SlideShare a Scribd company logo
2
Most read
3
Most read
13
Most read
Cryptography and Steganography with watermarking
Evolution 
Cryptography 
Watermarking 
Steganography
Cryptography 
Cryptography derived its name from a Greek 
word called “Kryptos” which means “Hidden 
Secrets”. 
Cryptography is the practice and study of hiding 
information. It is the Art or Science of 
converting a plain text into a data which can’t 
be understood and again retransforming that 
message into its original form. 
It provides Confidentiality, Integrity, Accuracy.
Symmetric Cryptography 
Asymmetric Cryptography
Steganography 
Greek Words : 
STEGANOS – “Covered” 
GRAPHIA – “Writing” 
Steganography is the art and science of writing hidden 
messages in such a way that no one apart from the intended 
recipient knows of the existence of the message. 
Stegosaurus: a covered lizard
Types of Steganography 
Text 
audio 
image 
video 
protocol
Image steganography algorithm 
LSB - Example 
A sample raster data for 3 pixels (9 bytes) 
may be: 
Inserting 
the binary 
value for 
A 
(10000001) 
changes 
4 bits 
00100111 11101001 11001000 
00100111 11001000 11101001 
11001000 00100111 11101011 
00100111 11101000 11001000 
00100110 11001000 11101000 
11001001 00100111 11101011
LSB - Uses 
 Storing passwords and/or other confidential 
information 
 Covert communication of sensitive data 
 Speculated uses in terrorist activities 
 Being widely used to hide and/or transfer 
illegal content
Cryptography and Steganography with watermarking
Watermarking 
A watermark is a recognizable image or 
pattern in paper that appears as various 
shades of lightness/darkness when viewed 
by transmitted light (or when viewed by 
reflected light, a top a dark 
background), caused by thickness 
variations in the paper.
Digital Watermarking 
A digital watermark is a digital signal or 
pattern inserted into a digital document such 
as text, graphics or multimedia, and carries 
information unique to the copyright owner, 
the creator of the document or the authorized 
consumer. 
VISIBLE WATERMARKING 
INVISIBLE WATERMARKING
Cryptography and Steganography with watermarking
EXAMPLE OF INVISIBLE WATERMARKING
EXAMPLE OF VISIBLE WATERMARKING 
+ =
UV Watermarking
APPLICATION FIELD FOR WATERMARKING 
INTERNET 
TV 
IIII 
INTERNET 
RADIO 
E-Book 
INTERNET 
NEWSPAPER 
EDUCATION 
MATERIAL 
INTERNET 
MAGZINE 
DOCUMENTS 
CERTIFICATES 
AUDIO 
TEXT 
IMAGE 
VIDEO 
GRAPHICS 
WATERMARKING 
TECHNOLOGY
Watermarking Vs. Steganography 
Goal of Steganography 
 Intruder Cannot detect message 
 Primarily 1:1 communication 
 Goal of Watermarking 
 Intruder cannot remove or replace the 
message 
 Primarily 1: many communication
Cryptography vs. Steganography 
Cryptography: although encypted and 
unreadable, the existence of data is not 
hidden 
WHEREAS 
Steganography: no knowledge of the 
existence of the data
REFERENCES 
 http://www.garykessler.net/library/steganography.html 
 http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ 
fsc/july2004/research/2004_03_research01.htm 
 http://stegano.net/tutorial/steg-history.html 
 http://www.strangehorizons.com/2001/20011008/steganography.shtml
QUERIES ?
“For every lock there is a Key… 
It is better to KEEP SAFE YOUR LOCK THAN THE KEY”

