The process of hiding data in images is called steganography.
The most popular method for hiding data in files is to utilize graphic images as hiding place. Attackers can embed information such as: 1. Source code for hacking tool 2. List of compromised server 3. Plans for future attack The Basic Types of Steganography: Substitutional Steganography: some elements of the redundant covering medium are substituted by the elements of the stego medium. Selecting Steganography: some elements of the covering medium are selected to carry the hidden information. The relevant information is hidden in a narrow band region of a world wide noise. The hiding (narrow) band is changed by time to time. (Radio Communication.) Constructional steganography: the stego message is made similar to the structure of the covering medium.
Key Concepts & Components:
There is a principal difference between steganography and encryption, how ever they can meet some points too. They can be applied together, i.e. encrypted information can be hidden in addition. To hide something a covering medium is always needed. (picture, sound track, text or even the structure of a file system etc.) The covering medium must be redundant; otherwise the hidden information could be detected easily. (This is the conception of hiding into noise.) The technology of hiding should match the nature of the medium. The hidden information should not be lost, if the carrying medium is edited, modified, formatted, re-sized, compressed or printed. That’s a difficult task to realize. Nowdays the most popular application of steganography is hiding copy rights and other commercial information. Such kind of hidden information is known as e-watermark.
Submitted To: Submitted by:
Amit Mishra Manish Tanwar Astt. Professor IV Year, A2