Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Stegnography final
1. under the guidance of: Presented by:
Miss Surapriya swain Nikhil Kumar
MR Alok Kumar pani Reg no :0601221172
2. Steganography is the art of covered or hidden writing. The purpose of
Steganography is covert communication to hide a message from a
third party. This differs from cryptography, the art of secret writing,
which is intended to make a message unreadable by a third party but
does not hide the existence of the secret communication. Although
Steganography is separate and distinct from cryptography,
Although the term Steganography was only coined at the end of the
15th century, the use of Steganography dates back several millennia. In
ancient times, messages were hidden on the back of wax writing
tables, written on the stomachs of rabbits, or tattooed on the scalp of
slaves. Invisible ink has been in use for centuries—for fun by children
and students and for serious espionage by spies and terrorists.
Microdots and microfilm, a staple of war and spy movies, came about
after the invention of photography
Steganography hides the covert message but not the fact that two
parties are communicating with each other. The Steganography
process generally involves placing a hidden message in some
transport medium, called the carrier. The secret message is embedded
in the carrier to form the Steganography medium. The use of a
Steganography key may be employed for encryption of the hidden
message and/or for randomization in the Steganography scheme.
3. What is What is
Steganography Encryption
Converting the data
Hiding the fact that
into non readable
information is being
.
(non perceivable)
sent.
data
Usually hiding the
It’s a way to pass
data inside other
data so that it
data.
become safe.
The data is passed in
Any unauthorized
an unusual
person is not able
communication
to understand it
manner.
1 2
5. Needs to send Sud get d mesg
private mesg without anybody
sees it
6. Alice Wendy Bob
Original
Secret Key
Image
Image
Encryption Stegano Message Secret
Normal Image
Algorithm Algorithm Retrieval Message
Secret
Message Secret Key
Image
Ordinary
Image
7.
8. Payload: the data that is desirable for
transport
Carrier: signal, stream or data file into which
the payload is hidden
Channel: type of input, such as JPEG image
Package: the resulting signal, stream or data
file
which has the payload encoded
Encoding density: the percentage of bytes
which are modified to encode the payload,
typically as a floating-point number between 0
and 1
9. Steganographic
Techniques
Genome Steganography
Hiding in Text
Hiding in the disk space
Hiding data in software and
circuitry
Information Hiding in Images
Hiding in network packets
Hiding in music files & video
10. Apparently neutral’s protest is
p e r s
h i n
thoroughly discounted and
ignored. Isman hard hit.
g s a i
l s f r
Blockade issue affects pretext
for embargo on by-products,
o m n y
ejecting suets and vegetable
j u n e
i
oils.
An instace from wwii
11. p e r s
h i n
g s a i
l s f r
o m n y
j u n e
i
12. How It Work’s in case of images
Key Image is an image which
under goes in to an Encryption a clone of original
This image is Original image is the image
generating Algorithm which
image which contains the whose clone is created
generates a unique encryption
hidden encrypted message
technique .
Key Image Original Image Clone of Original
image
Unique
Algorithm Encryption Steganographic
Technique Algorithm
Message
Message is encrypted using Encrypte
unique encryption technique d
Message
13. • 28 possible values for each color per pixel
• Not much difference in intensity between
11111111 and 11111110
• Change to least significant bit of each color yields 3 bits per pixel
• One ASCII character can be represented for each 3 pixels
• Given the following 8 carrier bytes
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000
• Assume we want to insert some payload –
the letter ‘G’, in ASCII:
01000111
• The resulting bytes are
10010100 00001101 11001000 10010110
00001110 11001011 10011111 00010001
• Only half of the available bytes were affected by our insertion
• Change is relatively undetectable
14. Sample Result
Before Stganography
After Stganography
15. Hiding in TCP
Places to hide message
- Reserved bits A
header
- Sequence number field
- Initial Sequence
Number (ISN) B
oMakes use of three-
way handshake in
buildup
of a TCP/IP connection
C
17. Statistical analysis
Analyze frequency of DCT coefficients
compressing
18.
19. Where it can be USED – Applications?
Government Agencies: -- Security companies: -- Can USE
who store documents And SELL IBES products as stand
alone or as a part of their bigger
which are very sensitive
package
Business people: -- Banks and other financial
preserve legal and customer institutions: -- safeguard
specific financial documents their databases
Private Organizations: -- who want Digital Watermarking
to safeguard their Digital Signature Authentication
sensitive information Digital Linkage and Storage
20. Steganography is a fascinating and effective method of
hiding data that has been used throughout history.
Methods that can be employed to uncover such
devious tactics, but the first step are awareness that
such methods even exist. There are many good
reasons as well to use this type of data hiding,
including watermarking or a more secure central
storage method for such things as passwords, or key
processes. Regardless, the technology is easy to use
and difficult to detect. The more that you know about its
features and functionality, the more ahead you will be in
the game.