Presentation is loading. Please wait.

Presentation is loading. Please wait.

By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.

Similar presentations


Presentation on theme: "By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43."— Presentation transcript:

1

2 By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43

3 “ Three people can keep the secret only if two of them are dead !” -Benjamin Franklin

4 What is the secret message? Harshada Kshirsagar.

5

6

7 Will somebody else receive my msg? Will somebody read my msg? Will somebody alter my msg? Will somebody delete my msg? Use Confidential data from my msg?

8 stegein  to cover STEGANOGRAPHY

9  to write grafein STEGANOGRAPHY

10

11 Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in A BLOCK OF WOOD, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.

12 You can try steganography at home by writing on a piece of paper with LEMON JUICE. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire!

13 Message on head scalp… In ancient Greece, they used to select messengers and shave their head, they would then write a message on their scalp. Then the hair was allowed to grow back. After the hair grew back, the messenger was sent to deliver the message. The recipient shave off the messengers hair to see the secret msg…

14

15

16

17 Select Carrier File Choose a method of steganogr aphy Choose a program to hide msg in carrier file Communicat e the chosen method to receive via a different channel Embed msg in carrier file,and if possible encrypt it Choose a regular medium to transfer the file

18

19

20 p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Spy Game Null ciphers

21 p h g l o j i m e i s s u n a f y ne i rs n r

22

23 Feature Coding Harshada Kshirsagar. Vertical end line top of letters is altered

24

25 Illusions1.htm Illusions2.html

26 Methods Of Steganography Injection Substitution Harshada Kshirsagar.

27 Steganography Technique: Adding Bytes to End-of- Image FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 60......JFIF.....` 00 60 00 00 FF E1 00 94 45 78 69 66 00 00 49 49.`......Exif..II 2A 00 08 00 00 00 0A 00 FE 00 04 00 01 00 00 00 *............... 00 00 00 00 00 01 03 00 01 00 00 00 00 02 1A 01................ 01 01 03 00 01 00 00 00 00 02 00 00 02 01 03 00................... 73 4E 85 03 7D B6 D4 60 FF 00 CF 45 CF F3 AB BF sN..}..`...E.... 72 D4 7A 9B 2F 13 3E D4 57 C0 E3 9E 4F BE 2A B5 r.z./.>.W...O.*. CD B7 92 57 3C F1 D8 7B FB 7F 9F C2 A8 CF AF D9...W<..{........ 96 DF 1E A1 68 0F 27 1E 6A F2 7F 3A 9E 5D 73 4C....h.'.j..:.]sL 96 DD 44 97 F6 AC 79 CF EF 17 F2 A4 3D 51 FF D9..D...y.....=Q.. 50 4B 03 04 14 00 02 00 08 00 72 76 D6 30 1B A9 PK........rv.0.. 83 F2 F8 3F 00 00 27 D9 00 00 13 00 11 00 75 73...?..'.......us 20 63 6F 6E 73 74 69 74 75 74 69 6F 6E 2E 74 78 constitution.tx 74 55 54 0D 00 07 C7 8D D8 40 63 D7 F2 40 C6 E0 tUT......@c..@.. ED 40 D5 7D 5B 73 DC 46 B2 E6 3B 23 F8 1F 10 7E.@.}[s.F..;#...~... 21 00 00 81 00 00 00 00 75 73 20 63 6F 6E 73 74 !.......us const 69 74 75 74 69 6F 6E 2E 74 78 74 55 54 05 00 07 itution.txtUT... C7 8D D8 40 50 4B 05 06 00 00 00 00 01 00 01 00...@PK.......... 4A 00 00 00 3A 40 00 00 00 00 48 49 12 00 9A 40 J...:@....HI...@ 00 00 64 34 31 64 38 63 64 39 38 66 30 30 62 32..d41d8cd98f00b2 30 34 00 27 DD 73 04.'.s baboon.jpg 1.JPEG file with end-of-image bytes FF D9. 2.Application appends hidden data within a zip file, its signature, and user-specified password. baboon_stego.jpg

28 Harshada Kshirsagar.

29

30 2,94,912 chars Harshada Kshirsagar.

31

32 Applications Barcodes Hides Personal Communication Military Information Exchange Personal Information Sending Credit card no E- commerce Harshada Kshirsagar.

33

34

35

36 Steganalysis The goal of steganalysis is to identify suspected information streams,determine whether or not they have messages encoded into them,and if possible,recover the hidden information.. DETECTDEFEAT

37 Steganalysis Text Image Audio Harshada Kshirsagar.

38 Steganalysis: Detecting s teganography Text -Odd use of language Images -Size of image -Cross check with the other copies of image on the net. Harshada Kshirsagar.

39 Steganalysis … Defeating steganography Text -Change the order of the words -Add or remove words Images -Compress Image using Lossy compression -Resize image -Convert to other format -Modify colors

40 Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult ● Defeating steganography is not hard Harshada Kshirsagar.


Download ppt "By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43."

Similar presentations


Ads by Google