SlideShare a Scribd company logo
1 of 27
SUBMITTED BY-
MAYANK JAISWAL(0900410041)
PAWAN KR. VERMA(0900410055)
SUDHANSH GUPTA(0900410077)
Outline
ā€¢ What is Steganography ?
ā€¢ Steganography ā€“ History
ā€¢ Watermarking and Cryptography
ā€¢ Steganography vs. Cryptography
ā€¢ Steganography vs. Watermarking
ā€¢ Steganography ā€“ Carrier Files
ā€¢ Modern Steganography Techniques
ā€¢ Basics of Modern Steganography
ā€¢ Important Requirement for Steganographic System
ā€¢ Uses for Steganography
ā€¢ Steganography ā€“ Tools
ā€¢ Detection of Steganographic Content/Countermeasures
ā€¢ Existing Steganographic Techniques
ā€¢ Existing Attacks
ā€¢ Conclusion
ā€¢ Reference
What is Steganography ?
Steganography is of Greek origin and means ā€œconcealed
writingā€ -
ā€¢ from the Greek word steganos meaning ā€œcoveredā€
ā€¢ and the Greek word graphie meaning ā€œwritingā€
Steganography is the process of hiding of a secret
message within an ordinary message and extracting it
at its destination.
Steganography is a technique of hiding information in
digital media.
The art of detecting Steganography is referred to as
Steganalysis.
Figure-1
Steganography - History
ā€¢ Both Axis and Allied spies during World War II used
such measures as invisible inks using milk, fruit juice
or urine which darken when heated.
ā€¢ Itā€™s also a very good Anti-forensics mechanism to
mitigate the effectiveness of a forensics investigation
ā€¢ In ancient Greece they used to select messenger &
shave their head, they would then write a message on
their head, once the message had been return the hair
was allowed to grow back after the hair grew back the
messenger was sent to deliver the message, the
recipient would shave off the messengers hair to
seethe secret message
Watermarking and Cryptography
There are two major branches of information hiding, Cryptography and
Watermarking.
Watermarking :-
ā€¢ Communication in watermarking is the host signal, with the
embedded data providing copyright protection.
ā€¢ The existence of a watermark is often declared openly.
ā€¢ Any attempt to remove or invalidate the embedded content renders
the host useless.
Cryptography :-
ā€¢ Doesnā€™t conceal the communication.
ā€¢ Scrambles the data to prevent eavesdroppers understanding the
content.
ā€¢ Cryptography involves various methods and implementations.
ā€¢ May be considered complementary and orthogonal (unrelated).
Security level
Figure-2
Steganography vs. Cryptography
Steganography and cryptography are closely related.
Cryptography scrambles messages so it canā€™t be understood.
Steganography on the other hand, hide the message so there is
no knowledge of the existence of the message. With
cryptography, comparison is made between portions of the
plaintext and portions of the cipher text. In steganography,
comparisons may be made between the cover-media, the stego-
media, and possible portions of the message. The end result in
cryptography is the cipher text, while the end result in
steganography is the stego-media. The message in
steganography may or may not be encrypted. If it is encrypted,
then a cryptanalysis technique is applied to extract the
message.
Steganography vs. Watermarking
Digital watermarking can be a form of steganography, in which data
is hidden in the message without the end user's knowledge.It is a
technique which allows an individual to add hidden copyright notices
or other verification messages to digital audio, video, or image signals
and documents. Such a message is a group of bits describing
information pertaining to the signal or to the author of the signal
(name, place, etc.) The technique takes its name from watermarking
of paper or money as a security measure.
Figure-3
Steganography ā€“ Carrier Files
ā€¢ bmp (bit map picture)
ā€¢ jpeg (joint photographic experts group)
ā€¢ gif (graphics interchange format)
ā€¢ wav (waveform audio)
ā€¢ mpeg(moving picture experts group)
ā€¢ png(portable network graphic)
Amongst othersā€¦
Modern Steganography Techniques
1. Masking and Filtering: Is where information is hidden
inside of a image using digital watermarks that include
information such as copyright, ownership, or licenses.
2. Algorithms and Transformations: This technique hides
data in mathematical functions that are often used in
compression algorithms.
3. Least Significant Bit Insertion: The most common and
popular method of modern day steganography is to make
use of the LSB of a pictureā€™s pixel information.
Basics of Modern Steganography
fE: steganographic function "embedding"
fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
Figure-4
Important Requirement for
Steganographic System
1. Security of the hidden communication
2. Size of the payload
3. Robustness against malicious and unintentional attacks
Figure-5
Uses for Steganography
ā€¢ Covert communications
ļƒ¼ Privacy
ļƒ¼ Espionage
ļƒ¼ Terrorism
ļƒ¼Criminal activities
