Top Banner
BY- MYNK STEGANOGRAPHY
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography

BY- MYNK

STEGANOGRAPHY

Page 2: Steganography

CONTENTS

Rise of internet SecurityInformation securityMethods to provide security to informationWhat is cryptographyProblems in cryptographyWhat is steganographyTypes of steganographyAdvantages of steganographyDisadvantages of steganographyLatest research on steganographyConclusion

Page 3: Steganography

RISE OF INTERNET

Since the rise of internet one of the most important factors of information technology.

Now a days internet became common use. As the use of internet increases providing security to the information is also important thing.

Page 4: Steganography

INFORMATION SECURITY

Information security means protecting information systems from unauthorized access, use, disruption, modification, recording or destruction.

Page 5: Steganography

METHODS OF PROVIDE SECURITY TO INFORMATION

We have two methods to provide security to the information. They are:-

● Cryptography● Steganography

Page 6: Steganography

WHAT IS CRYPTOGRAPHY

Cryptography is the study of hiding information and it is used when communicating over an untrusted medium such as internet, where information needs to be protected from other third parties.

Page 7: Steganography

PROBLEMS IN CRYPTOGRAPHY

Encrypt the message, but do not hide the message.

Suspicious (doubtful)

This problems can be overcome by Steganography.

Page 8: Steganography

WHAT IS STEGANOGRAPHY

Steganography means hiding information in other information.

The word Steganography is derived from the Greek words “STEGOS” means ‘cover’ and “GRAFIA” means ‘writing’defining it as ‘covered writing’.

Anyone else viewing this message will fail to know it contains hidden/encrypted data.

Page 9: Steganography

TYPES OF STEGANOGRAPHY

Encoding Secret Messages in Text

Encoding Secret Messages in Audio

Encoding Secret Messages in Images

Encoding Secret Messages in videos

Page 10: Steganography

TEXT STEGANOGRAPHY

Steganography in text files can be accomplished through various techniques:--

Line-shift encodingWord-shift encodingFeature encoding

Page 11: Steganography

LINE SHIFT ENCODING:- In this type of coding, Text lines is shifted up/down.

WORD SHIFT ENCODING:- In this type of encoding, Word is shifted left to right or vice versa.

FEATURE ENCODING:- In this type of encoding, minor changes occurs in shapes of characters.

Page 12: Steganography

AUDIO STEGANOGRAPHY

Audio steganography embeds the secret message into the music files having formats.

The different methods are:

Low-bit encodingPhase codingSpread spectrum

Page 13: Steganography

LOW-BIT ENCODING:- In this type of coding, data was stored in the least significant bit of images, binary data can be stored in the least significant bit of audio files.

PHASE CODING:- The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data.

SPREAD SPECTRUM:- When using a spread spectrum technique, however, the encoded data is spread across as much of the frequency spectrum as possible.

Page 14: Steganography

IMAGE STEGANOGRAPHY

Images are composed of dots called PIXELS.8-bit and 24-bit per pixel image files.Each pixel gets its own color by combining

percentages of red, green and blue(RGB).For 8bit each of these colors has value from 0

to 225.

Page 15: Steganography

Image of a tree with a steganographically hidden image.

Page 16: Steganography

VIDEO STEGANOGRAPHY

Video Steganography is a technique to hide any kind of files in any extension into a carrrying Video file.

Page 17: Steganography

ADVANTAGES

It is used in the way of hiding not the information but the password to reach that information.

Difficult to detect. Only receiver can detect.

Can be applied differently in digital image, audio and video file.

It can be done faster with the large number of softwares.

Page 18: Steganography

DISADVANTAGES

Huge number of data, huge file size, so someone can suspect about it.

If this technique is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous for all.

Page 19: Steganography

LATEST RESEARCH ON STEGANOGRAPHY

The Steganography Analysis and Research Center(SARC) is a Center of Excellence within BackboneSecurity focused exclusively on steganography research and the development of advanced steganalysis products and services. The SARC has developed state-of-the-art steganography detection and extraction capabilities that address the needs ofcomputer forensic examiners and informationtechnology security personnel in law enforcement,government agencies, military organizations, theintelligence community, and the private sector.

Page 20: Steganography

CONCLUSION

Though Steganography is not implemented in wider ways but it can be the best security tool.

The main problem of today’s world is to secure their data confidentially, the techniques used currently are not considered the best which can only be replaced by Steganography.

Page 21: Steganography

THANK YOU……….