SlideShare a Scribd company logo
under the guidance of:   Presented by:
Miss Surapriya swain     Nikhil Kumar
MR Alok Kumar pani       Reg no :0601221172
   Steganography is the art of covered or hidden writing. The purpose of
    Steganography is covert communication to hide a message from a
    third party. This differs from cryptography, the art of secret writing,
    which is intended to make a message unreadable by a third party but
    does not hide the existence of the secret communication. Although
    Steganography is separate and distinct from cryptography,
   Although the term Steganography was only coined at the end of the
    15th century, the use of Steganography dates back several millennia. In
    ancient times, messages were hidden on the back of wax writing
    tables, written on the stomachs of rabbits, or tattooed on the scalp of
    slaves. Invisible ink has been in use for centuries—for fun by children
    and students and for serious espionage by spies and terrorists.
    Microdots and microfilm, a staple of war and spy movies, came about
    after the invention of photography
   Steganography hides the covert message but not the fact that two
    parties are communicating with each other. The Steganography
    process generally involves placing a hidden message in some
    transport medium, called the carrier. The secret message is embedded
    in the carrier to form the Steganography medium. The use of a
    Steganography key may be employed for encryption of the hidden
    message and/or for randomization in the Steganography scheme.
What is                 What is
Steganography           Encryption


                        Converting the data
Hiding the fact that
                        into non readable
information is being
                                .
                        (non perceivable)
sent.
                        data
Usually hiding the
                        It’s a way to pass
data inside other
                        data so that it
data.
                        become safe.
The data is passed in
                        Any unauthorized
an unusual
                        person is not able
communication
                        to understand it
manner.

         1                      2
Fusion
               Invisible




               Merge




    Steganography      Encryption
Needs to send   Sud get d mesg
private mesg    without anybody
                     sees it
Alice     Wendy            Bob




                          Original
Secret Key
                          Image
Image



             Encryption   Stegano                     Message     Secret
                                      Normal Image
             Algorithm    Algorithm                   Retrieval   Message



 Secret
 Message                                             Secret Key
                                                     Image

                                      Ordinary
                                      Image
Stegnography final
 Payload: the data that is desirable for
  transport
 Carrier: signal, stream or data file into which
  the payload is hidden
 Channel: type of input, such as JPEG image
 Package: the resulting signal, stream or data
  file
   which has the payload encoded
 Encoding density: the percentage of bytes
which are modified to encode the payload,
typically as a floating-point number between 0
and 1
Steganographic
Techniques


 Genome Steganography
 Hiding in Text
 Hiding in the disk space
 Hiding data in software and
  circuitry
 Information Hiding in Images
 Hiding in network packets
 Hiding in music files & video
Apparently neutral’s protest is
 p          e         r       s
 h          i           n
thoroughly discounted and
ignored. Isman hard hit.
 g        s     a    i
 l        s     f        r
Blockade issue affects pretext
for embargo on by-products,
 o   m       n y
ejecting suets and vegetable
 j        u     n   e
 i
oils.


 An instace from wwii
p           e               r    s
h           i                n
g       s           a   i
l       s           f        r
o   m           n   y
j       u           n   e
i
How It Work’s in case of images
            Key Image is an image which
            under goes in to an Encryption a clone of original
                              This image is                 Original image is the image
            generating Algorithm which
                              image which contains the      whose clone is created
            generates a unique encryption
                              hidden encrypted message
            technique .



Key Image                   Original Image                         Clone of Original
                                                                   image




                          Unique
Algorithm                 Encryption                          Steganographic
                          Technique                           Algorithm



 Message
            Message is encrypted using          Encrypte
            unique encryption technique         d
                                                Message
• 28  possible values for each color per pixel
• Not much difference in intensity between
           11111111 and 11111110
• Change to least significant bit of each color yields 3 bits per pixel
• One ASCII character can be represented for each 3 pixels
• Given the following 8 carrier bytes
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000
• Assume we want to insert some payload –
    the letter ‘G’, in ASCII:
                 01000111
• The resulting bytes are
10010100 00001101 11001000 10010110
00001110 11001011 10011111 00010001
• Only half of the available bytes were affected by our insertion
• Change is relatively undetectable
Sample Result
       Before Stganography




        After Stganography
Hiding in TCP




                Places to hide message
                - Reserved bits           A
header




                - Sequence number field
                - Initial Sequence
                Number (ISN)                  B
                oMakes use of three-
                way handshake in
                buildup
                of a TCP/IP connection
                                          C
Unused Header Bit
Stuffing




 Padding Byte Stuffing
   Statistical analysis
   Analyze frequency of DCT coefficients
   compressing
Stegnography final
Where it can be USED – Applications?




