Upload
dharadipal
View
217
Download
0
Embed Size (px)
Citation preview
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
1/21
Presented by:
Nikhil KumarReg no :0601221172
under the guidance of:
Miss Surapriya swain
MR Alok Kumar pani
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
2/21
Steganography is the art of covered or hidden writing. The purpose of
Steganography is covert communication to hide a message from athird party. This differs from cryptography, the art of secret writing,which is intended to make a message unreadable by a third party butdoes not hide the existence of the secret communication. AlthoughSteganography is separate and distinct from cryptography,
Although the term Steganography was only coined at the end of the
15th century, the use of Steganography dates back several millennia. Inancient times, messages were hidden on the back of wax writingtables, written on the stomachs of rabbits, or tattooed on the scalp ofslaves. Invisible ink has been in use for centuriesfor fun by childrenand students and for serious espionage by spies and terrorists.Microdots and microfilm, a staple of war and spy movies, came aboutafter the invention of photography
Steganography hides the covert message but not the fact that twoparties are communicating with each other. The Steganographyprocess generally involves placing a hidden message in sometransport medium, called the carrier. The secret message is embeddedin the carrier to form the Steganography medium. The use of aSteganography key may be employed for encryption of the hidden
message and/or for randomization in the Steganography scheme.
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
3/21
1
Hiding the fact that
information is beingsent.
Usually hiding thedata inside otherdata.
What is
Steganography
.
2
Converting the data
into non readable(non perceivable)data
Its a way to passdata so that itbecome safe.
Any unauthorized
person is not ableto understand it
What is
Encryption
The data is passed inan unusual
communicationmanner.
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
4/21
Fusion
Invisible
Merge
Steganography Encryption
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
5/21
Needs to send
private mesg
Sud get d mesg
without anybodysees it
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
6/21
Normal Image
Secret Key
Image
Stegano
Algorithm
Original
Image
Message
Retrieval
Ordinary
Image
Secret
Message
Encryption
Algorithm
Secret Key
Image
Secret
Message
Alice Wendy Bob
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
7/21
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
8/21
Payload: the data that is desirable fortransport
Carrier: signal, stream or data file into whichthe payload is hidden
Channel: type of input, such as JPEG image Package: the resulting signal, stream or data
file
which has the payload encoded
Encoding density: the percentage of bytes
which are modified to encode the payload,
typically as a floating-point number between 0
and 1
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
9/21
SteganographicTechniques
Genome Steganography
Hiding in Text
Hiding in the disk space Hiding data in software and
circuitry
Information Hiding in Images Hiding in network packets
Hiding in music files & video
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
10/21
p
hgl
oji
m
e
iss
un
af
yn e
i
r s
n
r
Apparently neutrals protest is
thoroughly discounted andignored. Isman hard hit.Blockade issue affects pretext
for embargo on by-products,ejecting suets and vegetableoils.
An instace from wwii
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
11/21
p
hgl
oji
m
e
iss
un
af
yn e
i
r s
n
r
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
12/21
How ItWorks in case of images
Algorithm
Key Image
Unique
Encryption
Technique
MessageEncrypte
d
Message
Original Image Clone of Originalimage
Steganographic
Algorithm
Key Image is an image which
under goes in to an Encryption
generating Algorithm which
generates a unique encryption
technique .
Message is encrypted using
unique encryption technique
Original image is the image
whose clone is created
This image is a clone of original
image which contains the
hidden encrypted message
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
13/21
28
possible values for each color perpixel
Not much difference in intensity between
11111111and 11111110
Change to least significant bit of each color yields 3 bits per pixel
One ASCII character can be represented for each 3 pixels
Given the following 8 carrier bytes
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000 Assume we want to insert some payload
the letter G, in ASCII:
01000111 The resulting bytes are
10010100 00001101 11001000 10010110
00001110 11001011 10011111 00010001 Only half of the available bytes were affected by ourinsertion
Change is relatively undetectable
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
14/21
Sample Result
Before Stganography
After Stganography
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
15/21
HidinginTCP
header
Places to hide message
- Reserved bits
- Sequence number field
- Initial Sequence
Number (ISN)
oMakes use of three-
way handshake in
buildup
of a TCP/IP connectionC
B
A
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
16/21
Unused Header BitStuffing
Padding Byte Stuffing
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
17/21
Statistical analysis
Analyze frequency of DCT coefficients
compressing
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
18/21
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
19/21
Where it can be USED Applications?
Government Agencies: --
who store documents
which are very sensitive
Private Organizations: -- who want
to safeguard their
sensitive information
Security companies: -- Can USE
And SELL IBES products as stand
alone or as a part of their bigger
package
Banks and other financialinstitutions: -- safeguardtheir databases
Business people: --
preserve legal and customer
specific financial documents
Digital Watermarking
Digital Signature Authentication
Digital Linkage and Storage
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
20/21
Steganography is a fascinating and effective method ofhiding data that has been used throughout history.Methods that can be employed to uncover suchdevious tactics, but the first step are awareness thatsuch methods even exist. There are many good
reasons as well to use this type of data hiding,including watermarking or a more secure centralstorage method for such things as passwords, or keyprocesses. Regardless, the technology is easy to useand difficult to detect. The more that you know about itsfeatures and functionality, the more ahead you will be in
the game.
7/29/2019 stegnogrphyfinal-120207103413-phpapp02
21/21
Thank you
21