Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Steganograph y

Click to edit Master subtitle style


Tayum tech/ece/7th sem Bhagwant university
1

B-

3/14/12

Agenda
Steganography

What is Steganography? History Steganography today


2 2

Steganography tools

3/14/12

Steganography Definition
Steganography
covered writing
Steganography is the process of hiding of
from the Greek word steganos meaning and the Greek word graphie meaning

a secret message within an ordinary message and extracting it at its destination


Anyone else viewing the message will fail
3 3 3/14/12 to know it contains hidden/encrypted data

Steganography - History
Greek history warning of invasion by

scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.
Both Axis and Allied spies during World

War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.
Invisible Ink is also a form of

steganography
4 4 3/14/12

Steganography

The U.S. government is concerned about the

use of Steganography.

Common uses in include the disguising of

corporate espionage.

Its also a very good Anti-forensics

mechanism to mitigate the effectiveness of a forensics investigation


Child pornography
3/14/12

5 5

Steganography
Modern digital steganography
data is encrypted then inserted and hidden, using a special

algorithm which may add and/or modify the contents of the file
This technique may simply append the data

to the file, or disperse it throughout


Carefully crafted programs apply the

encrypted data such that patterns appear normal.


3/14/12

6 6

Steganography Carrier Files


Steganography Carrier Files
bmp jpeg gif wav mp3 Amongst others

7 7

3/14/12

Steganography - Tools
Steganography Tools
Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) JPHide Camouflage Hiderman Many others

8 8

3/14/12

Important Requirement for Steganographic System


Security of the hidden

communication

size of the payload

Robustness against malicious and

unintentional attacks

3/14/12

Detection of Steganographic Content/Countermeasures


The detection of steganographically encoded packages is called Steganalysis.
Visual Analysis tries to reveal the

presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.

Statistical (Algorithmic) Analysis

reveals tiny alterations in an 3/14/12 image's statistical behavior

You might also like