steganography
TRANSCRIPT
MESSAGE CONCEALMENTUSING
STEGANOGRAPHY
Guided By:- Presented By:
• Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.
• . Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
• There exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points .
• In this report I have studied a different types of algorithms available for image steganography and a comparison of them is prepared.
• I have proposed one LSB based technique as future work
• Steganography is the art and science of writing hidden messages .
• The word "Steganography" is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC.
• This is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured.
Cryptography is secret writing
In cryptography the message will be encrypted and cannot be decoded without
knowing the proper key.
Steganography is the act of adding a hidden message to an image or other media file. It is similar to encrypting a document, but instead of running it through a cypher, the document is broken up and stored in unused, or unnoticable, bits within the overall image.
Watermarking attempts to hide a message as it is to tag a document for later identification. Watermarking is used to protect the copyright of the original owner
Text Steganography
Line-shift encoding Word-shift encoding Feature specific encoding:
Image Steganography
Image DomainTransform Domain
Audio Steganography
DCTLSB
WaveletsWavelets are mathematical functions that cut
up data into different frequency components, and then study each component with a resolution matched to its scale. They have advantages over traditional Fourier methods in analyzing physical situations where the signal contains discontinuities and sharp spikes.
Advantages of waveletDecomposes the signal
High level and Low level
System architecture
Stego-K ey k
UntrustedChannel
M essage m
StegoObjects
StegoObjects
CoverObjectc
M essage m
StegoObjects
ALGORITHM
HARDWARE REQURIMENT
P4 SYSTEM
SOFTWARE REQUIREMENT
MATLAB
1. efficient data hiding
No change in size of audio
Future Work1. Using wavelet approach to hide info inside
video
2. Combining DCT and DWT
3. Adding audio inside audio
[1] T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the
Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.
[2] M.Kharrazi,H.T.Sencar and N.Menon ,”image steganography concepts and practice”,WSPC lecture
notes 2004.[3] Jamil, T., “Steganography: The art of hiding
information is plain sight”, IEEE Potentials, 18:01, 1999
[4] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
Thanks