SlideShare a Scribd company logo
1 of 24
STEGANOGRAPHY IN
IMAGES
NIKHIL TRIPATHI
12MCMB10
M.Tech (IT)
OVERVIEW
oSteganography Defined
oExamples in History
oDigital Approaches
oReasons For Using Digital Images
oImage Attributes
oPopular Techniques That Use Images
oSteganalysis
oAdvancements in image steganography
oTechnical limitations
STEGANOGRAPHY
DEFINED
oGreek for “covered writing”.
o“The art and science of writing hidden messages
in such a way that no one apart from the intended
recipient even knows that a message has been
sent.”
EXAMPLES IN
HISTORY
oTattoos on shaved heads
oWax-covered tablets
oInvisible Inks - milk, fruit juice
STEGANOGRAPHY V/S
CRYPTOGRAPHY
oSteganography involves the hiding of the data while
Cryptography involves the encryption and decryption
of data.
oSteganalysis involves finding out whether there is
really a hidden message or not while Cryptanalysis
involves breaking of the encrypted into decrypted
message.
STEGANOGRAPHY with
CRYPTOGRAPHY
oVery very strong when combined.
oA message sent in secret (steganography) in an
encrypted form (cryptography) is much more secure
than a "plain text" message sent by secret means or a
clearly sent encrypted message.
DIGITAL APPROACHES
oToday, it often exists within digital formats.
oIt makes use of seemingly innocent cover files
such as text, audio, and image files.
oThe embedded message may be anything that can
be encoded in binary.
REASONS FOR
USING DIGITAL
IMAGES
oIt is the most widely used medium being used today.
oTakes advantage of our limited visual perception of
colors.
oThis field is expected to continually grow as
computer graphics power also grows.
oMany programs are available to apply
steganography.
IMAGE ATTRIBUTES
oDigital images are made up of pixels.
o8-bit and 24-bit images are common.
oThe larger the image size, the more information you
can hide. However, larger images may require
compression to avoid detection.
IMAGE-BASED
TECHNIQUES
oLeast Significant Bit Insertion
oMasking and Filtering
LSB INSERTION
oReplaces least significant bits with the message
to be encoded.
oMost popular technique when dealing with
images.
oSimple, but susceptible to lossy compression and
image manipulation.
LSB - Example
A sample raster data for 3 pixels (9 bytes)
may be:
00100111 11101001 11001000
00100111 11001000 11101001
11001000 00100111 11101011
Inserting
the binary
value for
A
(10000001)
changes
4 bits
00100111 11101000 11001000
00100110 11001000 11101000
11001000 00100110 11101011
LSB Continued…
oBest to use a grayscale palette or one with gradual
changes in shades.
oOtherwise, it is best to use images with “noisy areas”
– areas with ample color variation.
LSB - Uses
oStoring passwords and/or other confidential
information.
oCovert communication of sensitive data.
oSpeculated uses in terrorist activities.
oBeing widely used to hide and/or transfer illegal
content.
MASKING & FILTERING
oMasks secret data over the original data by
changing the luminance of particular areas.
oDuring masking, it embed the message within
significant bits of the cover image.
oNot susceptible to lossy techniques because image
manipulation does not affect the secret message.
MASKING & FILTERING
- Uses
oDigital Watermarking – provides identification
pertaining to the owner; i.e. license or copyright
information.
o Fingerprinting – provides identification of the user;
used to identify and track illegal use of content.
Visible Watermark -
Example
STEGANALYSIS
Five classes of steganalysis:
o Stego-only
o Known-cover
o Known-message
o Chosen-stego and
o Chosen-message
ADVANCEMENTS
oUse of steganography for malwares to embed it in
crafted HTML and JPEG files.
e.g. Duqu worm (2011)
oAccording to recent report(30th Jan, 2012), it will be
used in android applications to send premium rates
messages.
oSelecting multiplayers’ games to use as a covert
channel.
oUse of private chat rooms as a carrier.
oResearch are being done to practice steganography
using a key not by using a method.
TECHNICAL
CHALLENGES
Limitations due to these three properties which work
in opposition to each other:-
oCAPACITY of the cover object.
oUNDETECTABILITY of the stego-object.
oROBUSTNESS of the stego-object.
oStrength often depends on attackers not knowing
how data could be hidden.
SUMMARY
oSteganography as a whole has existed in many forms
throughout much of history.
oLossless compression of images with a great deal of
color variation work best as a cover image to embed a
message.
oSteganography can be used as beneficial tool for
privacy.
oSteganography will work best if combined with
cryptography.
REFERENCES
http://www.youtube.com/watch?v=OOY-
lbDEmNM for techniques of steganography
CERIAS Steganography by John Oritz youtube
videos.
http://www.garykessler.net/library/steganography.h
tml
http://en.wikipedia.org/wiki/Digital_watermarking
http://www.youtube.com/watch?v=C0T1MbrST5U
for watermarking techniques.
http://stegano.net
QUERIES ?
<THANK YOU>

