Documente Academic
Documente Profesional
Documente Cultură
DEEPAK KUMAR CHAURASIA (10/CS/102) SOURAV KARAN (10/CS/94) PAWAN KUMAR (10/CS/90)
What is STEGANOGRAPHY ?
Steganography is the art and science to hide data in a cover that can be text, audio, image, video, etc. ORIGIN : Greek words stegos meaning cover and grafia meaning writing, defining it as covered writing.
History
Greek historian Herodotus writes of a nobleman, Histaeus, who needed to communicate with his sonin-law in Greece. He shaved the head of one of his most trusted slaves and tattooed the message onto the slave's scalp. When the slave's hair grew back the slave was dispatched with the hidden message. In the Second World War the Microdot technique was developed by the Germans. Information, especially photographs, was reduced in size until it was the size of a typed period. Extremely difficult to detect, a normal cover message was sent over an insecure channel with one of the periods on the paper containing hidden information.
Categories of Steganography
IMAGE STEGANOGRAPHY
Hiding Data in Images
Even though audio and video files offer a much higher capacity to hide information, digital images are more easily disguised and can be exchanged on a much lower bandwidth. Image steganography techniques can be broadly classified into two categoriesspatial domain techniques and transform domain techniques.
Scenario
It was used in 9/11 WTC Attack in 2001. For Communication, Terrorists used Pictures Mail of few celebrities. For about 6-7 months, no security professional have any idea what these pictures mail are.
Modules
The Steganography consists of mainly four modules Encryption, Hide message, Retrieve message and Decryption. Encryption and Hide message form the modules at the sender side. Retrieve message and Decryption form the modules at the Receiver side.
Encryption
Secret key can be used for encryption of the message to be hidden. It provides security by converting it into a cipher text, which will be difficult for hackers to decrypt. Moreover if the message is password protected, then while retrieving message, the retriever has to enter the correct password for viewing the message.
Hide Message
Hiding message is the most important module of steganography. It involves embedding the message into the cover text. Each pixel typically has three numbers associated with it, one each for red, green, and blue intensities, and these values often range from 0-255.In order to hide the message, data is first converted into byte format and stored in a byte array. The message is then encrypted and then embed each bits into the LSB position of each pixel position. The least significant (right most) bit of each 8-bit byte has been co-opted to hide a text message.
Retrieve Message
It involves retrieving the embed message from the file (independent of the file format). Once the message has been retrieved it has to be converted into original message or file. This can be done by reading the embedded data from the master file. The read data will be in the bytes format. This message has to be converted into the suitable output file format.
Decryption
Decryption involves converting the cipher text into decrypted format. Secret key can be used for decryption of the message that is hidden. It provides security by converting the cipher text, into the original data message or file.
An 800 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. For example, a grid for 3 pixels of a 24-bit image can be as follows: (00101101 00011100 11011100) (10100110 11000100 00001100) (11010010 10101101 01100011) When the number 200, which binary representation is 11001000, is embedded into the least significant bits of this part of the image, the resulting grid is as follows: (00101101 00011101 11011100) (10100110 11000101 00001100) (11010010 10101100 01100011)
------------------------------------------------------As compared to transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without sacrificing the cover image quality. This is achieved through retaining integrity of the wavelet coefficients at high capacity embedding.
Invisibility Independent of file format Robustness against statistical attacks Robustness against image manipulation Payload capacity Unsuspicious files
THANKYOU ALL