Cyber Security 2 Presentation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Topic:

Steganography In
Cybersecurity
Hidden Data in the Digital World
Group Members :
 Sajid Hussain (044)
 Safeer Ahmed Tahir (008)
 Arslan Aslam (018)
 Muhammad Danish (023)
 Introduction to
Steganography

Steganography is the art of concealing information


within other non-suspicious data, such as images,
audio, video, or text.

 The goal is to hide the existence of the message


itself, not just encrypt it.
Key Point
Unlike encryption, where the data is
disguised but detectable,
steganography aims to make the data
undetectable.
 History of
Steganography
The term "steganography" comes from Greek,
meaning "hidden writing."
Examples: Messages hidden in wax tablets, tattoos
on slaves, and invisible ink.

- Modern Use:
 How Steganography

Works
Basic Concept:
 The message (payload) is hidden within a carrier
file (e.g., an image, audio file).
Common Methods:
 Least Significant Bit (LSB) Technique: Modifies
the least significant bits of a file to encode
information without significantly altering the
file's appearance or quality.
 Transform Domain
Techniques
Embedding data in transformed domains (e.g., frequency domain) of the
carrier file (like JPEG, MP3).

Example:
A pixel in an image can be altered slightly without noticeable
changes to the human eye, but it can contain hidden data.
 Types of
Steganography
1. Image Steganography:
Hiding data within image files (e.g., JPEG, PNG). - Modifying pixel values
without perceptible changes to the image.
2. Audio Steganography:
Embedding data in sound files (e.g., MP3, WAV). - Often uses phase coding or
echo hiding.
3. Video Steganography:
Hiding messages in video files (e.g., AVI, MP4). - Data can be embedded in
both the video frames and audio tracks.
4. Text Steganography:
Concealing messages in plain text (e.g., using formatting changes, word spacing,
or invisible characters).
5. Network Steganography:
Hiding data in network protocols (e.g., in packet headers or timing delays
between packets).
 Benefits of
Steganography
Data Protection:
Secure way to transmit confidential information.
Can be used alongside encryption to add an additional layer
of security.
Covert Communication:
Helps in bypassing censorship or surveillance
systems by hiding the existence of the
communication.
 Risks and Challenges

Hidden Malware Delivery:


Malware authors can hide malicious code within seemingly
innocent files (images, audio, etc.), making detection more
difficult
Increased Detection Difficulty:
Detection tools have to differentiate between legitimate data and hidden messages,
which can be complex and resource-intensive.

Legal and Ethical Concerns:


Potential use for illegal activities (e.g., terrorism, fraud) under the guise of harmless
communication
 Detecting
Steganography
Techniques
Statistical for Detection
Analysis:
Examining the carrier file for irregular patterns that suggest data has
been embedded.
Data Redundancy Check:
Identifying files that may contain hidden information by analyzing the
redundancy in the data.
File Size and Structure Analysis:
Unusual file size increases can indicate hidden data.
Machine Learning:
Modern tools can use AI and machine learning algorithms to detect
subtle changes in files.
 Steganography vs
Cryptography
Steganography:
Hides the existence of the message. - Can be used
alongside encryption for extra security.

Cryptography:
Hides the content of the message, but the existence of the
message is still detectable.
 Conclusion

Steganography is both a powerful tool and a


potential cybersecurity threat.
Awareness and detection techniques are essential
for mitigating the risks associated with
steganography in cybersecurity.
Thanks
Q&A
Open the floor for questions

You might also like