SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
CYBER
SECURITY
BITS EDU CAMPUS
COMPUTER SCIENCE DEPARTMENT
TOPIC:
STEGANOGRAPHY
Prepared by:
Shruti Ghelani-140050107031
Taha Malampattiwala-140050107052
Jinal Mayavanshi-140050107056
INFORMATION HIDING
• Information Hiding is a branch of computer science that deals with
concealing the existence of a message
• It is related to cryptography whose intent is to render messages
unreadable except by the intended recipients
• It employs technologies from numerous science disciplines:
• Digital Signal Processing (Images, Audio, Video)
• Cryptography
• Information TheoryCoding Theory
• Data Compression
• Human Visual/Auditory perception
• There are four primary sub-disciplines of Information Hiding
• Steganography
• Watermarking
• Covert Channels
• Anonymity
• Alice and Bob
• Classical names given to the parties wishing to communicate
• Sometimes, you may have a Carol and a Dave
• Eve, an adversary, can listen to but not modify or forge a message
• (think passive eavesdropping)
• Wendy the Warden, another adversary, can monitor, modify, or forge a
message
• A passive warden simply listens (like Eve)
• An active warden may modify a message
• A malicious warden may forge a fake message
BASIC TERMINOLOGY
What is Steganography?
def’n:
the art and science of hiding information by
embedding it in some other data.
cryptography - render message unintelligible
steganography - conceal the existence of the message
• Steganography literally means “covered writing”
• A stegosaurus has a covered back
• Steganography’s primary goal is to hide data within some other data such that
the hidden data cannot be detected even if it is being sought
• Secondary goals:
• prevent extraction from the cover file without destroying the cover
• prevent destruction of the stego-message without destroying the cover
• Most frequently, steganography is applied to images, but many other data or
file types are possible
• Audio
• Video
• Text
• Executable programs
The cover provides a host for transporting the hidden info.
info
embed
-file
extract
info
Digital Steganography
• HTML message as cover?
• computer program as cover?
• network protocol headers
• white space in text
• unused space in buffer
• least significant bits of image
• slight distortion in sound file
• “Easter eggs”
Steganography in Images
Two types of compression:
• lossless (gif)
• lossy (jpeg)
Sometimes concealed message inserted as a comment.
Sometimes the accuracy of the image is sacrificed slightly.
Common Tools
• StegoDOS
• White Noise Storm
• S-tools
• Outguess
• Steghide
APPLICATIONS OF INFORMATION
HIDING• Covert military communications
• Covert police communications
• Criminals have learned that police are nearby when they hear encrypted
communications, so they abate their activity for the moment
• A steganographic system would prevent this detection
• Digital Rights Management – protecting intellectual property such as
images, music, electronic books, etc.
• Embedding textual data in medical images would better ensure that the
picture belongs to a particular patient
• This technique could apply to personal pictures, sounds, and movies
• Tamper proofing – ensuring a data file has not been changed
• Communicating in an oppressive country w/o free speech
NEFARIOUS APPLICATIONS OF INFORMATION HIDING
• You won’t find these applications in the book
• money laundering
• drug running
• child pornography
• spying (good or bad depending upon which side you’re on!)
• terrorism
• Unfortunately, these uses are also possible
• The technology itself isn’t bad, but like many things, it can be (and is)
abused
• Since there are nefarious uses, law enforcement and the military is also
interested in understanding hiding techniques and detecting hidden data
• There are some projects right here at UTSA that have done research for the
Air Force
STEGANALYSIS
• Steganalysis is the detection of data that has been hidden
• It is a cat and mouse game – as one group of researchers come up with
better ways to hide stuff, another group figures out how to detect it or
perhaps just destroy it
• In the summer course last year, one student thought he had a hiding system
that was undetectable
• His lab partner wrote a statistical analysis program that exposed the
hidden message
• The first student modified his program to defeat the attack
• His lab partner modified his analyzer and still found the message
THANKYOU.

