SlideShare a Scribd company logo
2
Most read
3
Most read
15
Most read
“steganography”

            BY
SHAIK SHARAF PARVEZ
       09081A0474

  Under the guidance of
 Miss. Geetha(Asst. Proff.)
STEGAN-O-GRAPHY
   “The goal of steganography is to hide messages in such a
    way that no one apart from the intended recipient even
    knows that a message has been sent.”

   This can be achieve by concealing the existence of
    information within seemingly harmless carriers or cover

   It can be understand by the following figure.
PPT steganography
   Steganography in “TEXT”


   Steganography in “IMAGES”


   Steganography in “AUDIO”
It involves three types of coding:
Line-Shift      Coding : Here, text lines are vertically shifted to
        encode the document uniquely.

   Word-Shift Coding : The codewords are coded into a
        document by shifting the horizontal locations of words within
        text lines, while maintaining a natural spacing appearance.

   Feature Coding : In feature coding, certain text features are
         altered, or not altered, depending on the codeword.
Image Compression:
   Image compression offers a solution to large image files. Two kinds of image
           compression are lossless and lossy compression. Both methods save
           storage space but have differing effects on any uncompressed hidden data
           in theimage.

   “Lossy”    JPEG(Joint Photographic Experts Group) format files, offers high
compression, but may not maintain the original image's integrity. Hence it is called
“lossy”.
   “Lossless” compression maintains the original image data exactly, It is thus more
           favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
Image Encoding Techniques
    The most common approaches to information hiding in images :

   Least Significant bit insertion :


   Masking and Filtering :


   Algorithms and transformations :
Audio Environments

             Digital representation
   Sample quantization method :
   Temporal sampling rate :
   Another digital representation :
Transmission medium :
            Bender’s transmission environments

   Digital end-to-end environment.

   Increased/decreased resampling environment.

   Analog transmission and resampling.

   ''Over the air'' environment.
Methods of Audio Data Hiding


   Low-bit encoding :


   Phase coding :


   Echo data hiding :
   Steganalysis is the art and science of detecting a
        secret communication.
   Hiding   a   message     will   most   likely    leave
        detectable traces in the cover medium.
   The information hiding process changes the
        statistical properties of the cover, which is a
        steganalyst attempts to detect.
   The process of attempting to detect statistical
        traces is called statistical steganalysis.
IMPORTANT ASPECTS OF STEGANALYSIS


   DETECTING HIDDEN INFORMATION


   DISABLING STEGANOGRAPHY
PPT steganography
PPT steganography
PPT steganography
PPT steganography

More Related Content

PDF
Presentation On Steganography
PPTX
Steganography
PPTX
Steganography Project
PPT
Image Steganography
PPTX
Power Point Presentation on Artificial Intelligence
PPTX
Image steganography
PPTX
Image Steganography using LSB
PDF
ChatGPT ChatBot
Presentation On Steganography
Steganography
Steganography Project
Image Steganography
Power Point Presentation on Artificial Intelligence
Image steganography
Image Steganography using LSB
ChatGPT ChatBot

What's hot (20)

PPT
Steganography presentation
PPT
Steganography - The art of hiding data
PDF
Steganography
PPTX
SEMINAR ON staganography
PPTX
Image steganography and cryptography
PPTX
Steganography in images
PPTX
steganography
PPTX
Introduction to Cryptography
PPT
Steganography
PPTX
About Steganography
PPTX
Cryptography & Steganography
PPTX
Steganography
PPTX
Seminar ppt fog comp
PPTX
Steganography
PPT
Steganography
PPTX
Audio steganography
PDF
Steganography final report
PDF
Image Steganography Project Report
PPTX
Steganography
Steganography presentation
Steganography - The art of hiding data
Steganography
SEMINAR ON staganography
Image steganography and cryptography
Steganography in images
steganography
Introduction to Cryptography
Steganography
About Steganography
Cryptography & Steganography
Steganography
Seminar ppt fog comp
Steganography
Steganography
Audio steganography
Steganography final report
Image Steganography Project Report
Steganography
Ad

Similar to PPT steganography (20)

PPTX
review.pptx
PPTX
Steganography - Hiding in plain sight.pptx
PPTX
Image steganography in python with an ea
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PDF
Steganography and steganalysis
PPT
Steganography ppt.ppt
PPTX
Stegnography
PDF
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
PDF
K0815660
PDF
IJREAMV03I022640.pdf
PPTX
Multi-Level audio steganography
PDF
B03208016
PDF
LSB Based Image Steganography for Information Security System
PPTX
steganography using genetic algorithm along with visual cryptography for wire...
PDF
A Steganography LSB technique for hiding Image within Image Using blowfish En...
PDF
Conditional entrench spatial domain steganography
PPTX
Steganoghraphy
PDF
A Survey Paper On Different Steganography Technique
PPTX
Steganography
PPTX
steganography and watermarking
review.pptx
Steganography - Hiding in plain sight.pptx
Image steganography in python with an ea
“Multimedia Steganography with Cipher Text and Compression ppt.
Steganography and steganalysis
Steganography ppt.ppt
Stegnography
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
K0815660
IJREAMV03I022640.pdf
Multi-Level audio steganography
B03208016
LSB Based Image Steganography for Information Security System
steganography using genetic algorithm along with visual cryptography for wire...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
Conditional entrench spatial domain steganography
Steganoghraphy
A Survey Paper On Different Steganography Technique
Steganography
steganography and watermarking
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I

PPT steganography

  • 1. “steganography” BY SHAIK SHARAF PARVEZ 09081A0474 Under the guidance of Miss. Geetha(Asst. Proff.)
  • 3. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  It can be understand by the following figure.
  • 5. Steganography in “TEXT”  Steganography in “IMAGES”  Steganography in “AUDIO”
  • 6. It involves three types of coding: Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.  Word-Shift Coding : The codewords are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.  Feature Coding : In feature coding, certain text features are altered, or not altered, depending on the codeword.
  • 7. Image Compression:  Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in theimage.  “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”.  “Lossless” compression maintains the original image data exactly, It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
  • 8. Image Encoding Techniques The most common approaches to information hiding in images :  Least Significant bit insertion :  Masking and Filtering :  Algorithms and transformations :
  • 9. Audio Environments Digital representation  Sample quantization method :  Temporal sampling rate :  Another digital representation :
  • 10. Transmission medium : Bender’s transmission environments  Digital end-to-end environment.  Increased/decreased resampling environment.  Analog transmission and resampling.  ''Over the air'' environment.
  • 11. Methods of Audio Data Hiding  Low-bit encoding :  Phase coding :  Echo data hiding :
  • 12. Steganalysis is the art and science of detecting a secret communication.  Hiding a message will most likely leave detectable traces in the cover medium.  The information hiding process changes the statistical properties of the cover, which is a steganalyst attempts to detect.  The process of attempting to detect statistical traces is called statistical steganalysis.
  • 13. IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAPHY