17
presentatio n on Prabhu kumar Bharath university U11CS098 BY :

Steganography

Embed Size (px)

DESCRIPTION

A ppt about steganography which includes Introduction,History,Advantage,technique,Data embedded scheme,Application etc..it is a used for hidding the secret data by an tool and methos which could also be extracts by an extracting file using tool.

Citation preview

Page 1: Steganography

presentationon

Prabhu kumarBharath university

U11CS098

BY :

Page 2: Steganography

• INTRODUCTION

• HISTORY

•ADVANTAGE

•TECHNIQUE

•DATA EMBEDDED SCHEME

•APPLICATION

Page 3: Steganography

INTRODUCTION

what is steganography ?•It is the art of secret character .steganography is a art of

science of writing hidden massage in such a way that no one

apart from the sender and receiver for the information .

•It is a form of security through obscurity

•the word “steganography” is a Greek word means ”secret

writing” from the Greek word “steganos” means “covered for

protected”

•It is also called as the science of hiding information

•The main goal of cryptography is protects the contents of

massage.

•The main goal of steganography is to hide the information

also from the third party.

Page 4: Steganography

history

Steganography was first practiced during golden age in

Greece .it describes the melting wax tablets is used for

writing the massage and inscribing a massage in the

underlying wood.

The first recorded of steganography can be tracked by in

440 BC by Herodotus. When he mentioned two example of

steganography .

Herodotus sent a warning massage about forthcoming

attack to Greece by writing it directly

Steganography is researched both for legal and illegal

reasons.

Page 5: Steganography

ADVANTAGE*The advantages of steganography over cryptography

alone is that message don’t attract attention to themselves

*The steganography works the keep secret of information in

computer file .

*The steganography works to hide the massage with the help

of cryptography (cryptography is to make the data unreadable

by the third party)

*In electronic communication may include steganographic

coding inside the transparent layer. such as document file,

image file,wave file.

The advantage is secretly transmitted the massage without

the fact of transmission being discovered.

Page 6: Steganography

PHYSICAL:During world war III ,The French resistance sent massage written on the backs of couriers using indivisible link.

Sometimes massage is written in secret links, under the other massage and blank part of the other massage

Hidden massage in within Wax Tablets –in ancient Greece ,People wrote messages on the wood and covered it with WAX upon which an innocent covering massage was written.

Digital:keeping secret massage within lowest bits of noisy image and sound file.

sometimes pictures embedded in video materials (optionally played slow or fast)

Page 7: Steganography

Network:All the information hiding technique that may be used to

exchange stenograms in telecommunication networks.

Typical networks steganography methods involve

modification of the properties of a single network

protocols.

whenever digital steganography output may be in printed

document .

A massage ,the plain text may be encrypted by traditional

meaning ,producing a cipher text .

For example: The letter size

,spacing, type face of other character using by sender can be

manipulated to carry by the hidden message only the receipt

who knows the technique used in cover the message and

they decrypt it.

Page 8: Steganography

It means what will be scheme is used in data embedding in any file within security

steganographic robustness is a tool which is used in steganographic channel.

steganographic is a key scheme of embedding massage

Different –different steganographic has different level of protection

The embedding massage is carried out with use of a key for improving steganographic key can be used as verification .

Page 9: Steganography

c sc E C˄

Mc-container file

F-steganographic channel space

Sc-steganographic system

M-massage

E-embedding method

C^-modified container file

*s-tool :-increased the bandwidth

of whole embedding system is

decreased…

Page 10: Steganography

c sc E C˄

M

key

It modified the password in

the top or bottom of the

massage and the distribution

of password to the

steganographic.

Page 11: Steganography

c sc E C˄

Mkey

F(p ,L )[distributionfunction]

•Where p-maximum no of container

L-step of massage distribution

•According to performance of containerP>=L

F(p ,L )=cycle* L+ step *pIt is the no of the current L

Page 12: Steganography

c sc E C˄

M k

F(P,L)

G(Q,N)

Where:

G( q, n)-it is the responsible for massage selecting

F(p, l)-It is the responsible for position in the container

Page 13: Steganography

Steganography hide the secret massage in the

physically object which is sent.

The steganography process shows that the cover

image is passed through the embedding function.

The key is usually a password ,so this key is used to

encrypt and decrypt the massage before and after

the embedding.

The information are in covered video,image,text,

audio or more and using tools open from cover

source.

Page 14: Steganography

ApplicationHow terriost manually hide secret massage?

Step: Notepad-write massage-Secret.txt

Cmd-type:copy\cat.jpg+secret.txt secret cat.jpg

“If u will open the picture with the help of s-tool

we have to revealed the picture with the option

And we got the massage written by terriost

“bomb THE assembly at 5pm”

Page 15: Steganography

S-Tool

Step: Hide massage

Download s-toolopen

Drag any image with notepad

Where should be written msg.

Step: open the massage

Open the imageextract img-

Click okDrag imgsave in

new imgRevealed the

imgEnter the password and

user name Now u can see

the massage.

S-tool is steganography tools to set that hide file in wave file, Gif file .To

hide the file just drag them in s-tools interface .u can hide multiple files in one

sound/figure using steganographic tool i.e. “Robustness tool”1

Page 16: Steganography

THANK YOU !!!

Page 17: Steganography

WikipediaExploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodiawww.jjtc.com/stegdoc/steg1995.htmlInformation Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colasDigital Watermarking – H. Bergel , L. O’GormanWayner,peter(2002):Disappearing cryptography information hidingNetwork steganography center tutorialshttp://www.mozaiq.org/com

References