More Related Content

DOCX
E-commerce documentation
PPTX
COMSOL.pptx
PPTX
Steganography
PPTX
Full Stack Web Development
PPT
Steganography - The art of hiding data
PPT
Virtualization.ppt
PPTX
MatplotLib.pptx
PPTX
Python Libraries and Modules
E-commerce documentation
COMSOL.pptx
Steganography
Full Stack Web Development
Steganography - The art of hiding data
Virtualization.ppt
MatplotLib.pptx
Python Libraries and Modules

What's hot (20)

PPTX
Steganography in images
PPTX
About Steganography
PPTX
Steganography
PPTX
steganography
PPTX
Steganography
PDF
Steganography
PPTX
SEMINAR ON staganography
PPTX
PPT steganography
PPT
Steganography presentation
PPT
Steganography
PPTX
Transposition cipher techniques
PPTX
Steganography
PPTX
Forensic imaging
PPTX
Steganography and its techniques
PPT
Steganography
PPT
DES (Data Encryption Standard) pressentation
PPTX
Steganography
PPTX
Image steganography
PPTX
Steganography - A smart way to hide data
Steganography in images
About Steganography
Steganography
steganography
Steganography
Steganography
SEMINAR ON staganography
PPT steganography
Steganography presentation
Steganography
Transposition cipher techniques
Steganography
Forensic imaging
Steganography and its techniques
Steganography
DES (Data Encryption Standard) pressentation
Steganography
Image steganography
Steganography - A smart way to hide data
Ad

Viewers also liked (8)

PPTX
Steganography Project
PPTX
Steganography flooding
PPTX
Cox&king manendra shukla
PPTX
Art of Steganography
PPT
Steganography ppt
PPTX
Cox and kings project
PPT
Brand Strategy For Cox & Kings (1)
DOCX
Internship report
Steganography Project
Steganography flooding
Cox&king manendra shukla
Art of Steganography
Steganography ppt
Cox and kings project
Brand Strategy For Cox & Kings (1)
Internship report
Ad

Similar to Steganography ppt (20)

PPTX
Steganography
PPTX
PPT
Data hiding - Steganography
PPTX
Steganography(Presentation)
DOC
Steganography ProjectReport
PPTX
Information and network security 17 steganography
PPTX
Steganography_ENS
PPTX
206470316015_ENS.pptx
PPTX
Role of encryption in security vs privacy debate
PPTX
Computer Forensics Bootcamp
PPTX
Cybersecurity and Digital Forensics.pptx
PDF
digital stega slides
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PPTX
Tails os and Tor Proxies
PPTX
Draft current state of digital forensic and data science
PPTX
Demystifying Secure Channel
PPTX
Steganography_Presentation.pptx/types/history
PPTX
An Introduction to Surviving in a Surveillance Society
PPTX
Steganography
Steganography
Data hiding - Steganography
Steganography(Presentation)
Steganography ProjectReport
Information and network security 17 steganography
Steganography_ENS
206470316015_ENS.pptx
Role of encryption in security vs privacy debate
Computer Forensics Bootcamp
Cybersecurity and Digital Forensics.pptx
digital stega slides
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Tails os and Tor Proxies
Draft current state of digital forensic and data science
Demystifying Secure Channel
Steganography_Presentation.pptx/types/history
An Introduction to Surviving in a Surveillance Society
Steganography

More from Taha Malampatti (17)

