You are on page 1of 27

A PRESENTATION ON STEGANOGRA PHY

BY: AKANSHA GARG

3/10/12

INTRODUCTION
Steganography - stegno + graphy Stegno- meaning covered, from the Greek stegnos or roof Graphy- meaning writing from the Greek graphia

3/10/12

DEFINITION
Steganography is a term used to describe files that have other types of files secretly embedded inside.

By steganography, we mean the embedding of a text file, or a secret message, inside another text file , image ,sound or video.

It is in this way that steganography is a method of concealing the fact that communication is taking place in addition to 3/10/12 actually concealing an information.

HISTORY AND ORIGIN


Greeks, when wishing to send a secret message, wrote a message on messengers scalp, wait for the hair to grow back, and send that messenger to the receiver with the instructions to give him a haircut.

Use of tablets - Normal tablets are made out of wood with a wax coating. Anything that was to be inscribed on the tablets was written in the wax. To hide a message, the inscriber would write directly on the wood, then cover it with a fresh layer of wax. The tablet would then look like a fresh, new one. The receiver would then have to scrape off the wax to retrieve the desired message.

Spies during World War II- If a message were to be concealed, it would be written in a substance that would 3/10/12

GOALS AND OBJECTIVES

3/10/12

USES OF STEGANOGRAPHY POSITIVE USES:

Maintain national security. Secures confidential information.

NEGATIVE USES: Terrorist Activities

Smuggling and other illegal operations


3/10/12

TECHNIQUES OF STEGANOGRA Using Invisible ink and microdots for secreting a hidden message. PHY

Null ciphers (e.g., using the first letter of each word to form a hidden message in an otherwise innocuous text)

Digitally hiding data.


3/10/12

INVISIBLE INK METHOD

NULL CIPHERS
Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective

3/10/12

DIGITAL DATA HIDING

3/10/12

TEXT /WEB PAGES Use of a codebook


Layout of texts

IMPLEMENTA TION

Every Nth character Use of whitespaces and newlines Can be difficult to detect and 3/10/12 decode

That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discovered there. How first I entered it I scarce can say

AN In the midway of this our mortal ILLUSTRATIOlife, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell N how savage wild It were no easy task,

3/10/12

06081913030629170827 Meet

IMAG ES uses discrete cosine transformations. JPEG


Transform pixel blocks to DCT coefficients. Get least significant bit of each DCT coefficient. Replace LSB with secret message bit. 3/10/12 modified DCT into output image. Insert

IMPLEMENTA TION

AN ILLUSTRATIO N
ORIGINAL IMAGE

EMBEDDED IMAGE

No visual changes
3/10/12

IMPLEMENTA TION AUDI


O
Use frequencies inaudible to humans. Embed data using the LSB. Encoding musical tones

3/10/12

IMPLEMENTA TION VIDE


Visible signals (gestures, movements). Same techniques as with images. Same techniques as with audio.

O Video is a simultaneous combination of still images and audio

3/10/12

DETECTI ON STEGANAL

YSIS The way a steganographic image is detected.

Stegananalysis can sometimes (but very, very rarely) be done using visual detection.

Statistical analysis of the data and information.

3/10/12

TE XT for (disturbing of) patterns Look


Odd use of language Line heights and whitespaces.

DETECTI ON

3/10/12

IMAG ES color palette Examine


Size of the image

DETECTI ON

Difference in format of image Statistical analysis Analyze frequency of DCT coefficients


3/10/12

AUDI O Statistical analysis


Distortions

DETECTI ON

Analyze patterns in background noise

Measure inaudible frequencies.

3/10/12

VIDE O

DETECTI ON

Look for distinguishing movements Same techniques as with images Same techniques as with audio

3/10/12

TE XT spacing, and irrelevant material Change


Modify line heights, layout Add or remove words

DEFEATING STEGANOGRAPHY

3/10/12

IMAG ES Compress image files


Resize the image Modify colors

DEFEATING STEGANOGRAPHY

Convert to different format

3/10/12

Compress sound files Change bit rate Alter / limit frequency spectrum

AUDI O

DEFEATING STEGANOGRAPHY

3/10/12

VIDE O Compress video files

DEFEATING STEGANOGRAPHY

Convert to different format Alter video playing speed Modify colors


3/10/12

Hide data practically everywhere Detection of steganography Possible, but can be difficult Hard when done my masterminds. Defeating steganography is not hard

CONCLUS ION

3/10/12

STEGANOGR APHY
Questions?? ?
3/10/12

THANK YOU
3/10/12

You might also like