0% found this document useful (0 votes)
63 views

Steganography: The Art of Data Hiding

Here are some questions about steganography: 1. What are some common file formats that can be used for steganography? Common file formats include images (JPEG, BMP, GIF), audio (WAV, MP3), text files, and video files. Images are often used because human eyes are less likely to notice small changes in images than other file types. 2. What are some steganography tools that can be used to hide data in files? Popular steganography tools include Steganos, S-Tools, StegHide, Invisible Secrets, JPHide, Camouflage, and HiderMan. These tools allow encoding secret messages into files and extracting them

Uploaded by

Ganesan Siva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Steganography: The Art of Data Hiding

Here are some questions about steganography: 1. What are some common file formats that can be used for steganography? Common file formats include images (JPEG, BMP, GIF), audio (WAV, MP3), text files, and video files. Images are often used because human eyes are less likely to notice small changes in images than other file types. 2. What are some steganography tools that can be used to hide data in files? Popular steganography tools include Steganos, S-Tools, StegHide, Invisible Secrets, JPHide, Camouflage, and HiderMan. These tools allow encoding secret messages into files and extracting them

Uploaded by

Ganesan Siva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Steganography

The art of data hiding


Steganography:

Steganography
◦ derived from the Greek word steganos
meaning “covered”
◦ and the Greek word graphie meaning “writing”.

Steganography is the process of hiding of a


secret message within an ordinary message and
extracting it at its destination.
Steganography include two main tools for making
an information.

 Secret message – the message to be transferred.

 Carrier tool – tool that will be carrying the secret message.

 Steganographic tool – tool that will encode and decode


the message at source and destination respectively.
Steganography Carrier Files

bmp
jpeg
gif
wav
mp3
Text file
etc
Steganography Tools

Steganos
S-Tools (GIF, JPEG)
StegHide (WAV, BMP)
Invisible Secrets (JPEG)
JPHide
Camouflage
Hider man
‘You’
Many others
Basic Principle:

1. Encoding secret data with any data.


2. Sending it to destination.
3. Decoding at the destination.

Encoding Decoding
message message

secret information secret


Types of ‘steganography’:

Type of steganography is basically a permutation


of the carrier tool format and the format of secret
message.

Example:
Carrier tool type Secret message tool
type
JPEG JPEG
Txt JPEG
Txt Txt
Bmp gif
TEXT STEGANOGHRAPHY:

1. Altering text font.


2. Word shift coding.
3. Line shift coding.
4. Using codebook.

Embedding text in text


Altering Text Font
Secret message is written in different font
but in a way that is not identifiable to our
naked eyes.
Altering text font
 Secret message : “This is secret”.

MESSAGE SENT:
“I need this drink to keep me alive.
This is the secret of my life”

Steganography in text documents


“I need this drink to keep
me alive.
This is the secret of my
life”.
Word shift coding
In the message sent the secret words are
shifted on the left or right to make them
unique while decoding.
Word shift coding
Secret message : “Your first job”.
MESSAGE SENT:
“ Your site is great! this provides a wide variety of essays on almost every
topic. I really like the way you organize the information. It’s been quite easy
to find what I was looking for! When I have writers block,first site I visit is
yours. You never let me down! You do a praise worthy job.”

‘your’- shifted right two spaces after starting inverted


commas
‘first’- shifted one space left.
‘job’- shifted 2 spaces right.

Steganography in text documents


Line shift coding
In the message sent the secret lines are
shifted in the vertical direction up or down
to make them unique while decoding.
LINE shift coding
In this technique, lines are shifted

in the vertical direction, up or down.

This technique is called line shift technique.

Shifted down

Shifted up

Steganography in text documents


example: LINE shift coding

MESSAGE SENT:
“Sanjay a worker of our Industry, Often takes extended
measures to complete her work, sometimes skipping coffee
breaks. He is a dedicated individual who has absolutely no
vanity in spite of her high accomplishments and profound
knowledge in his field”.

Steganography in text documents


Secret message sent:
Sanjay a worker of our Industry, Often
takes extended breaks. He is a dedicated
individual who has absolutely no
knowledge in his field.

Steganography in text documents


Using codebook:

Codebook refers to the material providing the


key for the exact secret message received.

The Codebook is passed to the


destination with different source
and destination ID.

This is done to protect the


Codebook to be snatched
along with the information.

Steganography in text documents


Using codebook:
Memo to the Director

Subject: Letter of Recommendation

Jane is a dedicated individual who has absolutely no

vanity in spite of her high accomplishments and profound

knowledge in her field. I firmly believe that Jane can be

classed as a high-caliber employee, the type which cannot be

dispensed with. Consequently, I duly recommend that Jane be

promoted to executive management, and a proposal will be

sent away as soon as possible.


.
Project Leader

Steganography in text documents


Secret of Codebook used:

Read alternate lines(1,3,5…)

Steganography in text documents


Secret Message that was sent

Jane is a dedicated individual who has


absolutely no knowledge in her field. I
firmly believe that Jane can be dispensed
with. Consequently, I duly recommend
that Jane be sent away as soon as
possible.

Steganography in text documents


Conditions to be followed:

• Secret data integrity must remain after being embedded in


stego object.

• The stego object must remain unchanged or almost


unchanged to naked eye.

• In watermarking, changes in stego object have no effect on


watermark.

• We assume the attacker knows secret data is hidden inside


the stego object.
QUESTIONS
Ganesan : DSE/2K9/050

You might also like