SlideShare ist ein Scribd-Unternehmen logo
1 von 24
STEGANOGRAPHY IN
IMAGES
NIKHIL TRIPATHI
12MCMB10
M.Tech (IT)
OVERVIEW
oSteganography Defined
oExamples in History
oDigital Approaches
oReasons For Using Digital Images
oImage Attributes
oPopular Techniques That Use Images
oSteganalysis
oAdvancements in image steganography
oTechnical limitations
STEGANOGRAPHY
DEFINED
oGreek for “covered writing”.
o“The art and science of writing hidden messages
in such a way that no one apart from the intended
recipient even knows that a message has been
sent.”
EXAMPLES IN
HISTORY
oTattoos on shaved heads
oWax-covered tablets
oInvisible Inks - milk, fruit juice
STEGANOGRAPHY V/S
CRYPTOGRAPHY
oSteganography involves the hiding of the data while
Cryptography involves the encryption and decryption
of data.
oSteganalysis involves finding out whether there is
really a hidden message or not while Cryptanalysis
involves breaking of the encrypted into decrypted
message.
STEGANOGRAPHY with
CRYPTOGRAPHY
oVery very strong when combined.
oA message sent in secret (steganography) in an
encrypted form (cryptography) is much more secure
than a "plain text" message sent by secret means or a
clearly sent encrypted message.
DIGITAL APPROACHES
oToday, it often exists within digital formats.
oIt makes use of seemingly innocent cover files
such as text, audio, and image files.
oThe embedded message may be anything that can
be encoded in binary.
REASONS FOR
USING DIGITAL
IMAGES
oIt is the most widely used medium being used today.
oTakes advantage of our limited visual perception of
colors.
oThis field is expected to continually grow as
computer graphics power also grows.
oMany programs are available to apply
steganography.
IMAGE ATTRIBUTES
oDigital images are made up of pixels.
o8-bit and 24-bit images are common.
oThe larger the image size, the more information you
can hide. However, larger images may require
compression to avoid detection.
IMAGE-BASED
TECHNIQUES
oLeast Significant Bit Insertion
oMasking and Filtering
LSB INSERTION
oReplaces least significant bits with the message
to be encoded.
oMost popular technique when dealing with
images.
oSimple, but susceptible to lossy compression and
image manipulation.
LSB - Example
A sample raster data for 3 pixels (9 bytes)
may be:
00100111 11101001 11001000
00100111 11001000 11101001
11001000 00100111 11101011
Inserting
the binary
value for
A
(10000001)
changes
4 bits
00100111 11101000 11001000
00100110 11001000 11101000
11001000 00100110 11101011
LSB Continued…
oBest to use a grayscale palette or one with gradual
changes in shades.
oOtherwise, it is best to use images with “noisy areas”
– areas with ample color variation.
LSB - Uses
oStoring passwords and/or other confidential
information.
oCovert communication of sensitive data.
oSpeculated uses in terrorist activities.
oBeing widely used to hide and/or transfer illegal
content.
MASKING & FILTERING
oMasks secret data over the original data by
changing the luminance of particular areas.
oDuring masking, it embed the message within
significant bits of the cover image.
oNot susceptible to lossy techniques because image
manipulation does not affect the secret message.
MASKING & FILTERING
- Uses
oDigital Watermarking – provides identification
pertaining to the owner; i.e. license or copyright
information.
o Fingerprinting – provides identification of the user;
used to identify and track illegal use of content.
Visible Watermark -
Example
STEGANALYSIS
Five classes of steganalysis:
o Stego-only
o Known-cover
o Known-message
o Chosen-stego and
o Chosen-message
ADVANCEMENTS
oUse of steganography for malwares to embed it in
crafted HTML and JPEG files.
e.g. Duqu worm (2011)
oAccording to recent report(30th Jan, 2012), it will be
used in android applications to send premium rates
messages.
oSelecting multiplayers’ games to use as a covert
channel.
oUse of private chat rooms as a carrier.
oResearch are being done to practice steganography
using a key not by using a method.
TECHNICAL
CHALLENGES
Limitations due to these three properties which work
in opposition to each other:-
oCAPACITY of the cover object.
oUNDETECTABILITY of the stego-object.
oROBUSTNESS of the stego-object.
oStrength often depends on attackers not knowing
how data could be hidden.
SUMMARY
oSteganography as a whole has existed in many forms
throughout much of history.
oLossless compression of images with a great deal of
color variation work best as a cover image to embed a
message.
oSteganography can be used as beneficial tool for
privacy.
oSteganography will work best if combined with
cryptography.
REFERENCES
http://www.youtube.com/watch?v=OOY-
lbDEmNM for techniques of steganography
CERIAS Steganography by John Oritz youtube
videos.
http://www.garykessler.net/library/steganography.h
tml
http://en.wikipedia.org/wiki/Digital_watermarking
http://www.youtube.com/watch?v=C0T1MbrST5U
for watermarking techniques.
http://stegano.net
QUERIES ?
<THANK YOU>

