SlideShare ist ein Scribd-Unternehmen logo
1 von 36
A
Presenation
    on

       Steganography
              Smart Way to Hide a Object . . .




                           By : Yogesh Prajapati
Who am I ?
Name : Yogesh Prajapati
Work : Java Developer
Education : Master of Computer Application
Skill (Java) : J2EE,
        Spring(IOC & Security),
        Hibernate,
        JAX-WS,
        Restful Architecture,
        No-SQL(Lucene,Solr-Lucane Based Search Engine),
        SQL(Ms Sql Server,MySql,PostgreSQL),
        JSP, Javascript,Jquery,
        Servlet,AJAX,
        Load Balancing and Clustering(of App server & Db )
        Logging Mechanism in Java,
        Security of Web Application…………….

                                ……And even Many More……..
Introduction

  Steganography is the process of hiding one medium of communication
  (text, sound or image) within another without changing in original
  format.

  Steganography

                   from the Greek word steganos meaning “covered”
           and the Greek word graphie meaning “writing”
                          Stenography



                      στεγανός     γραφία



                      Covered       writing
Introduction Cont. . .


 Steganography is the process of hiding of a secret message
  within an ordinary message and extracting it at its destination

 Anyone else viewing the message will fail to know it contains
 hidden/encrypted data

 With cryptography the information is known to exist,
  but it is encoded in such a way that only the intended recipient can read it.

         For Steganography Data Hidden in:
                  Sound
                  Text
                  Packet headers
                  Unused space of hard drives
                  Images
Example
Example




          fE:    steganographic function "embedding“

          fE-1: steganographic function "extracting"

          cover: cover data in which emb will be hidden

          emb:    message to be hidden

          key:   parameter of fE

          stego: cover data with the hidden message
History for Stenography


  Ancient Greeks used wax-covered tablets

  Tattooed shaved heads

  Method used during WW-II

  World War Two is better known for the birth of hardcore encoding

  Example:

             Apparently neutral's protest is thoroughly discounted
    and ignored. Isman hard hit. Blockade issue affects
    pretext for embargo on by products, ejecting suets and
    vegetable oils.

  Taking the second letter in each word the following message emerges:
History for Stenography
  Ancient Greeks used wax-covered tablets

  Tattooed shaved heads

  Method used during WW-II

  World War Two is better known for the birth of hardcore encoding

  Example:

             pparently neutral's protest is thoroughly discounted
             A

    and ignored. Isman hard hit. Blockade issue affects

    pretext for embargo on by products, ejecting suets and

    vegetable oils.

  Taking the second letter in each word the following message emerges:

  Pershing sails from NY June 1.
Different Kinds of Steganography
Not Cryptography?
Cryptography involves encrypting data
Steganography use data in original format

       Steganography                        Cryptography
       •Unknown message passing             •Known message passing

       •Little known technology             •Common technology

       •Technology still being developed •Most algorithms known to
       for certain formats               government departments

       •Once detected message is            •Strong algorithm are currently
       known Many Carrier formats           resistant to brute force attack
                                            Large expensive computing
                                            power required for cracking
                                            Technology increase reduces
                                            strength
Tools Available for Stenography


   Over 800 different embedding software programs available

   S-Tools – freeware for hiding data in GIF or .bmp image files or .wav files

    Hide and Seek
    J-Steg
    EZ Stego
    Image Hide
    Digital Picture Envelope
    Camouflage
    Gif Shuffle
    Spam Mimic
   JP Hide & Seek
    etc…
Steganography – Modern Day
How Actually Implemented ?
Implementing stenography


         •Hiding a message inside a text

         •Images

         •Least-significant bit modifications

         •Masking and filtering

         •Audio and video

         •IP datagram Steganography

         •Algorithms and transformations

         •Injection
Methods




      •Null Cipher

      •Steganography In Documents

      •Onion Cipher
Null Cipher

   Main purpose of using a Null Cipher
            Hide message among irrelevant data
            Confuse the cryptanalyst
   Example

           If I want to send some confidential Message is that
   “Bring two cases of beer ”

   For that I send a message to receiver

   “ Big rumble in New Guinea.
   The war on
   celebrity acts should end soon.
   Over four
   big ecstatic elephants replicated.”
Steganography In Documents

•Using Tool : SNOW
Steganography In Documents

•How to hide a message…
Steganography In Documents

•After Processing
Steganography In Documents

•Retrieve a Message…
Onion Cipher
Attacks on Stenography


Passive Attack

           Attacker will try to
                    Detect the embedded message


Active Attack

           Attacker will try to
                         Destroy the embedded message
                    Modify the embedded message
Attacks on Stenography

   Known carrier attack:
         The original cover media and stego media
         Both are available for analysis.

