SlideShare a Scribd company logo
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
What is Steganography ?
 Steganography is the practice of hiding private or sensitive
information within something that appears to be nothing out of
the usual.
 Steganography in the modern day sense of the word usually
refers to information or a file that has been concealed inside a
digital Picture, Video or Audio file.
Steganography terms
 Carrier or Cover File – A Original message or a file in which
hidden information will be stored inside of it .
 Stego-Medium – The medium in which the information is
hidden.
 Embedded or Payload – The information which is to be hidden
or concealed.
 Steganalysis – The process of detecting hidden information
inside a file.
Types of Steganography
• Steganography In Text/Documents
• Steganography In Images
• Steganography In Audio
• Steganography In Video
Steganography in Text
 Line Shift Coding: Lines are vertically shifted
 Word Shift Coding: Codewords are Horizontally shifted
 Feature Coding: Coding done using certain text features
 Alternative Methods
Syntactic Methods
Semantic Methods
 Tools :- wbStego
Steganography In Images
• Least Significant Bit Insertion
Common and Simple Approach
• Masking and Filtering
Mark an image in a manner similar to paper watermarks
• Algorithms and Transformations
DCT
FFT
Wavelet Transform
 Tools :- JPHide and JPSeek
Steganography In Audio
 Low bit encoding method is used to hide information inside audio
files which is some what similar to LSB that is generally used in
Images.
 Spread Spectrum is another method used to conceal information
inside of an audio file. This method works by adding random noises
to the signal the information is conceal inside a carrier and spread
across the frequency spectrum.
Steganography In Audio
 Echo Data Hiding is yet another method of hiding information inside an audio
file.
 This method uses the echoes in sound files in order to try and hide information.
 By simply adding extra sound to an echo inside an audio file, information can be
concealed. The thing that makes this method of concealing information inside of
audio files better than other methods is that it can actually improve the sound of
the audio inside an audio file.
 Tools :- mp3stego
Steganography in Videos
 Steganography in Videos is similar to that of Steganography in
Images, apart from information is hidden in each frame of
video. When only a small amount of information is hidden
inside of video it generally isn’t noticeable at all, however the
more information that is hidden the more noticeable it will
become.
 Tools :- msu StegoVideo
Advantages :
• It is used in the way of hiding not the
Information but the password to reach
that Information.
• Difficult to detect .Only receiver can
detect.
• Can be applied differently in digital
image, audio & video file.
• It can be done faster with the large no of
software's.
Disadvantages :
• Huge number of data = huge file size, so
some one can suspect about it.
• In sending and receiving information can
be leaked.
• The confidentiality of information is
maintained by the algorithms, and if the
algorithms are known then its all over.
• If this technique is gone in the wrong
hands like hackers, terrorist ,criminals then
this can be very much dangerous for all.
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques
Cryptography concepts and techniques

More Related Content

PDF
Steganography: LSB technique
PPTX
Information hiding
PPTX
Cryptography and network security Nit701
PPTX
Steganography
PPTX
Cryptography
PPTX
Cryptography
PPT
Steganography
PPTX
steganography
Steganography: LSB technique
Information hiding
Cryptography and network security Nit701
Steganography
Cryptography
Cryptography
Steganography
steganography

What's hot (20)

PPTX
Cryptography.ppt
PPTX
Steganography
PPTX
Cryptography and steganography
PPTX
About Steganography
PPT
Steganography - The art of hiding data
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PPTX
cryptography
PDF
Block Ciphers and the Data Encryption Standard
PPTX
SEMINAR ON staganography
PPTX
Image steganography and cryptography
PPTX
Cryptography
PPTX
I mage encryption using rc5
PPT
Stegnography
PPT
Steganography ppt
PDF
Asymmetric Cryptography
PPTX
Overview of cryptography
PPTX
Steganography
PPT
Steganography
PPT
Ch11 Basic Cryptography
Cryptography.ppt
Steganography
Cryptography and steganography
About Steganography
Steganography - The art of hiding data
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
cryptography
Block Ciphers and the Data Encryption Standard
SEMINAR ON staganography
Image steganography and cryptography
Cryptography
I mage encryption using rc5
Stegnography
Steganography ppt
Asymmetric Cryptography
Overview of cryptography
Steganography
Steganography
Ch11 Basic Cryptography
Ad

Similar to Cryptography concepts and techniques (20)

