steganography

Post on 28-Nov-2014

14.579 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

STEGANOGRAPHY

www.company.com

INTRODUCTION

Art and science of writing hidden

messages

No one apart from the sender and intended recipient, suspects the existence of the

message

A form of security through obscurity

ETYMOLOGY

Steganós

• Covered

Graptos

• Writing

www.company.com

HISTORY OF STEGANOGRAPHY

Current

440 B.C.

EVOLUTION

Watermarking

Cryptography

Steganography

www.company.com

ADVANTAGE OF STEGANOGRAPHY

OVER CRYPTOGRAPHY

Messages do not attract attention to themselvesProtects both messages and communicating parties

www.company.com

TYPES OF STEGANOGRAPH

Y

Steganography In Text/Documents

Steganography In Video

Steganography In Audio

Steganography In Images

STEGANOGRAPHY TERMS

Carrier or Cover File

Stego-Medium

Embedded or Payload

Steganalysis

VIDEO

www.company.comHOW IT WORKS

www.company.com

STEGANOGRAP

HY STEPS

Steganography

Encoding a message Decode a message

MESSAGE

Embed

ded Data

Plain info

MESSAGE

www.company.com

ENCODING

• Prepare cover data

Step1

www.company.com

DECODING

• Steganographic Data

Step1

www.company.com

STEGANALYSIS

Art and Science of detecting hidden messages

Just discover Steganography

Not deals with decrypting the data

STEGANOGRAPHY TECHNIQUES

Line Shift Coding

Word Shift Coding

Feature Coding

Least Significant Bit Insertion

Low bit encoding

Masking and Filtering

www.company.com

STEGANOGRAPHY USING LEAST SIGNIFICANT BIT

PRACTICAL

www.company.comList of some tools for Steganography

Program Image files Audio files Video files Document files

OpenPuff

BMP, JPG, PNG, TGA

Mp3, WAV 3gp, Mp4, MPEG-1,

MPEG-2, VOB, SWF, FLV

Pdf

MP3Stego - Mp3 - -

OpenStego BMP, PNG - - -

S-Tools BMP, GIF Wav - -

StegFS - - - -

Steganographic Laboratory (VSL)

BMP, PNG, JPG, TIFF

- - -

PHP-Class StreamSteganography

PNG - - -

www.company.com

USAGE IN MODERN

PRINTERS

www.company.com

ILLEGAL USAGE

HACKERS

TERRORISTS

CRIMINALS

CONCLUSION

www.company.com

QUERIES

?

top related