SlideShare a Scribd company logo
1 of 21
under the guidance of:   Presented by:
Miss Surapriya swain     Nikhil Kumar
MR Alok Kumar pani       Reg no :0601221172
   Steganography is the art of covered or hidden writing. The purpose of
    Steganography is covert communication to hide a message from a
    third party. This differs from cryptography, the art of secret writing,
    which is intended to make a message unreadable by a third party but
    does not hide the existence of the secret communication. Although
    Steganography is separate and distinct from cryptography,
   Although the term Steganography was only coined at the end of the
    15th century, the use of Steganography dates back several millennia. In
    ancient times, messages were hidden on the back of wax writing
    tables, written on the stomachs of rabbits, or tattooed on the scalp of
    slaves. Invisible ink has been in use for centuries—for fun by children
    and students and for serious espionage by spies and terrorists.
    Microdots and microfilm, a staple of war and spy movies, came about
    after the invention of photography
   Steganography hides the covert message but not the fact that two
    parties are communicating with each other. The Steganography
    process generally involves placing a hidden message in some
    transport medium, called the carrier. The secret message is embedded
    in the carrier to form the Steganography medium. The use of a
    Steganography key may be employed for encryption of the hidden
    message and/or for randomization in the Steganography scheme.
What is                 What is
Steganography           Encryption


                        Converting the data
Hiding the fact that
                        into non readable
information is being
                                .
                        (non perceivable)
sent.
                        data
Usually hiding the
                        It’s a way to pass
data inside other
                        data so that it
data.
                        become safe.
The data is passed in
                        Any unauthorized
an unusual
                        person is not able
communication
                        to understand it
manner.

         1                      2
Fusion
               Invisible




               Merge




    Steganography      Encryption
Needs to send   Sud get d mesg
private mesg    without anybody
                     sees it
Alice     Wendy            Bob




                          Original
Secret Key
                          Image
Image



             Encryption   Stegano                     Message     Secret
                                      Normal Image
             Algorithm    Algorithm                   Retrieval   Message



 Secret
 Message                                             Secret Key
                                                     Image

                                      Ordinary
                                      Image
 Payload: the data that is desirable for
  transport
 Carrier: signal, stream or data file into which
  the payload is hidden
 Channel: type of input, such as JPEG image
 Package: the resulting signal, stream or data
  file
   which has the payload encoded
 Encoding density: the percentage of bytes
which are modified to encode the payload,
typically as a floating-point number between 0
and 1
Steganographic
Techniques


 Genome Steganography
 Hiding in Text
 Hiding in the disk space
 Hiding data in software and
  circuitry
 Information Hiding in Images
 Hiding in network packets
 Hiding in music files & video
Apparently neutral’s protest is
 p          e         r       s
 h          i           n
thoroughly discounted and
ignored. Isman hard hit.
 g        s     a    i
 l        s     f        r
Blockade issue affects pretext
for embargo on by-products,
 o   m       n y
ejecting suets and vegetable
 j        u     n   e
 i
oils.


 An instace from wwii
p           e               r    s
h           i                n
g       s           a   i
l       s           f        r
o   m           n   y
j       u           n   e
i
How It Work’s in case of images
            Key Image is an image which
            under goes in to an Encryption a clone of original
                              This image is                 Original image is the image
            generating Algorithm which
                              image which contains the      whose clone is created
            generates a unique encryption
                              hidden encrypted message
            technique .



Key Image                   Original Image                         Clone of Original
                                                                   image




                          Unique
Algorithm                 Encryption                          Steganographic
                          Technique                           Algorithm



 Message
            Message is encrypted using          Encrypte
            unique encryption technique         d
                                                Message
• 28  possible values for each color per pixel
• Not much difference in intensity between
           11111111 and 11111110
• Change to least significant bit of each color yields 3 bits per pixel
• One ASCII character can be represented for each 3 pixels
• Given the following 8 carrier bytes
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000
• Assume we want to insert some payload –
    the letter ‘G’, in ASCII:
                 01000111
• The resulting bytes are
10010100 00001101 11001000 10010110
00001110 11001011 10011111 00010001
• Only half of the available bytes were affected by our insertion
• Change is relatively undetectable
Sample Result
       Before Stganography




        After Stganography
Hiding in TCP




                Places to hide message
                - Reserved bits           A
header




                - Sequence number field
                - Initial Sequence
                Number (ISN)                  B
                oMakes use of three-
                way handshake in
                buildup
                of a TCP/IP connection
                                          C
Unused Header Bit
Stuffing




 Padding Byte Stuffing
   Statistical analysis
   Analyze frequency of DCT coefficients
   compressing
Where it can be USED – Applications?




