Professional Documents
Culture Documents
Steganography
Steganography
1 2
Steganography and
Computer Steganography
Watermarking
• Steganography • How to make it secure?
– Message that we are hiding is a secret – Messages can be compressed and encrypted before
– Not generally related to what we hide it in being hidden in carrier.
• Watermarks – Compressed messages take less space hence minimizes
the information to be sent.
– Message that we are hiding might not be a secret
(Might not even hide) – Random looking message resulting from encryption
and compression will be easier to hide.
– Does relate to what we put it in
– Message can be scrambled and will be difficult to
– Ex. Hold a $20 bill up to light to see watermark encode.
(authenticity) , Company Logos (Ownership)
5 6
Various techniques in Various techniques in
Steganography Steganography
• Many approaches to hide data in a file • Substitution is the naïve approach to this
problem
• Embedded bits can be inserted in any place
• It replaces cover file bits with embedded file
or in any order
bits
• Areas that are less detectable or dispersed • Replacing certain cover file bits are detectable
through out the cover file are suitable • Careful selection of bits in cover file is
• Selection of cover medium will enhance important
Steganography better.
7 8
13 14
19 20
23 24
Image Structure and Image Image Structure and Image
processing processing
• RGB Color Cube • Color selection dialog box showing RGB levels.
29 30
Digital Carrier methods Digital Carrier methods
• Common methods of Digital Carrier • Simple method of hiding.
– Image and audio files easiest & common – Hiding the character ‘G’ across the following
carrier. eight bytes of a carrier file.
– Least significant bit substitution or overwriting. 10010101 00001101 11001001 10010110
• Most Common method 00001111 11001011 10011111 00010000
• LSB term comes from the numeric significance
• MSB - 28 LSB - 20
– ASCII value of G ( 71 01000111)
10010100 00001101 11001000 10010110
00001110 11001011 10011111 00010001
31 32
35 36
Examples of Hiding data in Examples of Hiding data in
various carriers (Contd.) various carriers (Contd.)
– Example employs Gif-it-Up, Nelsonsoft • A JPEG Carrier file containing the airport map
program
– Hides information using LSB Substitution
– Includes encryption option
– Original Carrier (Mall GIF) 632,778 bytes
– Steganography file 677,733 bytes
37 38
39 40
41 42