Você está na página 1de 11

STEG AN O

A TECHNIQ UE TO HIDE FILES IN


ANY SIM PLE IM AGE.
TABLE O F CO N TEN TS :

1.IN TRO D U CTIO N


2.H ISTO RY
3.STEG AN O G RAPH Y VS
CRYPTO G RAPH Y
4.H O W IT W O RKS
5.A VISU AL EXAM PLE
6.AD VAN TAG E & D ISAD VAN TAG E
7.CO N CLU SIO N
8.REFFEREN CE

Jens M artensson 2
INTRODUCTION

Steganography is the technique of hiding secret data


within an ordinary, non-secret, file or message in
order to avoid detection.
• The word steganography is derived from the Greek
words steganos (meaning hidden or covered) and
the Greek root graph (meaning to write).
• Steganography can be used to conceal almost any
type of digital content, including text, image, video
or audio content; the data to be hidden can be
hidden inside almost any other type of digital
content.

Jens M artensson 3
HISTORY
The first recorded use of the term was in 1499
by Johannes Trithemius in his Steganographia, a
treatise on cryptography and steganography,
1 2
disguised as a book on magic.
• The first recorded uses of steganography can be
traced back to 440 BC when Herodotus mentions
two examples in his Histories.[3] Histiaeus sent a
message to his vassal, Aristagoras, by shaving the
head of his most trusted servant, "marking" the
message onto his scalp, then sending him on his 3 4
way once his hair had regrown, with the instruction,
"When thou art come to Miletus, bid Aristagoras
shave thy head, and look thereon." Additionally, 
Demaratus sent a warning about a forthcoming
attack to Greece by writing it directly on the wooden
backing of a wax tablet before applying its beeswax
surface. Wax tablets were in common use then as 5 6
reusable writing surfaces, sometimes used for
shorthand.
Jens M artensson 4
STEGANOGRAPHY VS CRYPTOGRAPHY
The prim ary advantage of using steganography to hide data over encryption is that it
helps obscure the fact that there is sensitive data hidden in the fi
le or other content
carrying the hidden text.

B A S IS FO R
S TEG A N O G R A P H Y
C O M PA R IS O N C R Y P TO G R A P H Y

Basic It is know n as cover w riting. It m eans secret w riting.

G oal Secret com m unication D ata protection

Structure of the m essage N ot altered Altered only of the transm ission.

Popularity Less popular M ore com m only used.

Relies on Key N o param eters.

Supported security Confi


d entiality and authentication Confid entiality, data integrity, authentication, and
principles non-repudiation.
Techniques Spacialdom ain, transform dom ain, m odel-based and Transposition, substitution, stream cipher, block
ad-hoc. ciphers.
Im plem ented on Audio, video, im age, text. O nly on text fi
les.

Types of attack Steganalysis Cryptanalysis

Jens M artensson
HOW IT
WORKS

Jens M artensson
AN
ENCRYPTIO EXAMPLE DECRYPTIO
N N

1 2 1 2

4 4
3 3

5 6 5

Jens M artensson 7
ADVANTAGE
DISADVANTAGE

 It can be used by  Many a terrorist and anti


intelligence agencies for humanist activities have
sending their secret data. been carried out cloaked
 under this technique.
It’s very primary
advantage is, no one  If the file size is huge,
doubts about it. Like if you then someone can
are sending just a simple suspect about it.
image to your friend, even
in a group of friends.

Jens M artensson 8
Large Image slide
CONCLUSION

 Steganography is the art of hiding sensitive, secret data


w ithout generating any curiosity and suspicion am ong
third party.

 W ith proper usage of Steganography can prove to be the


ultim ate solution to inform ation hiding. O n the contrary,
its m isuse is devastating and unthinkable.

 Intention need to be good.

Jens M artensson 9
REFFERENCE

1.https:// w w w .google.com
2.https://w w w .w ikipedia.org
3.https://w w w .slideshare.net
4.https://techdiff erences.com
5.http://w w w .authorstream .com

Jens M artensson
Thank
You
PAPAN SARAKR
B.P.C.I.T ( CST-3 )

+ 919091123159
papansarkar101@ gm ail.com

Você também pode gostar