You are on page 1of 22

Seminar on STEGANOGRAPHY

Submitted by: debi Prasad behera Regd no.:0801294052 Branch: it

Overview
 Introduction
 History  Steganographic Techniques  Advantages  Applications  Conclusion

steganography is used primarily to protect digital rights  “watermarking” copyright notices  “fingerprinting” a serial ID . secret messages were often hidden (or memorized)  Today.Introduction  In Greek  Steganos = covered  Graphein = to write  Steganography is about hiding messages  Historically.

History of Steganography  The first recorded use of the term was in 1499 by Johannes Trithemius.  A treatise on cryptography and steganography disguised as a book on magic. Runners were memorizing message Sometimes killed after delivering the message .  First recorded uses of steganography can be traced back to 440 BC .

(cont…)  Demaratus tells Athens of Persia’s attack plans Writes the secret message on a tablet. turned into wax-covered ball that was swallowed by the messenger…  Invisible ink-jet technology Ink that is too small for human eye (Univ of Buffalo. and covers it with wax  Greek encouraged Aristagoras to revolt against the Writes message on the shaved head of the messenger.History Persian King. 2000) . and sends him after his hair grew  Chinese silk balls Message is written on silk.

SUDOKU PUZZLE BY STEGANOGRAPHY .STEGANOGRAPHIC TECHNIQUE 1. NETWORK STEGANOGRAPHY 4. PRINTED STEGANOGRAPHY 5. PHYSICAL STEGANOGRAPHY 2. DIGITAL STEGANOGRAPHY 3. TEXT STEGANOGRAPHY 6.

fruit juice) are transparent when dried but the deposit can be charred and is then visible  A mixture of alum and vinegar may be used to write on hardboiled eggs. smaller than human eye can see  Microdots with barcode-like information  Easter eggs  Claims that Beatles embedded secret messages in their music 7 . so that can only be read once shell is broken  Microdots  Inkjet dots.Physical Steganography  Invisible Ink  Certain organic fluids (milk.

 Pictures embedded in video material. exploiting redundancy in the targeted instruction set.  Changing the order of elements in a set. .  Concealing data within encrypted data or within random data.  Concealed messages in tampered executable files.Digital Steganography  Concealing messages within the lowest bits of noisy images or sound files.

 Making that image 85 times brighter produces the image below. . IMAGE OF A TREE  Image of a cat extracted from above image.EXAMPLE: Removing all but the two least significant bits of each colour component produces an almost completely black image.

 Utilizes communication protocols' control elements and their basic intrinsic functionality.Network Steganography  Exchange steganograms in telecommunication networks .  Relation between two or more different network protocols to enable secret communication. Modification of the properties of a single network protocol. .

Printed Steganography  The plain text. producing a cipher text. first encrypted by traditional means. Then. resulting in the stego text. an innocuous cover text is modified in some way so as to contain the cipher text. .

. The method that could be used is data compression.Text Steganography  Smaller memory occupation and simpler communication. •Longer length code words to less frequently occurring source symbols. •Smaller length code words to more frequently occurring source symbols.  Achieve data compression is Huffman coding.

Isman hard hit.” “Pershing Sails from NY June 1” . neutral’s protest is thoroughly discounted and ignored. ejecting suets and vegetable oils. Blockade issue affect pretext for embargo on by products.Hiding a message within a text  An actual message from a German spy  read second letter in each word “Apparently.

Sudoku puzzle by Steganography  Art of concealing data in an image using Sudoku which is used like a key to hide the data within an image..  Many keys as there are possible solutions of a Sudoku puzzle. .

 Plainly visible encrypted messages.  In digital steganography.Advantages  Messages do not attract attention to themselves. .  Will arouse suspicion. electronic communications may include steganographic coding inside of a transport layer.  No matter how unbreakable.  Steganography includes the concealment of information within computer files.

