SlideShare a Scribd company logo
1 of 21
By:
PAVNINDERPAL KAUR
Uni. RN: 1269169

M.Tech (C.S.E.)
L.L.R.I.E.T. , Moga


Introduction



History



Basic Model Of Steganography



Steganography Technique

 Why


steganography works

Requirements that must be satisfied

Applications of
 Attacks


Steganography

to Steganography

References


Steganography is of Greek origin where Greek words

steganos meaning "covered or protected"
graphei meaning "writing "
Hence steganography means concealed writing [3].


Steganography is the art and science of embedding secret messages in cover
message in such a way that no one, apart from the sender and intended
recipient, suspects the existence of the message.
Tattooing message on
slaves head

Writing messages on wood underlying
wax tablets

PERSHING SAILS FROM NY JUNE 1

Use of invisible inks

Use of null ciphers
Secret Message

Secret Message
Cover
Message

EMBEDDING
PROCESS

Stego
Object

EXTRACTION
PROCESS

Cover
Message

SECRET MESSAGE is the information to be hidden in suitable media.
COVER MESSAGE is the carrier of secret information such as image, audio,
video etc.

EMBEDDING ALGORITHM is the way or the idea that usually used to embed
the secret information in the cover message.
STEGO OBJECT is the cover message with secret message hidden in it [5].
APPROACH
TO
STEGANOGRAPHY
Inputs of Embedding Algorithm
Secret
Message

Cover Image
1

Cover Image
2

Secret Key

Steganographic Algorithm
Data
Hiding
Stego Object

Data Extraction
Secret Key

Inputs of Extraction Algorithm

Secret
Message
In this method instead of hiding data in LSB of RGB components, data is hidden
as shown in following example:
Let the data to be hidden is word 'ABC'.
Find the ASCII code of every character to be hidden.
ASCII code of A is 65 and its corresponding binary is 01000001
ASCII code of B is 66 and its corresponding binary is 01000010
ASCII code of C is 67 and its corresponding binary is 01000011
EMBEDDING METHOD
Let the RGB component of first pixel:
RED
1

0

1

1

0

GREEN
0

0

1

0

1

0

0

1

BLUE
1

0

1

0

1

0

0

1

1

0

1

1

0

1

Red component is replaced by ASCII code of A in binary i.e. 01000001 :
RED
0

1

0

0

0

GREEN
0

0

1

0

1

0

0

1

BLUE
1

0

1

0

1

0

Similarly,
Green component of second pixel is replaced by ASCII code of B
and
Blue Component of third pixel is replaced by ASCII code of C

1

1
Inputs: - Text file, cover image 1, cover image 2 and secret key.
Output: - Stego image.
Begin
1. Select text file,
convert into binary and calculate number of bits
2. Select cover image 1 for hiding purpose
find the number of pixels,

split it into RGB components
3. If bits are compatible with the image resolution, then
start sub iteration 1, else
start sub iteration 2
4. Provide security key
5. Select cover image 2 to hide distorted stego image
END
SUB ITERATION 1
Replace red component of the first pixel with first character
Replace green component of the second pixel with second character.
Replace blue component of the third pixel with third character
And repeat iterations until pixels get exhaust
Stop sub iteration 1
SUB ITERATION 2
Replace necessary bits as in immediate component of each pixel
Store the information about bits embedded in a binary address file
And repeat iterations until pixels get exhaust
Stop sub iteration2
Text File

Convert into
binary & cal.
no. of bits

If no. of bits=Resolution

Find number
of pixels in
image

If no. of bits ≠ Resolution

Replace red comp.
of 1st pixel with 1st
character
Repeat until
pixels exhaust

Replace
necessary bits in
pixels

Replace green
comp. of 2nd pixel
with 2nd character

Store info. about
bits embedded in
binary address
file

Replace blue
comp. of 3rd pixel
with 3rd character

Secret Key

Provide
secret key

Cover Image 1

Cover
Image 2

Hide
distorted
image

Repeat until
pixels exhaust

Stego
Object
Input: - Stego image and secret key.
Output: - Secret text file.
Begin
1. Browse the stego image.
2. Choose the folder in which you want to extract the hidden text file.
3. Provide necessary security key.

