SlideShare a Scribd company logo
1 of 21
Download to read offline
STEGANOGRAPHY




         BY- MYNK
CONTENTS

 Rise of internet
 Security
 Information security
 Methods to provide security to information
 What is cryptography
 Problems in cryptography
 What is steganography
 Types of steganography
 Advantages of steganography
 Disadvantages of steganography
 Latest research on steganography
 Conclusion
RISE OF INTERNET



 Since the rise of internet one of the most
  important factors of information technology.

 Now a days internet became common use. As the
  use of internet increases providing security to the
  information is also important thing.
INFORMATION SECURITY




Information security means protecting information
  systems from unauthorized
  access, use, disruption, modification, recording or
  destruction.
METHODS OF PROVIDE SECURITY TO
           INFORMATION

We have two methods to provide security to the
 information. They are:-

● Cryptography
● Steganography
WHAT IS CRYPTOGRAPHY




Cryptography is the study of hiding information and it
 is used when communicating over an untrusted
 medium such as internet, where information needs
 to be protected from other third parties.
PROBLEMS IN CRYPTOGRAPHY



 Encrypt the message, but do not hide the message.
 Suspicious (doubtful)




This problems can be overcome by Steganography.
WHAT IS STEGANOGRAPHY

 Steganography means hiding information in other
  information.
 The word Steganography is derived from the Greek
  words “STEGOS” means „cover‟ and “GRAFIA”
  means „writing‟defining it as „covered writing‟.
 Anyone else viewing this message will fail to know it
  contains hidden/encrypted data.
TYPES OF STEGANOGRAPHY

 Encoding Secret Messages in Text


 Encoding Secret Messages in Audio


 Encoding Secret Messages in Images


 Encoding Secret Messages in videos
TEXT STEGANOGRAPHY

Steganography in text files can be accomplished
  through various techniques:--



 Line-shift encoding
 Word-shift encoding
 Feature encoding
 LINE SHIFT ENCODING:- In this type of
 coding, Text lines is shifted up/down.

 WORD SHIFT ENCODING:- In this type of
 encoding, Word is shifted left to right or vice versa.

 FEATURE ENCODING:- In this type of
 encoding, minor changes occurs in shapes of
 characters.
AUDIO STEGANOGRAPHY

Audio steganography embeds the secret message into
 the music files having formats.

The different methods are:

 Low-bit encoding
 Phase coding
 Spread spectrum
 LOW-BIT ENCODING:- In this type of coding, data
  was stored in the least significant bit of
  images, binary data can be stored in the least
  significant bit of audio files.
 PHASE CODING:- The phase coding method works
  by substituting the phase of an initial audio segment
  with a reference phase that represents the data.
 SPREAD SPECTRUM:- When using a spread
  spectrum technique, however, the encoded data is
  spread across as much of the frequency spectrum as
  possible.
IMAGE STEGANOGRAPHY

 Images are composed of dots called PIXELS.
 8-bit and 24-bit per pixel image files.
 Each pixel gets its own color by combining
  percentages of red, green and blue(RGB).
 For 8bit each of these colors has value from 0 to 225.
Image of a tree
     with a
steganographicall
y
hidden image.
VIDEO STEGANOGRAPHY



Video Steganography is a technique to hide
 any kind of files in any extension into a
 carrrying Video file.
ADVANTAGES

 It is used in the way of hiding not the information
 but the password to reach that information.

 Difficult to detect. Only receiver can detect.


 Can be applied differently in digital image, audio and
 video file.

 It can be done faster with the large number of
 softwares.
DISADVANTAGES

 Huge number of data, huge file size, so someone can
 suspect about it.



 If this technique is gone in the wrong hands like
 hackers, terrorist, criminals then this can be very
 much dangerous for all.
LATEST RESEARCH ON STEGANOGRAPHY

 The Steganography Analysis and Research Center
(SARC) is a Center of Excellence within Backbone
Security focused exclusively on steganography
research and the development of advanced
steganalysis products and services. The SARC has
developed state-of-the-art steganography detection
and extraction capabilities that address the needs of
computer forensic examiners and information
technology security personnel in law enforcement,
government agencies, military organizations, the
intelligence community, and the private sector.
CONCLUSION

 Though Steganography is not implemented in wider
 ways but it can be the best security tool.

 The main problem of today‟s world is to secure their
 data confidentially, the techniques used currently are
 not considered the best which can only be replaced
 by Steganography.
THANK YOU……….

