SlideShare a Scribd company logo
Stegano Secrets - Python
Santhosh Baswa
Cyber Security Enthusiast
santhosh.nuz@gmail.com
October 17, 2015
Santhosh Baswa October 17, 2015 1 / 9
Introduction
Steganography
Steganography comes from Greek Word. It means covered or secret
writing.
” Steganography = steganos (covered) + graphein (writing) ”
Main Points
” The goal of steganography is to hide messages in such a way that
no one apart from the intended recipient even knows that a message
has been sent.”
This can be achieve by concealing the existence of information within
seemingly harmless carriers or cover.
Santhosh Baswa October 17, 2015 2 / 9
Block diagram of Steganography
Santhosh Baswa October 17, 2015 3 / 9
Steganography in Images
Image Encoding Techniques
The most common approaches to information hiding in images:
Least Significant bit Insertion
Masking and Filtering
Algorithms and transformations
Where we can use ?
Confidential Communication
Secret Data Storing
Santhosh Baswa October 17, 2015 4 / 9
Practical Session Starts with Python
By Using Python
Python Scripting is most powerful language for Security Professionals.
Syntax is too simple.
Lot of 3rd party modules available.
Python Modules used :
We are mainly using these modules in this session:
binascii (hexify)
getpass
sys , os
simplecrypt
Image,stepic
Santhosh Baswa October 17, 2015 5 / 9
Modules : binascii (hexify) and getpass
hexify
getpass
os and sys (stdin)
Santhosh Baswa October 17, 2015 6 / 9
Modules : simplecrypt
simplecrypt
Santhosh Baswa October 17, 2015 7 / 9
Modules : Image , Stepic
Image - Stepic
Santhosh Baswa October 17, 2015 8 / 9
Final Program Source code
Santhosh Baswa October 17, 2015 9 / 9

More Related Content

PDF
Steganography
PPTX
Steganography
PPTX
Steganography
PPT
Steganography
PPTX
Steganography Project Presentation By Papan Sarkar
PPT
Steganography
PPT
Stegnography
PPTX
Steganography Project Research Ideas
Steganography
Steganography
Steganography
Steganography
Steganography Project Presentation By Papan Sarkar
Steganography
Stegnography
Steganography Project Research Ideas

What's hot (19)

PPT
PPTX
Steganography
PDF
Audio steganography using lsb
PPTX
Steganograpy
PPTX
Steganography
PPTX
Stegnography
PDF
How Encryption Works
PDF
What is cloud encryption
PDF
Week13
PPT
16 exercises for part 3
PPT
Stegnography
PPT
Steganography
PPTX
Steganography
PPTX
Steganography
PDF
Py Vegas - Tales from the crypt
PPTX
Steganography basic
PPTX
Steganography
PPTX
Cryptography in formtaion security
PPTX
Stegnography
Steganography
Audio steganography using lsb
Steganograpy
Steganography
Stegnography
How Encryption Works
What is cloud encryption
Week13
16 exercises for part 3
Stegnography
Steganography
Steganography
Steganography
Py Vegas - Tales from the crypt
Steganography basic
Steganography
Cryptography in formtaion security
Stegnography
Ad

Viewers also liked (20)

PDF
Operations security - SyPy Dec 2014 (Sydney Python users)
PDF
اسلاید دوم جلسه یازدهم کلاس پایتون برای هکر های قانونی
PDF
Evdokimov python arsenal for re
PPTX
DNS hijacking - null Singapore
PPTX
PPTX
Humla workshop on Android Security Testing - null Singapore
PDF
Three things that rowhammer taught me by Halvar Flake
PPT
iOS Application Pentesting
PDF
Null Singapore - Can We secure the IoT - Chadi Hantouche
ODP
Pycon Sec
PDF
Managing third party libraries
PPTX
Identifying XSS Vulnerabilities
PPTX
News Bytes - December 2015
PPT
Network programming in python..
PDF
Python build your security tools.pdf
PPTX
PDF
Offensive cyber security: Smashing the stack with Python
PDF
Network Security and Analysis with Python
Operations security - SyPy Dec 2014 (Sydney Python users)
اسلاید دوم جلسه یازدهم کلاس پایتون برای هکر های قانونی
Evdokimov python arsenal for re
DNS hijacking - null Singapore
Humla workshop on Android Security Testing - null Singapore
Three things that rowhammer taught me by Halvar Flake
iOS Application Pentesting
Null Singapore - Can We secure the IoT - Chadi Hantouche
Pycon Sec
Managing third party libraries
Identifying XSS Vulnerabilities
News Bytes - December 2015
Network programming in python..
Python build your security tools.pdf
Offensive cyber security: Smashing the stack with Python
Network Security and Analysis with Python
Ad

