Download presentation
Presentation is loading. Please wait.
Published byHilary Rodgers Modified over 9 years ago
2
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43
3
“ Three people can keep the secret only if two of them are dead !” -Benjamin Franklin
4
What is the secret message? Harshada Kshirsagar.
7
Will somebody else receive my msg? Will somebody read my msg? Will somebody alter my msg? Will somebody delete my msg? Use Confidential data from my msg?
8
stegein to cover STEGANOGRAPHY
9
to write grafein STEGANOGRAPHY
11
Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in A BLOCK OF WOOD, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.
12
You can try steganography at home by writing on a piece of paper with LEMON JUICE. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire!
13
Message on head scalp… In ancient Greece, they used to select messengers and shave their head, they would then write a message on their scalp. Then the hair was allowed to grow back. After the hair grew back, the messenger was sent to deliver the message. The recipient shave off the messengers hair to see the secret msg…
17
Select Carrier File Choose a method of steganogr aphy Choose a program to hide msg in carrier file Communicat e the chosen method to receive via a different channel Embed msg in carrier file,and if possible encrypt it Choose a regular medium to transfer the file
20
p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Spy Game Null ciphers
21
p h g l o j i m e i s s u n a f y ne i rs n r
23
Feature Coding Harshada Kshirsagar. Vertical end line top of letters is altered
25
Illusions1.htm Illusions2.html
26
Methods Of Steganography Injection Substitution Harshada Kshirsagar.
27
Steganography Technique: Adding Bytes to End-of- Image FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 60......JFIF.....` 00 60 00 00 FF E1 00 94 45 78 69 66 00 00 49 49.`......Exif..II 2A 00 08 00 00 00 0A 00 FE 00 04 00 01 00 00 00 *............... 00 00 00 00 00 01 03 00 01 00 00 00 00 02 1A 01................ 01 01 03 00 01 00 00 00 00 02 00 00 02 01 03 00................... 73 4E 85 03 7D B6 D4 60 FF 00 CF 45 CF F3 AB BF sN..}..`...E.... 72 D4 7A 9B 2F 13 3E D4 57 C0 E3 9E 4F BE 2A B5 r.z./.>.W...O.*. CD B7 92 57 3C F1 D8 7B FB 7F 9F C2 A8 CF AF D9...W<..{........ 96 DF 1E A1 68 0F 27 1E 6A F2 7F 3A 9E 5D 73 4C....h.'.j..:.]sL 96 DD 44 97 F6 AC 79 CF EF 17 F2 A4 3D 51 FF D9..D...y.....=Q.. 50 4B 03 04 14 00 02 00 08 00 72 76 D6 30 1B A9 PK........rv.0.. 83 F2 F8 3F 00 00 27 D9 00 00 13 00 11 00 75 73...?..'.......us 20 63 6F 6E 73 74 69 74 75 74 69 6F 6E 2E 74 78 constitution.tx 74 55 54 0D 00 07 C7 8D D8 40 63 D7 F2 40 C6 E0 tUT......@c..@.. ED 40 D5 7D 5B 73 DC 46 B2 E6 3B 23 F8 1F 10 7E.@.}[s.F..;#...~... 21 00 00 81 00 00 00 00 75 73 20 63 6F 6E 73 74 !.......us const 69 74 75 74 69 6F 6E 2E 74 78 74 55 54 05 00 07 itution.txtUT... C7 8D D8 40 50 4B 05 06 00 00 00 00 01 00 01 00...@PK.......... 4A 00 00 00 3A 40 00 00 00 00 48 49 12 00 9A 40 J...:@....HI...@ 00 00 64 34 31 64 38 63 64 39 38 66 30 30 62 32..d41d8cd98f00b2 30 34 00 27 DD 73 04.'.s baboon.jpg 1.JPEG file with end-of-image bytes FF D9. 2.Application appends hidden data within a zip file, its signature, and user-specified password. baboon_stego.jpg
28
Harshada Kshirsagar.
30
2,94,912 chars Harshada Kshirsagar.
32
Applications Barcodes Hides Personal Communication Military Information Exchange Personal Information Sending Credit card no E- commerce Harshada Kshirsagar.
36
Steganalysis The goal of steganalysis is to identify suspected information streams,determine whether or not they have messages encoded into them,and if possible,recover the hidden information.. DETECTDEFEAT
37
Steganalysis Text Image Audio Harshada Kshirsagar.
38
Steganalysis: Detecting s teganography Text -Odd use of language Images -Size of image -Cross check with the other copies of image on the net. Harshada Kshirsagar.
39
Steganalysis … Defeating steganography Text -Change the order of the words -Add or remove words Images -Compress Image using Lossy compression -Resize image -Convert to other format -Modify colors
40
Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult ● Defeating steganography is not hard Harshada Kshirsagar.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.