•Steganography
from the Greek word steganos meaning “covered”
and the Greek word graphie meaning “writing”
•Process of hiding of a secret message within an ordinary message and extracting it at its destination
•Anyone else viewing the message will fail to know it contains hidden/encrypted data
This can be achieved by concealing the existence of information within seemingly harmless carriers or cover
Carrier: Text, Image, Audio, Video, etc.
History Of Steganography
Steganography ancient origins can be traced back to 440 BC, from the Histories of Herodotus
Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax.
Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians
Techniques Of Steganography
Masking and Filtering: Information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses.
Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms.
Least Significant Bit Insertion:The most common and popular method of modern day steganography is to make use of least significant bits of a picture pixel information
•The detection of steganographically encoded content is called Steganalysis
•Two Ways:
1)Visual Analysis :
Tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.
2) Statistical (Algorithmic) Analysis :
Reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.
Makes use of Algorithm or any Encoding method for finding the Alteration.
Steganography Tools
•Steganos
•S-Tools (GIF, JPEG)
•StegHide (WAV, BMP)
•Invisible Secrets (JPEG)
•JPHide
•Camouflage
•Hiderman
•Many others…
from the Greek word steganos meaning “covered”
and the Greek word graphie meaning “writing”
•Process of hiding of a secret message within an ordinary message and extracting it at its destination
•Anyone else viewing the message will fail to know it contains hidden/encrypted data
This can be achieved by concealing the existence of information within seemingly harmless carriers or cover
Carrier: Text, Image, Audio, Video, etc.
History Of Steganography
Steganography ancient origins can be traced back to 440 BC, from the Histories of Herodotus
Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax.
Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians
Techniques Of Steganography
Masking and Filtering: Information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses.
Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms.
Least Significant Bit Insertion:The most common and popular method of modern day steganography is to make use of least significant bits of a picture pixel information
•The detection of steganographically encoded content is called Steganalysis
•Two Ways:
1)Visual Analysis :
Tries to reveal the presence of secret communication through inspection, either with the naked eye or with the assistance of a computer.
2) Statistical (Algorithmic) Analysis :
Reveals tiny alterations in an image's statistical behavior caused by steganographic embedding.
Makes use of Algorithm or any Encoding method for finding the Alteration.
Steganography Tools
•Steganos
•S-Tools (GIF, JPEG)
•StegHide (WAV, BMP)
•Invisible Secrets (JPEG)
•JPHide
•Camouflage
•Hiderman
•Many others…
Comments
Post a Comment