stegnogrphyfinal-120207103413-phpapp02

Embed Size (px)

Citation preview

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    1/21

    Presented by:

    Nikhil KumarReg no :0601221172

    under the guidance of:

    Miss Surapriya swain

    MR Alok Kumar pani

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    2/21

    Steganography is the art of covered or hidden writing. The purpose of

    Steganography is covert communication to hide a message from athird party. This differs from cryptography, the art of secret writing,which is intended to make a message unreadable by a third party butdoes not hide the existence of the secret communication. AlthoughSteganography is separate and distinct from cryptography,

    Although the term Steganography was only coined at the end of the

    15th century, the use of Steganography dates back several millennia. Inancient times, messages were hidden on the back of wax writingtables, written on the stomachs of rabbits, or tattooed on the scalp ofslaves. Invisible ink has been in use for centuriesfor fun by childrenand students and for serious espionage by spies and terrorists.Microdots and microfilm, a staple of war and spy movies, came aboutafter the invention of photography

    Steganography hides the covert message but not the fact that twoparties are communicating with each other. The Steganographyprocess generally involves placing a hidden message in sometransport medium, called the carrier. The secret message is embeddedin the carrier to form the Steganography medium. The use of aSteganography key may be employed for encryption of the hidden

    message and/or for randomization in the Steganography scheme.

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    3/21

    1

    Hiding the fact that

    information is beingsent.

    Usually hiding thedata inside otherdata.

    What is

    Steganography

    .

    2

    Converting the data

    into non readable(non perceivable)data

    Its a way to passdata so that itbecome safe.

    Any unauthorized

    person is not ableto understand it

    What is

    Encryption

    The data is passed inan unusual

    communicationmanner.

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    4/21

    Fusion

    Invisible

    Merge

    Steganography Encryption

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    5/21

    Needs to send

    private mesg

    Sud get d mesg

    without anybodysees it

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    6/21

    Normal Image

    Secret Key

    Image

    Stegano

    Algorithm

    Original

    Image

    Message

    Retrieval

    Ordinary

    Image

    Secret

    Message

    Encryption

    Algorithm

    Secret Key

    Image

    Secret

    Message

    Alice Wendy Bob

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    7/21

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    8/21

    Payload: the data that is desirable fortransport

    Carrier: signal, stream or data file into whichthe payload is hidden

    Channel: type of input, such as JPEG image Package: the resulting signal, stream or data

    file

    which has the payload encoded

    Encoding density: the percentage of bytes

    which are modified to encode the payload,

    typically as a floating-point number between 0

    and 1

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    9/21

    SteganographicTechniques

    Genome Steganography

    Hiding in Text

    Hiding in the disk space Hiding data in software and

    circuitry

    Information Hiding in Images Hiding in network packets

    Hiding in music files & video

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    10/21

    p

    hgl

    oji

    m

    e

    iss

    un

    af

    yn e

    i

    r s

    n

    r

    Apparently neutrals protest is

    thoroughly discounted andignored. Isman hard hit.Blockade issue affects pretext

    for embargo on by-products,ejecting suets and vegetableoils.

    An instace from wwii

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    11/21

    p

    hgl

    oji

    m

    e

    iss

    un

    af

    yn e

    i

    r s

    n

    r

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    12/21

    How ItWorks in case of images

    Algorithm

    Key Image

    Unique

    Encryption

    Technique

    MessageEncrypte

    d

    Message

    Original Image Clone of Originalimage

    Steganographic

    Algorithm

    Key Image is an image which

    under goes in to an Encryption

    generating Algorithm which

    generates a unique encryption

    technique .

    Message is encrypted using

    unique encryption technique

    Original image is the image

    whose clone is created

    This image is a clone of original

    image which contains the

    hidden encrypted message

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    13/21

    28

    possible values for each color perpixel

    Not much difference in intensity between

    11111111and 11111110

    Change to least significant bit of each color yields 3 bits per pixel

    One ASCII character can be represented for each 3 pixels

    Given the following 8 carrier bytes

    10010101 00001101 11001001 10010110

    00001111 11001011 10011111 00010000 Assume we want to insert some payload

    the letter G, in ASCII:

    01000111 The resulting bytes are

    10010100 00001101 11001000 10010110

    00001110 11001011 10011111 00010001 Only half of the available bytes were affected by ourinsertion

    Change is relatively undetectable

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    14/21

    Sample Result

    Before Stganography

    After Stganography

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    15/21

    HidinginTCP

    header

    Places to hide message

    - Reserved bits

    - Sequence number field

    - Initial Sequence

    Number (ISN)

    oMakes use of three-

    way handshake in

    buildup

    of a TCP/IP connectionC

    B

    A

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    16/21

    Unused Header BitStuffing

    Padding Byte Stuffing

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    17/21

    Statistical analysis

    Analyze frequency of DCT coefficients

    compressing

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    18/21

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    19/21

    Where it can be USED Applications?

    Government Agencies: --

    who store documents

    which are very sensitive

    Private Organizations: -- who want

    to safeguard their

    sensitive information

    Security companies: -- Can USE

    And SELL IBES products as stand

    alone or as a part of their bigger

    package

    Banks and other financialinstitutions: -- safeguardtheir databases

    Business people: --

    preserve legal and customer

    specific financial documents

    Digital Watermarking

    Digital Signature Authentication

    Digital Linkage and Storage

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    20/21

    Steganography is a fascinating and effective method ofhiding data that has been used throughout history.Methods that can be employed to uncover suchdevious tactics, but the first step are awareness thatsuch methods even exist. There are many good

    reasons as well to use this type of data hiding,including watermarking or a more secure centralstorage method for such things as passwords, or keyprocesses. Regardless, the technology is easy to useand difficult to detect. The more that you know about itsfeatures and functionality, the more ahead you will be in

    the game.

  • 7/29/2019 stegnogrphyfinal-120207103413-phpapp02

    21/21

    Thank you

    21