Sie sind auf Seite 1von 17

STEGANOGRAPHY

Under Supervision of: Presented by :


Ms Shruti Awasthi Sumit dutt
Falish dureja
Shivam punyani
Manish kumar
What is Steganography?
Greek Words:
STEGANOS Covered
GRAPHIA Writing

Steganography is the art and science of writing hidden


messages in such a way that no one apart from the
intended recipient knows of the existence of the message.
This can be achieve by concealing the existence of
information within seemingly harmless carriers or
covers (text, image, video, audio, etc.)
not encryption
original image/file is intact
not fingerprinting
fingerprinting leaves separate file describing contents
Continue

The goal of steganography is to hide messages in such a way that no


one apart from the intended recipient even knows that a message has been
sent.
This can be achieve by concealing the existence of information within
seemingly harmless carriers or cover
It can be understand by the following figure.
Cryptography vs. Steganography

Cryptography Steganography

cryptos graphia steganos graphia

hidden writing covered writing

A secret manner of writing, Generally, the art of


writing or solving ciphers.
-Crptography

Here the meaning of the message is


changed.
The art of secret (covered or hidden) writing
-Steganography
Watermarking vs. Steganography

Goal of steganography
Intruder cannot detect a message
Primarily 1:1 communication

Goal of watermarking
Intruder cannot remove or replace the
message
Primarily 1:many communication
Motivation

Steganography received little attention in computing


Renewed interest because of industry desire to protect
copyrighted digital work
audio
images
video
Text

Detect counterfeiter, unauthorized presentation, embed key,


embed author ID
Steganography Copy protection
Basics of Modern Steganography

fE:steganographic function "embedding"


fE-1:steganographic function "extracting"
cover:cover data in which emb will be
hidden
emb:message to be hidden
key:parameter of fE
stego:cover data with the hidden message
IMAGE STENOGAPHY: ATTRIBUTES

Digital images are made up of pixels

The arrangement of pixels make up the images raster data

8-bit and 24-bit images are common

The larger the image size, the more information you can hide. However,
larger images may require compression to avoid detection.
REASONS FOR USING DIGITAL IMAGES
It is the most widely used medium being used today

Takes advantage of our limited visual perception of colors

This field is expected to continually grow as computer graphics power also


grows

Many programs are available to apply steganography


IMAGE-BASED TECHNIQUES

Least Significant Bit Insertion


Static Parsing
Steganography(SPS)
Masking and Filtering
LSB INSERTION

Replaces least significant bits with the


message to be encoded
Most popular technique when dealing with
images
Simple, but susceptible to lossy compression
and image manipulation
LSB - Example

A sample raster data for 3 pixels (9 bytes)


may be:
Inserting
00100111 11101001 11001000
the binary
00100111 11001000 11101001
11001000 00100111 11101011 value for
A
(10000001)
00100111 11101000 11001000
changes
00100110 11001000 11101000
11001001 00100111 11101011 4 bits
Static Parsing Steganography(SPS)

The sender and the receiver agree on a cover image.


The protocol does not modify the cover image.
Rather determines the bits of the secret message that
match the ones in the cover image and stores their
different locations (i.e. in the cover image) in a vector.
Then it is sent to the recipient.
SPS Algorithm

Let Image1 be the cover image and Secret1 be the secret


message.
The algorithm tries to find a match of all the bits of Secret1 in
Image1.
If this is the case, it stores the indexes of the start and end bits
of Secret1 that occur within Image1 in an output file Output1
If not, the algorithm recursively tries to find a match of the first
and second halves of Secret1 in Image1.
This Output1 is sent to the recipient.
The running time is obtained from the recurrence relation T (n)
= 2T (n = 2) + O(n).
MASKING & FILTERING

Masks secret data over the original data by changing


the luminance of particular areas
During masking, it embed the message within
significant bits of the cover image
Not susceptible to lossy techniques because image
manipulation does not affect the secret message
Stenography - Uses

Digital Watermarking provides identification pertaining to the


owner; i.e. license or copyright information
- Invisible vs. Visible
Fingerprinting provides identification of the user; used to
identify and track illegal use of content
Storing passwords and/or other confidential information
Covert communication of sensitive data
Speculated uses in terrorist activities
Being widely used to hide and/or transfer illegal content
REFERENCES

J.Altaay,S.Sahib and Mazdak Zamani, "An Introduction to Image Steganography


Techniques", in International Conference on Advanced Computer Science Applications
and Technologies, 2012, pp.122-126.
S.Bhattacharyya, I.Banerjee and G.Sanyal, "A Novel Approach of Secure Text Based
Steganography Model using Word Mapping Method(WMM)",in International Journal of
Computer and Information Engineering, 2010, pp.96-103
Weiqi Luo, Fangjun Huang and Jiwu Huang, Edge Adaptive Image Steganography
Based on LSB Matching Revisited, IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010.
http://en.wikipedia.org/wiki/Steganography

Das könnte Ihnen auch gefallen