You are on page 1of 21

SEMINAR

ON STEGANOGRAPHY
K.VISHNU MURTHY(18N81A05C5)
CONTENTS

 Introduction
 Physical and Digital Techniques
 Types of Steganography
 Advantages
 Disadvantages
 Steganography V/S Cryptography
 Conclusion
INTRODUCTION

 Steganography:

Steganography is the technique of hiding secret data within an ordinary, non- secret file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data.

 Steganography comes from geek word which means covered or secret writing
STEGAN -O- GRAPHY

COVERED WRITING
INTRODUCTION

 “Steganography means hiding one piece of data within another”


 Digital steganography usually involves hiding data inside files such as images, videos, and
audio.

 Today, digital steganography is one of the important components in the toolboxes of spies and
malicious hackers.
PHYSICAL TECHNIQUES

Hidden message on messenger’s body

Hidden message on paper written with secret ink

Messages written in morse code on knitting yarn

Message written on envelopes in the area covered by postal stamps


Concealing the message within
the lower bits of noisy images or
sound files

DIGITAL
Modifying the echo of a sound
TECHNIQUE file
S

Including data in ignored section


of a file
TYPES OF STEGANOGRAPHY

Steganography in Steganography in Steganography in


Text Image Audio
TEXT STEGANOGRAPHY

 Text steganography can be applied in the digital makeup format such as PDF, digital watermark or
information hiding

 It involves three types of coding:

 Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.

 Word-Shift Coding : The codewords are coded into a document by shifting the horizontal

locations of words within text lines, while maintaining a natural spacing appearance.

 Feature Coding : In feature coding, certain text features are altered, or not altered, depending on

the codeword.
EXAMPLE OF TEXT STEGANOGRAPHY

 An example of a message containing cipher text by German Spy in World War II:
“Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit.

Blockade issue affects Pretext for embargo on by ejecting suets and Vegetable oils. ”

 Taking the second letter in each word the following message emerges: 

Pershing sails from NY June 1


IMAGE STEGANOGRAPHY

 Hiding the data by taking the cover object as the image is known as image steganography
 Image compression offers a solution to large image files. Two kinds of image compression are
lossless and lossy compression. Both methods save storage space but have differing effects
on any uncompressed hidden data in the image.

 “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but
may not maintain the original image's integrity. Hence it is called “lossy”.

 “Lossless” compression maintains the original image data exactly, It is thus more favored by
steganographic techniques. Eg: (BMP ),(GIF) Formats.  
LSB(LEAST SIGNIFICANT BIT)

 Least significant bit (LSB) insertion is a common, simple approach to embedding information in
a cover image
 The least significant bit (in other words, the 8th bit) of some or all of the bytes inside an image
is changed to a bit of the secret message

 When using a 24-bit image, a bit of each of the red, green and blue colour components can be
used, since they are each represented by a byte. In other words, one can store 3 bits in each
pixel. An 800 × 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000
bytes of embedded data 

 In its simplest form, LSB makes use of BMP images, since they use lossless compression
Example of Image
Steganography
AUDIO STEGANOGRAPHY

 Embedding secret messages into digital sound is known as audio Steganography


 Audio Steganography methods can embed messages in MP3 sound files.
 To embed data secretly onto digital audio file there are few techniques introduced:
 LSB Coding: LSB of each sample at audio is embedded by a bit of hidden information

 Echo coding: Hiding information with introducing echo at cover signal

 Spread Spectrum: Spread information under all frequency signals


EXAMPLE OF AUDIO
STEGANOGRAPHY
APPLICATIONS

Confidential
Protection of data
communication and
alteration
secret data storing

Access control system


for digital content Media Database systems
distribution
STEGANALYSIS

 Steganalysis is used for detecting a secret


communication.
 Hiding a message will most likely leave
detectable traces in the cover medium.
 The process of attempting to detect statistical
traces is called statistical steganalysis.
It is used in the way of hiding not only
the information but also the key to reach
that information.

ADVANTAG Difficult to detect. Only receiver can


ES detect.

Can be applied differently in digital


image, audio and video file. 
 The confidentiality of the information is
maintained by the algorithms, and if the
algorithms are known then this technique is
DIS- of no use
 If this technique is gone in the wrong hands
ADVANTAGES like hackers, terrorist, criminals then this
can be very much dangerous for all.
STEGANOGRAPHY V/S CRYPTOGRAPHY

STEGANOGRAPHY CRPTOGRAPHY
Steganography refers to Cover Writing. Cryptography refers to Secret Writing.
Steganography supports Confidentiality and Cryptography supports Confidentiality,
Authentication. Authentication, Data integrity and Non-
repudiation.

Structure of secret message remains same. Structure of secret message can be altered.
It is implemented on Audio, video, image, text. It is implemented only on text files

Little Known technology Commonly Technology


Though Steganography is not
implemented in wider ways but it can be
the best security tool. 
CONCLUSIO
N
To secure the data confidentially, the
techniques used currently are not
considered the best which can only be
replaced by Steganography.
THANK YOU

You might also like