Professional Documents
Culture Documents
Security Through Obscurity
Security Through Obscurity
Steganographic techniques
• 1.Physical steganography
Steganographic Methods
Injection
When files are created there are usually some bytes in the file that
aren’t really needed, or at least aren’t that important. These areas of
the file can be replaced with the information that is to be hidden, with
out significantly altering the file or damaging it. This allows a person to
hide information in the file and make sure that no human could detect
the change in the file.
The LSB method works best in picture files that have a high resolution
and use many different colors, and with audio files that have many
different sounds and that are of a high bit rate.
The LSB method usually does not increase the file size, but depending
on the size of the information that is to be hidden inside the file, the
file can become noticeably distorted.
Injection
Steganography In Images
Steganography In Audio
Steganography In Video
Steganography In Documents
Steganography In Images
Steganography In Audio
Hiding information inside Audio files the technique usually used is low
bit encoding which is similar to LSB that is used in Images. The
problem with low bit encoding is that it is usually noticeable to the
human ear.
Steganography In Video
DCT works by slightly changing the each of the images in the video,
only so much though so it’s isn’t noticeable by the human eye. To be
more precise about how DCT works, DCT alters values of certain parts
of the images, it usually rounds them up.
Steganography In Documents
• Cropping
• Rotating Images
• Blurring
Misuse of Steganography-
Steganography can make use of unlimited legal means to use any web
site without attracting the attention of anybody, including the owners
of the target web sites themselves, due to this it is sometime use for
unsocial activities.
Steganography v Cryptography
Micro dots
• Microdots are photographs the size of a printed period having
the clarity of standard-sized typewritten pages.
• The first microdots were discovered masquerading as a period on
a typed envelope carried by a German agent in 1941.
--Micro Dot
Live Demo
Secure Mail
Demos on Data hiding inside a
image
Demos on how data injection
_ Disadvantages
– Normally must use
the original program
to hide and reveal
data
– If the picture with the
hidden information is
converted to another
format, then the
hidden data may be
lost
FIGURE 1. The cover_image (5th wave.gif), hidden_data file (virusdetectioninfo.txt), and stego_key.