Stegnography and Steganalysis
-
Upload
arjun-kalra -
Category
Documents
-
view
221 -
download
0
Transcript of Stegnography and Steganalysis
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 1/18
A SEMINAR ON
“STEGANOGRAPHY AND STEGANALYSIS”
SUBMITTED TO: SUBMITTED BY:
Ms. ANSHIKA ARJUN
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 2/18
INTRODUCTION • Internet users frequently need to store, send or receive private
information
• This method of protecting information is known as encryption.
• A major drawback to encryption is that the existence of data is
not hidden
A solution to this problem is steganography.
word stegano means “covered” and graphie means “writing”
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 3/18
DEFINATION
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the intended
recipient knows of the existence of the message. This can be
achieve by concealing the existence of information withinseemingly harmless carriers or cover
Carrier: text, image, video, audio, etc.
Hidden ImageCover Image Stego Image
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 4/18
STEGANOGRAPHY
TERMS
• Carrier File – A file which has hidden information inside
of it.
• Steganalysis – The process of detecting hidden
information inside of a file.
• Stego-Medium – The medium in which the information is
hidden.
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 5/18
TYPES OF
STEGANOGRAPHY
• Music Steganography
• Image Steganography
• Text steganography
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 6/18
MUSIC
STEGANOGRAPHY• Music steganography embeds the secret message into the
music files.
The different methods are:
- Low bit coding
- Phase coding
- Echo data hiding
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 7/18
IMAGE
STEGANOGRAPHY • Image steganography embeds the secret data in the image.
The methods are:
- LSB insertion in BMP images :
Here data is inserted at the LSB of each Pixel
- Random LSB Insertion :
Here Random pixels are selected & data is inserted at the
LSB of selected pixel.
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 8/18
BMP EXAMPLE
Cover image
Image to be hidden
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 9/18
BMP EXAMPLE
CONTINUED Cover image
Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7
Plane 0 Plane 1 Plane 2 Plane 3 Plane 4 Plane 5 Plane 6 Plane 7
Stego image
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 10/18
BMP EXAMPLE
Example: 8 bit color image00100111 11101001 11001000 00100111 11001000
11101001 11001000 00100111
Then each bit of binary equivalence of letter 'A' i.e. 01100101
are copied serially
(from the left hand side) to the LSB's of equivalent binary
pattern of pixels,
resulting the bit pattern will become like this: -
00100110 11101001 11001001 00100110 11001000
11101001 11001000 00100111
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 11/18
TEXT
STEGANOGRAPHY
• In this steganography message is hidden between a text.
• Steganography in text files can be accomplished through
various techniques.
The methods are:
- Line shift coding
- Word shift coding
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 12/18
USES OF
STEGANOGRAPHY
• Common uses include the disguising of corporate
intelligence.
• Military and intelligence agencies require unobtrusive
communications. They can do it by steganography..
• It’s also a very good Anti-forensics mechanism to mitigate
the effectiveness of a forensics investigation
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 13/18
STEGANALYSIS
• The art and science of detecting hidden data, determining
the length of the message, and extracting the data.
• By identifying the existence of a hidden message, perhaps
we can identify the tools used to hide it.
• If we identify the tool, perhaps we can use that tool to
extract the original message.
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 14/18
MODELS FOR
STEGANALYSIS1. BLIND DETECTION MODEL: Detects presence of
information without any prior knowledge of steganography
application or carrier file types that may have been used.
2. ANALYTICAL MODEL: Detects presence of file or other
artifacts associated with a particular steganographyapplication.
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 15/18
IMPORTANCE OF
STEGNALYSIS• Prevent Terrorist Attacks
• Catch people engaging in illegal activities
• Discourage Piracy
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 16/18
CONCLUSION
• Steganography has its place in security.
• There are an infinite number of steganography applications.
• Multimedia steganography are more or less vulnerable to
attack like media formatting, compression etc.
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 17/18
REFRENCES
• www.stegoarchive.com
•
www.stego.com
• www.stegno.com
8/2/2019 Stegnography and Steganalysis
http://slidepdf.com/reader/full/stegnography-and-steganalysis 18/18
THANK YOU!