1 / 24

Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training | Edureka

** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools.<br>Below is the list of topics covered in this session:<br>1. What is Steganography?<br>2. History of Steganography<br>3. Basic Steganographic Model<br>4. LSB Steganography<br>5. Demo: LSB Steganography<br>6. Demo: Steganographic Tools<br><br><br>Cyber Security Playlist: https://bit.ly/2N2jlNN <br>Cyber Security Blog Series: https://bit.ly/2AuULkP <br><br>Instagram: https://www.instagram.com/edureka_lea...<br>Facebook: https://www.facebook.com/edurekaIN/ <br>Twitter: https://twitter.com/edurekain <br>LinkedIn: https://www.linkedin.com/company/edureka

EdurekaIN
Download Presentation

Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agenda 01 What is Steganography? 02 History of Steganography 03 Basic Steganographic Model 04 LSB Steganography - Demo Steganography Tools 05 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  2. What is Steganography? Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  3. What is Steganography? Data is hidden in the plain sight Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  4. What is Steganography? Cryptography Board meeting is happening on Tuesday. We are meeting at 40.7127 S, Board meeting is happening on Tuesday. We are meeting at 40.7127 S, 74.0059 E Uksb klsmnc ou fghmhnvb gh sdeygdh. eu sfhd vbsnmrig st lolmnar K, dgfhal V 74.0059 E Receiver Sender Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  5. What is Steganography? Cryptography Uksb klsmnc ou fghmhnvb gh sdeygdh Intruder understands that secret message is being sent Receiver Sender Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  6. What is Steganography? Steganography is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message Receiver Sender Intruder will not get to know of the existence of secret message Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  7. History of Steganography Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  8. Steganographic Tecniques Steganography 2019 1800 Concealed or Hidden Drawing or Writing GRAPHEN STEGANOS Wax Tablet Invisible Ink Null Cipher Microdots Semagrams Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  9. Steganography Types Image Steganography Text Audio Steganography Steganography Email Video Steganography Steganography Network Steganography Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  10. Characteristics of Steganographic Techniques Transparency Robustness Tamper Resistance Original Image StegoImage Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  11. Basic Steganographic Model Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  12. Basic Steganographic Model StegoObject Cover File(X) Steganographic Encoder f(X,M,K) Secret Message(M) Communication Channel Key(K) Secret Message(M) Steganographic Decoder Stego Object Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  13. Steganographic Model: With Encryption Key StegoKey Cover File Cypher Text Message StegoObject Encryption Algorithm Steganographic Encoder SENDER Communication Channel Cypher Text Steganographic Decoder Decryption Algorithm StegoObject Message RECEIVER Key StegoKey Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  14. LSB Steganography Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  15. Pixels & Bits 1 0 1 1 0 1 1 1 R G 1 1 0 1 1 0 0 1 Pixel B 1 0 1 0 0 1 0 0 Total: 24 Bits Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  16. Least Significance Bit Steganography If we change MSB, it will have larger impact on final value. If we change LSB, the impact on final value is very less Value: 255 1 1 1 1 1 1 1 1 Least Significant Bit(LSB) Most Significant Bit(MSB) 255 255 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 254 127 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 Change in bytes is 0.000002% Change in bytes is 99.99999% Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  17. Least Significant Bit Steganography Least Significant Bit Steganography(LSBS) involves overwriting the bit with the lowest arithmetic value Secret message to hidden: Letter ‘A’ 1 0 0 0 0 0 1 Pixels after insertion Pixels before insertion(3 pixels) 10000000 10100100 10110101 10110101 11110011 10110111 11100111 10110011 00110011 10000001 10100100 10110100 10110100 11110010 10110110 11100110 10110011 00110011 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  18. Demo Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  19. Least Significant Bit Steganography - Demo To encode the text into image 1 Loads an image and looks at each pixels in hexadecimal value. 2 Converts secret text into bits and stores them in LSB of pixel bits 3 A delimiter is added to the end of the edited pixel values To decode the text from image While retrieving all the 0’s and 1’s extracted until delimiter is found. Extracted bits are converted into string(secret message) 4 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  20. Steganography Tools Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  21. Steganographic Tools Tool Stegosuite Stegohide Xiao Steganography Description Hide text inside any image Hide secret file in image or audio file. Free software that can be used to hide secret files in BMP images or in WAV files. Portable application to hide text inside image file Tool to conceal files in image, audio & flash files Tool that lets you hide any type of file inside of file. SSuite Picsel OpenPuff Camouflage Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  22. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related