Top Banner
MESSAGE CONCEALMENT USING STEGANOGRAPHY Guided By:- Presented By:
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography

MESSAGE CONCEALMENTUSING

STEGANOGRAPHY

Guided By:- Presented By:

Page 2: Steganography

• Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.

• . Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.

• There exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points .

• In this report I have studied a different types of algorithms available for image steganography and a comparison of them is prepared.

• I have proposed one LSB based technique as future work

Page 3: Steganography

• Steganography is the art and science of writing hidden messages .

• The word "Steganography" is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC.

• This is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured.

Page 4: Steganography

Cryptography is secret writing

In cryptography the message will be encrypted and cannot be decoded without

knowing the proper key.

Steganography is the act of adding a hidden message to an image or other media file. It is similar to encrypting a document, but instead of running it through a cypher, the document is broken up and stored in unused, or unnoticable, bits within the overall image.

Watermarking attempts to hide a message as it is to tag a document for later identification. Watermarking is used to protect the copyright of the original owner

Page 5: Steganography

Text Steganography

Line-shift encoding Word-shift encoding Feature specific encoding:

Page 6: Steganography

Image Steganography

Image DomainTransform Domain

Page 7: Steganography

Audio Steganography

DCTLSB

Page 8: Steganography

WaveletsWavelets are mathematical functions that cut

up data into different frequency components, and then study each component with a resolution matched to its scale. They have advantages over traditional Fourier methods in analyzing physical situations where the signal contains discontinuities and sharp spikes.

Page 9: Steganography

Advantages of waveletDecomposes the signal

High level and Low level

Page 10: Steganography

System architecture

Stego-K ey k

UntrustedChannel

M essage m

StegoObjects

StegoObjects

CoverObjectc

M essage m

StegoObjects

Page 11: Steganography

ALGORITHM

Page 12: Steganography

HARDWARE REQURIMENT

P4 SYSTEM

SOFTWARE REQUIREMENT

MATLAB

Page 13: Steganography

1. efficient data hiding

No change in size of audio

Page 14: Steganography

Future Work1. Using wavelet approach to hide info inside

video

2. Combining DCT and DWT

3. Adding audio inside audio

Page 15: Steganography

[1] T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the

Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.

[2] M.Kharrazi,H.T.Sencar and N.Menon ,”image steganography concepts and practice”,WSPC lecture

notes 2004.[3] Jamil, T., “Steganography: The art of hiding

information is plain sight”, IEEE Potentials, 18:01, 1999

[4] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.

Page 16: Steganography

Thanks