Stegnography and Steganalysis

Post on 06-Apr-2018

221 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 1/18

A SEMINAR ON

“STEGANOGRAPHY AND STEGANALYSIS” 

SUBMITTED TO: SUBMITTED BY:

Ms. ANSHIKA ARJUN

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 2/18

INTRODUCTION • Internet users frequently need to store, send or receive private

information

• This method of protecting information is known as encryption.

• A major drawback to encryption is that the existence of data is

not hidden

A solution to this problem is steganography.

word  stegano  means “covered” and  graphie  means “writing” 

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 3/18

DEFINATION

Steganography is the art and science of writing hidden

messages in such a way that no one apart from the intended

recipient knows of the existence of the message. This can be

achieve by concealing the existence of information withinseemingly harmless carriers or cover 

Carrier: text, image, video, audio, etc.

Hidden ImageCover Image Stego Image

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 4/18

STEGANOGRAPHY

TERMS

• Carrier File –  A file which has hidden information inside

of it.

• Steganalysis  –  The process of detecting hidden

information inside of a file.

• Stego-Medium  –  The medium in which the information is

hidden.

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 5/18

TYPES OF

STEGANOGRAPHY 

• Music Steganography

• Image Steganography

• Text steganography

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 6/18

MUSIC

STEGANOGRAPHY• Music steganography embeds the secret message into the

music files.

The different methods are:

- Low bit coding

- Phase coding

- Echo data hiding

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 7/18

IMAGE

STEGANOGRAPHY • Image steganography embeds the secret data in the image.

The methods are:

-  LSB insertion in BMP images :

Here data is inserted at the LSB of each Pixel

- Random LSB Insertion :

Here Random pixels are selected & data is inserted at the

LSB of selected pixel.

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 8/18

BMP EXAMPLE

Cover image

Image to be hidden 

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 9/18

BMP EXAMPLE

CONTINUED Cover image

Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

Stego image

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 10/18

BMP EXAMPLE

Example: 8 bit color image00100111 11101001 11001000 00100111 11001000

11101001 11001000 00100111

Then each bit of binary equivalence of letter 'A' i.e. 01100101

are copied serially

(from the left hand side) to the LSB's of equivalent binary

 pattern of pixels,

resulting the bit pattern will become like this: -

00100110 11101001 11001001 00100110 11001000 

11101001 11001000 00100111 

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 11/18

TEXT

STEGANOGRAPHY 

• In this steganography message is hidden between a text.

• Steganography in text files can be accomplished through

various techniques.

The methods are:

- Line shift coding

- Word shift coding

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 12/18

USES OF

STEGANOGRAPHY

• Common uses include the disguising of corporate

intelligence.

• Military and intelligence agencies require unobtrusive

communications. They can do it by steganography..

•  It’s also a very good Anti-forensics mechanism to mitigate

the effectiveness of a forensics investigation

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 13/18

STEGANALYSIS

• The art and science of detecting hidden data, determining

the length of the message, and extracting the data.

• By identifying the existence of a hidden message, perhaps

we can identify the tools used to hide it.

• If we identify the tool, perhaps we can use that tool to

extract the original message.

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 14/18

MODELS FOR

STEGANALYSIS1. BLIND DETECTION MODEL: Detects presence of 

information without any prior knowledge of steganography

application or carrier file types that may have been used.

2. ANALYTICAL MODEL: Detects presence of file or other 

artifacts associated with a particular steganographyapplication.

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 15/18

IMPORTANCE OF

STEGNALYSIS• Prevent Terrorist Attacks

• Catch people engaging in illegal activities

• Discourage Piracy

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 16/18

CONCLUSION

•  Steganography has its place in security.

• There are an infinite number of steganography applications.

• Multimedia steganography are more or less vulnerable to

attack like media formatting, compression etc.

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 17/18

REFRENCES

• www.stegoarchive.com 

www.stego.com 

• www.stegno.com 

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 18/18

 

THANK YOU!

top related