Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
CRYPTOGRAPHY Lecture 1 3 week summer course. Why we need secure means of communication? Government: diplomacy is sometimes better done quietly. Military:
Watermarking & Steganography
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Watermarking & Steganography Sanjay Goel University at Albany, SUNY.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Spread Spectrum Steganography
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
STEGANOGRPAHY [APPLICATION – I]
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
CGMB 324: MULTIMEDIA SYSTEM DESIGN Chapter 03: Multimedia Element I - Text.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Introduction to Steganography
Steganography Nathan Shirley
Welcome
Steganography Example
PCM (Pulse Code Modulation)
Computers Talk Binary.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave, concealed by hair growth, and exposed by shaving his head again. 3.A picture messages in microdots or microfilm. 4.In the computer age, steganography can be done by entering confidential documents into other documents. Each document can be used as a medium, for example text files, image files or multimedia files such as mp3 or video files. Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave, concealed by hair growth, and exposed by shaving his head again. 3.A picture messages in microdots or microfilm. 4.In the computer age, steganography can be done by entering confidential documents into other documents. Each document can be used as a medium, for example text files, image files or multimedia files such as mp3 or video files.

In Indonesian Messages

Concealment of Information in Text Documents Concealment of Information in the Multimedia Files

1.Open Space Method Data is hidden using a number of predetermined spacing from the end of each sentence. For example, two spaces will hide a bit, four spaces will hide two bits and eight spaces would generate three bits and so on. 2. Syntactic Methods the use of punctuation and structure of the text to hide the information without significantly changing the meaning of a message carrier. For example, there are two phrases "bread, butter, and milk" and "bread, butter and milk" grammatically correct but differ in the use of commas.

1.Low Bit coding This method is commonly used in digital steganography techniques that concealment of the relatively large size of the message, but the impact on audio quality results with a lot less noise. 2. Spread Spectrum With this method the message is encoded and distributed to each frequency spectrum allows. Thus it would be very difficult for those who will try to solve it unless he has access to such data or can reconstruct random signal is used to spread the message on frequency range. 1.Low Bit coding This method is commonly used in digital steganography techniques that concealment of the relatively large size of the message, but the impact on audio quality results with a lot less noise. 2. Spread Spectrum With this method the message is encoded and distributed to each frequency spectrum allows. Thus it would be very difficult for those who will try to solve it unless he has access to such data or can reconstruct random signal is used to spread the message on frequency range.