YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 1/18

A SEMINAR ON

“STEGANOGRAPHY AND STEGANALYSIS” 

SUBMITTED TO: SUBMITTED BY:

Ms. ANSHIKA ARJUN

Page 2: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 2/18

INTRODUCTION • Internet users frequently need to store, send or receive private

information

• This method of protecting information is known as encryption.

• A major drawback to encryption is that the existence of data is

not hidden

A solution to this problem is steganography.

word  stegano  means “covered” and  graphie  means “writing” 

Page 3: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 3/18

DEFINATION

Steganography is the art and science of writing hidden

messages in such a way that no one apart from the intended

recipient knows of the existence of the message. This can be

achieve by concealing the existence of information withinseemingly harmless carriers or cover 

Carrier: text, image, video, audio, etc.

Hidden ImageCover Image Stego Image

Page 4: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 4/18

STEGANOGRAPHY

TERMS

• Carrier File –  A file which has hidden information inside

of it.

• Steganalysis  –  The process of detecting hidden

information inside of a file.

• Stego-Medium  –  The medium in which the information is

hidden.

Page 5: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 5/18

TYPES OF

STEGANOGRAPHY 

• Music Steganography

• Image Steganography

• Text steganography

Page 6: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 6/18

MUSIC

STEGANOGRAPHY• Music steganography embeds the secret message into the

music files.

The different methods are:

- Low bit coding

- Phase coding

- Echo data hiding

Page 7: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 7/18

IMAGE

STEGANOGRAPHY • Image steganography embeds the secret data in the image.

The methods are:

-  LSB insertion in BMP images :

Here data is inserted at the LSB of each Pixel

- Random LSB Insertion :

Here Random pixels are selected & data is inserted at the

LSB of selected pixel.

Page 8: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 8/18

BMP EXAMPLE

Cover image

Image to be hidden 

Page 9: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 9/18

BMP EXAMPLE

CONTINUED Cover image

Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7

Stego image

Page 10: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 10/18

BMP EXAMPLE

Example: 8 bit color image00100111 11101001 11001000 00100111 11001000

11101001 11001000 00100111

Then each bit of binary equivalence of letter 'A' i.e. 01100101

are copied serially

(from the left hand side) to the LSB's of equivalent binary

 pattern of pixels,

resulting the bit pattern will become like this: -

00100110 11101001 11001001 00100110 11001000 

11101001 11001000 00100111 

Page 11: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 11/18

TEXT

STEGANOGRAPHY 

• In this steganography message is hidden between a text.

• Steganography in text files can be accomplished through

various techniques.

The methods are:

- Line shift coding

- Word shift coding

Page 12: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 12/18

USES OF

STEGANOGRAPHY

• Common uses include the disguising of corporate

intelligence.

• Military and intelligence agencies require unobtrusive

communications. They can do it by steganography..

•  It’s also a very good Anti-forensics mechanism to mitigate

the effectiveness of a forensics investigation

Page 13: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 13/18

STEGANALYSIS

• The art and science of detecting hidden data, determining

the length of the message, and extracting the data.

• By identifying the existence of a hidden message, perhaps

we can identify the tools used to hide it.

• If we identify the tool, perhaps we can use that tool to

extract the original message.

Page 14: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 14/18

MODELS FOR

STEGANALYSIS1. BLIND DETECTION MODEL: Detects presence of 

information without any prior knowledge of steganography

application or carrier file types that may have been used.

2. ANALYTICAL MODEL: Detects presence of file or other 

artifacts associated with a particular steganographyapplication.

Page 15: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 15/18

IMPORTANCE OF

STEGNALYSIS• Prevent Terrorist Attacks

• Catch people engaging in illegal activities

• Discourage Piracy

Page 16: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 16/18

CONCLUSION

•  Steganography has its place in security.

• There are an infinite number of steganography applications.

• Multimedia steganography are more or less vulnerable to

attack like media formatting, compression etc.

Page 17: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 17/18

REFRENCES

• www.stegoarchive.com 

www.stego.com 

• www.stegno.com 

Page 18: Stegnography and Steganalysis

8/2/2019 Stegnography and Steganalysis

http://slidepdf.com/reader/full/stegnography-and-steganalysis 18/18

 

THANK YOU!


Related Documents