SlideShare a Scribd company logo
1 of 16
INTRODUCTION TO STEGANOGRAPHY
BSIT-7th
Instructor: Inam Ul Haq
Inam.bth@gmail.com
Steganography, Network Security, University of Okara
TABLE OF CONTENT
Information Hiding
Steganography
History
Fields applied to Information Hiding
Basic Terminologies
Steganalysis
Some Applications
Some Tools
Steganography Techniques
Steganography, Network Security, University of Okara
INFORMATION
HIDING
Steganography, Network Security, University of Okara
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE,
special issue on protection of multimedia content, 87(7):1062-1078, July 1999
INFORMATION
HIDING
Information Hiding is a branch of computer science that deals
with concealing the existence of a message
It is related to cryptography whose intent is to render messages
unreadable except by the intended recipients
It employs technologies from numerous science disciplines:
• Digital Signal Processing (Images, Audio, Video)
• Cryptography
• Information TheoryCoding Theory
• Data Compression
• Human Visual/Auditory perception
There are four primary sub-disciplines of Information Hiding
• Steganography
• Watermarking
• Covert Channels
• Anonymity
Steganography, Network Security, University of Okara
STEGANOGRAPHY
Steganography means “covered writing”
• A Greek word steganos means covered, protected or concealed
Definition: It is concealing any file, image, audio or video within
another file.
Most frequently, steganography is applied to images, but many
other data or file types are possible
• Audio
• Video
• Text
• Executable programs
• Links
Steganography, Network Security, University of Okara
HISTORY
The concept of message hiding is not new – it’s been around for
centuries
• A Greek shaved the head of a slave, wrote a message, then
waited for the hair to grow back before sending the slave to his
destination
• Steganography (in the form of invisible ink) was used by
Washington in the Revolutionary War
• Prior to the Civil War, quilts were sewn with special patterns to tell
escaping slaves which direction to go and what to do
• In the 1980’s, some of Margaret Thatcher’s cabinet documents
were leaked to the press. She ordered that the word processors
being used by government employees, encode their identity in the
word spacing of the documents
Steganography, Network Security, University of Okara
FIELDS APPLIED TO INFORMATION
HIDING
Information Theory/Coding Theory
Digital Signal Processing
• Discrete Fourier Transform/Discrete Cosine Transform
• Image/Audio/Video Processing
Data Compression
Cryptographic Principles
Discrete Math
Cryptographic Hashing
Data Networks
The Human Visual System/Human Auditory System
• Capabilities and limitations
Steganography, Network Security, University of Okara
BASIC TERMINOLOGY
The data to be hidden:
• Plaintext / Secret message / Stego-message / Embedded data
The data which will have a stego-message embedded in it:
• Covertext / Cover-Object /
• Cover-ImageCover-AudioCover-Video
• Target file
The key used to make the stego-message secure
• Stego-Key / Secret Key / Key
The file with the steganography-message embedded
• Stegotext / Stego-Object /
• Stego-ImageStego-AudioStego-Video
Steganography, Network Security, University of Okara
WATERMARKING
Watermarking is very similar to steganography in that one of its
goals is to not be detected
It’s primary goal is to not be able to be extracted or destroyed (at
least not without destroying the cover too)
Typically, watermarking is designed to protect intellectual property
rights for images, sounds, and video
• If it’s easily removed or destroyed, those rights cannot be protected
• There is a popular program called StirMark which does just that
• Make it tamper proof
Steganography, Network Security, University of Okara
ANONYMITY
Anonymity is about concealing the sender and receiver of messages
and this is the least studied sub-discipline of information hiding
STEGANALYSIS
Steganalysis is the detection of data that has been hidden
It is a cat and mouse game – as one group of researchers come
up with better ways to hide stuff, another group figures out how to
detect it or perhaps just destroy it
Steganography, Network Security, University of Okara
APPLICATIONS OF INFORMATION
HIDING
Covert military communications
Covert police communications
• Criminals have learned that police are nearby when they hear
encrypted communications, so they reduce their activity for the
moment
• A steganographic system would prevent this detection
Digital Rights Management – protecting intellectual property such
as images, music, electronic books, etc.
Embedding textual data in medical images would better ensure that
the picture belongs to a particular patient
• This technique could apply to personal pictures, sounds, and
movies
Tamper proofing – ensuring a data file has not been changed
Steganography, Network Security, University of Okara
STEGANOGRAPHY TOOLS
1. Anubis
2. BMP Secrets
3. DarkCryptTC
4. OpenPuff
5. OpenStego
6. StegFS
7. StegoShare
Other tools:
https://en.wikipedia.org/wiki/Steganography_tools
12 best steganography tools:
http://www.topbestalternatives.com/best-steganography-
software/
Steganography, Network Security, University of Okara
STEGANOGRAPHY TOOLS (CONTT.)
Steganography, Network Security, University of Okara
StegoShare allows embedding of large files into multiple images
STEGANOGRAPHY TOOLS (CONTT.)
Steganography, Network Security, University of Okara
Free tool that implements three layers of hidden data
STEGANOGRAPHIC
TECHNIQUES - SUBSTITUTION
The most common method is to replace the Least Significant Bit
(LSB) in substitution
RSA Algorithm
Hash LSB
DEF CON 16
See other techniques:
https://pdfs.semanticscholar.org/8946/d2ea49e2ca7c53c157bfe09c2b656fc841ce.p
df
Steganography, Network Security, University of Okara
EXERCISE
Steganography, Network Security, University of Okara
1- What is covert Channel?
2- Write a detail note on Anonymity.
3- Watermarking
4- Fingerprinting
5- Explore StirMark
6- What are different steganographic techniques?
7- Can you embed secret message into image?

