Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Network Security
Cryptography The science of writing in secret code.
Khan, Mohammed Minhajuddin
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
“The Art of Hiding Data”
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Steganography Rayan Ghamri.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Digital Watermarking Parag Agarwal
A Steganography Project Project By: Awadesh Madhogaria.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Steganography Ben Lee III Long Truong ECE Spring 2002.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
Steganography.
 Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Welcome
Cryptography And Network Security
STEGANOGRAPHY.
A (Very) Brief History of Pre-Computer Cryptography
Information and Network Security
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message (Wikipedia, the free encyclopedia) Like encryption, steganography involves the securing of information through the manipulation of data [1] By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message (Wikipedia). Steganography is designed to hide the data from the view [1] Steganography is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party (Garry C. Kessler) [2]

History The word steganography is of Greek origin and means "covered, or hidden writing". The term steganography was introduced at the end of the 15th century The use of steganography dates back several millennia. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the bald head of soldiers

Steganographic Message Steganographic Message has three parts: container or carrier: the file which conceals data hidden message: the actual data steganography key: could be the hidden message was also encrypted, or the key was used for the steganography method

References 1. Marjie T. Britz, Computer Forensics and Cyber Crime, An Introduction 2. http://www.garykessler.net/library/steganography.html 3. http://en.wikipedia.org/wiki/Steganography