title
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training | Edureka

description
🔵 Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools. Below is the list of topics covered in this session: 1. What is Steganography? 2. History of Steganography 3. Basic Steganographic Model 4. LSB Steganography 5. Demo: LSB Steganography 6. Demo: Steganographic Tools 🔥 Edureka CompTIA Security+ Training: https://bit.ly/3nxeVRl Subscribe to our channel to get video updates. Hit the subscribe button above: https://goo.gl/6ohpTV Cyber Security Playlist: https://bit.ly/2N2jlNN Cyber Security Blog Series: https://bit.ly/2AuULkP --------------------------------------------------------------------------------------------- Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka -------------------------------------------------------------------------------------------- #SteganographyTutorial #EthicalHacking #CybersecurityTraining #CybersecurityCertification #Edureka About Edureka Cyber Security Training Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access. Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses. ------------------------------------------------ Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings. --------------------------------------------------- Objectives of Edureka Cyber Security Course • This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on • This course focuses mainly on the basics concepts of Cyber Security • In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses • This course will be your first step towards learning Cyber Security -------------------------------------- Who Should go for this Training? Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below-mentioned profiles:- • Networking Professionals • Linux Administrators ----------------------------------------------- Got a question on the topic? Please share it in the comment section below and our experts will answer it for you. For Cyber Security Training and Certification, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free) for more information.

detail
{'title': 'Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training | Edureka', 'heatmap': [{'end': 184.522, 'start': 151.993, 'weight': 0.743}, {'end': 602.272, 'start': 515.375, 'weight': 0.8}, {'end': 657.389, 'start': 621.098, 'weight': 0.718}, {'end': 945.691, 'start': 830.3, 'weight': 0.831}, {'end': 1100.121, 'start': 989.094, 'weight': 0.929}, {'end': 2174.565, 'start': 2140.146, 'weight': 0.827}], 'summary': 'This tutorial covers the significance of steganography in data security, ancient art and techniques, fundamentals, lsb steganography using the rgb color model, image processing functions, and an overview of steganography tools including stegosuite, xios technology tool, and suit pixel.', 'chapters': [{'end': 88.376, 'segs': [{'end': 36.435, 'src': 'embed', 'start': 11.485, 'weight': 0, 'content': [{'end': 18.352, 'text': 'The growth of high-speed computer networks, and that of internet in particular, has increased the ease of communication,', 'start': 11.485, 'duration': 6.867}, {'end': 27.341, 'text': 'but this type of advancement and field of data communication has hiked the fear of getting data snooped at the time of sending it from the sender to the receiver.', 'start': 18.352, 'duration': 8.989}, {'end': 31.025, 'text': 'in order to address this issue, steganography plays an important role.', 'start': 27.341, 'duration': 3.684}, {'end': 36.435, 'text': "Hey guys, I'm Archana from Edureka and I welcome you all to this session on steganography.", 'start': 31.494, 'duration': 4.941}], 'summary': 'High-speed networks raise data snooping fear, steganography addresses issue.', 'duration': 24.95, 'max_score': 11.485, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w11485.jpg'}, {'end': 71.52, 'src': 'embed', 'start': 48.759, 'weight': 1, 'content': [{'end': 57.221, 'text': "Then we'll take a look at basic steganographic model before moving on to one of the most popular steganographic technique, which is LSB steganography.", 'start': 48.759, 'duration': 8.462}, {'end': 61.914, 'text': 'We will be doing a simple demo to understand how LSPS technology works.', 'start': 57.771, 'duration': 4.143}, {'end': 68.978, 'text': 'Finally, we will end this session by discussing various technographic tools and how to use them to hide the data.', 'start': 62.674, 'duration': 6.304}, {'end': 71.52, 'text': 'So I hope agenda was clear to you guys.', 'start': 69.559, 'duration': 1.961}], 'summary': 'Introduction to steganography, focusing on lsb technique and technographic tools.', 'duration': 22.761, 'max_score': 48.759, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w48759.jpg'}], 