SlideShare a Scribd company logo
1 of 23
STEGANOGRAPHY
INTRODUCTION

                                   No one apart
                                      from the
    Art and            A form of    sender and
 science of             security     intended
writing hidden          through      recipient,
 messages              obscurity   suspects the
                                    existence of
                                   the message


     www.company.com
Steganós   •   Covered

Graptos    •   Writing




ETYMOLOGY
HISTORY OF STEGANOGRAPHY

                    Current


                    1st and 2nd
                    World Wars




                    440 B.C.


  www.company.com
Cryptography


               Steganography

Watermarking


  EVOLUTION
ADVANTAGE OF STEGANOGRAPHY
    OVER CRYPTOGRAPHY



  Messages do not
  attract attention to    Protects both
      themselves         messages and
                         communicating
                             parties


  www.company.com
TYPES OF STEGANOGRAPHY

 Steganography In Text/Documents

 Steganography In Video

 Steganography In Audio

 Steganography In Images
   www.company.com
Carrier or Cover File

           Stego-Medium

        Embedded or Payload

           Steganalysis



STEGANOGRAPHY TERMS
VIDEO
HOW IT WORKS
www.company.com
STEGANOGRAPHY STEPS

                   Steganography




      Encoding a              Decode a
       message                message
 www.company.com
Embedded
  Data



             MESSAGE


Plain info




      MESSAGE
ENCODING

                        Step 2
• Prepare          • Encode
                                       • Steganographic
                                         data
  cover data         embedded
                     data with cover
                     data
    Step1                                   Step 3
     www.company.com
DECODING

                         Step 2
• Steganographic                    • Embedded
  Data               • Decode         data
                       Plain info     obtained

     Step1                             Step 3

       www.company.com
STEGANALYSIS
Art and Science of detecting hidden
            messages


     Just discover Steganography



 Not deals with decrypting the data
www.company.com
Line Shift Coding

                Word Shift Coding

                 Feature Coding

          Least Significant Bit Insertion

                Low bit encoding

             Masking and Filtering




STEGANOGRAPHY TECHNIQUES
STEGANOGRAPHY USING
 LEAST SIGNIFICANT BIT




www.company.com
PRACTICAL
Program          Image files   Audio files    Video files   Document
                                                                   files
                      BMP, JPG,     Mp3, WAV       3gp, Mp4,        Pdf
                      PNG, TGA                      MPEG-1,
     OpenPuff                                     MPEG-2, VOB,
                                                   SWF, FLV
     MP3Stego              -           Mp3             -            -
     OpenStego        BMP, PNG           -              -           -
      S-Tools          BMP, GIF        Wav              -           -
      StegFS               -             -              -           -
   Steganographic     BMP, PNG,          -              -           -
  Laboratory (VSL)    JPG, TIFF

     PHP-Class           PNG             -              -           -
StreamSteganography



List of some tools for Steganography
        www.company.com
USAGE IN MODERN PRINTERS

  Tiny yellow dots are added to each page


Printer serial numbers date and time stamps
         are encoded on yellow dots


EXAMPLE: HP and Xerox color laser printers.
    www.company.com
ILLEGAL USAGE

                   HACKERS



                  TERRORISTS



                  CRIMINALS


www.company.com
CONCLUSION
QUERIES




www.company.com

More Related Content

What's hot

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 

What's hot (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 

Similar to Steganography

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenographyricharia
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research IdeasMatlab Simulation
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 

Similar to Steganography (20)

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography.
Steganography.Steganography.
Steganography.
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Steganography
SteganographySteganography
Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
HACKING
HACKINGHACKING
HACKING
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
L1803037377
L1803037377L1803037377
L1803037377
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 

More from Neha Sharma

Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational ResearchNeha Sharma
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft SurfaceNeha Sharma
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist AttacksNeha Sharma
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface Neha Sharma
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality ShowsNeha Sharma
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics PracticalNeha Sharma
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about MathsNeha Sharma
 

More from Neha Sharma (9)

Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Transportation Problem in Operational Research
Transportation Problem in Operational ResearchTransportation Problem in Operational Research
Transportation Problem in Operational Research
 
Microsoft Surface
Microsoft SurfaceMicrosoft Surface
Microsoft Surface
 
Terrorist Attacks
Terrorist AttacksTerrorist Attacks
Terrorist Attacks
 
Microsoft Surface
Microsoft Surface Microsoft Surface
Microsoft Surface
 
Top Reality Shows
Top Reality ShowsTop Reality Shows
Top Reality Shows
 
Computer Graphics Practical
Computer Graphics PracticalComputer Graphics Practical
Computer Graphics Practical
 
IPv6
IPv6IPv6
IPv6
 
Interesting Facts about Maths
Interesting Facts about MathsInteresting Facts about Maths
Interesting Facts about Maths
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Steganography

  • 2. INTRODUCTION No one apart from the Art and A form of sender and science of security intended writing hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  • 3. Steganós • Covered Graptos • Writing ETYMOLOGY
  • 4. HISTORY OF STEGANOGRAPHY Current 1st and 2nd World Wars 440 B.C. www.company.com
  • 5. Cryptography Steganography Watermarking EVOLUTION
  • 6. ADVANTAGE OF STEGANOGRAPHY OVER CRYPTOGRAPHY Messages do not attract attention to Protects both themselves messages and communicating parties www.company.com
  • 7. TYPES OF STEGANOGRAPHY Steganography In Text/Documents Steganography In Video Steganography In Audio Steganography In Images www.company.com
  • 8. Carrier or Cover File Stego-Medium Embedded or Payload Steganalysis STEGANOGRAPHY TERMS
  • 11. STEGANOGRAPHY STEPS Steganography Encoding a Decode a message message www.company.com
  • 12. Embedded Data MESSAGE Plain info MESSAGE
  • 13. ENCODING Step 2 • Prepare • Encode • Steganographic data cover data embedded data with cover data Step1 Step 3 www.company.com
  • 14. DECODING Step 2 • Steganographic • Embedded Data • Decode data Plain info obtained Step1 Step 3 www.company.com
  • 15. STEGANALYSIS Art and Science of detecting hidden messages Just discover Steganography Not deals with decrypting the data www.company.com
  • 16. Line Shift Coding Word Shift Coding Feature Coding Least Significant Bit Insertion Low bit encoding Masking and Filtering STEGANOGRAPHY TECHNIQUES
  • 17. STEGANOGRAPHY USING LEAST SIGNIFICANT BIT www.company.com
  • 19. Program Image files Audio files Video files Document files BMP, JPG, Mp3, WAV 3gp, Mp4, Pdf PNG, TGA MPEG-1, OpenPuff MPEG-2, VOB, SWF, FLV MP3Stego - Mp3 - - OpenStego BMP, PNG - - - S-Tools BMP, GIF Wav - - StegFS - - - - Steganographic BMP, PNG, - - - Laboratory (VSL) JPG, TIFF PHP-Class PNG - - - StreamSteganography List of some tools for Steganography www.company.com
  • 20. USAGE IN MODERN PRINTERS Tiny yellow dots are added to each page Printer serial numbers date and time stamps are encoded on yellow dots EXAMPLE: HP and Xerox color laser printers. www.company.com
  • 21. ILLEGAL USAGE HACKERS TERRORISTS CRIMINALS www.company.com