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 

Ähnlich wie Steganography in images

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
B03208016
B03208016B03208016
B03208016inventy
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 

Ähnlich wie Steganography in images (20)

Steganography
SteganographySteganography
Steganography
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Steganography
SteganographySteganography
Steganography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Steganography
SteganographySteganography
Steganography
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
B03208016
B03208016B03208016
B03208016
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 

Kürzlich hochgeladen

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Kürzlich hochgeladen (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Steganography in images

  • 2. OVERVIEW oSteganography Defined oExamples in History oDigital Approaches oReasons For Using Digital Images oImage Attributes oPopular Techniques That Use Images oSteganalysis oAdvancements in image steganography oTechnical limitations
  • 3. STEGANOGRAPHY DEFINED oGreek for “covered writing”. o“The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”
  • 4. EXAMPLES IN HISTORY oTattoos on shaved heads oWax-covered tablets oInvisible Inks - milk, fruit juice
  • 5. STEGANOGRAPHY V/S CRYPTOGRAPHY oSteganography involves the hiding of the data while Cryptography involves the encryption and decryption of data. oSteganalysis involves finding out whether there is really a hidden message or not while Cryptanalysis involves breaking of the encrypted into decrypted message.
  • 6. STEGANOGRAPHY with CRYPTOGRAPHY oVery very strong when combined. oA message sent in secret (steganography) in an encrypted form (cryptography) is much more secure than a "plain text" message sent by secret means or a clearly sent encrypted message.
  • 7. DIGITAL APPROACHES oToday, it often exists within digital formats. oIt makes use of seemingly innocent cover files such as text, audio, and image files. oThe embedded message may be anything that can be encoded in binary.
  • 8. REASONS FOR USING DIGITAL IMAGES oIt is the most widely used medium being used today. oTakes advantage of our limited visual perception of colors. oThis field is expected to continually grow as computer graphics power also grows. oMany programs are available to apply steganography.
  • 9. IMAGE ATTRIBUTES oDigital images are made up of pixels. o8-bit and 24-bit images are common. oThe larger the image size, the more information you can hide. However, larger images may require compression to avoid detection.
  • 10. IMAGE-BASED TECHNIQUES oLeast Significant Bit Insertion oMasking and Filtering
  • 11. LSB INSERTION oReplaces least significant bits with the message to be encoded. oMost popular technique when dealing with images. oSimple, but susceptible to lossy compression and image manipulation.
  • 12. LSB - Example A sample raster data for 3 pixels (9 bytes) may be: 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 Inserting the binary value for A (10000001) changes 4 bits 00100111 11101000 11001000 00100110 11001000 11101000 11001000 00100110 11101011
  • 13. LSB Continued… oBest to use a grayscale palette or one with gradual changes in shades. oOtherwise, it is best to use images with “noisy areas” – areas with ample color variation.
  • 14. LSB - Uses oStoring passwords and/or other confidential information. oCovert communication of sensitive data. oSpeculated uses in terrorist activities. oBeing widely used to hide and/or transfer illegal content.
  • 15. MASKING & FILTERING oMasks secret data over the original data by changing the luminance of particular areas. oDuring masking, it embed the message within significant bits of the cover image. oNot susceptible to lossy techniques because image manipulation does not affect the secret message.
  • 16. MASKING & FILTERING - Uses oDigital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information. o Fingerprinting – provides identification of the user; used to identify and track illegal use of content.
  • 18. STEGANALYSIS Five classes of steganalysis: o Stego-only o Known-cover o Known-message o Chosen-stego and o Chosen-message
  • 19. ADVANCEMENTS oUse of steganography for malwares to embed it in crafted HTML and JPEG files. e.g. Duqu worm (2011) oAccording to recent report(30th Jan, 2012), it will be used in android applications to send premium rates messages. oSelecting multiplayers’ games to use as a covert channel. oUse of private chat rooms as a carrier. oResearch are being done to practice steganography using a key not by using a method.
  • 20. TECHNICAL CHALLENGES Limitations due to these three properties which work in opposition to each other:- oCAPACITY of the cover object. oUNDETECTABILITY of the stego-object. oROBUSTNESS of the stego-object. oStrength often depends on attackers not knowing how data could be hidden.
  • 21. SUMMARY oSteganography as a whole has existed in many forms throughout much of history. oLossless compression of images with a great deal of color variation work best as a cover image to embed a message. oSteganography can be used as beneficial tool for privacy. oSteganography will work best if combined with cryptography.
  • 22. REFERENCES http://www.youtube.com/watch?v=OOY- lbDEmNM for techniques of steganography CERIAS Steganography by John Oritz youtube videos. http://www.garykessler.net/library/steganography.h tml http://en.wikipedia.org/wiki/Digital_watermarking http://www.youtube.com/watch?v=C0T1MbrST5U for watermarking techniques. http://stegano.net