'start': 11.485, 'title': 'Steganography and data communication', 'summary': 'Discusses the significance of steganography in addressing data security concerns in the era of high-speed computer networks and the internet, covering topics such as steganographic techniques and tools, with a focus on lsb steganography.', 'chapters': [{'end': 88.376, 'start': 11.485, 'title': 'Steganography and data communication', 'summary': 'Discusses the significance of steganography in addressing data security concerns in the era of high-speed computer networks and the internet, covering topics such as steganographic techniques and tools, with a focus on lsb steganography.', 'duration': 76.891, 'highlights': ['LSB steganography is discussed as one of the most popular steganographic techniques, with a simple demo to understand how it works.', 'The session covers the understanding of steganography, its history, and a basic steganographic model before delving into LSB steganography.', 'The growth of high-speed computer networks and the internet has increased the ease of communication, but raised concerns about data security during transmission.']}], 'duration': 76.891, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w11485.jpg', 'highlights': ['The growth of high-speed computer networks and the internet has increased the ease of communication, but raised concerns about data security during transmission.', 'LSB steganography is discussed as one of the most popular steganographic techniques, with a simple demo to understand how it works.', 'The session covers the understanding of steganography, its history, and a basic steganographic model before delving into LSB steganography.']}, {'end': 579.132, 'segs': [{'end': 215.741, 'src': 'heatmap', 'start': 151.993, 'weight': 0, 'content': [{'end': 157.497, 'text': 'If cryptography is a strong way to encrypt and secure communication, then why do we need a new technique?', 'start': 151.993, 'duration': 5.504}, {'end': 162.372, 'text': 'Answer is very simple when we are using any cryptography technique.', 'start': 158.107, 'duration': 4.265}, {'end': 170.461, 'text': 'We need to send a secret key and third person can easily judge that some secret kind of communication is going on in simple terms.', 'start': 162.733, 'duration': 7.728}, {'end': 175.007, 'text': 'Cryptography does not try to hide the fact that secret message is being sent.', 'start': 170.802, 'duration': 4.205}, {'end': 177.637, 'text': 'This is where steganography comes into picture.', 'start': 175.535, 'duration': 2.102}, {'end': 184.522, 'text': "The main reason of using steganography is that you're hiding your secret message behind an ordinary file.", 'start': 178.077, 'duration': 6.445}, {'end': 190.127, 'text': 'No one will suspect the fact that a communication or some sort of secret message is being sent.', 'start': 185.183, 'duration': 4.944}, {'end': 196.667, 'text': 'People will generally think it as an ordinary file and your secret message will go without any suspicion.', 'start': 190.723, 'duration': 5.944}, {'end': 205.193, 'text': 'unlike cryptography, which conceals the content of a secret message, steganography conceals the very fact that message is being communicated.', 'start': 196.667, 'duration': 8.526}, {'end': 211.298, 'text': 'So, if I have to define steganography, it is an ancient art of covering messages in a secret way,', 'start': 205.714, 'duration': 5.584}, {'end': 215.741, 'text': 'such that only the sender and the receiver knows the presence of the message.', 'start': 211.298, 'duration': 4.443}], 'summary': 'Steganography hides secret messages within ordinary files, concealing the fact that communication is happening.', 'duration': 40.206, 'max_score': 151.993, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w151993.jpg'}, {'end': 264.467, 'src': 'embed', 'start': 237.1, 'weight': 1, 'content': [{'end': 244.342, 'text': 'The concept of steganography was first introduced in 1499, but the idea itself has existed since ancient times.', 'start': 237.1, 'duration': 7.242}, {'end': 255.105, 'text': 'There are stories of a method being used in Roman Empire whereby a slave chosen to convey a secret message had his scalp shaved clean and a message was tattooed onto his skin.', 'start': 244.922, 'duration': 10.183}, {'end': 259.466, 'text': "When the messenger's hair grew back, he was dispatched on a secret mission.", 'start': 255.545, 'duration': 3.921}, {'end': 264.467, 'text': "On the other end, the receiver shaved the messenger's scalp again and read the secret message.", 'start': 259.906, 'duration': 4.561}], 'summary': 'Steganography dates back to ancient times, first introduced in 1499.', 'duration': 