4. Convert the binary file into human readable form.
End
 Human Visual System (HVS) –
Insensitivity to gradual changes in shade
Insensitive to high frequencies and blue region of visible spectrum


Human Audio System (HAS) –
Sensitive to additive random noise
Inability to perceive absolute phase
The following is a list of main requirements that steganography techniques

must satisfy [4]:
a)

The integrity of the hidden information after it has been embedded inside
the stego object must be correct.

b)

The stego object must remain unchanged or almost unchanged to the
naked eye.

c)

In watermarking, changes in the stego object must have no effect on the
watermark.

d)

Finally, we always assume that the attacker knows that there is hidden
information inside the stego object.


Used by intelligence agencies.



Used by military forces to send secret messages.



Used in modern printers.



Used in digital watermarking.



Used by terrorists.



Used for corporate espionage to send out trade secrets.
 Additive Noise,

 Filtering
 Cropping
 Compression
 Rotation and Scaling
 Statistical Averaging
 Multiple Watermarking

Depending on these types of attacks steganography may
be classified as robust or fragile [2][4].
[1] Vipul Sharma, Sunny Kumar, “ A New Approach to Hide Text in Images
Using Steganography”, IJARCSSE, Volume 3, Issue 4, ISSN: 2277
128X, April 2013.
[2] James C. Judge, “Steganography: Past, Present, Future”, SANS Institute
2001.
[3] Ross J. Anderson, Fabien A.P. Petitcolas, “On The Limits of
Steganography”,
IEEE
Journal
of
Selected
Areas
in
Communications, 16(4):474-481, ISSN 0733-8716, May 1998.

[4] Ananthi S, Anjanadevi A “Reversible Image Data Hiding Using Predictive
Coding Technique Based on Steganograpic Scheme”, IOSR Journal of
Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012).
[5] Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding
Data”, International Journal on Computer Science and Engineering Vol.1(3),
2009.
[6] Emad T. Khalaf, Norrozila Sulaiman,"A Robust Data Hiding Technique
based on LSB Matching", World Academy of Science, Engineering and
Technology 58, 2011.
[7] Atallah M. Al-Shatnawi, "A New Method in Image Steganography with
Improved Image Quality",Applied Mathematical Sciences, Vol. 6, 2012.
Steganography

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
Tejas_srinivas
 

What's hot (20)

Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Steganography
Steganography Steganography
Steganography
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
Steganography Steganography
Steganography
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

Viewers also liked (11)

Steganography
SteganographySteganography
Steganography
 
Psychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio SteganographyPsychoacoustic Approaches to Audio Steganography
Psychoacoustic Approaches to Audio Steganography
 
Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report Psychoacoustic Approaches to Audio Steganography Report
Psychoacoustic Approaches to Audio Steganography Report
 
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
 
PDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documents
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similar to Steganography

B03208016
B03208016B03208016
B03208016
inventy
 

Similar to Steganography (20)

B03208016
B03208016B03208016
B03208016
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
Bi34381384
Bi34381384Bi34381384
Bi34381384
 
Securing Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image ShieldingSecuring Web Communication Using Three Layer Image Shielding
Securing Web Communication Using Three Layer Image Shielding
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Steganography