More Related Content

PPTX
Confusion and Diffusion.pptx
bcanawakadalcollege
 
PPT
Encryption
shyam Tirkey
 
PDF
Presentation On Steganography
TeachMission
 
PPTX
PPT steganography
parvez Sharaf
 
PDF
Asymmetric Cryptography
UTD Computer Security Group
 
PPT
Steganography presentation
Ashwin Prasad
 
PPT
Secure Socket Layer
Naveen Kumar
 
Confusion and Diffusion.pptx
bcanawakadalcollege
 
Encryption
shyam Tirkey
 
Presentation On Steganography
TeachMission
 
PPT steganography
parvez Sharaf
 
Asymmetric Cryptography
UTD Computer Security Group
 
Steganography presentation
Ashwin Prasad
 
Secure Socket Layer
Naveen Kumar
 

What's hot (20)

PPT
Data hiding - Steganography
Mohamed Talaat
 
PPTX
Holographic memory
deependra singh chauhan
 
PPT
Steganography - The art of hiding data
Sarin Thapa
 
PPTX
Digital watermarking
Ankush Kr
 
PPTX
steganography
shiveverma
 
DOCX
Steganography
Abhishek Singh
 
PPT
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
PPTX
Cryptography.ppt
Uday Meena
 
PPTX
Steganalysis ppt
Om Vishnoi
 
PDF
Cryptography - RSA and ECDSA
APNIC
 
PPT
Image Steganography
Hushen Savani
 
PPT
Cryptography - A Brief History
prasenjeetd
 
PPTX
Steganography
Daksh Verma
 
PPT
Steganography
Shankar Murthy
 
PPTX
Steganography
Neha Sharma
 
PPTX
Steganography in images
Aishwarya Korde
 
DOC
Steganography ProjectReport
ekta sharma
 
PPTX
Steganography presentation
BSheghembe
 
PPTX
Public key infrastructure
Aditya Nama
 
PPTX
cryptography ppt free download
Twinkal Harsora
 
Data hiding - Steganography
Mohamed Talaat
 
Holographic memory
deependra singh chauhan
 
Steganography - The art of hiding data
Sarin Thapa
 
Digital watermarking
Ankush Kr
 
steganography
shiveverma
 
Steganography
Abhishek Singh
 
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Cryptography.ppt
Uday Meena
 
Steganalysis ppt
Om Vishnoi
 
Cryptography - RSA and ECDSA
APNIC
 
Image Steganography
Hushen Savani
 
Cryptography - A Brief History
prasenjeetd
 
Steganography
Daksh Verma
 
Steganography
Shankar Murthy
 
Steganography
Neha Sharma
 
Steganography in images
Aishwarya Korde
 
Steganography ProjectReport
ekta sharma
 
Steganography presentation
BSheghembe
 
Public key infrastructure
Aditya Nama
 
cryptography ppt free download
Twinkal Harsora
 
Ad

Viewers also liked (12)

PPTX
Watermarkingppt
Abhishek Mukherjee
 
PPTX
Image Cryptography and Steganography
Mohammad Amin Amjadi
 
PPTX
Steganography and watermarking
sudip nandi
 
PDF
Robust video data hiding using forbidden zone
Madonna Ranjini
 
PPT
Robust Watermarking of Video Streams
Tamás Polyák
 
PPT
Steganography
Prabakara Pandian
 
PDF
Steganography: Hiding information in past, present and future.
Alberto Villegas
 
PDF
Data Hiding Techniques
prashant3535
 
PPTX
Cryptography
Tushar Swami
 
PPTX
Steganography
Uttam Jain
 
PPTX
Cryptography
Shivanand Arur
 
PPTX
Cryptography.ppt
kusum sharma
 
Watermarkingppt
Abhishek Mukherjee
 
Image Cryptography and Steganography
Mohammad Amin Amjadi
 
Steganography and watermarking
sudip nandi
 
Robust video data hiding using forbidden zone
Madonna Ranjini
 
Robust Watermarking of Video Streams
Tamás Polyák
 
Steganography
Prabakara Pandian
 
Steganography: Hiding information in past, present and future.
Alberto Villegas
 
Data Hiding Techniques
prashant3535
 
Cryptography
Tushar Swami
 
Steganography
Uttam Jain
 
Cryptography
Shivanand Arur
 
Cryptography.ppt
kusum sharma
 
Ad

Similar to Cryptography and Steganography with watermarking (20)