ā€¢ Intellectual property protection
ļƒ¼Digital watermarks
ļƒ¼Digital signatures
Steganography - Tools
ā€¢ Steganos
ā€¢ S-Tools (GIF, JPEG)
ā€¢ StegHide (WAV, BMP)
ā€¢ Invisible Secrets (JPEG)
ā€¢ JPHide
ā€¢ Camouflage
ā€¢ Hiderman
Many othersā€¦
Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded packages is
called Steganalysis.
ā€¢ Visual Analysis tries to reveal the presence of
secret communication through inspection, either
with the naked eye or with the assistance of a
computer.
ā€¢ Statistical (Algorithmic) Analysis reveals tiny
alterations in an image's statistical behavior
caused by steganographic embedding.
ā€¢ The nominally universal methods developed to
detect embedded stego-data are generally less
effective than the steganalytic methods aimed at
specific types of embedding.
DIFFERENT KINDS OF STEGANOGRAPHY
The four main categories of file formats that can be used for
steganography are:
I. Text
II. Images
III. Audio
IV. Protocol
Text steganography: Hiding information in text is the most
important method of steganography. The method was to hide a
secret message in every nth letter of every word of a text message.
After booming of Internet and different type of digital file formats
it has decreased in importance. Text stenography using digital
files is not used very often because the text files have a very small
amount of redundant data.
Text steganography can be classified in three basic Categories:-
ā€¢ Format-based
ā€¢ Random
ā€¢ Statistical generation and linguistic method.
Figure-6
Image steganography: Images are used as the popular cover
objects for steganography. A message is embedded in a digital
image through an embedding algorithm, using the secret key. The
resulting stego image is send to the receiver. On the other side, it
is processed by the extraction algorithm using the same key.
During the transmission of stego image unauthenticated persons
can only notice the transmission of an image but canā€™t guess the
existence of the hidden message.
Figure-7
Audio steganography: Audio stenography is masking,
which exploits the properties of the human ear to hide
information unnoticeably. An audible, sound can be inaudible
in the presene of another louder audible sound .This property
allows to select the channel in which to hide information.
Figure-8
Protocol steganography: The term protocol
steganography is to embedding information
within network protocols such as TCP/IP. We
hide information in the header of a TCP/IP
packet in some fields that can be either
optional or are never used.
Existing Steganographic
Techniques
The steganographic algorithms can broadly be
classified into two categories :-
1. Spatial Domain Techniques
2. Transform Domain Techniques
Spatial Domain:- These techniques use the pixel gray
levels and their color values directly for encoding the
message bits.
Transform Domain:- These techniques try to encode
message bits in the transform domain coefficients of the
image.
Existing Attacks
The steganalytic attacks developed till date can be
classified into visual and statistical attacks.
The statistical attacks can further be classified as :-
ā€¢ Targeted Attacks: These attacks are designed keeping a
particular steganographic algorithm in mind.
ļƒ¼ Histogram Analysis
ļƒ¼ Sample Pair Analysis
ļƒ¼ HCF-COM based Attack
ā€¢ Blind Attacks: The blind approach to steganalysis is
similar to the pattern classification problem.
ļƒ¼ Wavelet Moment Analysis
ļƒ¼ Calibration Based Attacks
ļƒ¼ Faridā€™s Wavelet Based Attack
Conclusion
1. The approach proposed in this work aims at hampering the
steganalysis ability to effectively estimating the statistics for
classification.
2. It was found that the calibration step is indeed able to estimate
image model. To counter this a generalized framework has been
proposed which disturbs this model estimation of the attack.
3. It is based on embedding data such that stego population remains
statistically closer to the cover population and the difference between
these two cannot be observed in the statistics drawn from the two
populations and if any how attacker may be able to know the
embedding algorithm but in that case he will not be able to know the
right pattern of the message because we will embed the message in
the form of cipher text.
4. Like this our security will remain consistent. Like this proposed
algo will be successful in breaking calibration based blind attacks.
Reference
ļ¶ Park,S.K, and Miller, K.W. (1988). "Random Number Generators:
Good Ones Are Hard To Find". Communications of the ACM 31
(10): 1192ā€“1201.
ļ¶ C. Kurak and J. McHugh, ā€œA Cautionary Note On Image
Downgrading,ā€ Proc. IEEE Eighth Ann. Computer Security
Applications Conf., IEEE Press, Piscataway, N.J., 1992
Websites:-
ļƒ¼ http://www.jjtc.com/Steganography/
ļƒ¼ http://azhar-
paperpresentation.blogspot.in/2010/04/steganography-and-
digital-watermarking.html
About Steganography