More Related Content

What's hot

What's hot (20)

Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 

Similar to Steganography in images

STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
B03208016
B03208016B03208016
B03208016inventy
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 

Similar to Steganography in images (20)

Steganography
SteganographySteganography
Steganography
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Steganography
SteganographySteganography
Steganography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Steganography
SteganographySteganography
Steganography
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
B03208016
B03208016B03208016
B03208016
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Steganography in images

  • 2. OVERVIEW oSteganography Defined oExamples in History oDigital Approaches oReasons For Using Digital Images oImage Attributes oPopular Techniques That Use Images oSteganalysis oAdvancements in image steganography oTechnical limitations
  • 3. STEGANOGRAPHY DEFINED oGreek for “covered writing”. o“The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”
  • 4. EXAMPLES IN HISTORY oTattoos on shaved heads oWax-covered tablets oInvisible Inks - milk, fruit juice
  • 5. STEGANOGRAPHY V/S CRYPTOGRAPHY oSteganography involves the hiding of the data while Cryptography involves the encryption and decryption of data. oSteganalysis involves finding out whether there is really a hidden message or not while Cryptanalysis involves breaking of the encrypted into decrypted message.
  • 6. STEGANOGRAPHY with CRYPTOGRAPHY oVery very strong when combined. oA message sent in secret (steganography) in an encrypted form (cryptography) is much more secure than a "plain text" message sent by secret means or a clearly sent encrypted message.
  • 7. DIGITAL APPROACHES oToday, it often exists within digital formats. oIt makes use of seemingly innocent cover files such as text, audio, and image files. oThe embedded message may be anything that can be encoded in binary.
  • 8. REASONS FOR USING DIGITAL IMAGES oIt is the most widely used medium being used today. oTakes advantage of our limited visual perception of colors. oThis field is expected to continually grow as computer graphics power also grows. oMany programs are available to apply steganography.
  • 9. IMAGE ATTRIBUTES oDigital images are made up of pixels. o8-bit and 24-bit images are common. oThe larger the image size, the more information you can hide. However, larger images may require compression to avoid detection.
  • 10. IMAGE-BASED TECHNIQUES oLeast Significant Bit Insertion oMasking and Filtering
  • 11. LSB INSERTION oReplaces least significant bits with the message to be encoded. oMost popular technique when dealing with images. oSimple, but susceptible to lossy compression and image manipulation.
  • 12. LSB - Example A sample raster data for 3 pixels (9 bytes) may be: 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 Inserting the binary value for A (10000001) changes 4 bits 00100111 11101000 11001000 00100110 11001000 11101000 11001000 00100110 11101011
  • 13. LSB Continued… oBest to use a grayscale palette or one with gradual changes in shades. oOtherwise, it is best to use images with “noisy areas” – areas with ample color variation.
  • 14. LSB - Uses oStoring passwords and/or other confidential information. oCovert communication of sensitive data. oSpeculated uses in terrorist activities. oBeing widely used to hide and/or transfer illegal content.
  • 15. MASKING & FILTERING oMasks secret data over the original data by changing the luminance of particular areas. oDuring masking, it embed the message within significant bits of the cover image. oNot susceptible to lossy techniques because image manipulation does not affect the secret message.
  • 16. MASKING & FILTERING - Uses oDigital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information. o Fingerprinting – provides identification of the user; used to identify and track illegal use of content.
  • 18. STEGANALYSIS Five classes of steganalysis: o Stego-only o Known-cover o Known-message o Chosen-stego and o Chosen-message
  • 19. ADVANCEMENTS oUse of steganography for malwares to embed it in crafted HTML and JPEG files. e.g. Duqu worm (2011) oAccording to recent report(30th Jan, 2012), it will be used in android applications to send premium rates messages. oSelecting multiplayers’ games to use as a covert channel. oUse of private chat rooms as a carrier. oResearch are being done to practice steganography using a key not by using a method.
  • 20. TECHNICAL CHALLENGES Limitations due to these three properties which work in opposition to each other:- oCAPACITY of the cover object. oUNDETECTABILITY of the stego-object. oROBUSTNESS of the stego-object. oStrength often depends on attackers not knowing how data could be hidden.
  • 21. SUMMARY oSteganography as a whole has existed in many forms throughout much of history. oLossless compression of images with a great deal of color variation work best as a cover image to embed a message. oSteganography can be used as beneficial tool for privacy. oSteganography will work best if combined with cryptography.
  • 22. REFERENCES http://www.youtube.com/watch?v=OOY- lbDEmNM for techniques of steganography CERIAS Steganography by John Oritz youtube videos. http://www.garykessler.net/library/steganography.h tml http://en.wikipedia.org/wiki/Digital_watermarking http://www.youtube.com/watch?v=C0T1MbrST5U for watermarking techniques. http://stegano.net