   Steganography only attack:
          In this type of attacks, only stego
          Media is available for analysis.

   Known message attack:
         The hidden message is known in this
         Case.

   Known Steganography attack:
         The cover media, stego media as
         Well as the Steganography tool or algorithm, are known.
Problems of Available Tools of stenography


 There are so many tools available for hiding a message or
 image or audio or video behind an any carrier file.
 The tools are easy to use but a problem of tools is that there another tools
  available which are working as reverse engineering of
 previous tools means they are capable to find the availably
  of out hidden file behind a carrier file.


  Size Problem
Trying to Solve Problem




       •Use of Algorithm in
              Java

       •In Operating System
              Windows XP Professional
Invisible Secret (The STEGO Tools)

Carrier File ( Size : 534 KB (546,933 bytes) )
Secret Data File (Size : 15.3 MB (16,061,760 bytes) )
New File From Tool ( After Processing)
Difference is

Carrier File ( Size : 534 KB (546,933 bytes) )

Secret Data File (Size : 15.3 MB (16,061,760 bytes) )

New File From Tool ( After Processing Size is : 572 KB)


Difference in original and new file is ( 572 – 534 =   38 KB
                                                           )
OUR WORK ON THIS

 Create RAR File of data file
Size of data file
After Processing the Final File Size is
Difference is

Carrier File ( Size : 534 KB (546,933 bytes) )

Secret Data File (Size : 7.77 KB (7,958 bytes) )

New File with zipped secret data
( After Processing Size is : 534 KB (547,256 bytes) )


Difference in original and new file is ( 534 – 534 =   0 KB)
Actual difference is

( 546,933 bytes - 547,256 bytes =   323 bytes )
The difference with normal process in
Invisible Secret is: 34 KB


And with our steps difference is 323 bytes

Approximately  100 times Effective than
normal procedure
Result



•      After Testing this method for different type of medium
We found that this method is work effectively only for
Plain text data

•      If you are using image,video,audio than this will work
But It will not give a satisfactory result same as for plain text
Thank You . . .

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Steganography
SteganographySteganography
Steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 

Andere mochten auch

Writing at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectWriting at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectEllis Pratt
 
Shorthand institute in delhi
Shorthand institute in delhiShorthand institute in delhi
Shorthand institute in delhiVidya Typing
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)dreamervikas
 

Andere mochten auch (7)

Writing at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectWriting at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno Project
 
Steganography
SteganographySteganography
Steganography
 
solar tree seminar report
solar tree seminar reportsolar tree seminar report
solar tree seminar report
 
Shorthand institute in delhi
Shorthand institute in delhiShorthand institute in delhi
Shorthand institute in delhi
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)Seminar report on solar tree (by Vikas)
Seminar report on solar tree (by Vikas)
 

Ähnlich wie Steganography. (20)

Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
HACKING
HACKINGHACKING
HACKING
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
Steganography Steganography
Steganography
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 

Kürzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Steganography.

