A SEMINAR ON “STEGANOGRAPHY AND STEGANAL YSIS” SUBMITTED TO: SUBMITTED BY : Ms. ANSHIKA ARJUN
8/2/2019 Stegnography and Steganalysis
1/18
A SEMINAR ON
STEGANOGRAPHY AND STEGANALYSIS
SUBMITTED TO: SUBMITTED BY:Ms. ANSHIKA ARJUN
8/2/2019 Stegnography and Steganalysis
2/18
INTRODUCTION Internet users frequently need to store, send or receive private
information
This method of protecting information is known as encryption.
A major drawback to encryption is that the existence of data is
not hidden
A solution to this problem is steganography.
word stegano meanscoveredand graphie meanswriting
8/2/2019 Stegnography and Steganalysis
3/18
DEFINATION
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the intended
recipient knows of the existence of the message. This can be
achieve by concealing the existence of information withinseemingly harmless carriers or cover
Carrier: text, image, video, audio, etc.
Hidden ImageCover Image Stego Image
8/2/2019 Stegnography and Steganalysis
4/18
STEGANOGRAPHY
TERMS
Carrier FileA file which has hidden information inside
of it.
SteganalysisThe process of detecting hidden
information inside of a file.
Stego-MediumThe medium in which the information is
hidden.
8/2/2019 Stegnography and Steganalysis
5/18
TYPES OF
STEGANOGRAPHY
Music Steganography
Image Steganography
Text steganography
8/2/2019 Stegnography and Steganalysis
6/18
MUSIC
STEGANOGRAPHY Music steganography embeds the secret message into the
music files.
The different methods are:
- Low bit coding
- Phase coding
- Echo data hiding
8/2/2019 Stegnography and Steganalysis
7/18
IMAGE
STEGANOGRAPHY Image steganography embeds the secret data in the image.
The methods are:
-LSB insertion in BMP images :Here data is inserted at the LSB of each Pixel
- Random LSB Insertion :
Here Random pixels are selected & data is inserted at the
LSB of selected pixel.
8/2/2019 Stegnography and Steganalysis
8/18
BMP EXAMPLE
Cover image
Image to be hidden
8/2/2019 Stegnography and Steganalysis
9/18
BMP EXAMPLE
CONTINUEDCover image
Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7
Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7
Stego image
8/2/2019 Stegnography and Steganalysis
10/18
BMP EXAMPLE
Example: 8 bit color image00100111 11101001 11001000 00100111 11001000
11101001 11001000 00100111
Then each bit of binary equivalence of letter 'A' i.e. 01100101
are copied serially
(from the left hand side) to the LSB's of equivalent binary
pattern of pixels,
resulting the bit pattern will become like this: -
00100110 11101001 11001001 00100110 11001000
11101001 11001000 00100111
8/2/2019 Stegnography and Steganalysis
11/18
TEXT
STEGANOGRAPHY
In this steganography message is hidden between a text.
Steganography in text files can be accomplished through
various techniques.
The methods are:
- Line shift coding
- Word shift coding
8/2/2019 Stegnography and Steganalysis
12/18
USES OF
STEGANOGRAPHY
Common uses include the disguising of corporate
intelligence.
Military and intelligence agencies require unobtrusive
communications. They can do it by steganography..
Its also a very good Anti-forensics mechanism to mitigate
the effectiveness of a forensics investigation
8/2/2019 Stegnography and Steganalysis
13/18
STEGANALYSIS
The art and science of detecting hidden data, determining
the length of the message, and extracting the data.
By identifying the existence of a hidden message, perhaps
we can identify the tools used to hide it.
If we identify the tool, perhaps we can use that tool to
extract the original message.
8/2/2019 Stegnography and Steganalysis
14/18
MODELS FOR
STEGANALYSIS1. BLIND DETECTION MODEL: Detects presence ofinformation without any prior knowledge of steganography
application or carrier file types that may have been used.
2. ANALYTICAL MODEL: Detects presence of file or other
artifacts associated with a particular steganographyapplication.
8/2/2019 Stegnography and Steganalysis
15/18
IMPORTANCE OF
STEGNALYSIS Prevent Terrorist Attacks
Catch people engaging in illegal activities
Discourage Piracy
8/2/2019 Stegnography and Steganalysis
16/18
CONCLUSION
Steganography has its place in security.
There are an infinite number of steganography applications.
Multimedia steganography are more or less vulnerable to
attack like media formatting, compression etc.
8/2/2019 Stegnography and Steganalysis
17/18
REFRENCES
www.stegoarchive.com
www.stego.com
www.stegno.com
http://www.stegoarchive.com/http://www.stego.com/http://www.stegno.com/http://www.stegno.com/http://www.stego.com/http://www.stegoarchive.com/8/2/2019 Stegnography and Steganalysis
18/18
THANK YOU!