Steganography
B Y:
K ira n G . K .
1 v k 0 6 e c0 3 0
Introduction :
Advance security is not maintained by the password
protection but it is gained by hiding the existence of the
data, which can only be done by Steganography.
Steganography is a subject which is rarely touched upon by
most IT Security Enthusiasts .
Steganographic Systems can hide messages inside of Digital
Objects such as a file that has been concealed inside a
Digital Picture, Video or Audio file.
The main advantage of Steganography is, it hides the
information in such a way that there is no information
hidden at all.
This is derived from the name of lizard “Stegosaurs”.
History of Steganography
:
4 4 0 B . C .
Histiaeus shaved the head of his most trusted slave
and tattooed it with a message which disappeared
after the hair had regrown. To instigate a revolt
against Persians.
1 st and 2 nd World Wars
German spies used invisible ink to print very small
dots on letters.
Microdots – Blocks of text or images scaled down to
the size of a regular dot.
Current
Special inks are used to write a hidden messages
on bank notes.
Evolution :
Etymology :
It comes from the Greek words :
Definition :
Steganography is the art and science of hiding the fact that communication is
taking place.
What is Steganography ?
Steganography is the practice of hiding private or
sensitive information within something that
appears to be nothing out of the usual.
Steganography in the modern day sense of the word
usually refers to information or a file that has
been concealed inside a digital Picture, Video or
Audio file.
Steganography terms
Carrier or Cover File – A Original message or
a file in which hidden information will be stored
inside of it .
Stego - Medium– The medium in which the
information is hidden.
Embedded or Payload – The information which
is to be hidden or concealed.
Steganalysis – The process of detecting hidden
information inside a file.
Types of Steganography
S te g a n o g ra p h y In Te x t/ D o cu m e n ts
Steganography In Images
Steganography In Audio
Steganography In Video
Steganography in Text
Lin e S h ift C o d in g : Lin e s a re ve rtica lly sh ifte d
W o rd S h ift C o d in g : C o d e w o rd s a re H o rizo n ta lly
sh ifte d
Fe a tu re C o d in g : C o d in g d o n e u sin g ce rta in text
fe a tu re s
A lte rn a tive M e th o d s
S yn ta ctic M e th o d s
S e m a n tic M e th o d s
Tools :- wbStego
Steganography In
Images
Le a st S ig n ifica n t B it In se rtio n
C o m m o n a n d S im p le A p p ro a ch
M a skin g a n d Filte rin g
M a rk a n im a g e in a m a n n e r sim ila r to p a p e r
w a te rm a rks
A lg o rith m s a n d Tra n sfo rm a tio n s
D CT
FFT
W a ve le t Tra n sfo rm
Tools :- JPHide and JPSeek
Steganography In Audio
Low bit encoding method is used to hide
information inside audio files which is some
what similar to LSB that is generally used in
Images.
Spread Spectrum is another method used to
conceal information inside of an audio file.
This method works by adding random noises
to the signal the information is conceal
inside a carrier and spread across the
frequency spectrum.
Steganography In Audio
Echo Data Hiding is yet another method of
hiding information inside an audio file.
This method uses the echoes in sound files in
order to try and hide information.
By simply adding extra sound to an echo inside an
audio file, information can be concealed. The
thing that makes this method of concealing
information inside of audio files better than
other methods is that it can actually improve the
sound of the audio inside an audio file.
Tools :- mp3stego
Steganography in
Videos
S te g a n o g ra p h y in V id e o s is sim ila r to th a t o f
S te g a n o g ra p h y in Im a g e s, a p a rt fro m
in fo rm a tio n is h id d e n in e a ch fra m e o f vid e o .
W h e n o n ly a sm a lla m o u n t o f in fo rm a tio n is
h id d e n in sid e o f vid e o it g e n e ra lly isn ’ t
n o tice a b le a t a ll, h o w e ve r th e m o re in fo rm a tio n
th a t is h id d e n th e m o re n o tice a b le it w ill
b e co m e .
Tools :- msu StegoVideo
How it works :
In this our original data is embed with the
carrier file to form STEGDATA.
Example:
D e te ctin g S te g a n o g ra p h y
:
The art of detecting Steganography is referred to as
Steganalysis.
Using different tools like sendsecret, Steganography 8.1
, Stegdetect, Hiderman etc.
Steganalysis does not deal with trying to decrypt the
hidden information inside of a file, just discovering
it.
It is mainly done with comparing the encrypted file Information hidden
with the original copy. behind the image.
It can be done through Histogram technique.
Detecting By histogram
technique :
Applications in Modern
Printers
Used in HP and Xerox brand color Laser
Printers.
Tiny Yellow dots are added to each page.
The dots are barely visible and contain
Encoded printer serial numbers, as well as
date and time stamps.
Machine ID codes in laser
printers
See http://www.eff.org/Privacy/printers/
Machine ID codes in laser
printers
Machine ID codes in laser
printers
Machine ID codes in laser
printers
A d va n ta g e s :
It is used in the way of hiding not the
Information but the password to
reach that Information.
Difficult to detect .Only receiver can
detect.
Can be applied differently in digital
image, audio & video file.
It can be done faster with the large no
of software's.
D isa d va n ta g e s :
Huge number of data = huge file size, so
some one can suspect about it.
In sending and receiving information can
be leaked.
The confidentiality of information is
maintained by the algorithms, and if the
algorithms are known then its all over.
If this technique is gone in the wrong
hands like hackers, terrorist ,criminals
then this can be very much dangerous
for all.
C o n clu sio n :
Though steganography is not implemented in wider ways but it can be the
best security tool.
The main problem of today's world is to secure their data confidentially, the
techniques used currently are not considered the best which can only be
replaced by Steganography.
If it gets in the hand of terrorist then it could be even worse than WTC Attack
in which steganography was used.
Bibliography
www.wikipedia.org
http://zone-h.org
h ttp :// w w w . e ffo
. rg / Priva cy / p rin te rs/
N . p ro vo s & P. H o n e ym a n , “ H id e & S e e k : A n
In tro d u ctio n to S te g a n o g ra p h y ,” IE E E
S e cu rity a n d p riva cy
D . A rtz, “ D ig ita lS te g a n o g ra p h y: H id in g D a ta
w ith in D a ta ,” IE E E S e cu rity a n d Priva cy
Thank You