SlideShare a Scribd company logo
“steganography”

            BY
SHAIK SHARAF PARVEZ
       09081A0474

  Under the guidance of
 Miss. Geetha(Asst. Proff.)
STEGAN-O-GRAPHY
   “The goal of steganography is to hide messages in such a
    way that no one apart from the intended recipient even
    knows that a message has been sent.”

   This can be achieve by concealing the existence of
    information within seemingly harmless carriers or cover

   It can be understand by the following figure.
PPT steganography
   Steganography in “TEXT”


   Steganography in “IMAGES”


   Steganography in “AUDIO”
It involves three types of coding:
Line-Shift      Coding : Here, text lines are vertically shifted to
        encode the document uniquely.

   Word-Shift Coding : The codewords are coded into a
        document by shifting the horizontal locations of words within
        text lines, while maintaining a natural spacing appearance.

   Feature Coding : In feature coding, certain text features are
         altered, or not altered, depending on the codeword.
Image Compression:
   Image compression offers a solution to large image files. Two kinds of image
           compression are lossless and lossy compression. Both methods save
           storage space but have differing effects on any uncompressed hidden data
           in theimage.

   “Lossy”    JPEG(Joint Photographic Experts Group) format files, offers high
compression, but may not maintain the original image's integrity. Hence it is called
“lossy”.
   “Lossless” compression maintains the original image data exactly, It is thus more
           favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
Image Encoding Techniques
    The most common approaches to information hiding in images :

   Least Significant bit insertion :


   Masking and Filtering :


   Algorithms and transformations :
Audio Environments

             Digital representation
   Sample quantization method :
   Temporal sampling rate :
   Another digital representation :
Transmission medium :
            Bender’s transmission environments

   Digital end-to-end environment.

   Increased/decreased resampling environment.

   Analog transmission and resampling.

   ''Over the air'' environment.
Methods of Audio Data Hiding


   Low-bit encoding :


   Phase coding :


   Echo data hiding :
   Steganalysis is the art and science of detecting a
        secret communication.
   Hiding   a   message     will   most   likely    leave
        detectable traces in the cover medium.
   The information hiding process changes the
        statistical properties of the cover, which is a
        steganalyst attempts to detect.
   The process of attempting to detect statistical
        traces is called statistical steganalysis.
IMPORTANT ASPECTS OF STEGANALYSIS


   DETECTING HIDDEN INFORMATION


   DISABLING STEGANOGRAPHY
PPT steganography
PPT steganography
PPT steganography
PPT steganography

More Related Content

PPT steganography

  • 1. “steganography” BY SHAIK SHARAF PARVEZ 09081A0474 Under the guidance of Miss. Geetha(Asst. Proff.)
  • 3. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  It can be understand by the following figure.
  • 5. Steganography in “TEXT”  Steganography in “IMAGES”  Steganography in “AUDIO”
  • 6. It involves three types of coding: Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.  Word-Shift Coding : The codewords are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.  Feature Coding : In feature coding, certain text features are altered, or not altered, depending on the codeword.
  • 7. Image Compression:  Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in theimage.  “Lossy” JPEG(Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image's integrity. Hence it is called “lossy”.  “Lossless” compression maintains the original image data exactly, It is thus more favored by steganographic techniques. Eg: (BMP ),(GIF) Formats.
  • 8. Image Encoding Techniques The most common approaches to information hiding in images :  Least Significant bit insertion :  Masking and Filtering :  Algorithms and transformations :
  • 9. Audio Environments Digital representation  Sample quantization method :  Temporal sampling rate :  Another digital representation :
  • 10. Transmission medium : Bender’s transmission environments  Digital end-to-end environment.  Increased/decreased resampling environment.  Analog transmission and resampling.  ''Over the air'' environment.
  • 11. Methods of Audio Data Hiding  Low-bit encoding :  Phase coding :  Echo data hiding :
  • 12. Steganalysis is the art and science of detecting a secret communication.  Hiding a message will most likely leave detectable traces in the cover medium.  The information hiding process changes the statistical properties of the cover, which is a steganalyst attempts to detect.  The process of attempting to detect statistical traces is called statistical steganalysis.
  • 13. IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAPHY