You are on page 1of 2

SYNOPSIS

Title: Steganography

What is Steganography:

 The process of hiding data in images is called steganography.


 The most popular method for hiding data in files is to utilize graphic images
as hiding place.
 Attackers can embed information such as:
1. Source code for hacking tool
2. List of compromised server
3. Plans for future attack
The Basic Types of Steganography:
 Substitutional Steganography: some elements of the redundant covering
medium are substituted by the elements of the stego medium.
 Selecting Steganography: some elements of the covering medium are
selected to carry the hidden information. The relevant information is
hidden in a narrow band region of a world wide noise. The hiding (narrow)
band is changed by time to time. (Radio Communication.)
 Constructional steganography: the stego message is made similar to the
structure of the covering medium.

Key Concepts & Components:


 There is a principal difference between steganography and encryption, how
ever they can meet some points too.
 They can be applied together, i.e. encrypted information can be hidden in
addition.
 To hide something a covering medium is always needed. (picture, sound
track, text or even the structure of a file system etc.)
 The covering medium must be redundant; otherwise the hidden
information could be detected easily. (This is the conception of hiding into
noise.)
 The technology of hiding should match the nature of the medium.
 The hidden information should not be lost, if the carrying medium is edited,
modified, formatted, re-sized, compressed or printed.
 That’s a difficult task to realize.
 Nowdays the most popular application of steganography is hiding copy
rights and other commercial information.
 Such kind of hidden information is known as e-watermark.

Submitted To: Submitted by:


Amit Mishra Manish Tanwar
Astt. Professor IV Year, A2

Computer Science

You might also like