27.367, 'max_score': 237.1, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w237100.jpg'}, {'end': 380.281, 'src': 'embed', 'start': 351.402, 'weight': 9, 'content': [{'end': 354.424, 'text': 'text steganography is hiding information inside the text files.', 'start': 351.402, 'duration': 3.022}, {'end': 360.17, 'text': 'It involves things like changing the format of existing text, changing words within a text,', 'start': 354.965, 'duration': 5.205}, {'end': 365.875, 'text': 'generating random character sequences or using some sort of context free grammar to generate readable text.', 'start': 360.17, 'duration': 5.705}, {'end': 369.036, 'text': 'Well, there are different methods to hide data in text.', 'start': 366.355, 'duration': 2.681}, {'end': 376.219, 'text': 'Some of the popular ones include format based method random and statistical generation linguistic method moving on.', 'start': 369.536, 'duration': 6.683}, {'end': 377.6, 'text': 'We have image technology.', 'start': 376.259, 'duration': 1.341}, {'end': 380.281, 'text': 'This is nothing but hiding data in an image.', 'start': 378.16, 'duration': 2.121}], 'summary': 'Text steganography hides data in text using methods like format-based, linguistic, and image technology.', 'duration': 28.879, 'max_score': 351.402, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w351402.jpg'}, {'end': 435.281, 'src': 'embed', 'start': 409.583, 'weight': 3, 'content': [{'end': 415.565, 'text': 'secret message is embedded into an audio signal which alters the binary sequence of corresponding audio file.', 'start': 409.583, 'duration': 5.982}, {'end': 419.087, 'text': 'Then there is video steganography and video steganography.', 'start': 416.005, 'duration': 3.082}, {'end': 422.388, 'text': 'You can hide any kind of data in digital video format.', 'start': 419.287, 'duration': 3.101}, {'end': 427.691, 'text': 'The advantage of this type of steganography is that large amount of data can be hidden very easily.', 'start': 422.828, 'duration': 4.863}, {'end': 432.113, 'text': 'You can think of it as combination of image steganography and audio steganography.', 'start': 428.111, 'duration': 4.002}, {'end': 435.281, 'text': 'Well, there are two classes of videos technology.', 'start': 432.58, 'duration': 2.701}], 'summary': 'Audio and video steganography can hide large amounts of data in digital files, combining image and audio techniques.', 'duration': 25.698, 'max_score': 409.583, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w409583.jpg'}, {'end': 514.495, 'src': 'embed', 'start': 447.107, 'weight': 4, 'content': [{'end': 455.151, 'text': "like it sounds, it's a technique of embedding information with the network control protocols like TCP, UDP, ICMP and many others.", 'start': 447.107, 'duration': 8.044}, {'end': 463.255, 'text': 'For example, you can hide information in the header of an TCP IP packet in some fields that are either optional or not important.', 'start': 455.551, 'duration': 7.704}, {'end': 465.777, 'text': "And finally there's email steganography.", 'start': 463.716, 'duration': 2.061}, {'end': 467.618, 'text': "It's not a very well-known type.", 'start': 465.857, 'duration': 1.761}, {'end': 476.385, 'text': 'But anyway email that contains the files embedded within hidden information using steganography can be very difficult to detect as well as read.', 'start': 467.839, 'duration': 8.546}, {'end': 479.728, 'text': 'Now that we have learnt of different types of steganography.', 'start': 476.946, 'duration': 2.782}, {'end': 485.332, 'text': "Let's take a look at few features that a steganography technique must and should possess.", 'start': 480.208, 'duration': 5.124}, {'end': 490.198, 'text': "I'm sure you can see an image of an adorable and cute kitten on the screen right?", 'start': 486.207, 'duration': 3.991}, {'end': 494.63, 'text': "Well, that's our cover image or the file where we store our secret data.", 'start': 490.559, 'duration': 4.071}, {'end': 500.626, 'text': 'So the first feature that any steganography technique must possess is transparency.', 'start': 495.282, 'duration': 5.344}, {'end': 503.568, 'text': "It's an important feature each cover media.", 'start': 501.106, 'duration': 2.462}, {'end': 508.371, 'text': 'It can be image or audio or video has certain information hiding capacity.', 'start': 503.688, 'duration': 4.683}, {'end': 514.495, 'text': 'If more information or data is hidden inside the cover, then it will result in degradation of cover media.', 'start': 508.811, 'duration': 5.684}], 'summary': 'Steganography involves embedding information in network protocols like tcp, udp, and icmp, and in email, making detection and reading