More Related Content

What's hot

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
Ā 
Steganography
SteganographySteganography
SteganographySonam M
Ā 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
Ā 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
Ā 
PPT steganography
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
Ā 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
Ā 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
Ā 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
Ā 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
Ā 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in imagesAishwarya Korde
Ā 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
Ā 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsiskartikeya upadhyay
Ā 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
Ā 
Steganography
Steganography Steganography
Steganography Uttam Jain
Ā 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
Ā 
Steganography
SteganographySteganography
Steganographysandeipz
Ā 

What's hot (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Ā 
Steganography
SteganographySteganography
Steganography
Ā 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
Ā 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
Ā 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Ā 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Ā 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
Ā 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Ā 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Ā 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Ā 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
Ā 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
Ā 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ā 
Steganography
SteganographySteganography
Steganography
Ā 

Viewers also liked

Steganography.
Steganography.Steganography.
Steganography.yprajapati
Ā 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
Ā 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguissamis
Ā 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
Ā 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsSri Madhur
Ā 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
Ā 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
Ā 
E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"MD SALEEM QAISAR
Ā 
eCall 2018 vision IMA
eCall 2018 vision IMAeCall 2018 vision IMA
eCall 2018 vision IMAAntoine Trarieux
Ā 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
Ā 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Alberto Villegas
Ā 
Final2
Final2Final2
Final2pooja pal
Ā 
E ball technology..ppt
E ball technology..pptE ball technology..ppt
E ball technology..pptManilaBhardwaj
Ā 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyHushen Savani
Ā 
E ball technology ppt b
E ball technology ppt bE ball technology ppt b
E ball technology ppt bVikas Reddy
Ā 
E ball seminar
E ball seminarE ball seminar
E ball seminarjomin mathew
Ā 

Viewers also liked (20)

Steganography.
Steganography.Steganography.
Steganography.
Ā 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Ā 
528 439-449
528 439-449528 439-449
528 439-449
Ā 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
Ā 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
Ā 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
Ā 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Ā 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
Ā 
E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"E-ball " Upcomming Compact PC"
E-ball " Upcomming Compact PC"
Ā 
E ball
E ballE ball
E ball
Ā 
eCall 2018 vision IMA
eCall 2018 vision IMAeCall 2018 vision IMA
eCall 2018 vision IMA
Ā 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ā 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
Ā 
Final2
Final2Final2
Final2
Ā 
Eball presentation 2
Eball presentation 2Eball presentation 2
Eball presentation 2
Ā 
E ball technology..ppt
E ball technology..pptE ball technology..ppt
E ball technology..ppt
Ā 
E ball ppt
E ball pptE ball ppt
E ball ppt
Ā 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ā 
E ball technology ppt b
E ball technology ppt bE ball technology ppt b
E ball technology ppt b
Ā 
E ball seminar
E ball seminarE ball seminar
E ball seminar
Ā 

Similar to About Steganography

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
Ā 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
Ā 
Stegnography
StegnographyStegnography
StegnographyMayank Garg
Ā 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Ā 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Ā 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
Ā 
Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.CSCJournals
Ā 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Ā 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
Ā 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Ā 
Steganography
Steganography Steganography
Steganography Sagar Kumar
Ā 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
Ā 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
Ā 
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...IOSR Journals
Ā 

Similar to About Steganography (20)

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
Ā 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
Ā 
C01111519
C01111519C01111519
C01111519
Ā 
Stegnography
StegnographyStegnography
Stegnography
Ā 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Ā 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Ā 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
Ā 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
Ā 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
Ā 
Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.
Ā 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
Ā 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
Ā 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
Ā 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
Ā 
Steganography
Steganography Steganography
Steganography
Ā 
K0815660
K0815660K0815660
K0815660
Ā 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
Ā 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
Ā 
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiverā€™s Mobile (A N...
Ā 

Recently uploaded

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
Ā 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
Ā 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
Ā 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
Ā 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
Ā 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
Ā 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
Ā 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
Ā 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
Ā 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
Ā 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
Ā 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
Ā 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
Ā 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
Ā 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
Ā 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
Ā 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
Ā 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
Ā 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Ā 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Ā 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
Ā 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Ā 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
Ā 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
Ā 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Ā 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
Ā 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
Ā 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Ā 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
Ā 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
Ā 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
Ā 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Ā 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
Ā 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
Ā 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
Ā 

About Steganography

  • 1. SUBMITTED BY- MAYANK JAISWAL(0900410041) PAWAN KR. VERMA(0900410055) SUDHANSH GUPTA(0900410077)
  • 2. Outline ā€¢ What is Steganography ? ā€¢ Steganography ā€“ History ā€¢ Watermarking and Cryptography ā€¢ Steganography vs. Cryptography ā€¢ Steganography vs. Watermarking ā€¢ Steganography ā€“ Carrier Files ā€¢ Modern Steganography Techniques ā€¢ Basics of Modern Steganography ā€¢ Important Requirement for Steganographic System ā€¢ Uses for Steganography ā€¢ Steganography ā€“ Tools ā€¢ Detection of Steganographic Content/Countermeasures ā€¢ Existing Steganographic Techniques ā€¢ Existing Attacks ā€¢ Conclusion ā€¢ Reference
  • 3. What is Steganography ? Steganography is of Greek origin and means ā€œconcealed writingā€ - ā€¢ from the Greek word steganos meaning ā€œcoveredā€ ā€¢ and the Greek word graphie meaning ā€œwritingā€ Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination. Steganography is a technique of hiding information in digital media. The art of detecting Steganography is referred to as Steganalysis.
  • 5. Steganography - History ā€¢ Both Axis and Allied spies during World War II used such measures as invisible inks using milk, fruit juice or urine which darken when heated. ā€¢ Itā€™s also a very good Anti-forensics mechanism to mitigate the effectiveness of a forensics investigation ā€¢ In ancient Greece they used to select messenger & shave their head, they would then write a message on their head, once the message had been return the hair was allowed to grow back after the hair grew back the messenger was sent to deliver the message, the recipient would shave off the messengers hair to seethe secret message
  • 6. Watermarking and Cryptography There are two major branches of information hiding, Cryptography and Watermarking. Watermarking :- ā€¢ Communication in watermarking is the host signal, with the embedded data providing copyright protection. ā€¢ The existence of a watermark is often declared openly. ā€¢ Any attempt to remove or invalidate the embedded content renders the host useless. Cryptography :- ā€¢ Doesnā€™t conceal the communication. ā€¢ Scrambles the data to prevent eavesdroppers understanding the content. ā€¢ Cryptography involves various methods and implementations. ā€¢ May be considered complementary and orthogonal (unrelated).
  • 8. Steganography vs. Cryptography Steganography and cryptography are closely related. Cryptography scrambles messages so it canā€™t be understood. Steganography on the other hand, hide the message so there is no knowledge of the existence of the message. With cryptography, comparison is made between portions of the plaintext and portions of the cipher text. In steganography, comparisons may be made between the cover-media, the stego- media, and possible portions of the message. The end result in cryptography is the cipher text, while the end result in steganography is the stego-media. The message in steganography may or may not be encrypted. If it is encrypted, then a cryptanalysis technique is applied to extract the message.
  • 9. Steganography vs. Watermarking Digital watermarking can be a form of steganography, in which data is hidden in the message without the end user's knowledge.It is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Such a message is a group of bits describing information pertaining to the signal or to the author of the signal (name, place, etc.) The technique takes its name from watermarking of paper or money as a security measure. Figure-3
  • 10. Steganography ā€“ Carrier Files ā€¢ bmp (bit map picture) ā€¢ jpeg (joint photographic experts group) ā€¢ gif (graphics interchange format) ā€¢ wav (waveform audio) ā€¢ mpeg(moving picture experts group) ā€¢ png(portable network graphic) Amongst othersā€¦
