SlideShare a Scribd company logo
What is Steganography?

Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”

 Steganography is the art and
  science of writing hidden messages
  in such a way that no one apart       Stegosaurus: a covered lizard



  from the intended recipient knows
                                        (but not a type of cryptography)




  of the existence of the message.

 This can be achieve by concealing
  the existence of information
  within seemingly harmless carriers
  or cover

 Carrier: text, image, video, audio,
  etc.
Cryptography
   Cryptography was concerned solely with message
    confidentiality (i.e., encryption)—conversion of message
    from a comprehensible form into an incomprehensible one
    and back again at the other end, rendering it unreadable by
    interceptors or eavesdroppers without secret knowledge
    (namely the key needed for decryption of that message)

Cryptography is secret writing. Anybody can see the message,
  but nobody else can read it. Usually, this is because its letters
  have been re-arranged, or replaced by different letters,
  according to some scheme that only the sender and receiver
  know. Only those who possess a secret key can decrypt the
  message into plain text
DIFFERENCE B/W
CRYPTOGRAPHY AND STEGANOGRAPHY
Steganography deals with composing hidden messages so that
only the sender and the receiver know that the message even
exists. Since, nobody except the sender and the receiver knows
the existence of the message, it does not attract unwanted
attention.
Steganography is hidden writing. The message is there, but
nobody notices it. Once the presence of hidden information is
revealed or even suspected, the purpose of steganography is
defeated.
However, once noticed, it can be read. A common form of
steganography is the use of JPEG files (a computer image) to
hide the message.
The obvious advantage of Steganography over
cryptography is that messages do not attract any
attention
History of Steganography
   Steganography ancient origins can be traced back to 440 BC, from the Histories of
  Herodotus
  Demeratus sent a warning about a forthcoming attack to Greece by writing it on a
  wooden panel and covering it in wax.
    Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it.
  After his hair had grown the message was hidden. The purpose was to instigate a revolt
  against the Persians.
   Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells
  the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the
  hair that afterwards grew over it, and exposed by shaving the head again. The message
  allegedly carried a warning to Greece about Persian invasion plans



World War II
the French Resistance sent some messages written on the backs of couriers using invisible
   ink.
Modern Steganography Technique


Least Significant Bit Insertion: The most common and
  popular method of modern day Steganography is to
  make use of the LSB of a picture’s pixel information.
  Thus the overall image distortion is kept to a minimum
  while the message is spaced out over the pixels in the
  images. This technique works best when the image file
  is larger then the message file and if the image is
  grayscale.
Image of a tree with a steganographically
hidden image. The hidden image is revealed by
removing all but the two least significant bits
of each color component and a subsequent
normalization. The hidden image is shown
below.


                Image of a cat extracted from the tree image
                above.
Basics of Modern Steganography




fE:     steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message
Important Requirement for
           Steganographic System
Security of the hidden communication


size of the payload


Robustness against malicious and unintentional attacks
Detection of Steganographic
        Content/Countermeasures
The detection of steganographically encoded packages is
 called Steganalysis.

  Visual Analysis tries to reveal the presence of secret
    communication through inspection, either with the naked eye
    or with the assistance of a computer.

  Statistical (Algorithmic) Analysis reveals tiny alterations
    in an image's statistical behavior caused by steganographic
    embedding.
     The nominally universal methods developed to detect embedded stego-
      data are generally less effective than the steganalytic methods aimed at
      specific types of embedding.

More Related Content

PPTX
Steganography in images
PPTX
SEMINAR ON staganography
PDF
Steganography
PPT
Steganography - The art of hiding data
PDF
Email security presentation
PDF
Steganography and steganalysis
PPTX
One Time Pad Encryption Technique
Steganography in images
SEMINAR ON staganography
Steganography
Steganography - The art of hiding data
Email security presentation
Steganography and steganalysis
One Time Pad Encryption Technique

What's hot (20)

PPTX
Cryptography
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
Steganography and watermarking
PPTX
Steganography
PPTX
Biometric security using cryptography
PPTX
About Steganography
PPT
6. cryptography
PDF
Introduction to Cryptography
PPT
Steganography presentation
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Steganography
PPT
Digital signature
PPTX
Steganography presentation
PPTX
Steganoghraphy
PPTX
Steganography - A smart way to hide data
PPTX
Steganography in images
PDF
Electronic mail security
PPTX
Steganography
PDF
Steganography Project
PPTX
Double DES & Triple DES
Cryptography
What is Asymmetric Encryption? Understand with Simple Examples
Steganography and watermarking
Steganography
Biometric security using cryptography
About Steganography
6. cryptography
Introduction to Cryptography
Steganography presentation
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Steganography
Digital signature
Steganography presentation
Steganoghraphy
Steganography - A smart way to hide data
Steganography in images
Electronic mail security
Steganography
Steganography Project
Double DES & Triple DES
Ad

