Upload
prabhu-kumar
View
365
Download
0
Embed Size (px)
DESCRIPTION
A ppt about steganography which includes Introduction,History,Advantage,technique,Data embedded scheme,Application etc..it is a used for hidding the secret data by an tool and methos which could also be extracts by an extracting file using tool.
Citation preview
presentationon
Prabhu kumarBharath university
U11CS098
BY :
• INTRODUCTION
• HISTORY
•ADVANTAGE
•TECHNIQUE
•DATA EMBEDDED SCHEME
•APPLICATION
INTRODUCTION
what is steganography ?•It is the art of secret character .steganography is a art of
science of writing hidden massage in such a way that no one
apart from the sender and receiver for the information .
•It is a form of security through obscurity
•the word “steganography” is a Greek word means ”secret
writing” from the Greek word “steganos” means “covered for
protected”
•It is also called as the science of hiding information
•The main goal of cryptography is protects the contents of
massage.
•The main goal of steganography is to hide the information
also from the third party.
history
Steganography was first practiced during golden age in
Greece .it describes the melting wax tablets is used for
writing the massage and inscribing a massage in the
underlying wood.
The first recorded of steganography can be tracked by in
440 BC by Herodotus. When he mentioned two example of
steganography .
Herodotus sent a warning massage about forthcoming
attack to Greece by writing it directly
Steganography is researched both for legal and illegal
reasons.
ADVANTAGE*The advantages of steganography over cryptography
alone is that message don’t attract attention to themselves
*The steganography works the keep secret of information in
computer file .
*The steganography works to hide the massage with the help
of cryptography (cryptography is to make the data unreadable
by the third party)
*In electronic communication may include steganographic
coding inside the transparent layer. such as document file,
image file,wave file.
The advantage is secretly transmitted the massage without
the fact of transmission being discovered.
PHYSICAL:During world war III ,The French resistance sent massage written on the backs of couriers using indivisible link.
Sometimes massage is written in secret links, under the other massage and blank part of the other massage
Hidden massage in within Wax Tablets –in ancient Greece ,People wrote messages on the wood and covered it with WAX upon which an innocent covering massage was written.
Digital:keeping secret massage within lowest bits of noisy image and sound file.
sometimes pictures embedded in video materials (optionally played slow or fast)
Network:All the information hiding technique that may be used to
exchange stenograms in telecommunication networks.
Typical networks steganography methods involve
modification of the properties of a single network
protocols.
whenever digital steganography output may be in printed
document .
A massage ,the plain text may be encrypted by traditional
meaning ,producing a cipher text .
For example: The letter size
,spacing, type face of other character using by sender can be
manipulated to carry by the hidden message only the receipt
who knows the technique used in cover the message and
they decrypt it.
It means what will be scheme is used in data embedding in any file within security
steganographic robustness is a tool which is used in steganographic channel.
steganographic is a key scheme of embedding massage
Different –different steganographic has different level of protection
The embedding massage is carried out with use of a key for improving steganographic key can be used as verification .
c sc E C˄
Mc-container file
F-steganographic channel space
Sc-steganographic system
M-massage
E-embedding method
C^-modified container file
*s-tool :-increased the bandwidth
of whole embedding system is
decreased…
c sc E C˄
M
key
It modified the password in
the top or bottom of the
massage and the distribution
of password to the
steganographic.
c sc E C˄
Mkey
F(p ,L )[distributionfunction]
•Where p-maximum no of container
L-step of massage distribution
•According to performance of containerP>=L
F(p ,L )=cycle* L+ step *pIt is the no of the current L
c sc E C˄
M k
F(P,L)
G(Q,N)
Where:
G( q, n)-it is the responsible for massage selecting
F(p, l)-It is the responsible for position in the container
Steganography hide the secret massage in the
physically object which is sent.
The steganography process shows that the cover
image is passed through the embedding function.
The key is usually a password ,so this key is used to
encrypt and decrypt the massage before and after
the embedding.
The information are in covered video,image,text,
audio or more and using tools open from cover
source.
ApplicationHow terriost manually hide secret massage?
Step: Notepad-write massage-Secret.txt
Cmd-type:copy\cat.jpg+secret.txt secret cat.jpg
“If u will open the picture with the help of s-tool
we have to revealed the picture with the option
And we got the massage written by terriost
“bomb THE assembly at 5pm”
S-Tool
Step: Hide massage
Download s-toolopen
Drag any image with notepad
Where should be written msg.
Step: open the massage
Open the imageextract img-
Click okDrag imgsave in
new imgRevealed the
imgEnter the password and
user name Now u can see
the massage.
S-tool is steganography tools to set that hide file in wave file, Gif file .To
hide the file just drag them in s-tools interface .u can hide multiple files in one
sound/figure using steganographic tool i.e. “Robustness tool”1
THANK YOU !!!
WikipediaExploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodiawww.jjtc.com/stegdoc/steg1995.htmlInformation Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colasDigital Watermarking – H. Bergel , L. O’GormanWayner,peter(2002):Disappearing cryptography information hidingNetwork steganography center tutorialshttp://www.mozaiq.org/com
References