Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
In Greek terminology,
hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.
This can be achieved by concealing the existence of
History of Steganography
440 B.C.
Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
1st and 2nd World Wars
German spies used invisible ink to print very small dots on letters. A message sent by a German spy during World War II read: Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects for pretext embargo on by-products, ejecting suets and vegetable oils. By taking the second letter of every word the hidden message Pershing sails for NY June 1 can be
Evolution
Cryptograph y Steganograph y
Watermarkin g
Steganography Terms
Carrier or Cover File - A Original message or a file in
is hidden.
Embedded or Payload - The information which is to
be hidden or concealed.
Steganalysis - The process of detecting hidden
Types of Steganography
Steganography in Texts/Documents Steganography in Images Steganography in Audio Steganography in Video
Steganography in text
Line Shift Coding: Lines are vertically shifted. In line shift
coding, shift various lines inside the document up or down by a small fraction (such as 1/300th of an inch).
Word Shift Coding: Code words are horizontally shifted.
The decoding technique is measuring the spaces between each word and a left shift could represent a 0 bit and a right bit representing a 1 bit. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
Feature Coding: Coding done using certain text features.
This can use a number of different characteristics such as the height of certain characters, the dots above i and j and the horizontal line length of letters such as f and t.
White Space Manipulation: It is done by adding a certain
Steganography In Images
Least significant bit insertion technique 4 bits to hide the secret Host imagePixel: 10110001
Secret Pixel: 00111111 New Image Pixel: 10110011
Steganography in audio
PHASE CODING
Steganography in video
For video, a combination of sound and image techniques
can be used.
This is due to the fact that video generally has separate
inner files for the video (consisting of many images) and the sound.
So techniques can be applied in both areas to hide data.
Due to the size of video files, the scope for adding lots of data is much greater and therefore the chances of hidden data being detected is quite low.
APPLICATIONS OF STEGANOGRAPHY
Secure Communication
It is a state-of-the-art digital
steganography software package developed for confidential multimedia communication. The software allows the user to select a multimedia data file or "container" for embedding hidden text, audio sequence, video clip, or any form of data file. The contents of the text message are hashed with those of the container file to produce a key file. The key file is also known as a Stegfile.
copyright marking is the growth of the Internet which has allowed images, audio, video, etc to become available in digital form.
also made it far easier for copies of copyrighted material to be made and distributed . Using the Internet a copy stored on a computer can be shared easily with anybody which doesnt require the material to be stored on a server and therefore makes it harder for the copyright owner to locate and prosecute offending parties. Watermarks identify the copyright owner of the file. Watermarks are typically hidden to prevent their detection and removal, they are said to be imperceptible
It has
image and attribute text information. The attribute information can be any personal records The main function is to securely link the personal record and digital photograph together and then create a hash file that can be safely stored in a database. This hash file is unique to and can only be decoded with the original photograph and associated personal record. An optional password is also available to protect the hash file prior to data storage.
CONCLUSION
Steganography can protect data by hiding it but using it alone may not guarantee total protection.
In case of encryption, by seeing the meaningless
appearing sequence of bits enemy can detect that some illegal message is being sent.
However, if one uses both methods, this will lead to
security in depth.
REFERANCES
Steganography And Digital Watermarking
Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham.
www.scribd.com/doc/27459895
www.authorstream.com/Presentation/pavanku
mar4b7-473085-steganography/
THANK YOU