STEGANOGRAPHY
www.company.com
INTRODUCTION
Art and science of writing hidden
messages
No one apart from the sender and intended recipient, suspects the existence of the
message
A form of security through obscurity
ETYMOLOGY
Steganós
• Covered
Graptos
• Writing
www.company.com
HISTORY OF STEGANOGRAPHY
Current
440 B.C.
EVOLUTION
Watermarking
Cryptography
Steganography
www.company.com
ADVANTAGE OF STEGANOGRAPHY
OVER CRYPTOGRAPHY
Messages do not attract attention to themselvesProtects both messages and communicating parties
www.company.com
TYPES OF STEGANOGRAPH
Y
Steganography In Text/Documents
Steganography In Video
Steganography In Audio
Steganography In Images
STEGANOGRAPHY TERMS
Carrier or Cover File
Stego-Medium
Embedded or Payload
Steganalysis
VIDEO
www.company.comHOW IT WORKS
www.company.com
STEGANOGRAP
HY STEPS
Steganography
Encoding a message Decode a message
MESSAGE
Embed
ded Data
Plain info
MESSAGE
www.company.com
ENCODING
• Prepare cover data
Step1
www.company.com
DECODING
• Steganographic Data
Step1
www.company.com
STEGANALYSIS
Art and Science of detecting hidden messages
Just discover Steganography
Not deals with decrypting the data
STEGANOGRAPHY TECHNIQUES
Line Shift Coding
Word Shift Coding
Feature Coding
Least Significant Bit Insertion
Low bit encoding
Masking and Filtering
www.company.com
STEGANOGRAPHY USING LEAST SIGNIFICANT BIT
PRACTICAL
www.company.comList of some tools for Steganography
Program Image files Audio files Video files Document files
OpenPuff
BMP, JPG, PNG, TGA
Mp3, WAV 3gp, Mp4, MPEG-1,
MPEG-2, VOB, SWF, FLV
MP3Stego - Mp3 - -
OpenStego BMP, PNG - - -
S-Tools BMP, GIF Wav - -
StegFS - - - -
Steganographic Laboratory (VSL)
BMP, PNG, JPG, TIFF
- - -
PHP-Class StreamSteganography
PNG - - -
www.company.com
USAGE IN MODERN
PRINTERS
www.company.com
ILLEGAL USAGE
HACKERS
TERRORISTS
CRIMINALS
CONCLUSION
www.company.com
QUERIES
?