)
Including data in ignored sections of a file, such as after
the logical end of the carrier file.
Steganography
V/s
Cryptography
Steganography V/s Cryptography
Steganography Cryptography
•Unknown message passing •Known message passing
•Little known technology •Common technology
•Technology still being develop for
certain formats
•Most of algorithm known by all
•Steganography does not alter the
structure of the secret message
•Cryptography alter the structure of
the secret message
Basic Steganography Model
Evolution
CryptographyWatermarking Steganography
Steganography Terms
Carrier or Cover File -A Original message or a file in which hidden
information will be stored inside of it .
Stego-Medium-The medium in which the information is hidden.
Embedded or Payload -The information which is to be hidden or
concealed.
Steganalysis-The process of detecting hidden information inside a file.
Types Of Steganography
Text Steganography
Image Steganography
Audio Steganography
Types of Steganography
Text Steganography
Textsteganographycanbeappliedinthedigitalmakeupformatsuchas
PDF,digitalwatermarkorinformationhiding
Itismoredifficulttorealizetheinformationhidingbasedontext.The
simplestmethodofinformationhidingistoselectthecoverfirst,adopt
givenrulestoaddthephraseologicalorspellingmistakes,orreplacewith
synonymywords.
Ex:TextHidehidestheinformationinthemanneroftextoverwritingand
words’selection.
Text Steganography Methods
Text Steganography in Markup Languages[HTML]
Text Steganography in Specific characters in words
Line shifting Method
Word shifting
Open spaces
Semantic methods
Character Encoding
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
SinceEveryoneCanRead, EncodingText
InNeutralSentencesIsDoubtfullyEffective
‘Secret inside’
Image Steganography
Using image files as hosts for steganographic messages takes
advantage of the limited capabilities of the human visual system.
Some of the more common method for embedding messages in
image files can be categorized into two main groups, image
domain methods and transform domain methods.
Least significant bit (LSB) insertion is a common, simple
approach to embedding information in a cover image
DEMO Of Image
Steganography
Audio Steganography
Embedding secret messages into digital sound is known as
audio Steganography.
Audio Steganography methods can embed messages in
WAV, AU, and even MP3 sound files.
The properties of the human auditory system (HAS) are
exploited in the process of audio Steganography
Applications
Confidential communication and secret data storing.
Protection of data alteration.
Access control system for digital content distribution.
Media Database systems.
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligence services