SlideShare a Scribd company logo
3
Most read
5
Most read
7
Most read
Presentation on
STEGANOGRAPHY
By
UMANG VYAS
(CEO-TEACHMISSION)
IN THE PRESNTATION
 What is Steganography?
 Physical And Digital techniques
 Steganography v/s Cryptography
 Basic Steganography Model
 Evolution
 Steganography Terms
 Types Of Steganography
 Applications
What is Steganography?
 Steganography is the art and science of writing hidden messages in
such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message, a form of security through
obscurity.
 The word steganography is of Greek origin and means "concealed
writing" from the Greek words steganos meaning "covered or
protected", and graphein meaning "writing".
 “Steganography means hiding one piece of data within another”.
Physical Techniques
 Physical Techniques
 Hidden messages within wax tablets
 Hidden messages on messenger's body
 Hidden messages on paper written in secret inks
 Messages written in Morse code on knitting yarn and
then knitted into a piece of clothing worn by a courier
 Messages written on envelopes in the area covered
by postage stamps.
Digital Techniques
 Digital Techniques
 Concealing messages within the lowest bits of noisy images
or sound files.
 Chaffing and winnowing.
 Modifying the echo of a sound file (Echo Steganography)
 Including data in ignored sections of a file, such as after
the logical end of the carrier file.
Steganography
V/s
Cryptography
Steganography V/s Cryptography
Steganography Cryptography
• Unknown message passing • Known message passing
• Little known technology • Common technology
• Technology still being develop for
certain formats
• Most of algorithm known by all
• Steganography does not alter the
structure of the secret message
• Cryptography alter the structure of
the secret message
Basic Steganography Model
Evolution
CryptographyWatermarking Steganography
Steganography Terms
 Carrier or Cover File - A Original message or a file in which hidden
information will be stored inside of it .
 Stego-Medium - The medium in which the information is hidden.
 Embedded or Payload - The information which is to be hidden or
concealed.
 Steganalysis - The process of detecting hidden information inside a file.
 Types Of Steganography
 Text Steganography
 Image Steganography
 Audio Steganography
Types of Steganography
Text Steganography
 Text steganography can be applied in the digital makeup format such as
PDF, digital watermark or information hiding
 It is more difficult to realize the information hiding based on text. The
simplest method of information hiding is to select the cover first, adopt
given rules to add the phraseological or spelling mistakes, or replace with
synonymy words.
 Ex: TextHide hides the information in the manner of text overwriting and
words’ selection.
Text Steganography Methods
 Text Steganography in Markup Languages[HTML]
 Text Steganography in Specific characters in words
 Line shifting Method
 Word shifting
 Open spaces
 Semantic methods
 Character Encoding
Example
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
Image Steganography
 Using image files as hosts for steganographic messages takes
advantage of the limited capabilities of the human visual system.
 Some of the more common method for embedding messages in
image files can be categorized into two main groups, image
domain methods and transform domain methods.
 Least significant bit (LSB) insertion is a common, simple
approach to embedding information in a cover image
DEMO Of Image
Steganography
Audio Steganography
 Embedding secret messages into digital sound is known as
audio Steganography.
 Audio Steganography methods can embed messages in
WAV, AU, and even MP3 sound files.
 The properties of the human auditory system (HAS) are
exploited in the process of audio Steganography
Applications
 Confidential communication and secret data storing.
 Protection of data alteration.
 Access control system for digital content distribution.
 Media Database systems.
 Usage in modern printers
 Alleged use by terrorists
 Alleged use by intelligence services
Steganography Tools
 Steganos
 S-Tools (GIF, JPEG)
 StegHide (WAV, BMP)
 Invisible Secrets (JPEG)
 JPHide
 Camouflage
 Hiderman
Thank You

More Related Content

PPTX
PPT steganography
PPTX
Steganography
PDF
Image Steganography Project Report
PDF
Steganography final report
PPTX
Steganography Project
PPTX
Image steganography
PDF
Steganography
PPTX
Cyber security threats and its solutions
PPT steganography
Steganography
Image Steganography Project Report
Steganography final report
Steganography Project
Image steganography
Steganography
Cyber security threats and its solutions

What's hot (20)

PPT
Steganography presentation
PPTX
SEMINAR ON staganography
PPT
Steganography - The art of hiding data
PPT
Image Steganography
PPTX
Steganography in images
PPTX
About Steganography
PPTX
Cryptography & Steganography
PPT
Steganography
PPTX
steganography
PPTX
Image steganography and cryptography
PDF
Steganography: LSB technique
PPTX
Steganography and watermarking
PPTX
Image Steganography using LSB
PPTX
Steganography and its techniques
PPTX
Steganography
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PPTX
Steganography
PPTX
Image Steganography
PPTX
Introduction to Cryptography
Steganography presentation
SEMINAR ON staganography
Steganography - The art of hiding data
Image Steganography
Steganography in images
About Steganography
Cryptography & Steganography
Steganography
steganography
Image steganography and cryptography
Steganography: LSB technique
Steganography and watermarking
Image Steganography using LSB
Steganography and its techniques
Steganography
AUDIO STEGANOGRAPHY PRESENTATION
Steganography
Image Steganography
Introduction to Cryptography
Ad

Similar to Presentation On Steganography (20)

PPTX
Steganography - Hiding in plain sight.pptx
PDF
Steganography and steganalysis
PPT
steganography.ppt
PPT
steganography.ppt
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PDF
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
PDF
F017253244
PPT
Steganography ppt.ppt
PDF
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
PPTX
Steganography
PDF
Review of Role of Digital Video in Information Security
DOCX
Steganography
PDF
Steganography and Its Applications in Security
PPTX
Steganography
PDF
Analysis Of Different Types Of Steganography
PPTX
Steganography
PDF
A Survey Of Text Steganography Methods
ODP
Steganography
PDF
Stegnography Systems for Securing DataFile in Image
PDF
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography - Hiding in plain sight.pptx
Steganography and steganalysis
steganography.ppt
steganography.ppt
“Multimedia Steganography with Cipher Text and Compression ppt.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
F017253244
Steganography ppt.ppt
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
Steganography
Review of Role of Digital Video in Information Security
Steganography
Steganography and Its Applications in Security
Steganography
Analysis Of Different Types Of Steganography
Steganography
A Survey Of Text Steganography Methods
Steganography
Stegnography Systems for Securing DataFile in Image
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx

Presentation On Steganography

  • 2. IN THE PRESNTATION  What is Steganography?  Physical And Digital techniques  Steganography v/s Cryptography  Basic Steganography Model  Evolution  Steganography Terms  Types Of Steganography  Applications
  • 3. What is Steganography?  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.  The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing".  “Steganography means hiding one piece of data within another”.
  • 4. Physical Techniques  Physical Techniques  Hidden messages within wax tablets  Hidden messages on messenger's body  Hidden messages on paper written in secret inks  Messages written in Morse code on knitting yarn and then knitted into a piece of clothing worn by a courier  Messages written on envelopes in the area covered by postage stamps.
  • 5. Digital Techniques  Digital Techniques  Concealing messages within the lowest bits of noisy images or sound files.  Chaffing and winnowing.  Modifying the echo of a sound file (Echo Steganography)  Including data in ignored sections of a file, such as after the logical end of the carrier file.
  • 7. Steganography V/s Cryptography Steganography Cryptography • Unknown message passing • Known message passing • Little known technology • Common technology • Technology still being develop for certain formats • Most of algorithm known by all • Steganography does not alter the structure of the secret message • Cryptography alter the structure of the secret message
  • 10. Steganography Terms  Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it .  Stego-Medium - The medium in which the information is hidden.  Embedded or Payload - The information which is to be hidden or concealed.  Steganalysis - The process of detecting hidden information inside a file.
  • 11.  Types Of Steganography  Text Steganography  Image Steganography  Audio Steganography Types of Steganography
  • 12. Text Steganography  Text steganography can be applied in the digital makeup format such as PDF, digital watermark or information hiding  It is more difficult to realize the information hiding based on text. The simplest method of information hiding is to select the cover first, adopt given rules to add the phraseological or spelling mistakes, or replace with synonymy words.  Ex: TextHide hides the information in the manner of text overwriting and words’ selection.
  • 13. Text Steganography Methods  Text Steganography in Markup Languages[HTML]  Text Steganography in Specific characters in words  Line shifting Method  Word shifting  Open spaces  Semantic methods  Character Encoding
  • 14. Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 15. Image Steganography  Using image files as hosts for steganographic messages takes advantage of the limited capabilities of the human visual system.  Some of the more common method for embedding messages in image files can be categorized into two main groups, image domain methods and transform domain methods.  Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image
  • 17. Audio Steganography  Embedding secret messages into digital sound is known as audio Steganography.  Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files.  The properties of the human auditory system (HAS) are exploited in the process of audio Steganography
  • 18. Applications  Confidential communication and secret data storing.  Protection of data alteration.  Access control system for digital content distribution.  Media Database systems.  Usage in modern printers  Alleged use by terrorists  Alleged use by intelligence services
  • 19. Steganography Tools  Steganos  S-Tools (GIF, JPEG)  StegHide (WAV, BMP)  Invisible Secrets (JPEG)  JPHide  Camouflage  Hiderman