Government Agencies: --               Security companies: -- Can USE
who store documents                   And SELL IBES products as stand
                                      alone or as a part of their bigger
which are very sensitive
                                      package


Business people: --                   Banks and other financial
preserve legal and customer           institutions: -- safeguard
specific financial documents           their databases



 Private Organizations: -- who want   Digital Watermarking
 to safeguard their                   Digital Signature Authentication
 sensitive information                Digital Linkage and Storage
Steganography is a fascinating and effective method of
hiding data that has been used throughout history.
Methods that can be employed to uncover such
devious tactics, but the first step are awareness that
such methods even exist. There are many good
reasons as well to use this type of data hiding,
including watermarking or a more secure central
storage method for such things as passwords, or key
processes. Regardless, the technology is easy to use
and difficult to detect. The more that you know about its
features and functionality, the more ahead you will be in
the game.
Thank you




            21

More Related Content

What's hot

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 

What's hot (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Stegnography
StegnographyStegnography
Stegnography
 

Viewers also liked

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysisPrince Boonlia
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalHeena Bohra
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBRITTO EDISON
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenographyricharia
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
android technology presentation
android technology presentationandroid technology presentation
android technology presentationNishul Tomar
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceSameep Sood
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 

Viewers also liked (20)

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Stegnography
StegnographyStegnography
Stegnography
 
BLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGYBLUE BRAIN TECHNOLOGY
BLUE BRAIN TECHNOLOGY
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Steganography
SteganographySteganography
Steganography
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Edge detection
Edge detectionEdge detection
Edge detection
 
android technology presentation
android technology presentationandroid technology presentation
android technology presentation
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
artificial eye
artificial eyeartificial eye
artificial eye
 

Similar to Stegnography final

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijdms
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsMaddiSujitha
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
Steganography
SteganographySteganography
SteganographySonam M
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 

Similar to Stegnography final (20)

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Steganography
SteganographySteganography
Steganography
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
Steganography
Steganography Steganography
Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
10.1.1.62.8194
10.1.1.62.819410.1.1.62.8194
10.1.1.62.8194
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Stegnography final

  • 1. under the guidance of: Presented by: Miss Surapriya swain Nikhil Kumar MR Alok Kumar pani Reg no :0601221172
  • 2. Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography,  Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuries—for fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography  Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.
  • 3. What is What is Steganography Encryption Converting the data Hiding the fact that into non readable information is being . (non perceivable) sent. data Usually hiding the It’s a way to pass data inside other data so that it data. become safe. The data is passed in Any unauthorized an unusual person is not able communication to understand it manner. 1 2
  • 4. Fusion Invisible Merge Steganography Encryption
  • 5. Needs to send Sud get d mesg private mesg without anybody sees it
  • 6. Alice Wendy Bob Original Secret Key Image Image Encryption Stegano Message Secret Normal Image Algorithm Algorithm Retrieval Message Secret Message Secret Key Image Ordinary Image
  • 7.
  • 8.  Payload: the data that is desirable for transport  Carrier: signal, stream or data file into which the payload is hidden  Channel: type of input, such as JPEG image  Package: the resulting signal, stream or data file which has the payload encoded  Encoding density: the percentage of bytes which are modified to encode the payload, typically as a floating-point number between 0 and 1
  • 9. Steganographic Techniques  Genome Steganography  Hiding in Text  Hiding in the disk space  Hiding data in software and circuitry  Information Hiding in Images  Hiding in network packets  Hiding in music files & video
  • 10. Apparently neutral’s protest is p e r s h i n thoroughly discounted and ignored. Isman hard hit. g s a i l s f r Blockade issue affects pretext for embargo on by-products, o m n y ejecting suets and vegetable j u n e i oils. An instace from wwii
  • 11. p e r s h i n g s a i l s f r o m n y j u n e i
  • 12. How It Work’s in case of images Key Image is an image which under goes in to an Encryption a clone of original This image is Original image is the image generating Algorithm which image which contains the whose clone is created generates a unique encryption hidden encrypted message technique . Key Image Original Image Clone of Original image Unique Algorithm Encryption Steganographic Technique Algorithm Message Message is encrypted using Encrypte unique encryption technique d Message
  • 13. • 28 possible values for each color per pixel • Not much difference in intensity between 11111111 and 11111110 • Change to least significant bit of each color yields 3 bits per pixel • One ASCII character can be represented for each 3 pixels • Given the following 8 carrier bytes 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 • Assume we want to insert some payload – the letter ‘G’, in ASCII: 01000111 • The resulting bytes are 10010100 00001101 11001000 10010110 00001110 11001011 10011111 00010001 • Only half of the available bytes were affected by our insertion • Change is relatively undetectable
  • 14. Sample Result Before Stganography After Stganography
  • 15. Hiding in TCP Places to hide message - Reserved bits A header - Sequence number field - Initial Sequence Number (ISN) B oMakes use of three- way handshake in buildup of a TCP/IP connection C
  • 16. Unused Header Bit Stuffing Padding Byte Stuffing
  • 17. Statistical analysis  Analyze frequency of DCT coefficients  compressing
  • 18.
  • 19. Where it can be USED – Applications? Government Agencies: -- Security companies: -- Can USE who store documents And SELL IBES products as stand alone or as a part of their bigger which are very sensitive package Business people: -- Banks and other financial preserve legal and customer institutions: -- safeguard specific financial documents their databases Private Organizations: -- who want Digital Watermarking to safeguard their Digital Signature Authentication sensitive information Digital Linkage and Storage
  • 20. Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.
  • 21. Thank you 21