 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
An Introduction Steganography with A Case Study of Steganalysis
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Spread Spectrum Steganography
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Introduction to Steganography
Security Using Armstrong Numbers and Authentication using Colors
Steganography in WebP image using LSB embedding
Welcome
Steganography Example
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
Information Steganography Using Magic Matrix
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Simple Encryption- Lesson 5
Embedding Secrets Using Magic Matrices
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Data hiding based Hamming code
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
Partial reversible data hiding scheme using (7, 4) hamming code
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
STEGANOGRAPHY IN IMAGES
Lossless Data Hiding in the Spatial Domain for High Quality Images
Presentation transcript:

 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software Package  Conclusion

 Embedding a message into an image requires two files.  cover image  Message to be hidden  When combined, the cover image and the embedded message make a stegoimage.  A stego-key (a type of password) may also be used to hide then later decode the message.

 Several techniques are proposed by researchers  LSB insertion  Masking and Filtering  Algorithmic Transformations  Redundant Pattern Encoding  Encrypt and Scatter…………..

Use of Punctuation Marks  The idea behind this technique is to utilize the presence of punctuation marks like, ; : “ etc. in the text for encoding a secret messge.  Encode the given secret message using punctuation marks into the embedded message  Embed the message in a cover image to create a stego- image using some transformation  Extract the embedded message using the reverse transformation  Decode the secret message from the embedded message

 Message “Pershing sails from NY June 1”  Encoded using ASCII code where comma stands for 0 and semicolon for 1 OFT, I had heard of Lucy Gray; And, when I crossed the wild; I chanced, to see, at break of day, The solitary child, No mate, no comrade; Lucy knew, She dwelt, on a wide moor, The sweetest thing; that ever grew, Beside a human door; You, yet may spy the fawn; at play, The hare; upon the green, But, the sweet face of Lucy Gray; Will never more be seen, ……………..

Use of modified Scytale Cipher  Arrange a message on a rectangular array of some size e.g., 4x16  Fill the remaining cells of the grid with arbitrary letters or numbers and note down the row number and column number of the secret message.  Embed this data array linearly in a cover image file.

 Embedded Message D C A4E52565A D714347B4F E6D A6E C B6F73  When arranged on a grid of same size (4x16) will reveal the secret message “Send Army” at (row, column) = (1,8)

 S-Tools for Windows Version 4 is used.  It allows processing of GIF and BMP images and audio WAV files.  S-Tools applies the LSB method for image and audio files and also includes encryption routines.  The message to be embedded is first compressed.  The compressed output is then encrypted using IDEA using a stego-key and inserted into the low-order bits of each color value.

 The two presented technique are based on the simple idea of adding an additional layer of confusion in order to make the message revealment difficult against steganalysis.  They have less capacity in comparison with other methods.