Top Banner
STEGANOGRAPHY A SEMINAR REPORT ON: Presented by: Nikhil Kumar Reg no :0601221172 under the guidance of : Miss Surapriya swain MR Alok Kumar pani
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Stegnography final

STEGANOGRAPHY

A SEMINAR REPORT ON:

Presented by:Nikhil KumarReg no :0601221172

under the guidance of:Miss Surapriya swainMR Alok Kumar pani

Page 2: Stegnography final

Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. Although Steganography is separate and distinct from cryptography,

Although the term Steganography was only coined at the end of the 15th century, the use of Steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Invisible ink has been in use for centuries—for fun by children and students and for serious espionage by spies and terrorists. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography

Steganography hides the covert message but not the fact that two parties are communicating with each other. The Steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the Steganography medium. The use of a Steganography key may be employed for encryption of the hidden message and/or for randomization in the Steganography scheme.

Introduction

Page 3: Stegnography final

What is …

1

Hiding the fact that information is being sent.

Usually hiding the data inside other data.

What is Steganography

.

2

Converting the data into non readable (non perceivable) data

It’s a way to pass data so that it become safe.Any unauthorized person is not able to understand it

What is Encryption

The data is passed in an unusual communication manner.

Page 4: Stegnography final

Fusion

Invisible Invisible

Merge

Steganography

Encryption

Page 5: Stegnography final

Needs to send private mesg

Sud get d mesg without

anybody sees it

HOW STEGANOGRAPHY WORKS?

Page 6: Stegnography final

Steganography Framework

Normal Image

Secret Key Image

Stegano Algorithm

Original Image

Message Retrieval

Ordinary Image

Secret Message

Encryption Algorithm

Secret Key Image

Secret Message

Alice Wendy Bob

Page 7: Stegnography final

STEGANOGRAPHIC SYSTEM

Page 8: Stegnography final

TerminologyPayload: the data that is desirable for transportCarrier: signal, stream or data file into which

the payload is hidden Channel: type of input, such as JPEG image Package: the resulting signal, stream or data

file which has the payload encoded Encoding density: the percentage of bytes

which are modified to encode the payload,typically as a floating-point number between 0and 1

Page 9: Stegnography final

Steganographic Techniques

Genome SteganographyHiding in TextHiding in the disk spaceHiding data in software

and circuitryInformation Hiding in

ImagesHiding in network packetsHiding in music files &

video

Page 10: Stegnography final

phgloji

m

ei

ss

un

afyn e

i

r sn

r

Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

AN EXAMPLE:

An instace from wwii

Page 11: Stegnography final

phgloji

m

ei

ss

un

afyn e

i

r sn

r

Page 12: Stegnography final

How It Work’s in case of images

Algorithm

Key Image

Unique Encryption Technique

Message Encrypted Message

Original Image Clone of Original image

Steganographic Algorithm

Key Image is an image which under goes in to an Encryption generating Algorithm which generates a unique encryption technique .

Message is encrypted using unique encryption technique

Original image is the image whose clone is created

This image is a clone of original image which contains the hidden encrypted message

Page 13: Stegnography final

• 28 possible values for each color per pixel• Not much difference in intensity between 11111111 and 11111110• Change to least significant bit of each color yields 3 bits per pixel • One ASCII character can be represented for each 3 pixels• Given the following 8 carrier bytes10010101 00001101 11001001 1001011000001111 11001011 10011111 00010000• Assume we want to insert some payload – the letter ‘G’, in ASCII: 01000111• The resulting bytes are10010100 00001101 11001000 1001011000001110 11001011 10011111 00010001• Only half of the available bytes were affected by our insertion• Change is relatively undetectable

MECHANISM AT A GLANCE

Page 14: Stegnography final

Sample Result

Before Stganography

After Stganography

Page 15: Stegnography final

Hid

ing

in T

CP

header

Places to hide message- Reserved bits- Sequence number field- Initial Sequence Number (ISN)oMakes use of three-way handshake in buildupof a TCP/IP connection

C

B

Packet with manipulated

header

Acknowledgement

A

C can

communicate

with B as A

Page 16: Stegnography final

MP3 ENCODING

Unused Header Bit Stuffing

Padding Byte Stuffing

Page 17: Stegnography final

steganalysis

Statistical analysis Analyze frequency of DCT coefficients

compressing

Page 18: Stegnography final

Detecting Steganography

Page 19: Stegnography final

Where it can be USED – Applications?

Government Agencies: --who store documents which are very sensitive

Private Organizations: -- who want to safeguard their sensitive information

IT CAN BE USED WHEREVER DATA SECURITY IS REQUIRED

Security companies: -- Can USE And SELL IBES products as stand alone or as a part of their bigger package

Banks and other financial institutions: -- safeguard their databases

Business people: --preserve legal and customer specific financial documents

Digital WatermarkingDigital Signature AuthenticationDigital Linkage and Storage

Page 20: Stegnography final

steganography

conclusion

Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.

TOO MANY SECRETSIN CONCLUSION:

Page 21: Stegnography final

Thank you

21