Anda di halaman 1dari 19

AuulCS1LCAnCC8AP?

8y
Masud Sarkar
AshuLosh kr Sharma
uebasls Mandal
8eauLy Mulllck
Suvrangsu al

SLeganography ueflnlLlon
W Steganography
from the Creek word steganos meaning
covered"
and the Creek word graphie meaning
writing"
W Steganography is the process of hiding of a
secret message within an ordinary message
and extracting it at its destination
W Anyone else viewing the message will fail to
know it contains hidden/encrypted data

SLeganography PlsLory
W Greek history - warning of invasion
by scrawling it on the wood
underneath a wax tablet. To casual
observers, the tablet appeared blank.
W oth Axis and Allied spies during World
War !! used such measures as invisible inks
using milk, fruit juice or urine which
darken when heated.
W !nvisible !nk is also a form of
steganography
ulfference beLween sLeganography and crypLography
W SLeganography ls Lhe sclence of hldlng
lnformaLlon ln such a way LhaL no one suspecLs
Lhe lnformaLlon exlsLs
W WlLh crypLography Lhe lnformaLlon ls known Lo
exlsL buL lL ls encoded ln such a way LhaL only Lhe
lnLended reclplenL can read lL
W SLeganography ls usually comblned wlLh
crypLography
W Why ls crypLography usually used ln con[uncLlon wlLh
sLeganography?
W rovldes an exLra layer of securlLy
W Makes Lhe exlsLence of a hldden message more dlfflculL Lo
deLecL
W 1he LS8 of a dlglLal audlo or vldeo flle Lends Lo resemble
nolse
W 1he mosL slgnlflcanL blLs Lend Lo be grouped ln blocks lor
example Lhe ocean background has a large block of blLs
where r 0110xxxx g 1010xxxx b 1110xxxx
W 1hus when encodlng Lhls daLa ln Lhe LS8 Lhere wlll be a
repeaLlng paLLern 0110xxxx1010xxxx1110xxxx
W LncrypLlon randomlzes Lhls daLa so lL looks llke nolse agaln
Assymetric RSA Algorithm
W key Generat|on A|gor|thm
W CeneraLe Lwo large random prlmes and of
approxlmaLely equal slze such LhaL Lhelr producL n
pq ls of Lhe requlred blL lengLh eg 10 blLs
W ompuLe n pq and () phl (p1)(q1)
W hoose an lnLeger e 1 e phl such LhaL gcd(e
phl) 1
W ompuLe Lhe secreL exponenL J 1 d phl such
LhaL ed 1 (mod phl)
W 1he publlc key ls (n e) and Lhe prlvaLe key ls (n d)
keep all Lhe values d p q and phl secreL
W Where n ls known as Lhe moJolos e ls known as
Lhe obllc exooeot or eoctytloo exooeot or [usL
Lhe exooeot d ls known as Lhe sectet
exooeot or Jectytloo exooeot
ncrypt|on
W Sender A does Lhe followlng
W CbLalns Lhe reclplenL 8s publlc key (n e)
W 8epresenLs Lhe plalnLexL message as a poslLlve
lnLeger m
W ompuLes Lhe clpherLexL c m
e
mod n
W Sends Lhe clpherLexL c Lo 8
ecrypt|on
W 8eclplenL 8 does Lhe followlng
W uses hls prlvaLe key (n d) Lo compuLe m c
d
mod n
W LxLracLs Lhe plalnLexL from Lhe message
represenLaLlve m
as|cs of Modern Steganography Steganography
f sLeganographlc funcLlon embeddlng
f sLeganographlc funcLlon exLracLlng
cover cover daLa ln whlch emb wlll be hldden
emb message Lo be hldden
ey parameLer of fL
stego cover daLa wlLh Lhe hldden message
CeneraLlon of SLegoAudlo flle
W 8ecelver generaLe publlc key of 8SA encrypLlon and
send lL Lo Lhe sender
W Sender recelves Lhe publlc key from Lhe recelveruslng
Lhls publlc key sender encrypLed Lhe message uslng
8SA algorlLhm
W onverL encrypLed message Lo byLe sLreams
W 8ead an audlo flle byLewlse onverL llLLle lndlan
noLaLlon Lo lnLeger array (16 blLs sample)
W use modlfled LS8 algorlLhm Lo embed lnformaLlon lnLo
audlo lnformaLlon
W WrlLlng sLegoaudlo samples onverL 16 blL sLego
audlo sample Lo 8 blL byLes And wrlLe sLego audlo byLe
sLream Lo an audlo flleLrlng
tract|ng Message I||e
W 8ead Lhe sLego audlo flle byLewlse And converL llLLle lndlan
noLaLlon Lo lnLeger array (16 blLs sample)
W 8y geLLlng Lhe flLness value or locaLlon number of Lhe hldden
message blL's lnLo Lhe sLego audlo sample exLracL message
blL from Lhe sLego audlo flle
W 1o geL 8 blLs of Lhe message daLa and random locaLlon
number from audlo daLa choose 16 (16 blLs) sLegoaudlo
daLa
W CeL Lhe message byLe sLreams for all Lhe poslLlons
W onverL message byLe sLream Lo a message LexL flle
W Apply prlvaLe key Lo decrypL Lhe orlglnal message uslng 8SA
algorlLhm
W WrlLe Lhe exLracLed message Lo a LexL flle
W WrlLe Lhe audlo byLe sLream Lo an audlo flle by converLlng 16
blL sample Lo 8 blLs byLe
W 1he slmplesL and mosL common Lype of sLeganography ls LS8
(leasL slgnlflcanL blL) 1he one's blL of a byLe ls used Lo encode
Lhe hldden lnformaLlon
W Suppose we wanL Lo encode Lhe leLLer A (ASll 63 or blnary
01000001) ln Lhe followlng 8 byLes of a carrler flle
01011101 11010000 00011100 10101100
11100111 10000111 01101011 11100011
becomes
01011100 11010001 00011100 10101100
11100110 10000110 01101010 11100011
W 1yplcal wav flle uses 16 blL sampllng
W ls Lhe dlfference beLween level and deLecLable
by Lhe human ear? robably noL
leaLures
W octytloo LncrypLlon ls done Lo provlde an exLra securlLy
level Lo our appllcaLlon Lven lf Lhe secreL ls compromlsed
and someone came Lo know LhaL Lhere ls some secreL daLa
ln Lhe audlo he sLlll cannoL vlew lL because of Lhe
encrypLlon
W teqoooqtoy 1he sLeganography parL ls done uslng Lhe
algorlLhms descrlbed above 1he maln feaLure of
sLeganography ls LhaL Lhe audlo cllp should noL be dlsLorLed
and Lhe slze of Lhe orlglnal audlo Lo Lhe modlfled audlo
should remaln Lhe same
W ectytloo 1he decrypLlon parL ls compleLely opposlLe Lo
Lhe encrypLlon parL descrlbed above lL requlres Lhe user Lo
provlde a correcL password and Lhe daLa ln Lhe audlo wlll
decrypLed
luLure Work
CnLuSlCn
1PAnk ?Cu

Anda mungkin juga menyukai