Uploaded on Jun 8, 2022
PPT on Steganography.
An Overview of Steganography
AN OVERVIEW OF
STEGANOGRAPHY
INTRODUCTION
Steganography is the technique of
hiding secret data within an ordinary,
non-secret, file or message in order
to avoid detection; the secret data is
then extracted at its destination.
SOURCE: WWW.TECHTARGET.COM
USE
The use of steganography can be
combined with encryption as an
extra step for hiding or protecting
data. The word steganography is
derived from the Greek words
steganos (meaning hidden or
covered) and the Greek root graph
(meaning to write).
SOURCE: WWW.TECHTARGET.COM
BENEFIT
Steganography can be used to
conceal almost any type of digital
content, including text, image, video
or audio content; the data to be
hidden can be hidden inside almost
any other type of digital content.
SOURCE: WWW.TECHTARGET.COM
SECRET CONTENT
The content to be concealed through
steganography called hidden text is
often encrypted before being
incorporated into the innocuous-
seeming cover text file or data
stream. If not encrypted, the hidden
text is commonly processed in some
way in order to increase the difficulty
of detecting the secret content.
SOURCE: WWW.TECHTARGET.COM
WHAT ARE EXAMPLES
FOR STEGANOGRAPHY?
Steganography is practiced by those
wishing to convey a secret message
or code. While there are many
legitimate uses for steganography,
malware developers have also been
found to use steganography to
obscure the transmission of
malicious code.
SOURCE: WWW.TECHTARGET.COM
FORMS OF
STEGANOGRAPHY
Forms of steganography have been used for
centuries and include almost any technique
for hiding a secret message in an otherwise
harmless container.
For example, using invisible ink to hide secret
messages in otherwise inoffensive messages;
hiding documents recorded on microdot which
can be as small as 1 millimeter in diameter on
or inside legitimate-seeming correspondence;
and even by using multiplayer gaming
environments to share information.
SOURCE: WWW.TECHTARGET.COM
HOW IS
STEGANOGRAPHY USED
TODAY?
In modern digital steganography, data is
first encrypted or obfuscated in some other
way and then inserted, using a special
algorithm, into data that is part of a
particular file format such as a JPEG image,
audio or video file.
SOURCE: WWW.TECHTARGET.COM
WATERMARK
The practice of adding a watermark a
trademark or other identifying data hidden
in multimedia or other content files is one
common use of steganography.
Watermarking is a technique often used by
online publishers to identify the source of
media files that have been found being
shared without permission.
SOURCE: WWW.TECHTARGET.COM
EMBED A TEXT FILE INTO
AN IMAGE FILE
While there are many different uses of
steganography, including embedding
sensitive information into file types, one of
the most common techniques is to embed a
text file into an image file.
SOURCE: WWW.TECHTARGET.COM
ADVANTAGES OF
STEGANOGRAPHY
The primary advantage of using
steganography to hide data over encryption
is that it helps obscure the fact that there is
sensitive data hidden in the file or other
content carrying the hidden text.
Whereas an encrypted file, message or
network packet payload is clearly marked
and identifiable as such, using
steganographic techniques helps to obscure
the presence of the secure channel.
SOURCE: WWW.TECHTARGET.COM
Comments