0% found this document useful (0 votes)
53 views

Steganography: Santosh Kumar 1ve03ec053

Steganography is the practice of hiding a secret message into another message in a manner such that to the casual observer it is unseen. Usage of steganography can be traced back to around 440 B.C Existed in different forms and media Tatoos on scalp Dots on top of 'i' and 'j' Modern day applications Poor cousin of cryptography till recently hiding copyright info: digital watermarks fingerprinting (growing due to web piracy)

Uploaded by

Shivani Patil
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Steganography: Santosh Kumar 1ve03ec053

Steganography is the practice of hiding a secret message into another message in a manner such that to the casual observer it is unseen. Usage of steganography can be traced back to around 440 B.C Existed in different forms and media Tatoos on scalp Dots on top of 'i' and 'j' Modern day applications Poor cousin of cryptography till recently hiding copyright info: digital watermarks fingerprinting (growing due to web piracy)

Uploaded by

Shivani Patil
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26

STEGANOGRAPHY

Presented by

SANTOSH KUMAR 1ve03ec053

Outline
What is steganography? Traces in history. Modern day applications. Basic Principle of steganography. Steganography techniques. Steganalysis & its Tools. Conclusion & References.

What is Steganography ?

Steganography is the practice of hiding a secret message into another message in a manner such that to the casual observer it is unseen. The word Steganography in Greek steganos , meaning covered or secret, and graptos , meaning writing.

HISTORY
Usage of Steganography can be traced back to around 440 B.C Existed in different forms and media Tatoos on scalp Dots on top of i and j Deliberate misspellings or Error

Throughout history there have been two major types of Steganography

Steganography

technical
Open codes

linguistic
Semagrams

An example of an open code:


Since everyone can read, encoding text in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective Secret inside

An example of an semagrams

There are more eating meals towards the 85th street.

There are more eating meals towards the 85th street.

Modern day applications

Poor cousin of cryptography till recently

Hiding copyright info: digital watermarks fingerprinting (growing due to web piracy)

BASIC PRINCIPAL OF STEGANOGRAPHY

Key

Key

Cover

Cover *

emb

Encoder (Hiding Mechanism)


Sender

Stego

Decoder (Extraction Mechanism)

emb*

Recipient

The Stegosystem

STEGANOGRAPHIC TECHNIQUES
Steganography In Images

Steganography In Documents
Steganography In Audio Steganography In Video

Steganography in images
Way images are stored:
Digital image are stored in either 24-bit or 8bit pixel files 24-bit image are large & not ideal for internet uses

8-bits are good options.


Proper selection of cover image is important

Where is the hidden message

Stored in image ?
There are 8 bits in each pixel
The four bits to the left are the most significant bits (MSB)

The four bits to the right are the least significant


bits (LSB) Changes to the MSB will result in a drastic

change in the color and image quality

Changes in the LSB will have minimal impact

Least Significant Bit method


Consider a 24 bit picture Data to be inserted: character a: (01100001 ) Host pixels: 3 pixel will be used to store one character of 8-bits
Ex:
00100111 00100111 11001000 11101001 11001000 00100111 11001000 11101001 11101001

Embedding a

00100110
00100110 11001000

11101001
11001000 00100111

11001001
11101000 11101001

Red

Green

Blue

The Stegosystem

Changes to the MSB will result in a drastic change in the color and image quality

Steganography In Documents
Adding white space and tabs to the ends of the lines of a document. Within these spaces and tabs lie the pieces that make up the secret message. This type of Steganography is extremely effective

SOFTWARE
The most popular piece of software used to perform this type of Steganography is piece called SNOW.
(Steganographic nature of Whitespace) A unique steganographic tool that it relies on whitespace and tabs.

SNOW

Example of Snow: For this example the following files will be used: insnow.txt = this is the secret file to conceal hide.txt = this is the infile (cover file) outsnow.txt = this is the outfile (cover file + secret file) Miss = this is the password used for encryption/decryption.

To hide insnow.txt within hide.txt using encryption with the output of outsnow.txt: snow p Miss f insnow.txt hide.txt outsnow.txt

MISS

To extract the hidden message: snow p Miss outsnow.txt

MISS

Steganalysis
The art of detecting Steganography
Steganalysis involves detecting the use of Steganography inside of a file & reading the embedded message The hidden message may be extracted or the image is modified in a way so that the message is destroyed but image quality is unaffected

Flaws with Steganography


Pictures

Color degradation Significant file size change


Manipulation of carrier may result in degraded or

inability to extract the message


Difficulty in hiding large message inside small

carriers

Steganalysis Tools
S-Tools
Ability to hide files within BMP, GIF files
http://members.tripod.com/steganography/stego/software.html

JPHide and JPSeek


JPHIDE and JPSEEK , which allow you to hide a file in a jpeg visual image http://www.snapfiles.com/php/download.php?id=101911

MP3Stego MP3Stego will hide information in MP3 files


http://www.petitcolas.net/fabien/software/MP3Stego_1_1_17.zip

Conclusion
Steganography detection very difficult.
Steganography has its place in the security. On its own, it wont serve much but when used as a layer of cryptography, it would lead to a greater security The question you really should be asking is, is it used by Terrorists?

References
Information Security Website http://www.infosyssec.com/infosyssec/stendig1.htm Steganography Tools http://www.infoanarchy.org/wiki/index.php/Stenogra phy Digital Steganography http://www.cc.gatech.edu/classes/AY2003/cs6262_f all/digital_steganography.pdf

You might also like