You're about to create your best presentation ever

Steganography Presentation Template

Create your presentation by reusing one of our great community templates.

Steganography

Transcript: what is Steganography Early Steganography the differenece between steganography and cryptography is that cryptography is a technique used to hide the message from the reader while steganography is the technique used to prevent the message from being read at all. it is meant to camouflage the meaning of the message in something inanimate or something that would otherwise not be viewed unless you knew what you were looking for. in 1883 Auguste Kerchoffs wrote two novels which stated 6 principles for military cyphers. the system must me practically, if not mathematically indecipherable it must not be required to be secret; it must be able to fall in the hands of the enemy without any inconvenience. it must be communicable and retainable without the help of written notes. it must be applicable to telegraphic correspondence it must be portable. the system must be easy to use. most of these rules are no longer applicable with the rise of technology but the second principle is still considered a very important aspect of Steganography. this was the work of a monk name johannes thrithemius his method was to hide his messages in the second letters of every second word this message reveals the word prymus apex. before the introduction of technology steganography was alot more basic and just plain clever. in early chinese civilization it was common to write messages on silk, encase them in wax then stick them "in" the messengers. in greek legend there are stories of men having their head shaved then they would be tattooed with a secret message on the scalp and then their hair would grow back leaving the message out of view unless one knew it was there. Steganography Steganography vs. Cryptography padiel aporsy mesarpon omeuas peludyn malpreaxo The art or practice of concealing a hidden message within another message the word Steganography is greek and translates to " covered writing" Steganography has been apart of human society for an undetermined amount of time. evidence of its use is seen in Egyptian art and in many other civilizations. Kerchoffs' Principle

Steganography

Transcript: 1 m 2 p b Y g X S Concealed Writing Steganography What is it? The word Steganography comes from the greek words, steganos, which means "covered, concealed or protected" and the word graphein, which means "writing". Steganography is one kind of technique to hide messages, that you don't want to be visible for others, other than the Recipient. For example it can be hidden inside of an image or a shopping list. Steganography Example Hi, could you go to the store for the campfire later, and some kind of instrument you can play on? P.S I got bread at home. Ham 5kg Ice 20kg Mustard x 3 bottles Yeast x 1 bag Nuts x 5 bags Aubergine x 2 Meat 5kg Eggs x 2 boxes Iceberg Lettuce x 1 head Sausage x 1 pack Apple Juice x 2 Lactose free milk x 2 Edam 1kg Xylophone Answer Hi, could you go to the store for the campfire later, and some kind of instrument you can play on? P.S I got bread at home. Ham 5kg Ice 20kg Mustard x 3 bottles Yeast x 1 bag Nuts x 5 bags Aubergine x 2 Meat 5kg Eggs x 2 boxes Iceberg Lettuce x 1 head Sausage x 1 pack Apple Juice x 2 Lactose free milk x 2 Edam 1kg Xylophone H When was it first seen? Steganography was first seen 400 BC, when an historian wrote about an example, how a tyrant used his servant as the message. He shaved all of his hair and then marked his message on his scalp. Steganography has been used for centuries, but it wasn't until 1985 it was used digitally. P Physical Techniques Steganography can be used both physically and digitally, and there's a lot of different techniques that can be used. A lot of the techniques that have been discovered isn't all of them, you can come up with whatever you want as long as it hides the message. Some examples of physical techniques are: You can hide the message on an envelope and then hide it by covering it with a postage stamp. You can hide the message in a letter by using invisible ink between the lines. You can hide the message in a letter or similar, by on purpose writing the word wrong, then take the letter that is wrong or missing and then you find the message. Something like this Once upon a midnight dreary, whille I pondered, weak and weary, Over many a quaint and curios volume of foregotten lore, While I nodded, nearly napping, suddely there came a tapping, As of some one gently rapping, rapping at my chamber dooor. "'T'is some visitor," I mutterred, "tapping at my chambere door-- Only this, and nothing more." Once upon a midnight dreary, whille I pondered, weak and weary, Over many a quaint and curios volume of foregotten lore, While I nodded, nearly napping, sudde(n)ly there came a tapping, As of some one gently rapping, rapping at my chamber dooor. "'T'is some visitor," I mutterred, "tapping at my chambere door-- Only this, and nothing more." LENORE D Digital Steganography There is also digital Steganography, it can be used in many ways, it is very complicated when using it. Some simple techniques are. You can hide the message by making it hidden in the sourcecode. You can use steganography for audio signals You can hide the message by making the text the same color background A Thank you for listening!

