Professional Documents
Culture Documents
Seminar
Seminar
STEGANOGRAPHY
STEGANOGRAPHY
J.VENKATESWARA RAO
16S11A0557
Presentation Outline
1. What is STEGANOGRAPHY?
2. History
3. Uses of Steganography
4. Types of Steganography
5. General Diagram
6. Steganography Techniques
7. Steganalysis
8. Implementation and Results
9. Steganography Vs Cryptography
10.Advantages and Disadvantages
11.Conclusion and Future Scope
1. What is STEGANOGRAPHY?
STEGANOGRAPHY
• Art of Hiding information.
• Greek word
1. Text Steganography
2. Image Steganography
3. Audio/video Steganography
4. Network Steganography
7. Steganalysis
• Process of identifying Steganography.
• Identify suspected information streams.
• Image-Steganography
• Steghide
• Xiao Steganography
• S-Tools
• Hide ‘N’ Send
9. Steganography vs Cryptography
9.1 Combination of Steganography and Cryptography
Results in acquiring
• Confidentiality
• Integrity
• Availability
• Non-repudiation
• Authenticity
10. Advantages and Disadvantages
Advantages Disadvantages
• Way of hiding password to reach • Huge number of data, huge file
the information. size, so someone can suspect
• Difficult to detect except for about it.
receiver. • If this technique is gone in the
• Can be applied differently in wrong hands like hackers,
digital image, audio etc. terrorists, criminals then this can
• Can be done faster with the large be very much dangerous for all.
number of softwares.
11. Conclusion and Future Scope
• Steganography and its derivatives are growing in use and application.
• In areas where cryptography and strong encryption are being outlawed,
citizens are looking at Steganography .
• In the near future, the most important use of Steganographic techniques will
probably be lying in the field of security.
• Hence, Combination of Steganography with Cryptography results in more
safer form of data transmission.
THANK
YOU