P. 1
Steganography Final

Steganography Final

|Views: 17|Likes:
Published by Dalia Montasser

More info:

Published by: Dalia Montasser on Dec 31, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

03/08/2014

pdf

text

original

Steganography

Agenda
 What is Steganography?  Steganography Techniques.

 Hierarchy.
 Steganography VS Cryptography.

 Data hiding VS watermarking.
 What is Steganalysis?  Categorizes of Steganalysis.

 Applications.

Agenda
 What is Steganography?
 Steganography Techniques.  Hierarchy.  Steganography VS Cryptography.

 Data hiding VS watermarking.
 What is Steganalysis?  Categorizes of Steganalysis.  Applications.

Steganós (Stegano)  Covered or protected Graphei (Graphy)  writing Stegano .Graphy  Covered Writing.    .What is Steganography ??  It is a Greek word.

What is Steganography ??  Practice of hiding information within other information Is the art and science of writing hidden messages in such a way that no one. suspects the existence of the message. apart from the sender and intended recipient.  .

 Hierarchy.  Applications.  Data hiding VS watermarking.  What is Steganalysis?  Categorizes of Steganalysis.  Steganography VS Cryptography.Agenda  What is Steganography?  Steganography Techniques. .

Steganography techniques      Physical Steganography  Digital Steganography Network Steganography Audio Steganography Past Current E-Text Steganography .

(drawbacks) Secret ink.Physical Steganography  The first recorded uses of Steganography can be traced back to 440 BC. Wax tablets. Text messages.     . Messenger's body.

Unexpected precipitation Smothers Eastern towns. The highways are knowingly slippery.Physical Steganography cont’d text Steganography News Eight Weather: Tonight increasing snow. Be extremely cautious and use snow tires especially heading east. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday First letter of each word yields: Newt is upset because he thinks he is President .

videos. etc. Images .Digital Steganography  Modern Steganography entered the world in 1985.   . The boom of Steganography coincides with the appearance of the Internet.

The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. .Digital Steganography cont’d Image of a tree with a steganographically hidden image.

Digital Steganography cont’d .

Digital Steganography cont’d Why LSB ??? concealing .

Why LSB???? MSB 1 0 0 0 0 0 0 LSB 1 (10000001)2 = (129)10 1 0 0 0 0 0 0 0 (10000000)2 = (128)10 0 0 0 0 0 0 0 1 (00000001)2 = (1)10 .

Digital Steganography cont’d Revealing .

ideally.  .Network Steganography  Is a part of information hiding focused on modern networks and is a method of hiding secret data in users' normal data transmissions. so it cannot be detected by third parties. EX: LACK ( Lost Audio Packets Steganography).

Network Steganography cont’d LACK .

Parity coding. Echo hiding. the cover audio message before Steganography and the stego message after Steganography remains the same. Spread spectrum. .  Methods: LSB coding.Audio Steganography  Audio Steganography requires a text or audio secret message to be embedded within a cover audio message. Phase coding. Due to availability of redundancy.

Audio Steganography cont’d .

Audio Steganography cont’d LSB coding .

. it requires less memory and provides for simpler communication. However.E-Text Steganography  text Steganography is considered to be the most difficult kind of Steganography due to the lack of redundancy in text as compared to image or audio.

 Steganography VS Cryptography. Hierarchy.Agenda  What is Steganography?  Steganography Techniques.  What is Steganalysis?  Categorizes of Steganalysis. .  Data hiding VS watermarking.  Applications.

Hierarchy Secret writing Cryptography Steganography Protection against detection (data hiding) Protection against removal (document marking) Watermarking Fingerprinting .

.  What is Steganalysis?  Categorizes of Steganalysis.  Data hiding VS watermarking.  Hierarchy. Steganography VS Cryptography.  Applications.Agenda  What is Steganography?  Steganography Techniques.

but not the existence of the message. . •one cannot decode the message without knowing the proper key. Cryptography •Cryptography is hiding the content of the message. •one can tell that a message has been encrypted.Steganography VS Cryptography Steganography •The message may not be difficult to decode •Most people would not detect the presence of the message.

Why Steganography?  Encrypted messages are obvious . Russia. Thus. Iraq .  .using Steganography we can hide them in other innocuous looking objects so that their very presence is not revealed. Iran. Steganography can be a feasible alter.).native in countries where usage of encryption is illegal (China....

.  What is Steganalysis?  Categorizes of Steganalysis. Data hiding VS watermarking.  Applications.Agenda  What is Steganography?  Steganography Techniques.  Steganography VS Cryptography.  Hierarchy.

in such a way that an eavesdropper cannot detect the presence of m in d'. So. Similar to encrypting a document. So. bits within the overall image. to obtain new data d'. in such a way that an eavesdropper cannot remove or replace m in d‘. but instead of running it through a cipher. Placing a watermark in an image or other media file serves to identify the artist or author of the work. by people. to obtain new data d'. practically indistinguishable from d. should the image be used without permission by someone else. Watermarking is used to protect the copyright of the original owner. practically indistinguishable from d.Data hiding VS Watermarking Steganography (data hiding) Watermarking Adding a hidden message to an image or other media file. by people. the main goal of Steganography is to hide a message m in some audio or video (cover) data d. the main goal of watermarking is to hide a message m in some audio or video (cover) data d. to make their claim stronger. the document is broken up and stored in unused. So. or unnoticeable. . Similar to steganography BUT has a completely different purpose. it isn’t for the purpose of hiding data.

 Applications.  Steganography VS Cryptography.Agenda  What is Steganography?  Steganography Techniques. .  Hierarchy.  What is Steganalysis?  Categorizes of Steganalysis.  Data hiding VS watermarking.

 The goal: is to discover hidden information and to break the security of its carriers ( the files which have hidden information inside of them).Steganalysis  What is Steganalysis?  Steganalysis is the discovery of the existence of hidden information. therefore. . like cryptography and cryptanalysis.

 Data hiding VS watermarking.Agenda  What is Steganography?  Steganography Techniques.  Steganography VS Cryptography.  Hierarchy.  Applications. .  What is Steganalysis?  Categorizes of Steganalysis.

It depends on the knowledge of the steganographic algorithm used. Steganalysis algorithms can be categorized as:  Targeted Steganalysis : ○ is one that is designed to detect stego Works that are created by one or more particular steganographic methods. This provides a powerful clue with which to choose the feature representation. .  Blind Steganalysis: ○ If the method of detection is independent of the Steganography method used.

 Steganography VS Cryptography.  What is Steganalysis?  Categorizes of Steganalysis.  Applications. .  Hierarchy.Agenda  What is Steganography?  Steganography Techniques.  Data hiding VS watermarking.

Applications 1. Publishing digital contents on the web and limiting the controlling the access of those contents. . Barely visible tiny yellow dots are added to each page encoded printer serial numbers. 2.  Access control system for digital content distribution. date and time stamps.  Usage in modern printers.

com/?m=200811 http://stegano.org/wiki/Steganography#Applications Web-based Multimedia Steganography System – Paper.org/wiki/Steganography http://stegano.png http://wajdyessam.com/2010/06/audi o-steg.net/tutorial.net/workshop/ http://arxivblog.htm l#echo http://mynetworksecurity.html http://en.wikipedia.wordpress.com/BPCSe/applications-e.wikipedia.References             http://www.html http://www.datahide.html http://en.sudancs. Digital Watermarking and Steganography – Second Edition .datahide.com/BPCSe/applications-e.files.snotmonkey.com/?p=159 http://www.com/work/school/405/methods.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->