Top Banner

of 18

Steganography Final New

May 30, 2018

Download

Documents

amitpatel111
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/14/2019 Steganography Final New

    1/18

    Steganography

    Swami Vivekanand College Of Computer Science( Bhavnagar )

  • 8/14/2019 Steganography Final New

    2/18

    History of Steganography

    : During World War 2 invisible ink was used to write information onpieces of paper so that the paper appeared to the average person as justbeing blank pieces of paper. Liquids such as milk, vinegar and fruitjuices were used, because when each one of these substances are heatedthey darken and become visible to the human eye.

    In Ancient Greece they used to select Messengers and shave their head,they would then write a message on their head. Once the message had

    been written the hair was allowed to grow back. After the hair grew backthe messenger was sent to deliver the message, the recipient would shaveoff the messengers hair to see the secret message.

    Another method used in Greece was where someone would peel wax offa tablet that was covered in wax, write a message underneath the waxthen re-apply the wax. The recipient of the message would simplyremove the wax from the tablet to view the message.

  • 8/14/2019 Steganography Final New

    3/18

    Introduction :Advance security is not maintained by the password protection but it is gained by hiding the

    existence of the data, which can only be done by Steganography.

    Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts.

    Steganographic Systems can hide messages inside of Digital Objects such as a file that

    has been concealed inside a Digital Picture, Video or Audio file.

    The main advantage of Steganography is, it hides the information in sucha way that there is no information hidden at all.

    This is derived from the name of lizard Stegosaurs.

  • 8/14/2019 Steganography Final New

    4/18

    Evolution :

  • 8/14/2019 Steganography Final New

    5/18

    It comes from the Greek words :

    Steganography is the art and science of hiding the fact that

    communication is taking place.

    Definition :

  • 8/14/2019 Steganography Final New

    6/18

    Types of Steganography :

  • 8/14/2019 Steganography Final New

    7/18

    Substitution : Files are created in bytes . Least bits are used for information hiding.

    It is done without altering the file or damaging it.

    In LSB method Picture files that have a high resolution & with Audiofiles with different sounds of high bit rate. Are used to hide the

    information in them.

    Injection :

    It is a simple method. The information is directly injected in carrier file. Butin this method it increases the file size.

    The carrier file is the file in which the STEGDATA is encoded and sent to the

    receiver side.

    So the other side decodes this file and get the secret information.

    Techniques ofSteganography:

  • 8/14/2019 Steganography Final New

    8/18

    How it works :In this our original data is embed with the

    carrier file to form STEGDATA.

  • 8/14/2019 Steganography Final New

    9/18

  • 8/14/2019 Steganography Final New

    10/18

    Example:

  • 8/14/2019 Steganography Final New

    11/18

  • 8/14/2019 Steganography Final New

    12/18

  • 8/14/2019 Steganography Final New

    13/18

    Detecting Steganography

    : The art of detecting Steganography is referred to as

    Steganalysis.

    Using different tools like sendsecret, Steganography 8.1 ,Stegdetect, Hiderman etc.

    Steganalysis does not deal with trying to decrypt the hidden

    information inside of a file, just discovering it.

    It is mainly done with comparing the encrypted file with the

    original copy.

    It can be done through Histogram technique.

    Information hiddenbehind the image.

  • 8/14/2019 Steganography Final New

    14/18

    Detecting By histogram

    technique :

  • 8/14/2019 Steganography Final New

    15/18

    Advantages : It is used in the way of hiding not the

    Information but the password to reach

    that Information.

    Only receiver can detect.

    Can be applied differently in digital

    image, audio & video file.

    It can be done faster with the large no

    of software's.

  • 8/14/2019 Steganography Final New

    16/18

    Disadvantages :Huge number of data = huge file size, sosome one can suspect about it.

    In sending and receiving information canbe leaked.

    The confidentiality of information is

    maintained by the algorithms, and if the

    algorithms are known then its all over.

    If this technique is gone in the wrong

    hands like hackers, terrorist ,criminals

    then this can be very much dangerous for

    all.

  • 8/14/2019 Steganography Final New

    17/18

    Conclusion : Though steganography is not implemented in wider ways but it can be the

    best security tool.

    The main problem of today's world is to secure their data confidentially, thetechniques used currently are not considered the best which can only be

    replaced by Steganography.

    If it gets in the hand of terrorist then it could be even worse than WTC Attack

    in which steganography was used.

  • 8/14/2019 Steganography Final New

    18/18