Submitted By: Varun Singh Roll no.: MRT09UGBCS036.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Paul Krzyzanowski
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Information and Network Security
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Submitted By: Varun Singh Roll no.: MRT09UGBCS036

 1.Introduction.  2.History.  3.Classic Techniques.  4.Motivation.  5.Stegnography in text.  6.Stegnography in audio.  7.Stegnography in video.  8.Stegnography vs. Watermarking.  9.Good Stegnography.

 Stegnography : A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary Stegno - Graphy Covered Writing

Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content. ◦ persistent under transmission ◦ not encryption  original image/file is intact ◦ not fingerprinting  fingerprinting leaves separate file describing contents

 This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc.

 The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in his Histories.Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface.  In his work "Polygraphiae" Johannes Trithemius developed his so- called "Ave-Maria-Cipher" with which one can hide information in a Latin praise of God.

 Invisible ink (1st century AD - WW II)  Tatoo message on head  Overwrite select characters in printed type in pencil  Pin punctures in type  Microdots (WW II)  Newspaper clippings, knitting instructions, XOXO signatures, report cards.

 Steganography received little attention in computing.  Renewed interest because of industry desire to protect copyrighted digital work. ◦ audio ◦ images ◦ video ◦ Text  Detect counterfeiter, unauthorized presentation, embed key, embed author ID  Steganography ≠ Copy protection

 Hide message among irrelevant data.  Confuse the cryptoanalyst.  Text lines shifted up/down (40 lines text  2 40 codes)  word space coding  character encoding - minor changes to shapes of characters (here’s a para,we embed the information) Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.

Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer. [this is the information hiding in the paragraphy by stegnography technique.]

Perceptual coding ◦ inject signal into areas that will not be detected by humans ◦ may be obliterated by compression. Hardware with copy-protection ◦ not true watermarking - metadata present on media ◦ DAT. ◦ minidisc ◦ presence of copy protection mechanisms often failed to give the media wide-spread acceptance

 Coding still frames - spatial or frequency  data encoded during refresh. ◦ closed captioning  visible watermarking ◦ used by most networks.

 Although BMP files are perfect for steganographic use, they are able to carry only small files. So there is a problem, how to get much enough files to hide our message, and what to do to read them in a correct order? Good way out is to hide information in a video file, because as we know, AVI files are created out of bitmaps, combined into one piece, which are played in correct order and with appropriate time gap. Keeping that in mind all we have to do is to get out is file single frames and save them as BMP files. If we’ll use algorithm for hiding data in digital pictures, we can hide our message in bitmap obtained in this way, and then save it into new AVI file.  We’ll analyze only uncompressed AVI file, because if any compression is executed files loses its data.

Goal of steganography ◦ Intruder cannot detect a message ◦ Primarily 1 to 1 communication. Goal of watermarking ◦ Intruder cannot remove or replace the message ◦ Primarily 1:many communication

    dex.php?option=com_content&view=article&i d=11&Itemid=16&lang=en dex.php?option=com_content&view=article&i d=11&Itemid=16&lang=en  05/methods.html 05/methods.html

THANK YOU Any Ques????