the role of steganography in secure information solutions (prathepan yogarajah)
DESCRIPTION
TRANSCRIPT
![Page 1: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/1.jpg)
http://isrc.ulster.ac.uk
9th May 2013
www.hidinimage.co.uk
Pratheepan Yogarajah
The role of Steganography in Secure Information solutions
![Page 2: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/2.jpg)
http://isrc.ulster.ac.uk
Securing Digital Information
2
![Page 3: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/3.jpg)
http://isrc.ulster.ac.uk
Securing Digital Information
Paper documentDigital document Server
![Page 4: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/4.jpg)
http://isrc.ulster.ac.uk4
Securing Digital Information
Closed System Open System
![Page 5: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/5.jpg)
http://isrc.ulster.ac.uk5
If we don’t secure information…
Scenario 1:
![Page 6: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/6.jpg)
http://isrc.ulster.ac.uk6
![Page 7: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/7.jpg)
http://isrc.ulster.ac.uk7
![Page 8: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/8.jpg)
http://isrc.ulster.ac.uk8
![Page 9: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/9.jpg)
http://isrc.ulster.ac.uk9
Integrity—How do we know if the supporting documents have been altered?
Client logs into ABC Insurance portal and fills in a claim application and submits along with supporting documents.
Approved or rejected application sent back to Client
Scenario 2:
If we don’t secure information…
![Page 10: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/10.jpg)
http://isrc.ulster.ac.uk10
Scenario 3:
If we don’t secure information…
![Page 11: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/11.jpg)
http://isrc.ulster.ac.uk
Steganography
11
![Page 12: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/12.jpg)
http://isrc.ulster.ac.uk12
Steganography
Key
Encoder
Cover Image
Secret Data
Stego Object
Decoder
Secret Data
Communications Channel
![Page 13: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/13.jpg)
http://isrc.ulster.ac.uk
HidInImage
HidInImage enables the encryption and hiding of secret information (text or images) inside images using Steganography techniques.
Secret information is hidden imperceptibly in that it cannot be detected by the human eye.
Our innovative Steganograpy-based hiding solution plays a vital role in securing digital media content.
![Page 14: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/14.jpg)
http://isrc.ulster.ac.uk
Why HidInImage is Unique?
Revolutionary software algorithm for encryption
Novel technique for embedding of data in images using Steganography technique
Patented Encryption SoftwarePatented Embedding Software
![Page 15: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/15.jpg)
http://isrc.ulster.ac.uk15
Cover ImageProtected Image
What does HidInImage do?
+ Key =>
Secret Data
![Page 16: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/16.jpg)
http://isrc.ulster.ac.uk
HidInImage Video
16
![Page 17: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/17.jpg)
http://isrc.ulster.ac.uk 17
Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with her information details, (b) encrypted secret data (payload) of (a), a clean image showing nature in which the encrypted data will be embedded to and finally (d) shows the stego-image carrying the encrypted patient data
Secret Communication
![Page 18: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/18.jpg)
http://isrc.ulster.ac.uk18
Secret Data Cover Image Stego Object
Document authentication
![Page 19: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/19.jpg)
http://isrc.ulster.ac.uk19
How to detect alterations
Altered Document Recovered Document
Grayscale image of Altered Document
Final Result
![Page 20: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/20.jpg)
http://isrc.ulster.ac.uk
Received Document Extracted original content from received Document
Document authentication
![Page 21: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/21.jpg)
http://isrc.ulster.ac.uk
Anti-Counterfeit & Track and Trace Solution
![Page 22: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/22.jpg)
http://isrc.ulster.ac.uk
Solutions for Digital Images
images used by creative individuals, enterprises, governments and law enforcement
• Copyright Communication– Identifies content owner and rights
• Copy Protection– Controls copying of content
• Classification– Classifies content so it is used appropriately;
• Authentication– Verifies that content is genuine, from an authorized source and has not been altered
![Page 23: The role of steganography in secure information solutions (Prathepan yogarajah)](https://reader038.vdocuments.us/reader038/viewer/2022103110/549353a7b47959110f8b481b/html5/thumbnails/23.jpg)
http://isrc.ulster.ac.uk23
Thank You