Professional Documents
Culture Documents
Steganography
By Team: Ripped Pi-ceps / EECE (2020 Class) MTH217
- If not, the extraction process will fail and the secret data will remain friend. His name is Ahmed. He has a 001 Deadening Courageous Black Artful
it’s tied to human visual hidden. car. Its color is black.” 010 Dull Fearless Pitch-black Smart
Undetectability: An algorithm is considered undetectable if a New Message: “I have adroit friend. 100 Slow Heroic Cimmerian Adroit
person can’t detect hidden data by computing certain properties of the Stego- His name is Ahmed. He has a car. Its 101 Tedious Gallant Crepuscular Ingenious
file and comparing them to what is expected to be found in that type Image color is dark.” 110 Tiresome Stalwart Lightless Cagey
of file. LSB Secret After Decoding 111 Wearisome Valiant Unlighted Canny
Decoder First set of letters corresponding to 1000 Boring Valorous Dusky Apt
Tamper Resistance: A measure to how much the algorithm resist Second set of letters corresponding to 1010 Dull Courageous Dark Clever
the attempts to change the hidden data dark: {a, k, v} 1011 Irksome Fearless Black Artful
Robustness: This feature measures the ability of the algorithm to Hidden Message: “OK” 1101
------
Tedious
----
Heroic
----
Caliginous
----
Intelligent
----
Signal-to-Noise Ratio (SNR): The ratio between the signal the picture of the orange parrot encoded inside it using the
and noise but since in steganography the cover is actually the noise, LSB method which was explained above. But for human Syntactic Linguistic
low SNR is perfect to hide the signal. eyes, it would be impossible to guess what is hidden there or Steganography
if there was already something hidden in that picture or not. Depends on Grammatical phenomena to hide the message
For Example:
It can be used to hide the information of an invention The theory that you refer to is discredited (restrictive)
After swapping: The theory which you refer to is discredited
• John, [who you met yesterday], can’t come
Army can use audio steganography to make its
communications secret. = (non-restrictive) (no alternation is allowed)
• The management indicated
[that they had no idea what they were doing]
(the word (that) can be dropped from the complementary phrase)
Steganographic file systems can be used to hide
information between files.
Image Steganography
Using penn Complementisers / Is swapping available?
treebankII as an Relativisers
Image steganography (which is one of many types of Although we can hide any image inside any other image, input
steganography), we use an image as a cover medium to there is always a limit for the size of the image. The hidden
hold and hide our secret message. This secret message image size should be maximum 1/8 of the original image
Coding secret Insert or drop the
can be a plain text, another digital image file or any other size. And that because if you want to hide a byte using LSB message using conjunction word
type of data. method u will need another 8 bytes. trits system
References: - “Ei Nye in Chan Wai, May Aye Khine, Syntactic Bank-based Linguistic Steganography Approach, Yangon”.
- “Sangita Roy /. M. Manasmita, A Novel Approach to Format Based Text Steganography, 2006”.
- “Jessica Fredrich, Miroslav Goljan, and Rui Du , Detecting LSB Steganography in Color and Gray-Scale Images, New York, Binghamton”.