Steganography
-
Upload
ashwini-gawand -
Category
Documents
-
view
179 -
download
2
Transcript of Steganography
![Page 1: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/1.jpg)
MESSAGE CONCEALMENTUSING
STEGANOGRAPHY
Guided By:- Presented By:
![Page 2: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/2.jpg)
• Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.
• . Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
• There exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points .
• In this report I have studied a different types of algorithms available for image steganography and a comparison of them is prepared.
• I have proposed one LSB based technique as future work
![Page 3: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/3.jpg)
• Steganography is the art and science of writing hidden messages .
• The word "Steganography" is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC.
• This is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured.
![Page 4: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/4.jpg)
Cryptography is secret writing
In cryptography the message will be encrypted and cannot be decoded without
knowing the proper key.
Steganography is the act of adding a hidden message to an image or other media file. It is similar to encrypting a document, but instead of running it through a cypher, the document is broken up and stored in unused, or unnoticable, bits within the overall image.
Watermarking attempts to hide a message as it is to tag a document for later identification. Watermarking is used to protect the copyright of the original owner
![Page 5: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/5.jpg)
Text Steganography
Line-shift encoding Word-shift encoding Feature specific encoding:
![Page 6: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/6.jpg)
Image Steganography
Image DomainTransform Domain
![Page 7: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/7.jpg)
Audio Steganography
DCTLSB
![Page 8: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/8.jpg)
WaveletsWavelets are mathematical functions that cut
up data into different frequency components, and then study each component with a resolution matched to its scale. They have advantages over traditional Fourier methods in analyzing physical situations where the signal contains discontinuities and sharp spikes.
![Page 9: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/9.jpg)
Advantages of waveletDecomposes the signal
High level and Low level
![Page 10: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/10.jpg)
System architecture
Stego-K ey k
UntrustedChannel
M essage m
StegoObjects
StegoObjects
CoverObjectc
M essage m
StegoObjects
![Page 11: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/11.jpg)
ALGORITHM
![Page 12: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/12.jpg)
HARDWARE REQURIMENT
P4 SYSTEM
SOFTWARE REQUIREMENT
MATLAB
![Page 13: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/13.jpg)
1. efficient data hiding
No change in size of audio
![Page 14: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/14.jpg)
Future Work1. Using wavelet approach to hide info inside
video
2. Combining DCT and DWT
3. Adding audio inside audio
![Page 15: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/15.jpg)
[1] T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the
Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.
[2] M.Kharrazi,H.T.Sencar and N.Menon ,”image steganography concepts and practice”,WSPC lecture
notes 2004.[3] Jamil, T., “Steganography: The art of hiding
information is plain sight”, IEEE Potentials, 18:01, 1999
[4] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
![Page 16: Steganography](https://reader036.fdocuments.in/reader036/viewer/2022082220/546f2047b4af9fc77c8b4597/html5/thumbnails/16.jpg)
Thanks