Government Agencies: --               Security companies: -- Can USE
who store documents                   And SELL IBES products as stand
                                      alone or as a part of their bigger
which are very sensitive
                                      package


Business people: --                   Banks and other financial
preserve legal and customer           institutions: -- safeguard
specific financial documents           their databases



 Private Organizations: -- who want   Digital Watermarking
 to safeguard their                   Digital Signature Authentication
 sensitive information                Digital Linkage and Storage
Steganography is a fascinating and effective method of
hiding data that has been used throughout history.
Methods that can be employed to uncover such
devious tactics, but the first step are awareness that
such methods even exist. There are many good
reasons as well to use this type of data hiding,
including watermarking or a more secure central
storage method for such things as passwords, or key
processes. Regardless, the technology is easy to use
and difficult to detect. The more that you know about its
features and functionality, the more ahead you will be in
the game.
Thank you




            21

More Related Content

PPTX
About Steganography
PPT
Stegnography
PPT
Steganography chandni verma(cse 4th year)
PPT
Steganography.
PPTX
Steganography
PPT
Steganography - The art of hiding data
DOC
Steganography ProjectReport
About Steganography
Stegnography
Steganography chandni verma(cse 4th year)
Steganography.
Steganography
Steganography - The art of hiding data
Steganography ProjectReport

What's hot (20)

PPT
Stegnography
PPTX
Steganography
PPTX
PPT steganography
DOC
Steganography Engineering project report
PPT
Steganography
PPT
83747965 steganography
PPT
Steganography ppt
PDF
Steganography
PPTX
SEMINAR ON staganography
PPTX
Steganography presentation
PDF
Steganography and Its Applications in Security
PDF
A Steganography LSB technique for hiding Image within Image Using blowfish En...
DOCX
Steganography
PPT
Steganography
PPT
Steganography
PPT
Data hiding - Steganography
PPT
Steganography
PPTX
Audio steganography
PPTX
Stegnography
Stegnography
Steganography
PPT steganography
Steganography Engineering project report
Steganography
83747965 steganography
Steganography ppt
Steganography
SEMINAR ON staganography
Steganography presentation
Steganography and Its Applications in Security
A Steganography LSB technique for hiding Image within Image Using blowfish En...
Steganography
Steganography
Steganography
Data hiding - Steganography
Steganography
Audio steganography
Stegnography
Ad

Viewers also liked (20)

PPT
Image stegnography and steganalysis
PPTX
Steganography
PPTX
Image Steganography using LSB
PPT
Image Steganography
PPTX
Stegnography final
PPT
PPTX
BLUE BRAIN TECHNOLOGY
PDF
Arvind stegnography
PPTX
Steganography
PPT
Final stagenography
DOCX
EDGE DETECTION
PPTX
Data Security - English
PPTX
Edge detection
PPTX
android technology presentation
PPTX
Artificial intelligence
PPTX
Data Privacy and Protection Presentation
PPTX
Data protection ppt
PDF
Steganography Project
PPTX
Cryptography.ppt
PPTX
artificial eye
Image stegnography and steganalysis
Steganography
Image Steganography using LSB
Image Steganography
Stegnography final
BLUE BRAIN TECHNOLOGY
Arvind stegnography
Steganography
Final stagenography
EDGE DETECTION
Data Security - English
Edge detection
android technology presentation
Artificial intelligence
Data Privacy and Protection Presentation
Data protection ppt
Steganography Project
Cryptography.ppt
artificial eye
Ad

Similar to Stegnography final (20)

