steganography
TRANSCRIPT
STEGANOGRAPHYAN
EMERGINGFIELD
OFNETWORKING
Introduction to steganography Steganography an cryptography History of steganography Rules of steganography Technical methods of steganography Steganography in different media Steganography tools Forms of steganography Drawbacks of steganography Conclusion Referances
INDEX
Cryptography provides confidentiality of the message but not secracy.
If the message is being passed through human spies,the chances of key falling into enemy hands is very high.
However,with steganography,since the message is hidden,we cannot know that the secret message even exists.
STEGANOGRAPHY AND CRYPTOGRAPHY
Steganography has a long & colourful history.
The idea behind steganography is pretty ancient.
Steganography gets its name from the Greek words,steganos,meaning covered and graphein,meaning writing.
HISTORY OF STEGANOGRAPHY
The data in the container should not be significantly degraded by embedded data.
Embedded data should be as imperceptible as possible.
Embedded data should directly be encoded. Embedded data can be easily manipulated and
modified. Error correcting codes should be used in
embedded data.
RULES OF STEGANOGRAPHY
Steganography in text Image steganographySteganography in audio
STEGANOGRAPHY IN DIFFERENT MEDIA
LINE SHIFT CODING:Features are stamped into the text by shifting
the lines.They are vertically shifted for encoding.
WORD SHIFT CODING:Here, word shifting is done in a fixed pattern,
so that even the fact that a message is present is unknown.
FEATURE CODING:Characteristics of the letters are themselves
altered.
STEGANOGRAPHY IN TEXT
LEAST SIGNIFICANT BIT INSERTION:This is the most well-known image
steganography technique.A simple conversion of formats can destroy all hidden information.Unfortunately it is extremely vulnerable to attack.
MASKING AND FILTERING:Masking and filtering hide information by
marking an image in a manner similar to paper watermarks.
IMAGE STEGANOGRAPHY
S-Tools(steganography tools) are used to conceal files within various forms of data.
Using S-Tools, we can hide multiple files in one object.
S-Tools are used mainly in digital data, like a scanned image or sampled sound.
STEGANOGRAPHY IN TOOLS
BLINDSIDE: This is an application that allows one to conceal a file or set of files within a standard computer image.
S-Mail: This encrypts any data in a very difficult to decrypt kind of way and then hides it in a EXE files.
SCRAMDISK: This allows the creation and use of a virtual encrypted data drive.
FORMS OF STEGANOGRAPHY
It is almost an unbreakable system and is an advanced means of secret communication.
It can slip important communication without anyone knowing.
It can be used to track infrigment of copyrights in a digital medium and can work wonders on internet.
Soon, we can have artists, musicians and authors using steganography to fight piracy.
APPLICATIONS
Steganography is not without disadvantages,if fallen into wrong hands it can create tremendous damage.
The terrorist organisations are hiding maps, photographs of their targets and instructions for terrorist activities on chat rooms, bulletin boards and other websites using steganography.
DRAWBACKS
Steganography is finding increasing uses in news currently.
It can be used to protect copyrights,prevent piracy and work in the transfer of top secret data from place to place.
Once its relatively minor disadvantages aree rectified,steganography will be found to have amazing potential in the days to come.
CONCLUSION
ANY QUIERIES
Niel F Jhonson, “STEGANOGRAPHY”. William Stallings, “NETWORK AND
INTERWORK SECURITY”. Jian Zhao, “LOOK,IT’S NOT THERE!”
REFERENCES