PPTX
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
PPTX
CSE steganography for data writing and reading
misbanausheenparvam
 
PPT
Steganography
Divam Goyal
 
PDF
A Tutorial Review On Steganography
Bryce Nelson
 
PDF
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
PPTX
Information hiding
TabassumSaifi2
 
PPTX
Presentation1
guestb8230c
 
PDF
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
PPTX
Information and data security steganography and watermarking
Mazin Alwaaly
 
ODP
Steganography
Nikunj Dhameliya
 
PPTX
Steganography
Khushbu Chudasama
 
PPT
Steganography
Divam Goyal
 
PDF
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
PDF
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
PPT
83747965 steganography
Prashant Shukla
 
PPTX
cryptography ppt.pptx this ppt consists of cryptography basics
shrutishreemahato
 
PDF
10.1.1.157.3117
Anas Pa
 
PDF
Ijetr011937
ER Publication.org
 
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
CSE steganography for data writing and reading
misbanausheenparvam
 
Steganography
Divam Goyal
 
A Tutorial Review On Steganography
Bryce Nelson
 
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Information hiding
TabassumSaifi2
 
Presentation1
guestb8230c
 
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Information and data security steganography and watermarking
Mazin Alwaaly
 
Steganography
Nikunj Dhameliya
 
Steganography
Khushbu Chudasama
 
Steganography
Divam Goyal
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
83747965 steganography
Prashant Shukla
 
cryptography ppt.pptx this ppt consists of cryptography basics
shrutishreemahato
 
10.1.1.157.3117
Anas Pa
 
Ijetr011937
ER Publication.org
 

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 

Cryptography and Steganography with watermarking

  • 3. Cryptography Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain text into a data which can’t be understood and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 5. Steganography Greek Words : STEGANOS – “Covered” GRAPHIA – “Writing” Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Stegosaurus: a covered lizard
  • 6. Types of Steganography Text audio image video protocol
  • 7. Image steganography algorithm LSB - Example A sample raster data for 3 pixels (9 bytes) may be: Inserting the binary value for A (10000001) changes 4 bits 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011
  • 8. LSB - Uses  Storing passwords and/or other confidential information  Covert communication of sensitive data  Speculated uses in terrorist activities  Being widely used to hide and/or transfer illegal content
  • 10. Watermarking A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, a top a dark background), caused by thickness variations in the paper.
  • 11. Digital Watermarking A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. VISIBLE WATERMARKING INVISIBLE WATERMARKING
  • 13. EXAMPLE OF INVISIBLE WATERMARKING
  • 14. EXAMPLE OF VISIBLE WATERMARKING + =
  • 16. APPLICATION FIELD FOR WATERMARKING INTERNET TV IIII INTERNET RADIO E-Book INTERNET NEWSPAPER EDUCATION MATERIAL INTERNET MAGZINE DOCUMENTS CERTIFICATES AUDIO TEXT IMAGE VIDEO GRAPHICS WATERMARKING TECHNOLOGY
  • 17. Watermarking Vs. Steganography Goal of Steganography  Intruder Cannot detect message  Primarily 1:1 communication  Goal of Watermarking  Intruder cannot remove or replace the message  Primarily 1: many communication
  • 18. Cryptography vs. Steganography Cryptography: although encypted and unreadable, the existence of data is not hidden WHEREAS Steganography: no knowledge of the existence of the data
  • 19. REFERENCES  http://www.garykessler.net/library/steganography.html  http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ fsc/july2004/research/2004_03_research01.htm  http://stegano.net/tutorial/steg-history.html  http://www.strangehorizons.com/2001/20011008/steganography.shtml
  • 21. “For every lock there is a Key… It is better to KEEP SAFE YOUR LOCK THAN THE KEY”