0% found this document useful (0 votes)
78 views

Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The most popular techniques involve hiding information in digital images by modifying the least significant bits of pixels or using algorithms to mask hidden data within an image. Audio files are also commonly used by altering the binary sequence of a sound file to embed secret messages. While cryptography scrambles a message, steganography aims to conceal the very existence of the hidden message within innocent-looking cover files or objects.

Uploaded by

Aman Gujar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The most popular techniques involve hiding information in digital images by modifying the least significant bits of pixels or using algorithms to mask hidden data within an image. Audio files are also commonly used by altering the binary sequence of a sound file to embed secret messages. While cryptography scrambles a message, steganography aims to conceal the very existence of the hidden message within innocent-looking cover files or objects.

Uploaded by

Aman Gujar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

By, SHREYA KAMATH Roll no 42 WRO0464555 AISHWARYA GUJAR Roll no 43 WRO0485335

Steganography is the art and science of encoding


hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

It is a form of security through obscurity. The word steganography is of Greek origin and means
concealed writing.

Steganography takes cryptography a step farther by


hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.

This can be depicted by the following image:

The first recorded uses of steganography can be traced


back to 440 BC when Herodotus mentions two examples in his Histories.

Demaratus sent a warning about a forthcoming attack to


Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand.

During World War 2, the French resistance sent some


messages written on the backs of couriers using invisible ink.

Steganography

Text

Images

Audio/Video

Transform domain

Image domain

STEGANOGRAPHY IN TEXT:
Line-Shift coding: Here, text lines are vertically shifted to
encode the document uniquely. Word-shift coding: The code words are coded into the document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance. Feature coding: In feature coding, certain text features are altered, or not altered depending on the codeword.

Images are the most popular cover objects used for


steganography.

The most common approach to information hiding in


images: Least significant bit insertion Masking and filtering Algorithms and transformations

Replaces least significant bits with the message to be


encoded.

Most popular technique when dealing with images. Simple, but susceptible to lossy compression and image
manipulation.

Best to use a gray scale palette or one with gradual


changes in shades.

Otherwise, it is best to use images with noisy areas


areas with ample color variation and without large areas of solid color.

Grayscale palette

A painting by Renoir example of noisy areas

Storing passwords and/or other confidential information Covert communication of sensitive data Speculated uses in terrorist activities Being widely used to hide and/or transfer illegal
content.

Masks secret data over the original data by changing


the luminance of particular areas.

During masking, it embeds the message within


significant bits of the cover image.

Not susceptible to lossy techniques because image


manipulation does not affect the secret message.

Digital Watermarking provides identification pertaining to


the owner; i.e. license or copyright information - Invisible vs Visible

Fingerprinting provides identification of user; used to


identify and track illegal use of content.

Digital Watermarking -

In a computer-based audio steganography system, secret


messages are embedded in digital sound.

The secret message is embedded by slightly altering the


binary sequence of a sound file.

Existing audio steganography software can embed


messages in WAV, AU, and even MP3 sound files.

Embedding secret messages in digital sound is usually a


more difficult process than embedding messages in other media, such as digital images.

In order to conceal secret messages successfully, a variety


of methods for embedding information in digital audio have been introduced.

These methods range from rather simple algorithms


that insert information in the form of signal noise to more powerful methods that exploit sophisticated signal processing techniques to hide information.

Advantages:
Difficult to detect and Only receiver can detect. It can be done faster with large no. of softwares. Provides better security for sharing data in LAN,MAN & WAN.

Disadvantages:
The confidentiality of information is maintained by the
algorithms, and if the algorithms are known then this technique is of no use. Password leakage may occur and it leads to the unauthorized access of data. If this technique is gone in the wrong hands like hackers can be very much dangerous for all.

Cryptography is the practice of scrambling messages


so that even if detected, they are very difficult to decipher.

The purpose of Steganography is to conceal the


message such that the very existence of the hidden is camouflaged.

However, the two techniques are not mutually


exclusive.

Cryptography

Steganography

Alleged use by intelligence services:

In 2010, the Federal Bureau of Investigation revealed that the


Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with agents stationed abroad. Use by terrorists:

Lately, al-Qaeda operatives have been sending hundreds of


encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com

Moreover, an online "terrorist training manual", the


"Technical Mujahidin, a Training Manual for Jihads" contained a section entitled "Covert Communications and Hiding Secrets Inside Images.

Usage in modern Printers:

Steganography is used by some modern printers, including


HP and Xerox brand color laser printers.

Tiny yellow dots are added to each page.

The dots are barely visible and contain encoded printer serial
numbers, as well as date and time stamps. Governments, including the United States, already use the hidden markings to track counterfeiters

Steganalysis is the art and science of detecting a


secret communication.

Hiding a message will most likely leave detectable


traces in the cover medium.

The information hiding process changes the statistical


properties of the cover, which a steganalyst attempts to detect.

The process of attempting to detect statistical traces is


called statistical steganalysis.

Thank you!

You might also like