Sunteți pe pagina 1din 19

Steganography

INTRODUCTION
In Greek terminology,

STEGANOS Covered GRAPHIE Writing


Steganography is the art and science of writing

hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.
This can be achieved by concealing the existence of

information within seemingly harmless carriers or cover.


Carrier: text, image, video, audio, etc

History of Steganography
440 B.C.

Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
1st and 2nd World Wars

German spies used invisible ink to print very small dots on letters. A message sent by a German spy during World War II read: Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects for pretext embargo on by-products, ejecting suets and vegetable oils. By taking the second letter of every word the hidden message Pershing sails for NY June 1 can be

Evolution

Cryptograph y Steganograph y

Watermarkin g

Steganography Terms
Carrier or Cover File - A Original message or a file in

which hidden information will be stored inside of it .


Stego-Medium - The medium in which the information

is hidden.
Embedded or Payload - The information which is to

be hidden or concealed.
Steganalysis - The process of detecting hidden

information inside a file.

Types of Steganography
Steganography in Texts/Documents Steganography in Images Steganography in Audio Steganography in Video

Steganography in text
Line Shift Coding: Lines are vertically shifted. In line shift

coding, shift various lines inside the document up or down by a small fraction (such as 1/300th of an inch).
Word Shift Coding: Code words are horizontally shifted.

The decoding technique is measuring the spaces between each word and a left shift could represent a 0 bit and a right bit representing a 1 bit. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
Feature Coding: Coding done using certain text features.

This can use a number of different characteristics such as the height of certain characters, the dots above i and j and the horizontal line length of letters such as f and t.
White Space Manipulation: It is done by adding a certain

amount of white space to the end of lines. The amount of

Steganography In Images
Least significant bit insertion technique 4 bits to hide the secret Host imagePixel: 10110001
Secret Pixel: 00111111 New Image Pixel: 10110011

Steganography in audio
PHASE CODING

SPREAD SPECTRUM The message is hidden in those areas of the

carrier file with the greatest energy.

Steganography in video
For video, a combination of sound and image techniques

can be used.
This is due to the fact that video generally has separate

inner files for the video (consisting of many images) and the sound.
So techniques can be applied in both areas to hide data.

Due to the size of video files, the scope for adding lots of data is much greater and therefore the chances of hidden data being detected is quite low.

Generic Process of encoding & decoding

APPLICATIONS OF STEGANOGRAPHY
Secure Communication
It is a state-of-the-art digital

steganography software package developed for confidential multimedia communication. The software allows the user to select a multimedia data file or "container" for embedding hidden text, audio sequence, video clip, or any form of data file. The contents of the text message are hashed with those of the container file to produce a key file. The key file is also known as a Stegfile.

DIGITAL RIGHTS AND COPYRIGHT MARKING


One of the driving forces behind the increased use of

copyright marking is the growth of the Internet which has allowed images, audio, video, etc to become available in digital form.

also made it far easier for copies of copyrighted material to be made and distributed . Using the Internet a copy stored on a computer can be shared easily with anybody which doesnt require the material to be stored on a server and therefore makes it harder for the copyright owner to locate and prosecute offending parties. Watermarks identify the copyright owner of the file. Watermarks are typically hidden to prevent their detection and removal, they are said to be imperceptible
It has

DIGITAL SIGNATURE AUTHENTICATION


It is a software product specifically developed to prevent malicious tampering of private and confidential documents. This will detect any unwarranted tampering and alert the receiver side immediately. A digital signature and a multimedia container password are embedded into the confidential document.

DIGITAL LINKAGE AND STORAGE


It provides a secure data linkage between a digital

image and attribute text information. The attribute information can be any personal records The main function is to securely link the personal record and digital photograph together and then create a hash file that can be safely stored in a database. This hash file is unique to and can only be decoded with the original photograph and associated personal record. An optional password is also available to protect the hash file prior to data storage.

Illustrates the operations of StegSafe through a data flow diagram

CONCLUSION
Steganography can protect data by hiding it but using it alone may not guarantee total protection.
In case of encryption, by seeing the meaningless

appearing sequence of bits enemy can detect that some illegal message is being sent.
However, if one uses both methods, this will lead to

security in depth.

The message should first be encoded using a strong

encryption algorithm and then embedded into a carrier.

REFERANCES
Steganography And Digital Watermarking

Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham.
www.scribd.com/doc/27459895

www.authorstream.com/Presentation/pavanku

mar4b7-473085-steganography/

THANK YOU

S-ar putea să vă placă și