More Related Content

What's hot

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 

What's hot (20)

About Steganography
About SteganographyAbout Steganography
About Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 

Viewers also liked

Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption TechniquesDel Elson
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
160529 Future Okaz Presentation
160529 Future Okaz Presentation160529 Future Okaz Presentation
160529 Future Okaz PresentationFawaz Saad
 
Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?SPC Adriatics
 
Introducing Uml And Development Process
Introducing Uml And Development ProcessIntroducing Uml And Development Process
Introducing Uml And Development ProcessTerry Cho
 
Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016Rolly Perreaux, PMP
 
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميز
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميزملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميز
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميزExcellence Dayz - ملتقى التميز المؤسسي
 
Mark syllabus 2010
Mark syllabus 2010Mark syllabus 2010
Mark syllabus 2010u083125
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSPC Adriatics
 

Viewers also liked (20)

Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
Font-End Development Tools
Font-End Development ToolsFont-End Development Tools
Font-End Development Tools
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
OSCh1
OSCh1OSCh1
OSCh1
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 
SEO
SEOSEO
SEO
 
160529 Future Okaz Presentation
160529 Future Okaz Presentation160529 Future Okaz Presentation
160529 Future Okaz Presentation
 
Operating Systems & Utility Programs
Operating Systems & Utility ProgramsOperating Systems & Utility Programs
Operating Systems & Utility Programs
 
Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?
 
Introducing Uml And Development Process
Introducing Uml And Development ProcessIntroducing Uml And Development Process
Introducing Uml And Development Process
 
Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016Deploying and Managing Project Online and Project Server 2016
Deploying and Managing Project Online and Project Server 2016
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
A Star Search
A Star SearchA Star Search
A Star Search
 
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميز
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميزملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميز
ملتقى 2016 - اليوم الأول: تجربة وزارة الخدمة المدنية في التميز
 
Mark syllabus 2010
Mark syllabus 2010Mark syllabus 2010
Mark syllabus 2010
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
 

Similar to Introduction to Steganography Techniques

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdfssuser50a5ec
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 

Similar to Introduction to Steganography Techniques (20)

F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
319 325
319 325319 325
319 325
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
F1803023843
F1803023843F1803023843
F1803023843
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Steganography
SteganographySteganography
Steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
Java Script
Java ScriptJava Script
Java Script
 
Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1
 
Group 11 introduction to registers and counters
Group 11 introduction to registers and countersGroup 11 introduction to registers and counters
Group 11 introduction to registers and counters
 
Group 9 flip flops
Group 9 flip flopsGroup 9 flip flops
Group 9 flip flops
 
Group 12 ram
Group 12 ramGroup 12 ram
Group 12 ram
 
Group 7 combinational logic
Group 7 combinational logicGroup 7 combinational logic
Group 7 combinational logic
 
What is JDBC
What is JDBCWhat is JDBC
What is JDBC
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Introduction to Steganography Techniques

