SlideShare a Scribd company logo
“Multimedia Steganography
with Cipher Text and
Compression “
Synopsis
on
Department
Of
INFORMATION TECHNOLOGY
SUBMITTED BY:
NAME OF STUDENTS
ROLL NO.
INTRODUCTION
Steganography is the art and science of writing hidden messages in such a way
that no one, apart from the sender and intended recipient, suspects the existence
of the message, a form of security through obscurity. The word steganography is of
Greek origin and means "concealed writing" from the Greek words steganous
meaning "covered or protected“ . Generally, messages will appear to be something
else: images, articles, shopping lists, or some other cover text and classically, the
hidden message may be in invisible ink between the visible lines of a private letter.
The advantage of steganography, over cryptography alone, is that
messages do not attract attention to themselves. Plainly visible encrypted
messages no matter how unbreakable will arouse suspicion, and may in
themselves be incriminating in countries where encryption is illegal. Therefore,
whereas cryptography protects the contents of a message, steganography can be
said to protect both messages and communicating parties.
Steganography includes the concealment of information within computer files. In
digital steganography, electronic communications may include steganographic
coding inside of a transport layer, such as a document file, image file, program or
protocol.
Operations of Steganography through a Data flow diagram:
“Multimedia Steganography with Cipher Text and Compression ppt.
TYPES OF STEGANOGRAPHY
 TEXT STEGANOGRAPHY:
Steganography can be applied to different types of media including
text, audio, image and video etc. However, text steganography is considered
to be the most difficult kind of steganography due to lack of redundancy in
text as compared to image or audio but still has smaller memory occupation
and simpler communication. The method that could be used for text
steganography is data compression.
Data compression encodes information in one representation into
another representation. The new representation of data is smaller in size.
One of the possible schemes to achieve data compression is Huffman
coding. Huffman coding assigns smaller length code words to more
frequently occurring source symbols and longer length code words to less
frequently occurring source symbols.
 AUDIO STEGANOGRAPHY:
In a computer-based audio steganography system, secret messages are
embedded in digital sound. The secret message is embedded by slightly altering
the binary sequence of a sound file. Existing audio steganography software can
embed messages in WAV, AU, and even MP3 sound files.
Embedding secret messages in digital sound is usually a more difficult
process than embedding messages in other media, such as digital images. In
order to conceal secret messages successfully, a variety of methods for
embedding information in digital audio have been introduced.
 VIDEO STEGANOGRAPHY:
It is a technique to hide any kind of files in any extension into a carrying
Video file. This project is the application developed to embed any kind of
data(File) in another file, which is called carrier file. The carrier file must be a
video file. It is concerned with embedding information in an innocuous cover
media in a secure and robust manner. This system makes the Files more secure
by using the concepts Steganography and Cryptography.
 IMAGE STEGANOGRAPHY:
The original image’s integrity is maintained and the decompressed
image output is bit-by-bit identical to the original image input. The most popular
image formats that use lossless compression is GIF (Graphical Interchange
Format) and 8-bit BMP (a Microsoft Windows bitmap file).
Compression plays a very important role in choosing which
steganographic algorithm to use. Lossless compression, on the other hand,
never removes any information from the original image, but instead represents
data in mathematical formulas. Lossy compression techniques result in smaller
image file sizes, but it increases the possibility that the embedded message may
be partly lost due to the fact that excess image data will be removed. Lossless
compression though, keeps the original digital image intact without the chance
of lost, although is does not compress the image to such a small file size.
ADVANTAGES AND DISADVANTAGES:
Steganography is beneficial for securely storing sensitive data, such as hiding
system passwords or keys within other files. However, it can also pose serious
problems because it's difficult to detect. Network surveillance and monitoring
systems will not flag messages or files that contain steganographic data.
Therefore, if someone attempted to steal confidential data, they could conceal it
within another file and send it in an innocent looking email.
DETECTING STEGANOGRAPHY MISUSE:
There are two methods for detecting steganographically-encoded data:
visual steganalysis and statistical steganalysis. The visual method compares a
copy of the source file with the suspect file by running a hash against the source
file and checking that it matches the hash on the suspect copy. Statistical
steganalysis compares theoretically expected frequency distributions of message
content with the frequency distribution of the suspected file. Because the cover
text has to be modified to store the hidden data, there are usually detectable signs
within the cover text's normal characteristics that can be used to reveal the hidden
message. For example, when running a histogram on an image, there should be
random spikes, but if the histogram is flat or has one large spike, it's likely the
image contains hidden information.
CONCLUSION :
Steganography has its place in security. It is not intended to replace
cryptography but supplement it. Hiding a message with steganography methods
reduces the chance of a message being detected. However, if that message is
also encrypted, if discovered, it must also be cracked (yet another layer of
protection).
There are an infinite number of steganography applications. This paper explores
a tiny fraction of the art of steganography. It goes well beyond simply embedding
text in an image. Steganography does not only pertain to digital images but also
to other media (files such as voice, other text and binaries; other media such as
communication channels, the list can go on and on).
Thus, we have designed a software which has a really has a very good
application in real world. It will be notable feature as this system is very easy and
customizable makes it useful to wide variety of the users for Security purposes.
“Multimedia Steganography with Cipher Text and Compression ppt.