Steganography

Transcript: Intra Frame Encoded using the same principles of JPEG compression Predicted Frame Coded with reference to a previous frame Bi-Directional Frame Predicted from past and future reference frames AVI Frames 400 B.C- Message in the Shaved Head 1500's- message within a hard-boiled egg by writing on the shell with a special ink Modern steganography- The Prisoners Problem About Steganography Thank You.. Greek Words: STEGANOS “Covered” GRAPHIE " Writing” Steganography in Audio To embed data secretly onto digital audio file there are few techniques introduced : LSB Coding Phase Coding Parity Coding Spread Spectrum The technique demonstrated in our project is LSB Coding Cryptography Vs Steganograhy Steganography in Video Image compression offers a solution to large image files. Conclusion What is Steganography? History Of Steganography Steganography in Images Frames Container Format Least Significant bit insertion : Frames Image Encoding Techniques Steganalysis refers to the art and science of discrimination between stego-objects and cover-objects. Steganalysis needs to be done without any knowledge of secret key used for embedding and maybe even the embedding algorithm. However, message does not have to be gleaned. Just its presence detected. Steganography in “IMAGES” Steganography in “AUDIO” Steganography in “VIDEO” Steganography Audio Steganography Techniques Frames STEGANOGRAPHY UNDER VaRIOUS MEDIA AviReader opens existing AVI files and copies frames to bitmap files. AviWriter creates new AVI files and combines bitmaps to a video stream. Avi contains the function declarations and structure definitions. Steganographic Image Image Compression: Steganography using Least Significant Bit Replaces least significant bits with the message to be encoded Most popular technique when dealing with images Simple, but susceptible to lossy compression and image manipulation Steganography and steganalysis are still at an early stage of research Although in principle secure schemes exist, practical ones with reasonable capacity are not known. Notion of security and capacity for steganography needs to be investigated Steganography and corresponding steganalysis using image models needs to be further investigated Frames Final Year Project By: Frame Types Wave File Format Steganalysis Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieved by concealing the existence of information within seemingly harmless carriers or cover. Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. Souparno Chaudhuri Sudarshan Tamang Rohit Mehra Shubhendu Singh Rajput “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”. “Lossless” compression maintains the original image data exactly. It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats. I-Frames are encoded similarly to JPEG Images Can use LSB Manipulation to hide Information Flowchart of Audio Steganography Embedding secret messages into digital sound is known as audio Steganography. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. The properties of the human auditory system (HAS) are exploited in the process of audio Steganography

Steganography

Transcript: Steganography The Three Types of Digital Steganograhy? Techniques for achieving audio steganography can include: • Length of the message being encoded is shorter than the file • Can start embedding the message at the beginning of the file until the end of the message is reached. • This is not a good thing; the first part of the audio file will be coded with the message while the rest will be the original. • It will sound off therefore someone could easily suspect something. • Could also use a random number generator to spread the message randomly • The sender and receiver both have the secret key for the generator 1. direct sequence Spread out by a constant (called the chip rate) and regulated by a random signal. It is interlaced with a cover-signal 2. frequency-hopping schemes The audio file’s frequency is changed so it can hop between frequencies • This form also introduces noise in the audio file like the others • The signal is divided into blocks of 1’s or 0’s depending on the hidden message • An algorithm is applied to these blocks to encode them • The blocks are combined and form the final product image steganography is very similar to audio steganography these three colors are represented in binary code which looks like... 10101000, 11010101, 01010110 the first eight numbers representing red, second; green and last blue. the secret code being embedded, is also changed into this code. it is then changed into bits of color (an ammount of each, red green and blue) and scattered around the covering image. Word Shift Coding • Code words are coded into the document by shifting the words horizontally, but they still need to look natural so it is undetectable for others. • In order to decode it, you need to have the original image so you know the spacing between words in the unencoded document. • Word-shifting should be less visible than line-shifting. • Word-shifting can be detected if one knows the algorithm used by the formatter, the actual spaces between the words when compared to the expected spacing would reveal the encoded data. • Retyping the text destroys the hidden message Feature Coding • Altering the size of certain characters in a horizontal/vertical format. • This has the problem of being easily detected as changed font sizes can arouse suspicion, or if opened with a word processor, misspellings and extra white spaces would be detected. • Also comparing it to the original text would make the manipulation quite evident. *bows* He wrote two stories of Steganographic techniques Romans WWI & WWII Steganography Audio Steganography Audio since the RGB is composed of three different colors it can be represented as a cube both use the least significant The first story was about King Darius of Susa, who shaved the head of one of his prisoners. Back then, text was written on wax-covered tablets. Demeratus hid the message by writing it on the wood underneath the wax. Three types of Digital Steganography • The sending party and receiving party can use a shared key just as the random generator in the LBS • This process has the disadvantage of also causing noise Steganography Techniques The more information that is embedded the more 'background noise' there will be image steganography Today, Steganography is used all across the world on computer systems. Since the beginning of the digital world in 1992, many tools and technologies have been created to take advantage of old steganographic techniques. Invisible ink, microdots, messages on the back of postage stamps and more. Microdot • Tries to spread the data of the message as far as possible across the audio file • Can be compared to the random generator in LBS • 2 versions Steganography coding can be done in several different ways. There are three techniques to text steganography Image This strategy allows for a larger amount of data to be stored. The concept of hiding a message within an audio file. • Random or uniform respacing of the lines causes the text to be extremely difficult to decode. • It is also difficult to remove the encoding if the text is on paper, as each page needs to be rescanned, altered and reprinted. Least Significant Bit Encoding the RGB (red,green,blue) is one of the most used techniques of image steganography Parity Coding Digital Steganography These periods would be hidden on pieces of paper and sent. What is steganography? Text Apparently neutral´s protest is thoroughly discounted and ignored. Isman hard hit. Blockage issue affects pretext for embargo on products, ejecting suets and vegetable oils. Spread Spectrum Text Steganography is achieved by changing the text formatting, or by changing certain characteristics of a text. (such as characters) Take 2nd letter in each word: • Information is put into the audio as an echo • Amplitude, decay rate, and the delay time of the echo are all varied and set below the verge of the human hearing so the echo is not easily found. • if only 1 echo is produced, only 1 bit of data can be encoded

