By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.

Slides:



Advertisements
Similar presentations
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Advertisements

Khan, Mohammed Minhajuddin
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Spread Spectrum Steganography
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Some information drawn from following articles:
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
CS 5888C5 8S A PRODUCTION JONATHAN ERDMANHEAD TROJAN MANN WARM PILL SNOTPORTMAN WILLS ETHNIC URCHINSERIC HUTCHINS STEPHEN LIANGA PENIS LENGTH.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography & Classical Ciphers
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Steganography Paul Gretes Gangster pay ho Dennis Pattersonno sniper DNA test A lepers gut.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Topic 10a Introduction to Steganography 454 NOTE: some of the enclosed information was adapted from slides created by Professor Gary C. Kessler of Champlain.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Steganography Ryan Albright.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Welcome
Cryptographic Hash Function
A (Very) Brief History of Pre-Computer Cryptography
Computers Talk Binary.
Steganography.
Combinations COURSE 3 LESSON 11-3
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Fundamentals of Data Representation
AB AC AD AE AF 5 ways If you used AB, then, there would be 4 remaining ODD vertices (C, D, E and F) CD CE CF 3 ways If you used CD, then, there.
“Hiding in Plain Sight”
JPEG Steganalysis Statistical Offset Tests
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43

“ Three people can keep the secret only if two of them are dead !” -Benjamin Franklin

What is the secret message? Harshada Kshirsagar.

Will somebody else receive my msg? Will somebody read my msg? Will somebody alter my msg? Will somebody delete my msg? Use Confidential data from my msg?

stegein  to cover STEGANOGRAPHY

 to write grafein STEGANOGRAPHY

Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in A BLOCK OF WOOD, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.

You can try steganography at home by writing on a piece of paper with LEMON JUICE. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire!

Message on head scalp… In ancient Greece, they used to select messengers and shave their head, they would then write a message on their scalp. Then the hair was allowed to grow back. After the hair grew back, the messenger was sent to deliver the message. The recipient shave off the messengers hair to see the secret msg…

Select Carrier File Choose a method of steganogr aphy Choose a program to hide msg in carrier file Communicat e the chosen method to receive via a different channel Embed msg in carrier file,and if possible encrypt it Choose a regular medium to transfer the file

p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Spy Game Null ciphers

p h g l o j i m e i s s u n a f y ne i rs n r

Feature Coding Harshada Kshirsagar. Vertical end line top of letters is altered

Illusions1.htm Illusions2.html

Methods Of Steganography Injection Substitution Harshada Kshirsagar.

Steganography Technique: Adding Bytes to End-of- Image FF D8 FF E A JFIF.....` FF E `......Exif..II 2A A 00 FE * A E D B6 D4 60 FF 00 CF 45 CF F3 AB BF sN..}..`...E D4 7A 9B 2F 13 3E D4 57 C0 E3 9E 4F BE 2A B5 r.z./.>.W...O.*. CD B C F1 D8 7B FB 7F 9F C2 A8 CF AF D9...W<..{ DF 1E A1 68 0F 27 1E 6A F2 7F 3A 9E 5D 73 4C....h.'.j..:.]sL 96 DD F6 AC 79 CF EF 17 F2 A4 3D 51 FF D9..D...y.....=Q B D6 30 1B A9 PK rv F2 F8 3F D ?..' us F 6E F 6E 2E constitution.tx D C7 8D D D7 F2 40 C6 E0 ED 40 D5 7D 5B 73 DC 46 B2 E6 3B 23 F8 1F F 6E ! us const F 6E 2E itution.txtUT... C7 8D D B A A A d41d8cd98f00b DD '.s baboon.jpg 1.JPEG file with end-of-image bytes FF D9. 2.Application appends hidden data within a zip file, its signature, and user-specified password. baboon_stego.jpg

Harshada Kshirsagar.

2,94,912 chars Harshada Kshirsagar.

Applications Barcodes Hides Personal Communication Military Information Exchange Personal Information Sending Credit card no E- commerce Harshada Kshirsagar.

Steganalysis The goal of steganalysis is to identify suspected information streams,determine whether or not they have messages encoded into them,and if possible,recover the hidden information.. DETECTDEFEAT

Steganalysis Text Image Audio Harshada Kshirsagar.

Steganalysis: Detecting s teganography Text -Odd use of language Images -Size of image -Cross check with the other copies of image on the net. Harshada Kshirsagar.

Steganalysis … Defeating steganography Text -Change the order of the words -Add or remove words Images -Compress Image using Lossy compression -Resize image -Convert to other format -Modify colors

Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult ● Defeating steganography is not hard Harshada Kshirsagar.