More Related Content

PPTX
Cryptography and steganography
PDF
A Survey of Image Steganography
PPTX
Image steganography
PPTX
Presentation i
PPTX
Steganography in images
PPTX
Image Steganography
PDF
A Steganography LSB technique for hiding Image within Image Using blowfish En...
PPTX
Image steganography and cryptography
Cryptography and steganography
A Survey of Image Steganography
Image steganography
Presentation i
Steganography in images
Image Steganography
A Steganography LSB technique for hiding Image within Image Using blowfish En...
Image steganography and cryptography

What's hot (20)

PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PDF
Implementation of Image Steganography in Image by using FMM nested with LSB S...
PPTX
PVD BASED STEGNO.
PPTX
Steganography and its techniques
DOC
Steganography Engineering project report
PPTX
PPT steganography
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
PPTX
Steganography with RSA Algorithm
PDF
Comparative Study of Spatial Domain Image Steganography Techniques
PPTX
Art of Steganography
PPT
Steganography
PDF
A Study of Various Steganographic Techniques Used for Information Hiding
PPTX
Steganography
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
DOCX
Technical seminar report
DOC
Implementation of bpcs steganography (synopsis)
PPTX
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
PPTX
SEMINAR ON staganography
PPT
Steganography.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
Implementation of Image Steganography in Image by using FMM nested with LSB S...
PVD BASED STEGNO.
Steganography and its techniques
Steganography Engineering project report
PPT steganography
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Steganography with RSA Algorithm
Comparative Study of Spatial Domain Image Steganography Techniques
Art of Steganography
Steganography
A Study of Various Steganographic Techniques Used for Information Hiding
Steganography
AUDIO STEGANOGRAPHY PRESENTATION
Technical seminar report
Implementation of bpcs steganography (synopsis)
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
SEMINAR ON staganography
Steganography.
Ad

Viewers also liked (20)

PPTX
The Internet and Multimedia
PPTX
The Internet & Multimedia Integration
PPTX
Responsive web designing ppt(1)
PPTX
Multimedia
PPS
5) multimedia notes
PPTX
Multimedia presentation
PPT
Introduction To Multimedia
PPT
Multimedia
PPT
Introduction to multimedia
PPT
Introduction to multimedia
PPT
multimedia element
PDF
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
DOC
Syed Ubaid Ali Jafri - Cryptography Techniques
PPTX
Steganography
PDF
Steganography using reversible texture synthesis
DOCX
Steganography
DOC
Steganography using reversible texture synthesis
ODP
Chansonnier: web application for multimedia search on song videos
DOC
Steganography ProjectReport
PPT
Using Multimedia Content to Improve Web-Based Delivery of Legal Services
The Internet and Multimedia
The Internet & Multimedia Integration
Responsive web designing ppt(1)
Multimedia
5) multimedia notes
Multimedia presentation
Introduction To Multimedia
Multimedia
Introduction to multimedia
Introduction to multimedia
multimedia element
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
Syed Ubaid Ali Jafri - Cryptography Techniques
Steganography
Steganography using reversible texture synthesis
Steganography
Steganography using reversible texture synthesis
Chansonnier: web application for multimedia search on song videos
Steganography ProjectReport
Using Multimedia Content to Improve Web-Based Delivery of Legal Services
Ad

Similar to “Multimedia Steganography with Cipher Text and Compression ppt. (20)

PPTX
Steganography
PPTX
Steganography
PPTX
Steganography - Hiding in plain sight.pptx
PPTX
steganography
PPTX
CSE steganography for data writing and reading
PPTX
Steganography
DOCX
gyu.docx
PDF
PPTX
Stegnography final
PPTX
Steganograpy
PPTX
steganography-252-uzLRCSm.pptx
PPTX
Presentation1
PDF
Stegnography Systems for Securing DataFile in Image
PPT
Steganography presentation
PPTX
Steganography
PDF
Presentation On Steganography
PDF
A Tutorial Review On Steganography
PPTX
Steganography
PPTX
Steganography
Steganography
Steganography
Steganography - Hiding in plain sight.pptx
steganography
CSE steganography for data writing and reading
Steganography
gyu.docx
Stegnography final
Steganograpy
steganography-252-uzLRCSm.pptx
Presentation1
Stegnography Systems for Securing DataFile in Image
Steganography presentation
Steganography
Presentation On Steganography
A Tutorial Review On Steganography
Steganography
Steganography

