You are on page 1of 20

SEMINAR ON

STEGANOGRAPHY
STEGANOGRAPHY
J.VENKATESWARA RAO
16S11A0557
Presentation Outline
1. What is STEGANOGRAPHY?
2. History
3. Uses of Steganography
4. Types of Steganography
5. General Diagram
6. Steganography Techniques
7. Steganalysis
8. Implementation and Results
9. Steganography Vs Cryptography
10.Advantages and Disadvantages
11.Conclusion and Future Scope
1. What is STEGANOGRAPHY?
STEGANOGRAPHY
• Art of Hiding information.

• Embedding messages within other data.

• Conceal the existence of the embedded information.


1.1 Example
Ex: Fishing freshwater bends and saltwater coasts rewards anyone
feeling stressed. Resourceful anglers usually find masterful leapers fun and
admit swordfish rank overwhelming anyday.

FiShing frEshwater beNds anD saLtwater coAsts reWards anYone


feEling stRessed. ReSourceful anGlers usUally fiNd maSterful leApers fuN
anD adMit swOrdfish raNk ovErwhelming anYday.

“Send Lawyers Guns and Money”


2. History

• Greek word

• 15th century (400BC)

• Steganos (covered) + Graphie (writing) = Steganography (Covered Writing)


3. Uses of Steganography

• Solution to send news and information without fear.


• Possible to store information on a location.
• Best used for E-commerce.
• Paired with existing communication methods.
• Transportation of sensitive data.
4. Types of Steganography

Fig: Steganography Types


5. General Diagram

Fig: Block Diagram Representation


6. Steganography Techniques

1. Text Steganography
2. Image Steganography
3. Audio/video Steganography
4. Network Steganography
7. Steganalysis
• Process of identifying Steganography.
• Identify suspected information streams.

fE : steganographic function "embedding”


fE -1 : steganographic function "extracting”
Cover : cover data in which emb will be hidden
emb : message to be hidden
Stego : cover data with the hidden message
8. Implementation and Results
8.1 Procedure
8.2 Steganography Tools

• Image-Steganography
• Steghide
• Xiao Steganography
• S-Tools
• Hide ‘N’ Send
9. Steganography vs Cryptography
9.1 Combination of Steganography and Cryptography

Fig: Highly secured mechanism


9.2 Purpose of Combination

Results in acquiring
• Confidentiality
• Integrity
• Availability
• Non-repudiation
• Authenticity
10. Advantages and Disadvantages
Advantages Disadvantages
• Way of hiding password to reach • Huge number of data, huge file
the information. size, so someone can suspect
• Difficult to detect except for about it.
receiver. • If this technique is gone in the
• Can be applied differently in wrong hands like hackers,
digital image, audio etc. terrorists, criminals then this can
• Can be done faster with the large be very much dangerous for all.
number of softwares.
11. Conclusion and Future Scope
• Steganography and its derivatives are growing in use and application.
• In areas where cryptography and strong encryption are being outlawed,
citizens are looking at Steganography .
• In the near future, the most important use of Steganographic techniques will
probably be lying in the field of security.
• Hence, Combination of Steganography with Cryptography results in more
safer form of data transmission.
THANK
YOU

You might also like