Top Banner
A SEMINAR ON “STEGANOGRAPHY AND STEGANAL YSIS” SUBMITTED TO: SUBMITTED BY : Ms. ANSHIKA ARJUN
18

Stegnography and Steganalysis

Apr 06, 2018

Download

Documents

Arjun Kalra
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 Stegnography and Steganalysis

    1/18

    A SEMINAR ON

    STEGANOGRAPHY AND STEGANALYSIS

    SUBMITTED TO: SUBMITTED BY:Ms. ANSHIKA ARJUN

  • 8/2/2019 Stegnography and Steganalysis

    2/18

    INTRODUCTION Internet users frequently need to store, send or receive private

    information

    This method of protecting information is known as encryption.

    A major drawback to encryption is that the existence of data is

    not hidden

    A solution to this problem is steganography.

    word stegano meanscoveredand graphie meanswriting

  • 8/2/2019 Stegnography and Steganalysis

    3/18

    DEFINATION

    Steganography is the art and science of writing hidden

    messages in such a way that no one apart from the intended

    recipient knows of the existence of the message. This can be

    achieve by concealing the existence of information withinseemingly harmless carriers or cover

    Carrier: text, image, video, audio, etc.

    Hidden ImageCover Image Stego Image

  • 8/2/2019 Stegnography and Steganalysis

    4/18

    STEGANOGRAPHY

    TERMS

    Carrier FileA file which has hidden information inside

    of it.

    SteganalysisThe process of detecting hidden

    information inside of a file.

    Stego-MediumThe medium in which the information is

    hidden.

  • 8/2/2019 Stegnography and Steganalysis

    5/18

    TYPES OF

    STEGANOGRAPHY

    Music Steganography

    Image Steganography

    Text steganography

  • 8/2/2019 Stegnography and Steganalysis

    6/18

    MUSIC

    STEGANOGRAPHY Music steganography embeds the secret message into the

    music files.

    The different methods are:

    - Low bit coding

    - Phase coding

    - Echo data hiding

  • 8/2/2019 Stegnography and Steganalysis

    7/18

    IMAGE

    STEGANOGRAPHY Image steganography embeds the secret data in the image.

    The methods are:

    -LSB insertion in BMP images :Here data is inserted at the LSB of each Pixel

    - Random LSB Insertion :

    Here Random pixels are selected & data is inserted at the

    LSB of selected pixel.

  • 8/2/2019 Stegnography and Steganalysis

    8/18

    BMP EXAMPLE

    Cover image

    Image to be hidden

  • 8/2/2019 Stegnography and Steganalysis

    9/18

    BMP EXAMPLE

    CONTINUEDCover image

    Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

    Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

    Stego image

  • 8/2/2019 Stegnography and Steganalysis

    10/18

    BMP EXAMPLE

    Example: 8 bit color image00100111 11101001 11001000 00100111 11001000

    11101001 11001000 00100111

    Then each bit of binary equivalence of letter 'A' i.e. 01100101

    are copied serially

    (from the left hand side) to the LSB's of equivalent binary

    pattern of pixels,

    resulting the bit pattern will become like this: -

    00100110 11101001 11001001 00100110 11001000

    11101001 11001000 00100111

  • 8/2/2019 Stegnography and Steganalysis

    11/18

    TEXT

    STEGANOGRAPHY

    In this steganography message is hidden between a text.

    Steganography in text files can be accomplished through

    various techniques.

    The methods are:

    - Line shift coding

    - Word shift coding

  • 8/2/2019 Stegnography and Steganalysis

    12/18

    USES OF

    STEGANOGRAPHY

    Common uses include the disguising of corporate

    intelligence.

    Military and intelligence agencies require unobtrusive

    communications. They can do it by steganography..

    Its also a very good Anti-forensics mechanism to mitigate

    the effectiveness of a forensics investigation

  • 8/2/2019 Stegnography and Steganalysis

    13/18

    STEGANALYSIS

    The art and science of detecting hidden data, determining

    the length of the message, and extracting the data.

    By identifying the existence of a hidden message, perhaps

    we can identify the tools used to hide it.

    If we identify the tool, perhaps we can use that tool to

    extract the original message.

  • 8/2/2019 Stegnography and Steganalysis

    14/18

    MODELS FOR

    STEGANALYSIS1. BLIND DETECTION MODEL: Detects presence ofinformation without any prior knowledge of steganography

    application or carrier file types that may have been used.

    2. ANALYTICAL MODEL: Detects presence of file or other

    artifacts associated with a particular steganographyapplication.

  • 8/2/2019 Stegnography and Steganalysis

    15/18

    IMPORTANCE OF

    STEGNALYSIS Prevent Terrorist Attacks

    Catch people engaging in illegal activities

    Discourage Piracy

  • 8/2/2019 Stegnography and Steganalysis

    16/18

    CONCLUSION

    Steganography has its place in security.

    There are an infinite number of steganography applications.

    Multimedia steganography are more or less vulnerable to

    attack like media formatting, compression etc.

  • 8/2/2019 Stegnography and Steganalysis

    17/18

    REFRENCES

    www.stegoarchive.com

    www.stego.com

    www.stegno.com

    http://www.stegoarchive.com/http://www.stego.com/http://www.stegno.com/http://www.stegno.com/http://www.stego.com/http://www.stegoarchive.com/
  • 8/2/2019 Stegnography and Steganalysis

    18/18

    THANK YOU!