  • 1. A Presenation on Steganography Smart Way to Hide a Object . . . By : Yogesh Prajapati
  • 2. Who am I ? Name : Yogesh Prajapati Work : Java Developer Education : Master of Computer Application Skill (Java) : J2EE, Spring(IOC & Security), Hibernate, JAX-WS, Restful Architecture, No-SQL(Lucene,Solr-Lucane Based Search Engine), SQL(Ms Sql Server,MySql,PostgreSQL), JSP, Javascript,Jquery, Servlet,AJAX, Load Balancing and Clustering(of App server & Db ) Logging Mechanism in Java, Security of Web Application……………. ……And even Many More……..
  • 3. Introduction Steganography is the process of hiding one medium of communication (text, sound or image) within another without changing in original format. Steganography from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing” Stenography στεγανός γραφία Covered writing
  • 4. Introduction Cont. . .  Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination  Anyone else viewing the message will fail to know it contains hidden/encrypted data  With cryptography the information is known to exist, but it is encoded in such a way that only the intended recipient can read it. For Steganography Data Hidden in: Sound Text Packet headers Unused space of hard drives Images
  • 6. Example fE: steganographic function "embedding“ fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  • 7. History for Stenography Ancient Greeks used wax-covered tablets Tattooed shaved heads Method used during WW-II World War Two is better known for the birth of hardcore encoding Example: Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges:
  • 8. History for Stenography Ancient Greeks used wax-covered tablets Tattooed shaved heads Method used during WW-II World War Two is better known for the birth of hardcore encoding Example: pparently neutral's protest is thoroughly discounted A and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 9. Different Kinds of Steganography
  • 10. Not Cryptography? Cryptography involves encrypting data Steganography use data in original format Steganography Cryptography •Unknown message passing •Known message passing •Little known technology •Common technology •Technology still being developed •Most algorithms known to for certain formats government departments •Once detected message is •Strong algorithm are currently known Many Carrier formats resistant to brute force attack Large expensive computing power required for cracking Technology increase reduces strength
  • 11. Tools Available for Stenography Over 800 different embedding software programs available S-Tools – freeware for hiding data in GIF or .bmp image files or .wav files  Hide and Seek  J-Steg  EZ Stego  Image Hide  Digital Picture Envelope  Camouflage  Gif Shuffle  Spam Mimic JP Hide & Seek  etc…
  • 14. Implementing stenography •Hiding a message inside a text •Images •Least-significant bit modifications •Masking and filtering •Audio and video •IP datagram Steganography •Algorithms and transformations •Injection
  • 15. Methods •Null Cipher •Steganography In Documents •Onion Cipher
  • 16. Null Cipher Main purpose of using a Null Cipher Hide message among irrelevant data Confuse the cryptanalyst Example If I want to send some confidential Message is that “Bring two cases of beer ” For that I send a message to receiver “ Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.”
  • 18. Steganography In Documents •How to hide a message…
  • 22. Attacks on Stenography Passive Attack Attacker will try to Detect the embedded message Active Attack Attacker will try to Destroy the embedded message Modify the embedded message
  • 23. Attacks on Stenography Known carrier attack: The original cover media and stego media Both are available for analysis. Steganography only attack: In this type of attacks, only stego Media is available for analysis. Known message attack: The hidden message is known in this Case. Known Steganography attack: The cover media, stego media as Well as the Steganography tool or algorithm, are known.
  • 24. Problems of Available Tools of stenography There are so many tools available for hiding a message or image or audio or video behind an any carrier file. The tools are easy to use but a problem of tools is that there another tools available which are working as reverse engineering of previous tools means they are capable to find the availably of out hidden file behind a carrier file.  Size Problem
  • 25. Trying to Solve Problem •Use of Algorithm in  Java •In Operating System  Windows XP Professional
  • 26. Invisible Secret (The STEGO Tools) Carrier File ( Size : 534 KB (546,933 bytes) )
  • 27. Secret Data File (Size : 15.3 MB (16,061,760 bytes) )
  • 28. New File From Tool ( After Processing)
  • 29. Difference is Carrier File ( Size : 534 KB (546,933 bytes) ) Secret Data File (Size : 15.3 MB (16,061,760 bytes) ) New File From Tool ( After Processing Size is : 572 KB) Difference in original and new file is ( 572 – 534 = 38 KB )
  • 30. OUR WORK ON THIS Create RAR File of data file
  • 31. Size of data file
  • 32. After Processing the Final File Size is
  • 33. Difference is Carrier File ( Size : 534 KB (546,933 bytes) ) Secret Data File (Size : 7.77 KB (7,958 bytes) ) New File with zipped secret data ( After Processing Size is : 534 KB (547,256 bytes) ) Difference in original and new file is ( 534 – 534 = 0 KB) Actual difference is ( 546,933 bytes - 547,256 bytes = 323 bytes )
  • 34. The difference with normal process in Invisible Secret is: 34 KB And with our steps difference is 323 bytes Approximately 100 times Effective than normal procedure
  • 35. Result • After Testing this method for different type of medium We found that this method is work effectively only for Plain text data • If you are using image,video,audio than this will work But It will not give a satisfactory result same as for plain text
  • 36. Thank You . . .