  • 1. By: PAVNINDERPAL KAUR Uni. RN: 1269169 M.Tech (C.S.E.) L.L.R.I.E.T. , Moga
  • 2.  Introduction  History  Basic Model Of Steganography  Steganography Technique  Why  steganography works Requirements that must be satisfied Applications of  Attacks  Steganography to Steganography References
  • 3.  Steganography is of Greek origin where Greek words steganos meaning "covered or protected" graphei meaning "writing " Hence steganography means concealed writing [3].  Steganography is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 4.
  • 5. Tattooing message on slaves head Writing messages on wood underlying wax tablets PERSHING SAILS FROM NY JUNE 1 Use of invisible inks Use of null ciphers
  • 6. Secret Message Secret Message Cover Message EMBEDDING PROCESS Stego Object EXTRACTION PROCESS Cover Message SECRET MESSAGE is the information to be hidden in suitable media. COVER MESSAGE is the carrier of secret information such as image, audio, video etc. EMBEDDING ALGORITHM is the way or the idea that usually used to embed the secret information in the cover message. STEGO OBJECT is the cover message with secret message hidden in it [5].
  • 8. Inputs of Embedding Algorithm Secret Message Cover Image 1 Cover Image 2 Secret Key Steganographic Algorithm Data Hiding Stego Object Data Extraction Secret Key Inputs of Extraction Algorithm Secret Message
  • 9. In this method instead of hiding data in LSB of RGB components, data is hidden as shown in following example: Let the data to be hidden is word 'ABC'. Find the ASCII code of every character to be hidden. ASCII code of A is 65 and its corresponding binary is 01000001 ASCII code of B is 66 and its corresponding binary is 01000010 ASCII code of C is 67 and its corresponding binary is 01000011
  • 10. EMBEDDING METHOD Let the RGB component of first pixel: RED 1 0 1 1 0 GREEN 0 0 1 0 1 0 0 1 BLUE 1 0 1 0 1 0 0 1 1 0 1 1 0 1 Red component is replaced by ASCII code of A in binary i.e. 01000001 : RED 0 1 0 0 0 GREEN 0 0 1 0 1 0 0 1 BLUE 1 0 1 0 1 0 Similarly, Green component of second pixel is replaced by ASCII code of B and Blue Component of third pixel is replaced by ASCII code of C 1 1
  • 11. Inputs: - Text file, cover image 1, cover image 2 and secret key. Output: - Stego image. Begin 1. Select text file, convert into binary and calculate number of bits 2. Select cover image 1 for hiding purpose find the number of pixels, split it into RGB components 3. If bits are compatible with the image resolution, then start sub iteration 1, else start sub iteration 2 4. Provide security key 5. Select cover image 2 to hide distorted stego image END
  • 12. SUB ITERATION 1 Replace red component of the first pixel with first character Replace green component of the second pixel with second character. Replace blue component of the third pixel with third character And repeat iterations until pixels get exhaust Stop sub iteration 1 SUB ITERATION 2 Replace necessary bits as in immediate component of each pixel Store the information about bits embedded in a binary address file And repeat iterations until pixels get exhaust Stop sub iteration2
  • 13. Text File Convert into binary & cal. no. of bits If no. of bits=Resolution Find number of pixels in image If no. of bits ≠ Resolution Replace red comp. of 1st pixel with 1st character Repeat until pixels exhaust Replace necessary bits in pixels Replace green comp. of 2nd pixel with 2nd character Store info. about bits embedded in binary address file Replace blue comp. of 3rd pixel with 3rd character Secret Key Provide secret key Cover Image 1 Cover Image 2 Hide distorted image Repeat until pixels exhaust Stego Object
  • 14. Input: - Stego image and secret key. Output: - Secret text file. Begin 1. Browse the stego image. 2. Choose the folder in which you want to extract the hidden text file. 3. Provide necessary security key. 4. Convert the binary file into human readable form. End
  • 15.  Human Visual System (HVS) – Insensitivity to gradual changes in shade Insensitive to high frequencies and blue region of visible spectrum  Human Audio System (HAS) – Sensitive to additive random noise Inability to perceive absolute phase
  • 16. The following is a list of main requirements that steganography techniques must satisfy [4]: a) The integrity of the hidden information after it has been embedded inside the stego object must be correct. b) The stego object must remain unchanged or almost unchanged to the naked eye. c) In watermarking, changes in the stego object must have no effect on the watermark. d) Finally, we always assume that the attacker knows that there is hidden information inside the stego object.
  • 17.  Used by intelligence agencies.  Used by military forces to send secret messages.  Used in modern printers.  Used in digital watermarking.  Used by terrorists.  Used for corporate espionage to send out trade secrets.
  • 18.  Additive Noise,  Filtering  Cropping  Compression  Rotation and Scaling  Statistical Averaging  Multiple Watermarking Depending on these types of attacks steganography may be classified as robust or fragile [2][4].
  • 19. [1] Vipul Sharma, Sunny Kumar, “ A New Approach to Hide Text in Images Using Steganography”, IJARCSSE, Volume 3, Issue 4, ISSN: 2277 128X, April 2013. [2] James C. Judge, “Steganography: Past, Present, Future”, SANS Institute 2001. [3] Ross J. Anderson, Fabien A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Areas in Communications, 16(4):474-481, ISSN 0733-8716, May 1998. [4] Ananthi S, Anjanadevi A “Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme”, IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012).
  • 20. [5] Shashikala Channalli, Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering Vol.1(3), 2009. [6] Emad T. Khalaf, Norrozila Sulaiman,"A Robust Data Hiding Technique based on LSB Matching", World Academy of Science, Engineering and Technology 58, 2011. [7] Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality",Applied Mathematical Sciences, Vol. 6, 2012.