PPT
Steganography
PDF
International Journal of Engineering Research and Development
PPTX
Steganography
PPTX
Steganography
PDF
Be32364369
DOCX
Steganography
PPT
Steganography
PDF
10.1.1.62.8194
DOC
Steganography
DOCX
2.docx
DOCX
project-report-steganography.docx
PDF
An Infallible Method to Transfer Confidential Data using Delta Steganography
PPTX
Information security
PDF
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
PPT
Steganography presentation
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PDF
ClubHack Magazine Issue May 2012
PDF
Stegnography Systems for Securing DataFile in Image
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
PDF
Understanding Image Steganography with Practical Approach
Steganography
International Journal of Engineering Research and Development
Steganography
Steganography
Be32364369
Steganography
Steganography
10.1.1.62.8194
Steganography
2.docx
project-report-steganography.docx
An Infallible Method to Transfer Confidential Data using Delta Steganography
Information security
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
Steganography presentation
“Multimedia Steganography with Cipher Text and Compression ppt.
ClubHack Magazine Issue May 2012
Stegnography Systems for Securing DataFile in Image
MESSAGE TRANSFER USING STEGANOGRAPHY
Understanding Image Steganography with Practical Approach

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Stegnography final

  • 1. under the guidance of: Presented by: Miss Surapriya swain Nikhil Kumar MR Alok Kumar pani Reg no :0601221172
  • 2. Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography,  Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuries—for fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography  Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.
  • 3. What is What is Steganography Encryption Converting the data Hiding the fact that into non readable information is being . (non perceivable) sent. data Usually hiding the It’s a way to pass data inside other data so that it data. become safe. The data is passed in Any unauthorized an unusual person is not able communication to understand it manner. 1 2
  • 4. Fusion Invisible Merge Steganography Encryption
  • 5. Needs to send Sud get d mesg private mesg without anybody sees it
  • 6. Alice Wendy Bob Original Secret Key Image Image Encryption Stegano Message Secret Normal Image Algorithm Algorithm Retrieval Message Secret Message Secret Key Image Ordinary Image
  • 8.  Payload: the data that is desirable for transport  Carrier: signal, stream or data file into which the payload is hidden  Channel: type of input, such as JPEG image  Package: the resulting signal, stream or data file which has the payload encoded  Encoding density: the percentage of bytes which are modified to encode the payload, typically as a floating-point number between 0 and 1
  • 9. Steganographic Techniques  Genome Steganography  Hiding in Text  Hiding in the disk space  Hiding data in software and circuitry  Information Hiding in Images  Hiding in network packets  Hiding in music files & video
  • 10. Apparently neutral’s protest is p e r s h i n thoroughly discounted and ignored. Isman hard hit. g s a i l s f r Blockade issue affects pretext for embargo on by-products, o m n y ejecting suets and vegetable j u n e i oils. An instace from wwii
  • 11. p e r s h i n g s a i l s f r o m n y j u n e i
  • 12. How It Work’s in case of images Key Image is an image which under goes in to an Encryption a clone of original This image is Original image is the image generating Algorithm which image which contains the whose clone is created generates a unique encryption hidden encrypted message technique . Key Image Original Image Clone of Original image Unique Algorithm Encryption Steganographic Technique Algorithm Message Message is encrypted using Encrypte unique encryption technique d Message
  • 13. • 28 possible values for each color per pixel • Not much difference in intensity between 11111111 and 11111110 • Change to least significant bit of each color yields 3 bits per pixel • One ASCII character can be represented for each 3 pixels • Given the following 8 carrier bytes 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 • Assume we want to insert some payload – the letter ‘G’, in ASCII: 01000111 • The resulting bytes are 10010100 00001101 11001000 10010110 00001110 11001011 10011111 00010001 • Only half of the available bytes were affected by our insertion • Change is relatively undetectable
  • 14. Sample Result Before Stganography After Stganography
  • 15. Hiding in TCP Places to hide message - Reserved bits A header - Sequence number field - Initial Sequence Number (ISN) B oMakes use of three- way handshake in buildup of a TCP/IP connection C
  • 16. Unused Header Bit Stuffing Padding Byte Stuffing
  • 17. Statistical analysis  Analyze frequency of DCT coefficients  compressing
  • 19. Where it can be USED – Applications? Government Agencies: -- Security companies: -- Can USE who store documents And SELL IBES products as stand alone or as a part of their bigger which are very sensitive package Business people: -- Banks and other financial preserve legal and customer institutions: -- safeguard specific financial documents their databases Private Organizations: -- who want Digital Watermarking to safeguard their Digital Signature Authentication sensitive information Digital Linkage and Storage
  • 20. Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.
  • 21. Thank you 21