Beruflich Dokumente
Kultur Dokumente
B Y:
K ira n G . K .
1 v k 0 6 e c0 3 0
Introduction :
Advance security is not maintained by the password
protection but it is gained by hiding the existence of the
data, which can only be done by Steganography.
Steganography is a subject which is rarely touched upon by
most IT Security Enthusiasts .
Steganographic Systems can hide messages inside of Digital
Objects such as a file that has been concealed inside a
Digital Picture, Video or Audio file.
The main advantage of Steganography is, it hides the
information in such a way that there is no information
hidden at all.
This is derived from the name of lizard “Stegosaurs”.
History of Steganography
:
4 4 0 B . C .
Histiaeus shaved the head of his most trusted slave
and tattooed it with a message which disappeared
after the hair had regrown. To instigate a revolt
against Persians.
Current
Special inks are used to write a hidden messages
on bank notes.
Evolution :
Etymology :
It comes from the Greek words :
Definition :
Steganography is the art and science of hiding the fact that communication is
taking place.
What is Steganography ?
Tools :- wbStego
Steganography In
Images
Le a st S ig n ifica n t B it In se rtio n
C o m m o n a n d S im p le A p p ro a ch
M a skin g a n d Filte rin g
M a rk a n im a g e in a m a n n e r sim ila r to p a p e r
w a te rm a rks
A lg o rith m s a n d Tra n sfo rm a tio n s
D CT
FFT
W a ve le t Tra n sfo rm
Tools :- JPHide and JPSeek
Steganography In Audio
Low bit encoding method is used to hide
information inside audio files which is some
what similar to LSB that is generally used in
Images.
Spread Spectrum is another method used to
conceal information inside of an audio file.
This method works by adding random noises
to the signal the information is conceal
inside a carrier and spread across the
frequency spectrum.
Steganography In Audio
Echo Data Hiding is yet another method of
hiding information inside an audio file.
This method uses the echoes in sound files in
order to try and hide information.
By simply adding extra sound to an echo inside an
audio file, information can be concealed. The
thing that makes this method of concealing
information inside of audio files better than
other methods is that it can actually improve the
sound of the audio inside an audio file.
Tools :- mp3stego
Steganography in
Videos
S te g a n o g ra p h y in V id e o s is sim ila r to th a t o f
S te g a n o g ra p h y in Im a g e s, a p a rt fro m
in fo rm a tio n is h id d e n in e a ch fra m e o f vid e o .
W h e n o n ly a sm a lla m o u n t o f in fo rm a tio n is
h id d e n in sid e o f vid e o it g e n e ra lly isn ’ t
n o tice a b le a t a ll, h o w e ve r th e m o re in fo rm a tio n
th a t is h id d e n th e m o re n o tice a b le it w ill
b e co m e .
Tools :- msu StegoVideo
How it works :
In this our original data is embed with the
carrier file to form STEGDATA.
Example:
D e te ctin g S te g a n o g ra p h y
:
The art of detecting Steganography is referred to as
Steganalysis.
See http://www.eff.org/Privacy/printers/
Machine ID codes in laser
printers
Machine ID codes in laser
printers
Machine ID codes in laser
printers
A d va n ta g e s :
It is used in the way of hiding not the
Information but the password to
reach that Information.