PPTX
Audio steganography
PPTX
PPT steganography
PDF
P0460594100
PPTX
Steganography and its techniques
PPTX
Steganoghraphy
PDF
Steganography analysis techniques applied to audio and image files
PPT
Steganography presentation
PDF
Presentation On Steganography
PPTX
Steganography
PPTX
Steganograpy
PPTX
Steganography
PPTX
SteganographySecond
PPTX
Data Hiding in Audio Signals
PPTX
digital steganography
PDF
Enhancement of Data Hiding Capacity in Audio Steganography
PPTX
Steganography - Hiding in plain sight.pptx
PDF
Survey Paper on Steganography
PPTX
Steganography presentation
PPTX
Steganography ppt
PDF
IJREAMV03I022640.pdf
Audio steganography
PPT steganography
P0460594100
Steganography and its techniques
Steganoghraphy
Steganography analysis techniques applied to audio and image files
Steganography presentation
Presentation On Steganography
Steganography
Steganograpy
Steganography
SteganographySecond
Data Hiding in Audio Signals
digital steganography
Enhancement of Data Hiding Capacity in Audio Steganography
Steganography - Hiding in plain sight.pptx
Survey Paper on Steganography
Steganography presentation
Steganography ppt
IJREAMV03I022640.pdf
Ad

More from PVSaiGanesh (6)

PPTX
Write about security mechanisms
PPTX
What is the need for security saq
PPTX
What are the principles of security saq
PPTX
Give various security services saq
PPTX
Explain about different types of attacks
PPTX
Explain in detail about a model for network security
Write about security mechanisms
What is the need for security saq
What are the principles of security saq
Give various security services saq
Explain about different types of attacks
Explain in detail about a model for network security

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Business Ethics Teaching Materials for college
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Classroom Observation Tools for Teachers
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
VCE English Exam - Section C Student Revision Booklet
Business Ethics Teaching Materials for college
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPH.pptx obstetrics and gynecology in nursing
Classroom Observation Tools for Teachers
TR - Agricultural Crops Production NC III.pdf
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharma ospi slides which help in ospi learning

Cryptography concepts and techniques

  • 44. What is Steganography ?  Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual.  Steganography in the modern day sense of the word usually refers to information or a file that has been concealed inside a digital Picture, Video or Audio file.
  • 45. Steganography terms  Carrier or Cover File – A Original message or a file in which hidden information will be stored inside of it .  Stego-Medium – The medium in which the information is hidden.  Embedded or Payload – The information which is to be hidden or concealed.  Steganalysis – The process of detecting hidden information inside a file.
  • 46. Types of Steganography • Steganography In Text/Documents • Steganography In Images • Steganography In Audio • Steganography In Video
  • 47. Steganography in Text  Line Shift Coding: Lines are vertically shifted  Word Shift Coding: Codewords are Horizontally shifted  Feature Coding: Coding done using certain text features  Alternative Methods Syntactic Methods Semantic Methods  Tools :- wbStego
  • 48. Steganography In Images • Least Significant Bit Insertion Common and Simple Approach • Masking and Filtering Mark an image in a manner similar to paper watermarks • Algorithms and Transformations DCT FFT Wavelet Transform  Tools :- JPHide and JPSeek
  • 49. Steganography In Audio  Low bit encoding method is used to hide information inside audio files which is some what similar to LSB that is generally used in Images.  Spread Spectrum is another method used to conceal information inside of an audio file. This method works by adding random noises to the signal the information is conceal inside a carrier and spread across the frequency spectrum.
  • 50. Steganography In Audio  Echo Data Hiding is yet another method of hiding information inside an audio file.  This method uses the echoes in sound files in order to try and hide information.  By simply adding extra sound to an echo inside an audio file, information can be concealed. The thing that makes this method of concealing information inside of audio files better than other methods is that it can actually improve the sound of the audio inside an audio file.  Tools :- mp3stego
  • 51. Steganography in Videos  Steganography in Videos is similar to that of Steganography in Images, apart from information is hidden in each frame of video. When only a small amount of information is hidden inside of video it generally isn’t noticeable at all, however the more information that is hidden the more noticeable it will become.  Tools :- msu StegoVideo
  • 52. Advantages : • It is used in the way of hiding not the Information but the password to reach that Information. • Difficult to detect .Only receiver can detect. • Can be applied differently in digital image, audio & video file. • It can be done faster with the large no of software's.
  • 53. Disadvantages : • Huge number of data = huge file size, so some one can suspect about it. • In sending and receiving information can be leaked. • The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over. • If this technique is gone in the wrong hands like hackers, terrorist ,criminals then this can be very much dangerous for all.