difficult.', 'duration': 67.388, 'max_score': 447.107, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w447107.jpg'}, {'end': 579.132, 'src': 'embed', 'start': 535.647, 'weight': 7, 'content': [{'end': 539.388, 'text': "Well, that's the first feature Next feature is robustness.", 'start': 535.647, 'duration': 3.741}, {'end': 546.811, 'text': 'Robustness is the ability of hidden message to remain undamaged, even if the stigo media undergoes some sort of transformation,', 'start': 539.789, 'duration': 7.022}, {'end': 552.932, 'text': 'like cropping or scaling and blurring, or linear and nonlinear filtering, or some sort of hindrance.', 'start': 546.811, 'duration': 6.121}, {'end': 557.794, 'text': "So we have to make sure that technique in any way doesn't affect our secret message.", 'start': 553.473, 'duration': 4.321}, {'end': 560.636, 'text': 'and the last property tamper resistance.', 'start': 558.574, 'duration': 2.062}, {'end': 567.462, 'text': 'This is one of the most important feature, because if attacker is successful in destroying the steganography technique,', 'start': 561.096, 'duration': 6.366}, {'end': 573.567, 'text': 'then the tamper resistant property makes it difficult for the attacker to alter or damage the original data,', 'start': 567.462, 'duration': 6.105}, {'end': 579.132, 'text': 'while you can think of it as a last step that, as a sender, you can do to protect your data from other people.', 'start': 573.567, 'duration': 5.565}], 'summary': 'Steganography features include robustness and tamper resistance to protect secret messages from damage or alteration.', 'duration': 43.485, 'max_score': 535.647, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w535647.jpg'}], 'start': 88.876, 'title': 'Steganography techniques', 'summary': 'Explores the ancient art of steganography, its purpose in concealing communication, its contrast with cryptography, the historical evolution of techniques, and covers various steganography techniques including text, image, audio, video, networks, and email steganography.', 'chapters': [{'end': 282.704, 'start': 88.876, 'title': 'Steganography: hiding messages', 'summary': 'Explores the ancient art of steganography, its purpose in concealing communication, its contrast with cryptography, and the historical evolution of its techniques, including examples from the roman empire and ancient practices, demonstrating its relevance in modern times.', 'duration': 193.828, 'highlights': ["Steganography conceals the very fact that message is being communicated, unlike cryptography, which conceals the content of a secret message. Steganography conceals the act of communication, making it ideal for hiding secret messages, contrasting with cryptography's focus on encrypting the content of the message.", "Steganography's ancient origins and its evolution from practices in the Roman Empire are explored, demonstrating its historical relevance and continued relevance in modern times. The chapter delves into the ancient origins of steganography, including examples from the Roman Empire, highlighting its historical significance and continued relevance in modern communication.", 'The concept of steganography was first introduced in 1499, but the idea itself has existed since ancient times, showcasing its long-standing presence in communication methods. The concept of steganography dates back to ancient times, with the specific term being introduced in 1499, reflecting its enduring presence in methods of concealing communication.']}, {'end': 579.132, 'start': 283.368, 'title': 'Steganography techniques and features', 'summary': 'Covers various steganography techniques, including text, image, audio, video, networks, and email steganography, along with the key features required for a steganography technique, such as transparency, robustness, and tamper resistance.', 'duration': 295.764, 'highlights': ['Text steganography involves hiding information inside text files using methods like format-based method, random and statistical generation, and linguistic method. Various methods for hiding data in text files are discussed, including format-based, random and statistical generation, and linguistic methods.', 'Image steganography is popular due to the large number of bits present in digital representation, allowing for easy storage or hiding of data. The popularity of image steganography is attributed to the ample bits present in digital representation, enabling easy hiding or storage of data.', 'Audio steganography involves embedding secret messages into audio signals, altering the binary sequence of the corresponding audio file. Audio steganography entails embedding secret messages into audio signals, which