8/14/2019 Steganography Final New
1/18
Steganography
Swami Vivekanand College Of Computer Science( Bhavnagar )
8/14/2019 Steganography Final New
2/18
History of Steganography
: During World War 2 invisible ink was used to write information onpieces of paper so that the paper appeared to the average person as justbeing blank pieces of paper. Liquids such as milk, vinegar and fruitjuices were used, because when each one of these substances are heatedthey darken and become visible to the human eye.
In Ancient Greece they used to select Messengers and shave their head,they would then write a message on their head. Once the message had
been written the hair was allowed to grow back. After the hair grew backthe messenger was sent to deliver the message, the recipient would shaveoff the messengers hair to see the secret message.
Another method used in Greece was where someone would peel wax offa tablet that was covered in wax, write a message underneath the waxthen re-apply the wax. The recipient of the message would simplyremove the wax from the tablet to view the message.
8/14/2019 Steganography Final New
3/18
Introduction :Advance security is not maintained by the password protection but it is gained by hiding the
existence of the data, which can only be done by Steganography.
Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts.
Steganographic Systems can hide messages inside of Digital Objects such as a file that
has been concealed inside a Digital Picture, Video or Audio file.
The main advantage of Steganography is, it hides the information in sucha way that there is no information hidden at all.
This is derived from the name of lizard Stegosaurs.
8/14/2019 Steganography Final New
4/18
Evolution :
8/14/2019 Steganography Final New
5/18
It comes from the Greek words :
Steganography is the art and science of hiding the fact that
communication is taking place.
Definition :
8/14/2019 Steganography Final New
6/18
Types of Steganography :
8/14/2019 Steganography Final New
7/18
Substitution : Files are created in bytes . Least bits are used for information hiding.
It is done without altering the file or damaging it.
In LSB method Picture files that have a high resolution & with Audiofiles with different sounds of high bit rate. Are used to hide the
information in them.
Injection :
It is a simple method. The information is directly injected in carrier file. Butin this method it increases the file size.
The carrier file is the file in which the STEGDATA is encoded and sent to the
receiver side.
So the other side decodes this file and get the secret information.
Techniques ofSteganography:
8/14/2019 Steganography Final New
8/18
How it works :In this our original data is embed with the
carrier file to form STEGDATA.
8/14/2019 Steganography Final New
9/18
8/14/2019 Steganography Final New
10/18
Example:
8/14/2019 Steganography Final New
11/18
8/14/2019 Steganography Final New
12/18
8/14/2019 Steganography Final New
13/18
Detecting Steganography
: The art of detecting Steganography is referred to as
Steganalysis.
Using different tools like sendsecret, Steganography 8.1 ,Stegdetect, Hiderman etc.
Steganalysis does not deal with trying to decrypt the hidden
information inside of a file, just discovering it.
It is mainly done with comparing the encrypted file with the
original copy.
It can be done through Histogram technique.
Information hiddenbehind the image.
8/14/2019 Steganography Final New
14/18
Detecting By histogram
technique :
8/14/2019 Steganography Final New
15/18
Advantages : It is used in the way of hiding not the
Information but the password to reach
that Information.
Only receiver can detect.
Can be applied differently in digital
image, audio & video file.
It can be done faster with the large no
of software's.
8/14/2019 Steganography Final New
16/18
Disadvantages :Huge number of data = huge file size, sosome one can suspect about it.
In sending and receiving information canbe leaked.
The confidentiality of information is
maintained by the algorithms, and if the
algorithms are known then its all over.
If this technique is gone in the wrong
hands like hackers, terrorist ,criminals
then this can be very much dangerous for
all.
8/14/2019 Steganography Final New
17/18
Conclusion : Though steganography is not implemented in wider ways but it can be the
best security tool.
The main problem of today's world is to secure their data confidentially, thetechniques used currently are not considered the best which can only be
replaced by Steganography.
If it gets in the hand of terrorist then it could be even worse than WTC Attack
in which steganography was used.
8/14/2019 Steganography Final New
18/18
Top Related