Cyber Security 2 Presentation
Cyber Security 2 Presentation
Cyber Security 2 Presentation
Steganography In
Cybersecurity
Hidden Data in the Digital World
Group Members :
Sajid Hussain (044)
Safeer Ahmed Tahir (008)
Arslan Aslam (018)
Muhammad Danish (023)
Introduction to
Steganography
- Modern Use:
How Steganography
Works
Basic Concept:
The message (payload) is hidden within a carrier
file (e.g., an image, audio file).
Common Methods:
Least Significant Bit (LSB) Technique: Modifies
the least significant bits of a file to encode
information without significantly altering the
file's appearance or quality.
Transform Domain
Techniques
Embedding data in transformed domains (e.g., frequency domain) of the
carrier file (like JPEG, MP3).
Example:
A pixel in an image can be altered slightly without noticeable
changes to the human eye, but it can contain hidden data.
Types of
Steganography
1. Image Steganography:
Hiding data within image files (e.g., JPEG, PNG). - Modifying pixel values
without perceptible changes to the image.
2. Audio Steganography:
Embedding data in sound files (e.g., MP3, WAV). - Often uses phase coding or
echo hiding.
3. Video Steganography:
Hiding messages in video files (e.g., AVI, MP4). - Data can be embedded in
both the video frames and audio tracks.
4. Text Steganography:
Concealing messages in plain text (e.g., using formatting changes, word spacing,
or invisible characters).
5. Network Steganography:
Hiding data in network protocols (e.g., in packet headers or timing delays
between packets).
Benefits of
Steganography
Data Protection:
Secure way to transmit confidential information.
Can be used alongside encryption to add an additional layer
of security.
Covert Communication:
Helps in bypassing censorship or surveillance
systems by hiding the existence of the
communication.
Risks and Challenges
Cryptography:
Hides the content of the message, but the existence of the
message is still detectable.
Conclusion