Professional Documents
Culture Documents
Overview
Introduction
History Steganographic Techniques Advantages Applications Conclusion
Introduction
In Greek
Steganos = covered
Graphein = to write
Steganography is about hiding messages Historically, secret messages were often hidden (or
memorized)
Today, steganography is used primarily to protect
digital rights
watermarking copyright notices fingerprinting a serial ID
History of Steganography
The first recorded use of the term was in 1499 by Johannes Trithemius.
History
Persian King.
(cont)
STEGANOGRAPHIC TECHNIQUE
1. PHYSICAL STEGANOGRAPHY
2. DIGITAL STEGANOGRAPHY
3. NETWORK STEGANOGRAPHY
4. PRINTED STEGANOGRAPHY 5. TEXT STEGANOGRAPHY 6. SUDOKU PUZZLE BY STEGANOGRAPHY
Physical Steganography
Invisible Ink
Certain organic fluids (milk, fruit juice) are transparent when
dried but the deposit can be charred and is then visible A mixture of alum and vinegar may be used to write on hardboiled eggs, so that can only be read once shell is broken
Microdots
Inkjet dots, smaller than human eye can see Microdots with barcode-like information
Easter eggs
Claims that Beatles embedded secret messages in their music
Digital Steganography
Concealing messages within the lowest bits of noisy images or sound files.
Concealing data within encrypted data or within random data. Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set. Pictures embedded in video material.
EXAMPLE: Removing all but the two least significant bits of each colour component produces an almost completely black image. Making that image 85 times brighter produces the image below.
IMAGE OF A TREE
Network Steganography
Utilizes communication protocols' control elements and their basic intrinsic functionality. Modification of the properties of a single network protocol.
Relation between two or more different network protocols to enable secret communication.
Printed Steganography
producing a cipher text. Then, an innocuous cover text is modified in some way so as to contain the cipher text, resulting in the stego text.
Text Steganography
Smaller memory occupation and simpler communication.
Apparently, neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affect pretext for embargo on by products, ejecting suets and vegetable oils. Pershing Sails from NY June 1
to hide the data within an image. Many keys as there are possible solutions of a Sudoku puzzle..
Advantages
Messages do not attract attention to themselves.
Plainly visible encrypted messages. No matter how unbreakable.
Applications
1.
2. 3. 4. 5.
Modern Steganography
Hiding one message within another (container) Most containers are rich media
Images, audio, video can be tweaked without affecting human eye/ear
Steganalysis
Detection: is there a hidden message?
Develop signatures for known steganographic tools. When content is encrypted, the message should have a high entropy
survive an alternation
printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps.
Conclusion
Steganography is arguably weaker than cryptography because the information is revealed once the message is intercepted
On the other hand, an encrypted message that is not hidden may attract attention, and in some cases may itself incriminate the messenger
ANY QUERIES??
22