  • 11. Modern Steganography Techniques 1. Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. 2. Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms. 3. Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a pictureā€™s pixel information.
  • 12. Basics of Modern Steganography fE: steganographic function "embedding" fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message Figure-4
  • 13. Important Requirement for Steganographic System 1. Security of the hidden communication 2. Size of the payload 3. Robustness against malicious and unintentional attacks Figure-5
  • 14. Uses for Steganography ā€¢ Covert communications ļƒ¼ Privacy ļƒ¼ Espionage ļƒ¼ Terrorism ļƒ¼Criminal activities ā€¢ Intellectual property protection ļƒ¼Digital watermarks ļƒ¼Digital signatures
  • 15. Steganography - Tools ā€¢ Steganos ā€¢ S-Tools (GIF, JPEG) ā€¢ StegHide (WAV, BMP) ā€¢ Invisible Secrets (JPEG) ā€¢ JPHide ā€¢ Camouflage ā€¢ Hiderman Many othersā€¦
  • 16. Detection of Steganographic Content/Countermeasures The detection of steganographically encoded packages is called Steganalysis. ā€¢ Visual Analysis tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer. ā€¢ Statistical (Algorithmic) Analysis reveals tiny alterations in an image's statistical behavior caused by steganographic embedding. ā€¢ The nominally universal methods developed to detect embedded stego-data are generally less effective than the steganalytic methods aimed at specific types of embedding.
  • 17. DIFFERENT KINDS OF STEGANOGRAPHY The four main categories of file formats that can be used for steganography are: I. Text II. Images III. Audio IV. Protocol
  • 18. Text steganography: Hiding information in text is the most important method of steganography. The method was to hide a secret message in every nth letter of every word of a text message. After booming of Internet and different type of digital file formats it has decreased in importance. Text stenography using digital files is not used very often because the text files have a very small amount of redundant data. Text steganography can be classified in three basic Categories:- ā€¢ Format-based ā€¢ Random ā€¢ Statistical generation and linguistic method.
  • 20. Image steganography: Images are used as the popular cover objects for steganography. A message is embedded in a digital image through an embedding algorithm, using the secret key. The resulting stego image is send to the receiver. On the other side, it is processed by the extraction algorithm using the same key. During the transmission of stego image unauthenticated persons can only notice the transmission of an image but canā€™t guess the existence of the hidden message. Figure-7
  • 21. Audio steganography: Audio stenography is masking, which exploits the properties of the human ear to hide information unnoticeably. An audible, sound can be inaudible in the presene of another louder audible sound .This property allows to select the channel in which to hide information. Figure-8
  • 22. Protocol steganography: The term protocol steganography is to embedding information within network protocols such as TCP/IP. We hide information in the header of a TCP/IP packet in some fields that can be either optional or are never used.
  • 23. Existing Steganographic Techniques The steganographic algorithms can broadly be classified into two categories :- 1. Spatial Domain Techniques 2. Transform Domain Techniques Spatial Domain:- These techniques use the pixel gray levels and their color values directly for encoding the message bits. Transform Domain:- These techniques try to encode message bits in the transform domain coefficients of the image.
  • 24. Existing Attacks The steganalytic attacks developed till date can be classified into visual and statistical attacks. The statistical attacks can further be classified as :- ā€¢ Targeted Attacks: These attacks are designed keeping a particular steganographic algorithm in mind. ļƒ¼ Histogram Analysis ļƒ¼ Sample Pair Analysis ļƒ¼ HCF-COM based Attack ā€¢ Blind Attacks: The blind approach to steganalysis is similar to the pattern classification problem. ļƒ¼ Wavelet Moment Analysis ļƒ¼ Calibration Based Attacks ļƒ¼ Faridā€™s Wavelet Based Attack
  • 25. Conclusion 1. The approach proposed in this work aims at hampering the steganalysis ability to effectively estimating the statistics for classification. 2. It was found that the calibration step is indeed able to estimate image model. To counter this a generalized framework has been proposed which disturbs this model estimation of the attack. 3. It is based on embedding data such that stego population remains statistically closer to the cover population and the difference between these two cannot be observed in the statistics drawn from the two populations and if any how attacker may be able to know the embedding algorithm but in that case he will not be able to know the right pattern of the message because we will embed the message in the form of cipher text. 4. Like this our security will remain consistent. Like this proposed algo will be successful in breaking calibration based blind attacks.
  • 26. Reference ļ¶ Park,S.K, and Miller, K.W. (1988). "Random Number Generators: Good Ones Are Hard To Find". Communications of the ACM 31 (10): 1192ā€“1201. ļ¶ C. Kurak and J. McHugh, ā€œA Cautionary Note On Image Downgrading,ā€ Proc. IEEE Eighth Ann. Computer Security Applications Conf., IEEE Press, Piscataway, N.J., 1992 Websites:- ļƒ¼ http://www.jjtc.com/Steganography/ ļƒ¼ http://azhar- paperpresentation.blogspot.in/2010/04/steganography-and- digital-watermarking.html