STEGANOGRAPHY
A SEMINAR REPORT ON:
Presented by:Nikhil KumarReg no :0601221172
under the guidance of:Miss Surapriya swainMR Alok Kumar pani
Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography,
Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuries—for fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography
Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.
Introduction
What is …
1
Hiding the fact that information is being sent.
Usually hiding the data inside other data.
What is Steganography
.
2
Converting the data into non readable (non perceivable) data
It’s a way to pass data so that it become safe.Any unauthorized person is not able to understand it
What is Encryption
The data is passed in an unusual communication manner.
Fusion
Invisible Invisible
Merge
Steganography
Encryption
Needs to send private mesg
Sud get d mesg without
anybody sees it
HOW STEGANOGRAPHY WORKS?
Steganography Framework
Normal Image
Secret Key Image
Stegano Algorithm
Original Image
Message Retrieval
Ordinary Image
Secret Message
Encryption Algorithm
Secret Key Image
Secret Message
Alice Wendy Bob
STEGANOGRAPHIC SYSTEM
TerminologyPayload: the data that is desirable for transportCarrier: signal, stream or data file into which
the payload is hidden Channel: type of input, such as JPEG image Package: the resulting signal, stream or data
file which has the payload encoded Encoding density: the percentage of bytes
which are modified to encode the payload,typically as a floating-point number between 0and 1
Steganographic Techniques
Genome SteganographyHiding in TextHiding in the disk spaceHiding data in software
and circuitryInformation Hiding in
ImagesHiding in network packetsHiding in music files &
video
phgloji
m
ei
ss
un
afyn e
i
r sn
r
Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.
AN EXAMPLE:
An instace from wwii
phgloji
m
ei
ss
un
afyn e
i
r sn
r
How It Work’s in case of images
Algorithm
Key Image
Unique Encryption Technique
Message Encrypted Message
Original Image Clone of Original image
Steganographic Algorithm
Key Image is an image which under goes in to an Encryption generating Algorithm which generates a unique encryption technique .
Message is encrypted using unique encryption technique
Original image is the image whose clone is created
This image is a clone of original image which contains the hidden encrypted message
• 28 possible values for each color per pixel• Not much difference in intensity between 11111111 and 11111110• Change to least significant bit of each color yields 3 bits per pixel • One ASCII character can be represented for each 3 pixels• Given the following 8 carrier bytes10010101 00001101 11001001 1001011000001111 11001011 10011111 00010000• Assume we want to insert some payload – the letter ‘G’, in ASCII: 01000111• The resulting bytes are10010100 00001101 11001000 1001011000001110 11001011 10011111 00010001• Only half of the available bytes were affected by our insertion• Change is relatively undetectable
MECHANISM AT A GLANCE
Sample Result
Before Stganography
After Stganography
Hid
ing
in T
CP
header
Places to hide message- Reserved bits- Sequence number field- Initial Sequence Number (ISN)oMakes use of three-way handshake in buildupof a TCP/IP connection
C
B
Packet with manipulated
header
Acknowledgement
A
C can
communicate
with B as A
MP3 ENCODING
Unused Header Bit Stuffing
Padding Byte Stuffing
steganalysis
Statistical analysis Analyze frequency of DCT coefficients
compressing
Detecting Steganography
Where it can be USED – Applications?
Government Agencies: --who store documents which are very sensitive
Private Organizations: -- who want to safeguard their sensitive information
IT CAN BE USED WHEREVER DATA SECURITY IS REQUIRED
Security companies: -- Can USE And SELL IBES products as stand alone or as a part of their bigger package
Banks and other financial institutions: -- safeguard their databases
Business people: --preserve legal and customer specific financial documents
Digital WatermarkingDigital Signature AuthenticationDigital Linkage and Storage
steganography
conclusion
Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.
TOO MANY SECRETSIN CONCLUSION:
Thank you
21