Professional Documents
Culture Documents
ON STEGANOGRAPHY
K.VISHNU MURTHY(18N81A05C5)
CONTENTS
Introduction
Physical and Digital Techniques
Types of Steganography
Advantages
Disadvantages
Steganography V/S Cryptography
Conclusion
INTRODUCTION
Steganography:
Steganography is the technique of hiding secret data within an ordinary, non- secret file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data.
Steganography comes from geek word which means covered or secret writing
STEGAN -O- GRAPHY
COVERED WRITING
INTRODUCTION
Today, digital steganography is one of the important components in the toolboxes of spies and
malicious hackers.
PHYSICAL TECHNIQUES
DIGITAL
Modifying the echo of a sound
TECHNIQUE file
S
Text steganography can be applied in the digital makeup format such as PDF, digital watermark or
information hiding
Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.
Word-Shift Coding : The codewords are coded into a document by shifting the horizontal
locations of words within text lines, while maintaining a natural spacing appearance.
Feature Coding : In feature coding, certain text features are altered, or not altered, depending on
the codeword.
EXAMPLE OF TEXT STEGANOGRAPHY
An example of a message containing cipher text by German Spy in World War II:
“Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit.
Blockade issue affects Pretext for embargo on by ejecting suets and Vegetable oils. ”
Taking the second letter in each word the following message emerges:
Hiding the data by taking the cover object as the image is known as image steganography
Image compression offers a solution to large image files. Two kinds of image compression are
lossless and lossy compression. Both methods save storage space but have differing effects
on any uncompressed hidden data in the image.
“Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but
may not maintain the original image's integrity. Hence it is called “lossy”.
“Lossless” compression maintains the original image data exactly, It is thus more favored by
steganographic techniques. Eg: (BMP ),(GIF) Formats.
LSB(LEAST SIGNIFICANT BIT)
Least significant bit (LSB) insertion is a common, simple approach to embedding information in
a cover image
The least significant bit (in other words, the 8th bit) of some or all of the bytes inside an image
is changed to a bit of the secret message
When using a 24-bit image, a bit of each of the red, green and blue colour components can be
used, since they are each represented by a byte. In other words, one can store 3 bits in each
pixel. An 800 × 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000
bytes of embedded data
In its simplest form, LSB makes use of BMP images, since they use lossless compression
Example of Image
Steganography
AUDIO STEGANOGRAPHY
Confidential
Protection of data
communication and
alteration
secret data storing
STEGANOGRAPHY CRPTOGRAPHY
Steganography refers to Cover Writing. Cryptography refers to Secret Writing.
Steganography supports Confidentiality and Cryptography supports Confidentiality,
Authentication. Authentication, Data integrity and Non-
repudiation.
Structure of secret message remains same. Structure of secret message can be altered.
It is implemented on Audio, video, image, text. It is implemented only on text files