Steganography

Transcript: STEGANOGRAPHY Today, Steganography is used all across the world on computer systems. Since the beginning of the digital world in 1992, many tools and technologies have been created to take advantage of old steganographic techniques. Presnted by: Mehran Ramazanilar QUESTIONS ? since the RGB is composed of three different colors it can be represented as a cube In transposition ciphers, the letters are rearranged according to some predetermined rules or keys. Such ciphers were used mostly during the first World War and the American Civil War to send sensitive messages. WW-II Working of Image Steganography Steganography Audio Steganography TRANSPOSITIONS One of the least complicated ways of securing information in an audio file. To test yourself, try to decipher : • It will sound off therefore someone could easily suspect something. • Could also use a random number generator to spread the message randomly • The sender and receiver both have the secret key for the generator Test yourself: THGINYMROTSDNAKRADASAWTI Take 2nd letter in each word: "Photo of microdots taped inside the label of an envelope. The envelope was sent by German spies in Mexico City to Lisbon during World War II (1939-45), but intercepted by Allied intelligence." Echo Hiding Example: Message sent by German Spy in WW II: Pershing sails from NY June 1. Robust and shows higher level of immunity to Noise, Filter and compression and etc. The more information that is embedded the more 'background noise' there will be Check for yourself: A=T A diagrammatic cipher is used by many children in school. This system is, in essence, the same as the letter substitution system, but it's easier to remember than 26 randomly picked letters. It uses the tic-tac-toe boards and two X's. History of Steganography CAESAR SHIFT CIPHER Ubz Ukhpg Yhq Least Significant Bit-2 Algorithm THANK YOU This strategy allows for a larger amount of data to be stored. Multilevel Hiding Strategy Steganography coding can be done in several different ways. Null ciphers emerged Least Significant Bit Encoding Apparently neutral´s protest is thoroughly discounted and ignored. Isman hard hit. Blockage issue affects pretext for embargo on products, ejecting suets and vegetable oils. The Caesar shift cipher, named because it was used by Julius Caesar himself, is actually 26 different ciphers, one for each letter of the alphabet. A person only needs to be told which Caesar cipher was used in order to decipher a message. If the G cipher is used, then A becomes G, B becomes H, C becomes I, and so on through the alphabet. If the Y cipher is used, then A becomes Y, B becomes Z, C becomes A, and so on. This cipher is the basis for many more complex ciphers, but on its own does not allow great protection of a secret message, as checking 26 different cipher keys does not take a relatively great amount of time. For example, words might be written backwards, so that "all the better to see you with" becomes "lla eht retteb ot ees uoy htiw." Another transposition key is to swap every pair of letters, so the previous message becomes "la tl eh eb tt re ot es ye uo iw ht." • Length of the message being encoded is shorter than the file • Can start embedding the message at the beginning of the file until the end of the message is reached. • This is not a good thing; the first part of the audio file will be coded with the message while the rest will be the original. Image Steganography for example, A = T • The signal is divided into blocks of 1’s or 0’s depending on the hidden message • An algorithm is applied to these blocks to encode them • The blocks are combined and form the final product What is steganography? DIAGRAMMATIC CIPHER Techniques for achieving audio steganography can include: these three colors are represented in binary code which looks like... 10101000, 11010101, 01010110 the first eight numbers representing red, second; green and last blue. the secret code being embedded, is also changed into this code. it is then changed into bits of color (an ammount of each, red green and blue) and scattered around the covering image. • Information is put into the audio as an echo • Amplitude, decay rate, and the delay time of the echo are all varied and set below the verge of the human hearing so the echo is not easily found. • if only 1 echo is produced, only 1 bit of data can be encoded Advance as compared to LSB-1 Steganography is the art of hiding information. It is the writing of hidden messages in a way that no one besides the sender and recipient knows about the message. Greek word steganos means "covered" graphein means "to write" Romans used invisible inks, made of natural substances such as fruit juices and milk. To reveal the message, the recipient simply had to heat the hidden text. Invisible inks have advanced but are still in limited use today. Romans Three types of Digital Steganography Audio Image Text Microdot Taking text or pictures and then shrinking it to the size of a period. These

Now you can make any subject more engaging and memorable