By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43
“ Three people can keep the secret only if two of them are dead !” -Benjamin Franklin
What is the secret message? Harshada Kshirsagar.
Will somebody else receive my msg? Will somebody read my msg? Will somebody alter my msg? Will somebody delete my msg? Use Confidential data from my msg?
stegein to cover STEGANOGRAPHY
to write grafein STEGANOGRAPHY
Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in A BLOCK OF WOOD, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.
You can try steganography at home by writing on a piece of paper with LEMON JUICE. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire!
Message on head scalp… In ancient Greece, they used to select messengers and shave their head, they would then write a message on their scalp. Then the hair was allowed to grow back. After the hair grew back, the messenger was sent to deliver the message. The recipient shave off the messengers hair to see the secret msg…
Select Carrier File Choose a method of steganogr aphy Choose a program to hide msg in carrier file Communicat e the chosen method to receive via a different channel Embed msg in carrier file,and if possible encrypt it Choose a regular medium to transfer the file
p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Spy Game Null ciphers
p h g l o j i m e i s s u n a f y ne i rs n r
Feature Coding Harshada Kshirsagar. Vertical end line top of letters is altered
Illusions1.htm Illusions2.html
Methods Of Steganography Injection Substitution Harshada Kshirsagar.
Steganography Technique: Adding Bytes to End-of- Image FF D8 FF E A JFIF.....` FF E `......Exif..II 2A A 00 FE * A E D B6 D4 60 FF 00 CF 45 CF F3 AB BF sN..}..`...E D4 7A 9B 2F 13 3E D4 57 C0 E3 9E 4F BE 2A B5 r.z./.>.W...O.*. CD B C F1 D8 7B FB 7F 9F C2 A8 CF AF D9...W<..{ DF 1E A1 68 0F 27 1E 6A F2 7F 3A 9E 5D 73 4C....h.'.j..:.]sL 96 DD F6 AC 79 CF EF 17 F2 A4 3D 51 FF D9..D...y.....=Q B D6 30 1B A9 PK rv F2 F8 3F D ?..' us F 6E F 6E 2E constitution.tx D C7 8D D D7 F2 40 C6 E0 ED 40 D5 7D 5B 73 DC 46 B2 E6 3B 23 F8 1F F 6E ! us const F 6E 2E itution.txtUT... C7 8D D B A A A d41d8cd98f00b DD '.s baboon.jpg 1.JPEG file with end-of-image bytes FF D9. 2.Application appends hidden data within a zip file, its signature, and user-specified password. baboon_stego.jpg
Harshada Kshirsagar.
2,94,912 chars Harshada Kshirsagar.
Applications Barcodes Hides Personal Communication Military Information Exchange Personal Information Sending Credit card no E- commerce Harshada Kshirsagar.
Steganalysis The goal of steganalysis is to identify suspected information streams,determine whether or not they have messages encoded into them,and if possible,recover the hidden information.. DETECTDEFEAT
Steganalysis Text Image Audio Harshada Kshirsagar.
Steganalysis: Detecting s teganography Text -Odd use of language Images -Size of image -Cross check with the other copies of image on the net. Harshada Kshirsagar.
Steganalysis … Defeating steganography Text -Change the order of the words -Add or remove words Images -Compress Image using Lossy compression -Resize image -Convert to other format -Modify colors
Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult ● Defeating steganography is not hard Harshada Kshirsagar.