Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Information Hiding: Watermarking and Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Secure communication Informatics for economists II Jan Přichystal
“The Art of Hiding Data”
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Secure communication Informatics for economists II Jan Přichystal
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Cryptography – Test Review
Introduction to Steganography
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
A (Very) Brief History of Pre-Computer Cryptography
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Parag Agarwal Digital Watermarking Parag Agarwal
UIT Unconference December 06, 2018 Ian Redzic
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar ME CSE ( Part Time) III ME12F05P002

What is Steganography?  Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.security through obscurity  The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing".Greek  “Steganography means hiding one piece of data within another”.

STEGANOGRAPHY Art and science of writing hidden messages No one apart from the sender and intended recipient, suspects the existence of the message A form of security through obscurity

Example Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’

History Of Steganography  The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in his Histories.HerodotusHistories  Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Demaratus  Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Wax tablets  Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and covered in wax. The messenger then swallowed the ball of wax.  Special “inks” were important steganographic tools even during Second World War.  During Second World War a technique was developed to shrink photographically a page of text into a dot less than one millimeter in diameter, and then hide this microdot in an apparently innocuous letter. (The first microdot has been spotted by FBI in 1941.)

Steganography V/s Cryptography SteganographyCryptography Unknown message passingKnown message passing Steganography prevents discovery of the very existence of communication Encryption prevents an unauthorized party from discovering the contents of a communication Little known technologyCommon technology Technology still being develop for certain formatsMost of algorithm known by all Once detected message is known Strong current algorithm are resistant to attacks,larger expensive computing power is required for cracking Steganography does not alter the structure of the secret message Cryptography alter the structure of the secret message

Evolution Cryptography Watermarking Steganography

Steganography Terms  Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it.  Stego-Medium - The medium in which the information is hidden.  Embedded or Payload - The information which is to be hidden or concealed.  Steganalysis - The process of detecting hidden information inside a file.

Types Of Stegosystems  There are three basic types of stegosystems  Pure stegosystems - no key is used.  Secret-key stegosystems - secret key is used.  Public-key stegosystems - public key is used

Embedded Data Audio File Hidden MESSAGE

Audio File Types File Format Uncompressed WAVAIEF Compressed Lossy Mp3, AAC, WMA Loseless ALAC, FlAC, WavPack

WHY.WAV ? Most popular Audio formatDon’t lose any quality in recordingEasier format for DevelopmentNo Compression!!

WAVE FILE FORMAT

Steganography Techniques

TYPES OF STEGANOGRAPHY LSB CODING PHASE CODING ECHO HIDING SPREAD SPECTRUM

WHY LSB? computational complexity is easy to maintain Easier ImplementationVariation in choosing LSB

LSB ALGORITHM Receives the audio file convert it into bit pattern. Step1 Each character in the message is converted into bit pattern. Step 2 Check which LSB to Replace By LSB Algorithm Step 3 Replaces the LSB bit from audio with LSB bit from character in the message. Step 4

CONT. ALGORITHM : CHANGING BITS

Example Of LSB Method  A grid for 3 pixels of a 24-bit image can be as follows: ( ) ( ) ( )  When the number 200, which binary representation is , is embedded into the least significant bits of this part of the image, the resulting grid is as follows: ( ) ( ) ( )

Flowchart Of Audio Steganography

Applications  Confidential communication and secret data storing  Steganography provides us with: Potential capability to hide the existence of confidential data Hardness of detecting the hidden (i.e., embedded) data Strengthening of the secrecy of the encrypted data  Protection of data alteration  Access control system for digital content distribution  Media Database systems

Applications  Usage in modern printers  Alleged use by terrorists  Alleged use by intelligence services

Thank you