Presentation is loading. Please wait.

Presentation is loading. Please wait.

Submitted By: Varun Singh Roll no.: MRT09UGBCS036.

Similar presentations


Presentation on theme: "Submitted By: Varun Singh Roll no.: MRT09UGBCS036."— Presentation transcript:

1 Submitted By: Varun Singh Roll no.: MRT09UGBCS036

2  1.Introduction.  2.History.  3.Classic Techniques.  4.Motivation.  5.Stegnography in text.  6.Stegnography in audio.  7.Stegnography in video.  8.Stegnography vs. Watermarking.  9.Good Stegnography.

3  Stegnography : A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary Stegno - Graphy Covered Writing

4

5 Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content. ◦ persistent under transmission ◦ not encryption  original image/file is intact ◦ not fingerprinting  fingerprinting leaves separate file describing contents

6  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc.

7  The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in his Histories.Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface.  In his work "Polygraphiae" Johannes Trithemius developed his so- called "Ave-Maria-Cipher" with which one can hide information in a Latin praise of God.

8  Invisible ink (1st century AD - WW II)  Tatoo message on head  Overwrite select characters in printed type in pencil  Pin punctures in type  Microdots (WW II)  Newspaper clippings, knitting instructions, XOXO signatures, report cards.

9  Steganography received little attention in computing.  Renewed interest because of industry desire to protect copyrighted digital work. ◦ audio ◦ images ◦ video ◦ Text  Detect counterfeiter, unauthorized presentation, embed key, embed author ID  Steganography ≠ Copy protection

10  Hide message among irrelevant data.  Confuse the cryptoanalyst.  Text lines shifted up/down (40 lines text  2 40 codes)  word space coding  character encoding - minor changes to shapes of characters (here’s a para,we embed the information) Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.

11 Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer. [this is the information hiding in the paragraphy by stegnography technique.]

12 Perceptual coding ◦ inject signal into areas that will not be detected by humans ◦ may be obliterated by compression. Hardware with copy-protection ◦ not true watermarking - metadata present on media ◦ DAT. ◦ minidisc ◦ presence of copy protection mechanisms often failed to give the media wide-spread acceptance

13

14

15  Coding still frames - spatial or frequency  data encoded during refresh. ◦ closed captioning  visible watermarking ◦ used by most networks.

16  Although BMP files are perfect for steganographic use, they are able to carry only small files. So there is a problem, how to get much enough files to hide our message, and what to do to read them in a correct order? Good way out is to hide information in a video file, because as we know, AVI files are created out of bitmaps, combined into one piece, which are played in correct order and with appropriate time gap. Keeping that in mind all we have to do is to get out is file single frames and save them as BMP files. If we’ll use algorithm for hiding data in digital pictures, we can hide our message in bitmap obtained in this way, and then save it into new AVI file.  We’ll analyze only uncompressed AVI file, because if any compression is executed files loses its data.

17 Goal of steganography ◦ Intruder cannot detect a message ◦ Primarily 1 to 1 communication. Goal of watermarking ◦ Intruder cannot remove or replace the message ◦ Primarily 1:many communication

18

19  www.wikipedia.com www.wikipedia.com  www.projecttoseminars.com www.projecttoseminars.com  www.answers.com www.answers.com  http://brasil.cel.agh.edu.pl/~11ugbogusz/in dex.php?option=com_content&view=article&i d=11&Itemid=16&lang=en http://brasil.cel.agh.edu.pl/~11ugbogusz/in dex.php?option=com_content&view=article&i d=11&Itemid=16&lang=en  http://www.snotmonkey.com/work/school/4 05/methods.html http://www.snotmonkey.com/work/school/4 05/methods.html

20 THANK YOU Any Ques????


Download ppt "Submitted By: Varun Singh Roll no.: MRT09UGBCS036."

Similar presentations


Ads by Google