Similar to Stegano Secrets - Python (20)

PDF
Suhas Desai Clubhack09 Open Source Data Security 0.2
PDF
Suhas Desai Clubhack09 Open Source Data Security 0.2
PDF
Suhas desai _open_source_data_security - ClubHack2009
PPTX
Steganography
PPTX
Steganography is a thing to upload on net.pptx
PPTX
Introduction-to-------Steganography.pptx
PPTX
About Steganography
PPTX
steganography
PDF
Steganography Project Steganography project powerpoint presentation.pdf.pdf
PDF
Steganography project power point presentation.pdf
PDF
Steganography project powerpoint presentation.pdf
PDF
Steganography: Hiding your secrets with PHP
PPTX
Steganography
PDF
Steganography
PPTX
Steganography Project.pptx
PPTX
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
PPTX
Image steganography and cryptography
PDF
Understanding Image Steganography with Practical Approach
PDF
Ijetr011937
PPT
Steganography
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas desai _open_source_data_security - ClubHack2009
Steganography
Steganography is a thing to upload on net.pptx
Introduction-to-------Steganography.pptx
About Steganography
steganography
Steganography Project Steganography project powerpoint presentation.pdf.pdf
Steganography project power point presentation.pdf
Steganography project powerpoint presentation.pdf
Steganography: Hiding your secrets with PHP
Steganography
Steganography
Steganography Project.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Image steganography and cryptography
Understanding Image Steganography with Practical Approach
Ijetr011937
Steganography

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
sap open course for s4hana steps from ECC to s4
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology

Stegano Secrets - Python

  • 1. Stegano Secrets - Python Santhosh Baswa Cyber Security Enthusiast santhosh.nuz@gmail.com October 17, 2015 Santhosh Baswa October 17, 2015 1 / 9
  • 2. Introduction Steganography Steganography comes from Greek Word. It means covered or secret writing. ” Steganography = steganos (covered) + graphein (writing) ” Main Points ” The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.” This can be achieve by concealing the existence of information within seemingly harmless carriers or cover. Santhosh Baswa October 17, 2015 2 / 9
  • 3. Block diagram of Steganography Santhosh Baswa October 17, 2015 3 / 9
  • 4. Steganography in Images Image Encoding Techniques The most common approaches to information hiding in images: Least Significant bit Insertion Masking and Filtering Algorithms and transformations Where we can use ? Confidential Communication Secret Data Storing Santhosh Baswa October 17, 2015 4 / 9
  • 5. Practical Session Starts with Python By Using Python Python Scripting is most powerful language for Security Professionals. Syntax is too simple. Lot of 3rd party modules available. Python Modules used : We are mainly using these modules in this session: binascii (hexify) getpass sys , os simplecrypt Image,stepic Santhosh Baswa October 17, 2015 5 / 9
  • 6. Modules : binascii (hexify) and getpass hexify getpass os and sys (stdin) Santhosh Baswa October 17, 2015 6 / 9
  • 7. Modules : simplecrypt simplecrypt Santhosh Baswa October 17, 2015 7 / 9
  • 8. Modules : Image , Stepic Image - Stepic Santhosh Baswa October 17, 2015 8 / 9
  • 9. Final Program Source code Santhosh Baswa October 17, 2015 9 / 9