Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

STEGANOGRAPHY

AN
EMERGING
FIELD
OF
NETWORKING
INDEX
 Introduction to steganography
 Steganography an cryptography
 History of steganography
 Rules of steganography
 Technical methods of steganography
 Steganography in different media
 Steganography tools
 Forms of steganography
 Drawbacks of steganography
 Conclusion
 Referances
STEGANOGRAPHY AND
CRYPTOGRAPHY
 Cryptography provides confidentiality of the
message but not secracy.
 If the message is being passed through

human spies,the chances of key falling into


enemy hands is very high.
 However,with steganography,since the

message is hidden,we cannot know that the


secret message even exists.
HISTORY OF STEGANOGRAPHY
 Steganography has a long & colourful history.
 The idea behind steganography is pretty

ancient.
 Steganography gets its name from the Greek

words,steganos,meaning covered and


graphein,meaning writing.
RULES OF STEGANOGRAPHY
 The data in the container should not be
significantly degraded by embedded data.
 Embedded data should be as imperceptible as

possible.
 Embedded data should directly be encoded.

 Embedded data can be easily manipulated and

modified.
 Error correcting codes should be used in

embedded data.
STEGANOGRAPHY IN DIFFERENT
MEDIA
 Steganography in text
 Image steganography
 Steganography in audio
STEGANOGRAPHY IN TEXT
 LINE SHIFT CODING:
Features are stamped into the text by shifting the
lines.They are vertically shifted for encoding.
 WORD SHIFT CODING:

Here, word shifting is done in a fixed pattern, so


that even the fact that a message is present is
unknown.
 FEATURE CODING:

Characteristics of the letters are themselves


altered.
IMAGE STEGANOGRAPHY
 LEAST SIGNIFICANT BIT INSERTION:
This is the most well-known image
steganography technique.A simple
conversion of formats can destroy all hidden
information.Unfortunately it is extremely
vulnerable to attack.
 MASKING AND FILTERING:

Masking and filtering hide information by


marking an image in a manner similar to
paper watermarks.
STEGANOGRAPHY IN TOOLS
 S-Tools(steganography tools) are used to
conceal files within various forms of data.
 Using S-Tools, we can hide multiple files in

one object.
 S-Tools are used mainly in digital data, like a

scanned image or sampled sound.


FORMS OF STEGANOGRAPHY
 BLINDSIDE: This is an application that allows
one to conceal a file or set of files within a
standard computer image.
 S-Mail: This encrypts any data in a very

difficult to decrypt kind of way and then


hides it in a EXE files.
 SCRAMDISK: This allows the creation and use

of a virtual encrypted data drive.


APPLICATIONS
 It is almost an unbreakable system and is an
advanced means of secret communication.
 It can slip important communication without

anyone knowing.
 It can be used to track infrigment of

copyrights in a digital medium and can work


wonders on internet.
 Soon, we can have artists, musicians and

authors using steganography to fight piracy.


DRAWBACKS
 Steganography is not without
disadvantages,if fallen into wrong hands it
can create tremendous damage.
 The terrorist organisations are hiding maps,

photographs of their targets and instructions


for terrorist activities on chat rooms, bulletin
boards and other websites using
steganography.
CONCLUSION
 Steganography is finding increasing uses in
news currently.
 It can be used to protect copyrights,prevent

piracy and work in the transfer of top secret


data from place to place.
 Once its relatively minor disadvantages aree

rectified,steganography will be found to have


amazing potential in the days to come.
ANY QUIERIES
REFERENCES
 Niel F Jhonson, “STEGANOGRAPHY”.
 William Stallings, “NETWORK AND INTERWORK

SECURITY”.
 Jian Zhao, “LOOK,IT’S NOT THERE!”

You might also like