LEAST SIGNIFICANT BIT INSERTION USAGE IN MODERN PRINTERS EXAMPLES FROM MODERN PRACTICE ALLEGED USE BY TERRORISTS ALLEGED USE BY INTELLIGENCE SERVICES . 3.Applications 1. 2. 4. 5.

possible to embed messages in invisible parts of html pages .. audio.Modern Steganography  Hiding one message within another (“container”)  Most containers are rich media  Images. but hidden from the eye  Embed info such as camera type. video can be tweaked without affecting human eye/ear  Copyright notices embedded in digital art  Serial number embedded to prevent replication  Digital cameras EXIF tags  Not secretive. shutter speed.  Similarly.. date. focal length.

copyright) can be encoded redundantly and survive an alternation .  When content is encrypted. the message should have a high entropy .Steganalysis  Detection: is there a hidden message?  Develop signatures for known steganographic tools.g.  Promising results: high detection rates  Decoding: recover hidden message  No significant work in this area !  Prevention: destroy or remove a hidden message  Most steganographies not robust to image alterations  Short messages (e.

 Tiny yellow dots are added to each page. as well as date and time stamps. .Usage In Modern Printers  Steganography is used in HP and Xerox brand colour laser printers.  The dots are barely visible and contain encoded printer serial numbers.

Conclusion  Steganography is arguably weaker than cryptography because the information is revealed once the message is intercepted  On the other hand. steganography can be used in conjunction with cryptography . an encrypted message that is not hidden may attract attention. and in some cases may itself incriminate the messenger  In any event.

.

ANY QUERIES?? 22 .

4/073$90.5 O VZY[ZWW__SYWc`ZSZ[`W^U[Z`SZW^ O [_`U[Z`SZW^_S^W^UWVS O SYW_SaV[bVW[USZTW`cWSWVc`[a`SXXWU`ZYaSZW WÈWS^ O [\ ^Y`Z[`UW_WTWVVWVZVY`SS^` O W^SZaTW^WTWVVWV`[\^WbWZ`^W\US`[Z O Y`SUSW^S_ `SY_ O [`_WU^W`bWTa`VVWZX^[`WW W O TWVZX[_aUS_USW^S` \WVS`W_a``W^_\WWVX[USWZY` O S^ \[__TW`[WTWVW__SYW_ZZb_TW\S^`_[X`\SYW_ .347.

3.88 O W`WU`[Z_`W^WSVVWZW__SYW O WbW[\_YZS`a^W_X[^Z[cZ_`WYSZ[Y^S\U`[[_ O WZU[Z`WZ`_WZU^ \`WV`WW__SYW_[aVSbWSYWZ`^[\   O ^[_ZY^W_a`_YVW`WU`[Z^S`W_ O WU[VZY^WU[bW^VVWZW__SYW O [_YZXUSZ`c[^Z`_S^WS O ^WbWZ`[ZVW_`^[ [^^W[bWSVVWZW__SYW O [_`_`WYSZ[Y^S\W_Z[`^[Ta_``[SYWS`W^S`[Z_ O [^`W__SYW_WYU[\ ^Y`USZTWWZU[VWV^WVaZVSZ` SZV _a^bbWSZS`W^ZS`[Z .$90.

&8.034/073!739078  `WYSZ[Y^S\ _a_WVZ SZV W^[ T^SZVU[[a^S_W^ \^Z`W^_  Z  W[cV[`_S^WSVVWV`[WSU\SYW  WV[`_S^WTS^W b_TWSZVU[Z`SZWZU[VWV\^Z`W^_W^S ZaTW^_S_cWS_VS`WSZV`W_`S\_ .

.

°n¾° O `WYSZ[Y^S\ _S^YaST cWSW^`SZ U^ \`[Y^S\ TWUSa_W`WZX[^S`[Z_ ^WbWSWV[ZUW`WW__SYW_Z`W^UW\`WV _Z[`VVWZS S``^SU`S``WZ`[ZSZVZ _[WUS_W_S `_WXZU^ZS`W`W W__WZYW^ U[ZaZU`[Zc`U^ \`[Y^S\ O .

Z`W[`W^SZVSZWZU^ \`WVW__SYW`S` O ZSZ WbWZ`_`WYSZ[Y^S\ USZTWa_WVZ .

.

"&#$  .