PPTX
Lex & yacc
PPTX
Cultural heritage tourism
PPTX
Request dispacther interface ppt
PPTX
Introduction to Android ppt
PPT
Intodcution to Html
PPTX
Introduction to php
PPTX
Database Connectivity in PHP
PPTX
Cox and Kings Pvt Industrial Training
PPTX
An application of 8085 register interfacing with LCD
PPTX
An application of 8085 register interfacing with LED
PPT
Java Virtual Machine
PPTX
The sunsparc architecture
PDF
Orthogonal Projection
PPTX
Apple inc
PPT
Blood donation
PPTX
Compressors and its applications
PPTX
Laws Of Gravitation
Lex & yacc
Cultural heritage tourism
Request dispacther interface ppt
Introduction to Android ppt
Intodcution to Html
Introduction to php
Database Connectivity in PHP
Cox and Kings Pvt Industrial Training
An application of 8085 register interfacing with LCD
An application of 8085 register interfacing with LED
Java Virtual Machine
The sunsparc architecture
Orthogonal Projection
Apple inc
Blood donation
Compressors and its applications
Laws Of Gravitation

Recently uploaded (20)

PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
Arduino robotics embedded978-1-4302-3184-4.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Lesson 3_Tessellation.pptx finite Mathematics
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original

Steganography ppt

  • 2. TOPIC: STEGANOGRAPHY Prepared by: Shruti Ghelani-140050107031 Taha Malampattiwala-140050107052 Jinal Mayavanshi-140050107056
  • 3. INFORMATION HIDING • Information Hiding is a branch of computer science that deals with concealing the existence of a message • It is related to cryptography whose intent is to render messages unreadable except by the intended recipients • It employs technologies from numerous science disciplines: • Digital Signal Processing (Images, Audio, Video) • Cryptography • Information TheoryCoding Theory • Data Compression • Human Visual/Auditory perception • There are four primary sub-disciplines of Information Hiding • Steganography • Watermarking • Covert Channels • Anonymity
  • 4. • Alice and Bob • Classical names given to the parties wishing to communicate • Sometimes, you may have a Carol and a Dave • Eve, an adversary, can listen to but not modify or forge a message • (think passive eavesdropping) • Wendy the Warden, another adversary, can monitor, modify, or forge a message • A passive warden simply listens (like Eve) • An active warden may modify a message • A malicious warden may forge a fake message BASIC TERMINOLOGY
  • 5. What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible steganography - conceal the existence of the message
  • 6. • Steganography literally means “covered writing” • A stegosaurus has a covered back • Steganography’s primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought • Secondary goals: • prevent extraction from the cover file without destroying the cover • prevent destruction of the stego-message without destroying the cover • Most frequently, steganography is applied to images, but many other data or file types are possible • Audio • Video • Text • Executable programs
  • 7. The cover provides a host for transporting the hidden info. info embed -file extract info
  • 8. Digital Steganography • HTML message as cover? • computer program as cover? • network protocol headers • white space in text • unused space in buffer • least significant bits of image • slight distortion in sound file • “Easter eggs”
  • 9. Steganography in Images Two types of compression: • lossless (gif) • lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools • StegoDOS • White Noise Storm • S-tools • Outguess • Steghide
  • 10. APPLICATIONS OF INFORMATION HIDING• Covert military communications • Covert police communications • Criminals have learned that police are nearby when they hear encrypted communications, so they abate their activity for the moment • A steganographic system would prevent this detection • Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc. • Embedding textual data in medical images would better ensure that the picture belongs to a particular patient • This technique could apply to personal pictures, sounds, and movies • Tamper proofing – ensuring a data file has not been changed • Communicating in an oppressive country w/o free speech
  • 11. NEFARIOUS APPLICATIONS OF INFORMATION HIDING • You won’t find these applications in the book • money laundering • drug running • child pornography • spying (good or bad depending upon which side you’re on!) • terrorism • Unfortunately, these uses are also possible • The technology itself isn’t bad, but like many things, it can be (and is) abused • Since there are nefarious uses, law enforcement and the military is also interested in understanding hiding techniques and detecting hidden data • There are some projects right here at UTSA that have done research for the Air Force
  • 12. STEGANALYSIS • Steganalysis is the detection of data that has been hidden • It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it • In the summer course last year, one student thought he had a hiding system that was undetectable • His lab partner wrote a statistical analysis program that exposed the hidden message • The first student modified his program to defeat the attack • His lab partner modified his analyzer and still found the message