Professional Documents
Culture Documents
Security
Presented by:
Sharika shankar
1 Roll:no-25
Outline
1. What is steganography?
2. Comparison
3. Steganography model
4. Steganography security principle
5. Steganalysis
6. Steganalysis attack
7. Steganalysis techniques
8. Tools
9. Advantages
10. Applications
11. Limitations
12. Conclusion
2 13. Reference STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
What is Steganography?
watermarking
cryptography
steganography
4 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
Comparison
iin
2. Algorithm-secrecy/key-secrecy based
security-
Kerckhoff’s principle:
1.The embedding algorithm is know to be public.
2.By using embedding key in embedding process to
extract the embedded data by corresponding
extraction key.
10 STEGANOGRAPHY SECURITY: PRINCIPLE AND
PRACTICE
Steganalysis
Visual attack:
enable humans to distinguish between noise and
visual patterns.
Most common attack is to display the lsb of an object.
Random noise indicates the existence of a hidden
message.
STEGANOGRAPHY SECURITY: PRINCIPLE AND
16 PRACTICE
Statistical attack:
methods that prove the existence of hidden data via
statistical approaches.
It compares the frequency distribution of with the
theoretically expected distribution of the cover file.
Chi-square analysis: | n 2i n 2i 1 || n 2i * n 2i 1* |