steganography

15
STEGANOGRAPHY AN EMERGING FIELD OF NETWORKING

Upload: pavan96

Post on 24-Nov-2014

417 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: STEGANOGRAPHY

STEGANOGRAPHYAN

EMERGINGFIELD

OFNETWORKING

Page 2: STEGANOGRAPHY

Introduction to steganography Steganography an cryptography History of steganography Rules of steganography Technical methods of steganography Steganography in different media Steganography tools Forms of steganography Drawbacks of steganography Conclusion Referances

INDEX

Page 3: STEGANOGRAPHY

Cryptography provides confidentiality of the message but not secracy.

If the message is being passed through human spies,the chances of key falling into enemy hands is very high.

However,with steganography,since the message is hidden,we cannot know that the secret message even exists.

STEGANOGRAPHY AND CRYPTOGRAPHY

Page 4: STEGANOGRAPHY

Steganography has a long & colourful history.

The idea behind steganography is pretty ancient.

Steganography gets its name from the Greek words,steganos,meaning covered and graphein,meaning writing.

HISTORY OF STEGANOGRAPHY

Page 5: STEGANOGRAPHY

The data in the container should not be significantly degraded by embedded data.

Embedded data should be as imperceptible as possible.

Embedded data should directly be encoded. Embedded data can be easily manipulated and

modified. Error correcting codes should be used in

embedded data.

RULES OF STEGANOGRAPHY

Page 6: STEGANOGRAPHY

Steganography in text Image steganographySteganography in audio

STEGANOGRAPHY IN DIFFERENT MEDIA

Page 7: STEGANOGRAPHY

LINE SHIFT CODING:Features are stamped into the text by shifting

the lines.They are vertically shifted for encoding.

WORD SHIFT CODING:Here, word shifting is done in a fixed pattern,

so that even the fact that a message is present is unknown.

FEATURE CODING:Characteristics of the letters are themselves

altered.

STEGANOGRAPHY IN TEXT

Page 8: STEGANOGRAPHY

LEAST SIGNIFICANT BIT INSERTION:This is the most well-known image

steganography technique.A simple conversion of formats can destroy all hidden information.Unfortunately it is extremely vulnerable to attack.

MASKING AND FILTERING:Masking and filtering hide information by

marking an image in a manner similar to paper watermarks.

IMAGE STEGANOGRAPHY

Page 9: STEGANOGRAPHY

S-Tools(steganography tools) are used to conceal files within various forms of data.

Using S-Tools, we can hide multiple files in one object.

S-Tools are used mainly in digital data, like a scanned image or sampled sound.

STEGANOGRAPHY IN TOOLS

Page 10: STEGANOGRAPHY

BLINDSIDE: This is an application that allows one to conceal a file or set of files within a standard computer image.

S-Mail: This encrypts any data in a very difficult to decrypt kind of way and then hides it in a EXE files.

SCRAMDISK: This allows the creation and use of a virtual encrypted data drive.

FORMS OF STEGANOGRAPHY

Page 11: STEGANOGRAPHY

It is almost an unbreakable system and is an advanced means of secret communication.

It can slip important communication without anyone knowing.

It can be used to track infrigment of copyrights in a digital medium and can work wonders on internet.

Soon, we can have artists, musicians and authors using steganography to fight piracy.

APPLICATIONS

Page 12: STEGANOGRAPHY

Steganography is not without disadvantages,if fallen into wrong hands it can create tremendous damage.

The terrorist organisations are hiding maps, photographs of their targets and instructions for terrorist activities on chat rooms, bulletin boards and other websites using steganography.

DRAWBACKS

Page 13: STEGANOGRAPHY

Steganography is finding increasing uses in news currently.

It can be used to protect copyrights,prevent piracy and work in the transfer of top secret data from place to place.

Once its relatively minor disadvantages aree rectified,steganography will be found to have amazing potential in the days to come.

CONCLUSION

Page 14: STEGANOGRAPHY

ANY QUIERIES

Page 15: STEGANOGRAPHY

Niel F Jhonson, “STEGANOGRAPHY”. William Stallings, “NETWORK AND

INTERWORK SECURITY”. Jian Zhao, “LOOK,IT’S NOT THERE!”

REFERENCES