2. Cryptography Cryptography derived its name from a Greek word called Kryptos which means Hidden Secrets. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain text into a data which cant be understood and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
3. Symmetric Cryptography Asymmetric Cryptography
4. Steganography Greek Words : STEGANOS Covered GRAPHIA Writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Stegosaurus: a covered lizard
5. Types of Steganography Text audio image video protocol
6. Image steganography algorithm LSB - Example A sample raster data for 3 pixels (9 bytes) may be: Inserting the binary value for A (10000001) changes 4 bits 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011
7. LSB - Uses Storing passwords and/or other confidential information Covert communication of sensitive data Speculated uses in terrorist activities Being widely used to hide and/or transfer illegal content
8. Watermarking A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, a top a dark background), caused by thickness variations in the paper.
9. Digital Watermarking A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. VISIBLE WATERMARKING INVISIBLE WATERMARKING
10. EXAMPLE OF INVISIBLE WATERMARKING
11. EXAMPLE OF VISIBLE WATERMARKING + =
12. UV Watermarking
13. APPLICATION FIELD FOR WATERMARKING INTERNET TV IIII INTERNET RADIO E-Book INTERNET NEWSPAPER EDUCATION MATERIAL INTERNET MAGZINE DOCUMENTS CERTIFICATES AUDIO TEXT IMAGE VIDEO GRAPHICS WATERMARKING TECHNOLOGY
14. Watermarking Vs. Steganography Goal of Steganography Intruder Cannot detect message Primarily 1:1 communication Goal of Watermarking Intruder cannot remove or replace the message Primarily 1: many communication
15. Cryptography vs. Steganography Cryptography: although encypted and unreadable, the existence of data is not hidden WHEREAS Steganography: no knowledge of the existence of the data