  • 1. INTRODUCTION TO STEGANOGRAPHY BSIT-7th Instructor: Inam Ul Haq Inam.bth@gmail.com Steganography, Network Security, University of Okara
  • 2. TABLE OF CONTENT Information Hiding Steganography History Fields applied to Information Hiding Basic Terminologies Steganalysis Some Applications Some Tools Steganography Techniques Steganography, Network Security, University of Okara
  • 3. INFORMATION HIDING Steganography, Network Security, University of Okara F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999
  • 4. INFORMATION HIDING Information Hiding is a branch of computer science that deals with concealing the existence of a message It is related to cryptography whose intent is to render messages unreadable except by the intended recipients It employs technologies from numerous science disciplines: • Digital Signal Processing (Images, Audio, Video) • Cryptography • Information TheoryCoding Theory • Data Compression • Human Visual/Auditory perception There are four primary sub-disciplines of Information Hiding • Steganography • Watermarking • Covert Channels • Anonymity Steganography, Network Security, University of Okara
  • 5. STEGANOGRAPHY Steganography means “covered writing” • A Greek word steganos means covered, protected or concealed Definition: It is concealing any file, image, audio or video within another file. Most frequently, steganography is applied to images, but many other data or file types are possible • Audio • Video • Text • Executable programs • Links Steganography, Network Security, University of Okara
  • 6. HISTORY The concept of message hiding is not new – it’s been around for centuries • A Greek shaved the head of a slave, wrote a message, then waited for the hair to grow back before sending the slave to his destination • Steganography (in the form of invisible ink) was used by Washington in the Revolutionary War • Prior to the Civil War, quilts were sewn with special patterns to tell escaping slaves which direction to go and what to do • In the 1980’s, some of Margaret Thatcher’s cabinet documents were leaked to the press. She ordered that the word processors being used by government employees, encode their identity in the word spacing of the documents Steganography, Network Security, University of Okara
  • 7. FIELDS APPLIED TO INFORMATION HIDING Information Theory/Coding Theory Digital Signal Processing • Discrete Fourier Transform/Discrete Cosine Transform • Image/Audio/Video Processing Data Compression Cryptographic Principles Discrete Math Cryptographic Hashing Data Networks The Human Visual System/Human Auditory System • Capabilities and limitations Steganography, Network Security, University of Okara
  • 8. BASIC TERMINOLOGY The data to be hidden: • Plaintext / Secret message / Stego-message / Embedded data The data which will have a stego-message embedded in it: • Covertext / Cover-Object / • Cover-ImageCover-AudioCover-Video • Target file The key used to make the stego-message secure • Stego-Key / Secret Key / Key The file with the steganography-message embedded • Stegotext / Stego-Object / • Stego-ImageStego-AudioStego-Video Steganography, Network Security, University of Okara
  • 9. WATERMARKING Watermarking is very similar to steganography in that one of its goals is to not be detected It’s primary goal is to not be able to be extracted or destroyed (at least not without destroying the cover too) Typically, watermarking is designed to protect intellectual property rights for images, sounds, and video • If it’s easily removed or destroyed, those rights cannot be protected • There is a popular program called StirMark which does just that • Make it tamper proof Steganography, Network Security, University of Okara ANONYMITY Anonymity is about concealing the sender and receiver of messages and this is the least studied sub-discipline of information hiding
  • 10. STEGANALYSIS Steganalysis is the detection of data that has been hidden It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it Steganography, Network Security, University of Okara
  • 11. APPLICATIONS OF INFORMATION HIDING Covert military communications Covert police communications • Criminals have learned that police are nearby when they hear encrypted communications, so they reduce their activity for the moment • A steganographic system would prevent this detection Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc. Embedding textual data in medical images would better ensure that the picture belongs to a particular patient • This technique could apply to personal pictures, sounds, and movies Tamper proofing – ensuring a data file has not been changed Steganography, Network Security, University of Okara
  • 12. STEGANOGRAPHY TOOLS 1. Anubis 2. BMP Secrets 3. DarkCryptTC 4. OpenPuff 5. OpenStego 6. StegFS 7. StegoShare Other tools: https://en.wikipedia.org/wiki/Steganography_tools 12 best steganography tools: http://www.topbestalternatives.com/best-steganography- software/ Steganography, Network Security, University of Okara
  • 13. STEGANOGRAPHY TOOLS (CONTT.) Steganography, Network Security, University of Okara StegoShare allows embedding of large files into multiple images
  • 14. STEGANOGRAPHY TOOLS (CONTT.) Steganography, Network Security, University of Okara Free tool that implements three layers of hidden data
  • 15. STEGANOGRAPHIC TECHNIQUES - SUBSTITUTION The most common method is to replace the Least Significant Bit (LSB) in substitution RSA Algorithm Hash LSB DEF CON 16 See other techniques: https://pdfs.semanticscholar.org/8946/d2ea49e2ca7c53c157bfe09c2b656fc841ce.p df Steganography, Network Security, University of Okara
  • 16. EXERCISE Steganography, Network Security, University of Okara 1- What is covert Channel? 2- Write a detail note on Anonymity. 3- Watermarking 4- Fingerprinting 5- Explore StirMark 6- What are different steganographic techniques? 7- Can you embed secret message into image?