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
web development for engineering and engineering
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Project quality management in manufacturing
PDF
Well-logging-methods_new................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
web development for engineering and engineering
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Foundation to blockchain - A guide to Blockchain Tech
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
OOP with Java - Java Introduction (Basics)
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CH1 Production IntroductoryConcepts.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Project quality management in manufacturing
Well-logging-methods_new................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
bas. eng. economics group 4 presentation 1.pptx

“Multimedia Steganography with Cipher Text and Compression ppt.

  • 1. “Multimedia Steganography with Cipher Text and Compression “ Synopsis on
  • 3. INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganous meaning "covered or protected“ . Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and classically, the hidden message may be in invisible ink between the visible lines of a private letter. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.
  • 4. Operations of Steganography through a Data flow diagram:
  • 6. TYPES OF STEGANOGRAPHY  TEXT STEGANOGRAPHY: Steganography can be applied to different types of media including text, audio, image and video etc. However, text steganography is considered to be the most difficult kind of steganography due to lack of redundancy in text as compared to image or audio but still has smaller memory occupation and simpler communication. The method that could be used for text steganography is data compression. Data compression encodes information in one representation into another representation. The new representation of data is smaller in size. One of the possible schemes to achieve data compression is Huffman coding. Huffman coding assigns smaller length code words to more frequently occurring source symbols and longer length code words to less frequently occurring source symbols.
  • 7.  AUDIO STEGANOGRAPHY: In a computer-based audio steganography system, secret messages are embedded in digital sound. The secret message is embedded by slightly altering the binary sequence of a sound file. Existing audio steganography software can embed messages in WAV, AU, and even MP3 sound files. Embedding secret messages in digital sound is usually a more difficult process than embedding messages in other media, such as digital images. In order to conceal secret messages successfully, a variety of methods for embedding information in digital audio have been introduced.  VIDEO STEGANOGRAPHY: It is a technique to hide any kind of files in any extension into a carrying Video file. This project is the application developed to embed any kind of data(File) in another file, which is called carrier file. The carrier file must be a video file. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography.
  • 8.  IMAGE STEGANOGRAPHY: The original image’s integrity is maintained and the decompressed image output is bit-by-bit identical to the original image input. The most popular image formats that use lossless compression is GIF (Graphical Interchange Format) and 8-bit BMP (a Microsoft Windows bitmap file). Compression plays a very important role in choosing which steganographic algorithm to use. Lossless compression, on the other hand, never removes any information from the original image, but instead represents data in mathematical formulas. Lossy compression techniques result in smaller image file sizes, but it increases the possibility that the embedded message may be partly lost due to the fact that excess image data will be removed. Lossless compression though, keeps the original digital image intact without the chance of lost, although is does not compress the image to such a small file size.
  • 9. ADVANTAGES AND DISADVANTAGES: Steganography is beneficial for securely storing sensitive data, such as hiding system passwords or keys within other files. However, it can also pose serious problems because it's difficult to detect. Network surveillance and monitoring systems will not flag messages or files that contain steganographic data. Therefore, if someone attempted to steal confidential data, they could conceal it within another file and send it in an innocent looking email. DETECTING STEGANOGRAPHY MISUSE: There are two methods for detecting steganographically-encoded data: visual steganalysis and statistical steganalysis. The visual method compares a copy of the source file with the suspect file by running a hash against the source file and checking that it matches the hash on the suspect copy. Statistical steganalysis compares theoretically expected frequency distributions of message content with the frequency distribution of the suspected file. Because the cover text has to be modified to store the hidden data, there are usually detectable signs within the cover text's normal characteristics that can be used to reveal the hidden message. For example, when running a histogram on an image, there should be random spikes, but if the histogram is flat or has one large spike, it's likely the image contains hidden information.
  • 10. CONCLUSION : Steganography has its place in security. It is not intended to replace cryptography but supplement it. Hiding a message with steganography methods reduces the chance of a message being detected. However, if that message is also encrypted, if discovered, it must also be cracked (yet another layer of protection). There are an infinite number of steganography applications. This paper explores a tiny fraction of the art of steganography. It goes well beyond simply embedding text in an image. Steganography does not only pertain to digital images but also to other media (files such as voice, other text and binaries; other media such as communication channels, the list can go on and on). Thus, we have designed a software which has a really has a very good application in real world. It will be notable feature as this system is very easy and customizable makes it useful to wide variety of the users for Security purposes.