More Related Content

What's hot

Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 

What's hot (20)

steganography
steganographysteganography
steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Steganography
Steganography Steganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Understanding Steganography: Hiding Secret Messages in Plain Sight

Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptxAutuag
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 

Similar to Understanding Steganography: Hiding Secret Messages in Plain Sight (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography Project.pptx
Steganography Project.pptxSteganography Project.pptx
Steganography Project.pptx
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Steganography
SteganographySteganography
Steganography
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 

More from Mayank Saxena (19)

operating system
operating systemoperating system
operating system
 
operating system
operating systemoperating system
operating system
 
Financial services marketing
Financial services marketingFinancial services marketing
Financial services marketing
 
Introduction to financial service
Introduction to financial serviceIntroduction to financial service
Introduction to financial service
 
il&fs investmart
 il&fs investmart il&fs investmart
il&fs investmart
 
financial services
financial servicesfinancial services
financial services
 
Array
ArrayArray
Array
 
Html tutorial.02
Html tutorial.02Html tutorial.02
Html tutorial.02
 
Introduction html
Introduction htmlIntroduction html
Introduction html
 
Silc
SilcSilc
Silc
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Vlan
VlanVlan
Vlan
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Silc
SilcSilc
Silc
 
Wi fi
Wi fiWi fi
Wi fi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
artificial intelligence
artificial intelligenceartificial intelligence
artificial intelligence
 
4 g world
4 g world4 g world
4 g world
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 

Understanding Steganography: Hiding Secret Messages in Plain Sight

  • 1. STEGANOGRAPHY BY- MYNK
  • 2. CONTENTS  Rise of internet  Security  Information security  Methods to provide security to information  What is cryptography  Problems in cryptography  What is steganography  Types of steganography  Advantages of steganography  Disadvantages of steganography  Latest research on steganography  Conclusion
  • 3. RISE OF INTERNET  Since the rise of internet one of the most important factors of information technology.  Now a days internet became common use. As the use of internet increases providing security to the information is also important thing.
  • 4. INFORMATION SECURITY Information security means protecting information systems from unauthorized access, use, disruption, modification, recording or destruction.
  • 5. METHODS OF PROVIDE SECURITY TO INFORMATION We have two methods to provide security to the information. They are:- ● Cryptography ● Steganography
  • 6. WHAT IS CRYPTOGRAPHY Cryptography is the study of hiding information and it is used when communicating over an untrusted medium such as internet, where information needs to be protected from other third parties.
  • 7. PROBLEMS IN CRYPTOGRAPHY  Encrypt the message, but do not hide the message.  Suspicious (doubtful) This problems can be overcome by Steganography.
  • 8. WHAT IS STEGANOGRAPHY  Steganography means hiding information in other information.  The word Steganography is derived from the Greek words “STEGOS” means „cover‟ and “GRAFIA” means „writing‟defining it as „covered writing‟.  Anyone else viewing this message will fail to know it contains hidden/encrypted data.
  • 9. TYPES OF STEGANOGRAPHY  Encoding Secret Messages in Text  Encoding Secret Messages in Audio  Encoding Secret Messages in Images  Encoding Secret Messages in videos
  • 10. TEXT STEGANOGRAPHY Steganography in text files can be accomplished through various techniques:--  Line-shift encoding  Word-shift encoding  Feature encoding
  • 11.  LINE SHIFT ENCODING:- In this type of coding, Text lines is shifted up/down.  WORD SHIFT ENCODING:- In this type of encoding, Word is shifted left to right or vice versa.  FEATURE ENCODING:- In this type of encoding, minor changes occurs in shapes of characters.
  • 12. AUDIO STEGANOGRAPHY Audio steganography embeds the secret message into the music files having formats. The different methods are:  Low-bit encoding  Phase coding  Spread spectrum
  • 13.  LOW-BIT ENCODING:- In this type of coding, data was stored in the least significant bit of images, binary data can be stored in the least significant bit of audio files.  PHASE CODING:- The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data.  SPREAD SPECTRUM:- When using a spread spectrum technique, however, the encoded data is spread across as much of the frequency spectrum as possible.
  • 14. IMAGE STEGANOGRAPHY  Images are composed of dots called PIXELS.  8-bit and 24-bit per pixel image files.  Each pixel gets its own color by combining percentages of red, green and blue(RGB).  For 8bit each of these colors has value from 0 to 225.
  • 15. Image of a tree with a steganographicall y hidden image.
  • 16. VIDEO STEGANOGRAPHY Video Steganography is a technique to hide any kind of files in any extension into a carrrying Video file.
  • 17. ADVANTAGES  It is used in the way of hiding not the information but the password to reach that information.  Difficult to detect. Only receiver can detect.  Can be applied differently in digital image, audio and video file.  It can be done faster with the large number of softwares.
  • 18. DISADVANTAGES  Huge number of data, huge file size, so someone can suspect about it.  If this technique is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous for all.
  • 19. LATEST RESEARCH ON STEGANOGRAPHY The Steganography Analysis and Research Center (SARC) is a Center of Excellence within Backbone Security focused exclusively on steganography research and the development of advanced steganalysis products and services. The SARC has developed state-of-the-art steganography detection and extraction capabilities that address the needs of computer forensic examiners and information technology security personnel in law enforcement, government agencies, military organizations, the intelligence community, and the private sector.
  • 20. CONCLUSION  Though Steganography is not implemented in wider ways but it can be the best security tool.  The main problem of today‟s world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography.