FOOTPRINTING STEGANOGRAPHY.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
“The Art of Hiding Data”
Overview of Digital Stenography
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
File Name Extensions Computer Applications 7th grade.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
File Management Debi McGuire. What Is a File? Collection of data Data can be text, graphic, numbers.exe file is executable (program) File properties –Type.
Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Chair Professor Chin-Chen Chang Feng Chia University
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
UIT Unconference December 06, 2018 Ian Redzic
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

FOOTPRINTING STEGANOGRAPHY

FOOTPRINTING History and Evolution of STEGANOGRAPHY Steganographic techniques have been used for ages and they date back to ancient Greece. The aim of steganographic communication back then and now, in modern applications, is the same: to hide secret data (a steganogram) in an innocently looking cover and send it to the proper recipient who is aware of the information hiding procedure. In an ideal situation the existence of hidden communication cannot be detected by third parties. 

Herodotus FOOTPRINTING The first use of steganography is reported by Herodotus, the so-called father of history, who mentions that in ancient Greek, hidden text was written on wax tablets write message on a tablet and covered it with wax Secret letters can be hidden in the messengers' shoe soles    use pigeons to carry secret notes women's ear rings A very common steganographic scheme in history was the use. Invisible ink (like urine or milk), is still be used by a lot of children (e.g. lemon-based ink

Technique for Steganography FOOTPRINTING Technique for Steganography

Technique for Steganography FOOTPRINTING Technique for Steganography This Is Steganography practical This Is Steganography practical

TYPES OF STEGANOGRAPHY FOOTPRINTING TYPES OF STEGANOGRAPHY

Ethical And Non-Ethical Hacking FOOTPRINTING Ethical And Non-Ethical Hacking With Digital Steganography… Hacker can embed all sorts of malware to an unsuspecting user. Typically , an image file is attached to an email with an attractive header , the user click on it and the embedded file get executed. Terrorist can embed message Attackers send Illegal stuff with normal video

TOOLs FOOTPRINTING StegSpy Steghide QuickStego Open Stego OpenPuff SilentEye

Stealth files FOOTPRINTING Stealth Files compresses, encrypts, and then hides any type of file inside many other types of files, including EXE, DLL, OCX, COM, JPG, GIF, ART, MP3, AVI, WAV, DOC, BMP, and most other types of video, image, and executable files.

h@ckin9 kit FOOTPRINTING 10 NETWORK SECURITY + HACKING BOOKS Footprinting penetration testing NETWORK SECURITY + HACKING BOOKS LAB PRACTICE VM + OS +SERVER OS …………. MORE THEN THIS MILLINDHIRKANE@GMAIL.COM