Sie sind auf Seite 1von 56

Who am I ?

• My name
• My Background
• My major
Steganography
By
Name: zaid alfawzan
AND Course: Lewis University
University: Capstone

Stegnalysis
Encryption and Decryption
• What is Encryption
• What is Decryption
Encryption
• What is Encryption ?
Decryption
• What is Decryption
• Steganography and Steganalysis
Introduction
Proposed research topic Steganography Data Protection & Encryption
through Information Security.

we are going to study detail observation of Steganography technology


and Steganalysis, definition of steganography technique, definition of
data and information detection (Steganalysis)
The History of Steganography
• Steganography in the past
The History of Steganography
• Steganography in the current time
The idea of Steganography
• 5

Steganography and Steganalysis


Steganography
Steganography:

Is a technique to hide the written data.


Steganography word is a Greek word
Steganalysis
used to detect and identify the hidden data.
Use special algorithms to identify compressed information.
Steganalysis Approaches

• A) Statistical Approach
• B) Structural Approach
• C) Visual Approach
Steganalysis Approaches
Statistical Approach

some mathematical formulas are applied.


Structural Approach

By steganography the structure of data can be change


and embedded attribute of object.
Visual Approach

• In this method Steganalysis visually


analyze images and find the
difference.
Steganography vs. Cryptography

• Steganography
• Cryptography
Cryptography
• Cryptography

• data encryption cannot be identify and it is protected in steganography.


Main Focus
Main focus of our research Steganography and Steganalysis, as define
in the introduction.
Steganography is scientific technique to hide and protect data and
information from unauthorized user and preforms specific modifications
on the object to protect and hide.

Research is divided into two parts; we can say start and end in starting
portion object or file is going to hide and ending portion the hidden file is
going to reshape into its original form and define as:
First Part:

 What is Steganography?
 How Steganography work?
 What is the methodology of Steganography?
 How algorithms use to perform Steganography?
 During Steganography process which elements are
involve?

Second Part:
 What is Steganalysis?
 How Steganalysis work?
 What is the methodology of Steganalysis?
 How algorithms use to perform Steganalysis?
 During Steganalysis process which elements are
involve?
Images Steganography

Classification of Images Steganography involves the following

 Communication Algorithms

 Insertion Technique Least Significant Bit (LSB)

 Filtering & Masking


Communication Algorithms:

Data and information can embedded into undetected cover

There are three common communication techniques

1. Discrete wavelet transformation technique (DWT)


2. Fast Fourier transformation technique (FFT)
3. Discrete cosine transformation technique (DCT)
Discrete wavelet transformation technique (DWT)

• Hidden secret image S inside cover


C, by using 2 different keys.
Fast Fourier transformation technique (FFT)

• It a signal process
• Used to analysis part of spectrum
Discrete cosine transformation technique (DCT)

• Convert a signal into elementary.


• Used in image compression
Insertion Technique Least Significant Bit (LSB)

• LSB used for transmission of data.


• digital signal processing images.
• Images are of two type 8 bit and 24 bit.

 In 24 bit image 3 bit data embedded.


 In 8 bit image 1 bit data embedded.
Filtering & Masking

• Many signals are mask and the first signal unmask,


• used in watermarking method.
Type of Steganography
• A) Fragile
• B) Robust
Fragile
• Embedded the data in file
Robust
• Hard to embedded the data in file
Categories of Steganography
• A) Statistical aware steganography
• B) Model based steganography
Categories of Steganography
• A) Model based steganography

Achieve the highest embedding


Categories of Steganography
• B) Statistical aware steganography

Stegnalysis used to detect steganography


Categories of Stegnalyisi
• A) Passive
• B) Active
• C)
Categories of Stegnalyisi
• A) passive
• Detect the absence of secret image
Categories of Stegnalyisi
• B) Active
• Extract the propraties
Categories of Stegnalyisi
• C)
LSB
• What is LSB?
Convert image file from JPEG to GIF
or BMP
Images of Stenganlyiss
• Will be divided into two categories
• A) Generic
• B) specific
Images of Stenganlyiss
• A) Generic:
used for steganography
Images of Stenganlyiss
• B) specific
• Used for digital images
• Water marketing , hidden images
• Build content authentication
Technical In Steganography and stegnalysis

• Detecting Steganography content on the Internet.


• Survey of Data mining Technique for stengalysis .
• Using Image quality Metrics in stegnalysis
• Using Image-adaption technique
• The investigation of hidden data/ info
Detecting Steganography content on the
Internet.

• Hidden information over the internet.


The investigation of hidden data/
information
• Used a software to identify the hidden
information
Survey of Data mining Technique
for stengalysis
• Provide a powerful tools to detect
information
Using Image-adaption technique

• It is secure the data during the


transfer
Using Image quality Metrics in stegnalysis

• It is devolved algorithm
Experiment & observations

There are number of research paper demonstrated on steganography in


different ways but our research focuses on core issue of our research
image steganography and one technique with LSB.

Data collection for steganography described different assumptions and


parities related to our topic (image steganography). Water marking and
least significant bit calculated that for image steganography these two
techniques are effective and used as common. In water marking if we
add one image with another image the output must be combination of
these images, it’s very simple phenomena and often observed.
Experiment & observations
Example-1

Most significant bit of image is used for hidden the image in least
significant bit method and steganography.
Experiment & observations
Example-2
Two images are stored in memory locations one image worked as object
and other is host image.
Host image bits are selected for hide the object image as shown below.

Host image pixels 10110001

Secret image pixels0011111

And the output image pixels 10110011


Experiment & observations
One issue explored during experiment by comparing images it is difficult
to prevent attacks.

As 16 bit audio signals are

Audio bit Audio in Binary Audio with encode


output

1001 1000 0011 1100 0 1001 1000 0011 1100


1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1111 0011 1100 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Experiment & observations

In one 8 bit/channel image size is 1000x1400 pixels and compressed by


use Jseg, JPEG image file format used DCT (Discrete cosine transform )
to hide information of image size 8x8 pixel image block into coefficients
of 64 (Discrete cosine transform) and least significant bits of DCT no
longer used inside which the hidden information embedded.

Statistical analysis or test introduced if actual image has changed (alter)


in its original form statistical characteristics accepted.

Das könnte Ihnen auch gefallen