Viewers also liked (18)

PPTX
PPT steganography
PPTX
Steganography
PPTX
Steganography Project
PPTX
Mobile comp
PPT
Steganography ppt
PPTX
digital steganography
PPTX
Skin tone based steganography
PPTX
Recent trends in satellite communication
PDF
Stenographgh[1]
PPTX
Steganography
PPTX
Big data security
PPT
Image Steganography
PPT
Ppt on irrigation
PPT
Satellites presentation
PPTX
Irrigation PPT
 
PPT
Big data ppt
PPT
Satellite communications ppt
PPTX
Big data ppt
PPT steganography
Steganography
Steganography Project
Mobile comp
Steganography ppt
digital steganography
Skin tone based steganography
Recent trends in satellite communication
Stenographgh[1]
Steganography
Big data security
Image Steganography
Ppt on irrigation
Satellites presentation
Irrigation PPT
 
Big data ppt
Satellite communications ppt
Big data ppt
Ad

Similar to Steganography ppt (20)

PPT
Steganography
PPT
Steganography
PDF
Steganography
PDF
Steganography and Its Applications in Security
PPT
Stegnography
PPTX
CSE steganography for data writing and reading
PPTX
Presentation1
PPTX
steganography-252-uzLRCSm.pptx
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images -...
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
PDF
Feature Selection Algorithm for Supervised and Semisupervised Clustering
PPTX
Information hiding
PDF
informationhiding-181103070958 (1).pdf
PPT
Steganography
PDF
Hi3612991303
PPTX
Steganography
PDF
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
PPTX
Steganography and its techniques
ODP
Steganography
Steganography
Steganography
Steganography
Steganography and Its Applications in Security
Stegnography
CSE steganography for data writing and reading
Presentation1
steganography-252-uzLRCSm.pptx
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Information hiding
informationhiding-181103070958 (1).pdf
Steganography
Hi3612991303
Steganography
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography and its techniques
Steganography

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial diseases, their pathogenesis and prophylaxis
TR - Agricultural Crops Production NC III.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
Final Presentation General Medicine 03-08-2024.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra

Steganography ppt

  • 1. What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart Stegosaurus: a covered lizard from the intended recipient knows (but not a type of cryptography) of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc.
  • 2. Cryptography Cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of message from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message) Cryptography is secret writing. Anybody can see the message, but nobody else can read it. Usually, this is because its letters have been re-arranged, or replaced by different letters, according to some scheme that only the sender and receiver know. Only those who possess a secret key can decrypt the message into plain text
  • 3. DIFFERENCE B/W CRYPTOGRAPHY AND STEGANOGRAPHY Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since, nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. Steganography is hidden writing. The message is there, but nobody notices it. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated. However, once noticed, it can be read. A common form of steganography is the use of JPEG files (a computer image) to hide the message. The obvious advantage of Steganography over cryptography is that messages do not attract any attention
  • 4. History of Steganography Steganography ancient origins can be traced back to 440 BC, from the Histories of Herodotus Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece about Persian invasion plans World War II the French Resistance sent some messages written on the backs of couriers using invisible ink.
  • 5. Modern Steganography Technique Least Significant Bit Insertion: The most common and popular method of modern day Steganography is to make use of the LSB of a picture’s pixel information. Thus the overall image distortion is kept to a minimum while the message is spaced out over the pixels in the images. This technique works best when the image file is larger then the message file and if the image is grayscale.
  • 6. Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. The hidden image is shown below. Image of a cat extracted from the tree image above.
  • 7. Basics of Modern Steganography fE:     steganographic function "embedding" fE-1:   steganographic function "extracting" cover:  cover data in which emb will be hidden emb:    message to be hidden key:    parameter of fE stego:  cover data with the hidden message
  • 8. Important Requirement for Steganographic System Security of the hidden communication size of the payload Robustness against malicious and unintentional attacks
  • 9. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.  The nominally universal methods developed to detect embedded stego- data are generally less effective than the steganalytic methods aimed at specific types of embedding.