modifies the binary sequence of the corresponding audio file.', 'Video steganography combines image and audio steganography, enabling the easy hiding of large amounts of data within digital video formats. Video steganography combines image and audio steganography, facilitating the concealment of substantial data within digital video formats.', 'Network steganography involves embedding information within network control protocols like TCP, UDP, and ICMP. Network steganography embeds information within network control protocols such as TCP, UDP, and ICMP.', 'Email steganography involves embedding files with hidden information within emails, making it difficult to detect or read. Email steganography embeds files with hidden information within emails, rendering them challenging to detect or read.', 'The first feature of steganography techniques is transparency, ensuring that cover media retains its information hiding capacity without degradation. Transparency is a crucial feature that maintains the information hiding capacity of cover media without degradation.', 'Robustness is another key feature, ensuring that the hidden message remains undamaged even if the stego media undergoes transformations. Robustness ensures that the hidden message remains undamaged despite transformations applied to the stego media.', 'Tamper resistance is vital for protecting the original data from alteration or damage by attackers, serving as a last line of defense for the sender. Tamper resistance is crucial for safeguarding the original data from alteration or damage by attackers, acting as a final defense measure for the sender.']}], 'duration': 490.256, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w88876.jpg', 'highlights': ["Steganography conceals the act of communication, making it ideal for hiding secret messages, contrasting with cryptography's focus on encrypting the content of the message.", 'The chapter delves into the ancient origins of steganography, including examples from the Roman Empire, highlighting its historical significance and continued relevance in modern communication.', 'The concept of steganography dates back to ancient times, with the specific term being introduced in 1499, reflecting its enduring presence in methods of concealing communication.', 'Video steganography combines image and audio steganography, facilitating the concealment of substantial data within digital video formats.', 'Network steganography embeds information within network control protocols such as TCP, UDP, and ICMP.', 'Email steganography embeds files with hidden information within emails, rendering them challenging to detect or read.', 'Transparency is a crucial feature that maintains the information hiding capacity of cover media without degradation.', 'Robustness ensures that the hidden message remains undamaged despite transformations applied to the stego media.', 'Tamper resistance is crucial for safeguarding the original data from alteration or damage by attackers, acting as a final defense measure for the sender.', 'Text steganography involves hiding information inside text files using methods like format-based, random and statistical generation, and linguistic methods.', 'Image steganography is popular due to the large number of bits present in digital representation, enabling easy hiding or storage of data.', 'Audio steganography entails embedding secret messages into audio signals, which modifies the binary sequence of the corresponding audio file.']}, {'end': 801.919, 'segs': [{'end': 614.056, 'src': 'embed', 'start': 579.913, 'weight': 0, 'content': [{'end': 585.037, 'text': 'Okay, so till now we have covered what steganography is a bit about its history and its types.', 'start': 579.913, 'duration': 5.124}, {'end': 587.72, 'text': "Now, let's go through a basic steganographic model.", 'start': 585.458, 'duration': 2.262}, {'end': 589.261, 'text': "Well, it's pretty simple concept.", 'start': 587.88, 'duration': 1.381}, {'end': 595.426, 'text': "But before we start we should be aware of few technical terms that I was using earlier and which I said I'll explain later.", 'start': 589.641, 'duration': 5.785}, {'end': 596.407, 'text': 'So here we go.', 'start': 595.786, 'duration': 0.621}, {'end': 599.189, 'text': 'We have something called cover object or cover file.', 'start': 596.587, 'duration': 2.602}, {'end': 602.272, 'text': 'This is the file that we will use to hide the information.', 'start': 599.57, 'duration': 2.702}, {'end': 608.014, 'text': 'It could be an image or a video, or an audio or network, or the different types which we discussed earlier.', 'start': 602.632, 'duration': 5.382}, {'end': 609.874, 'text': 'and then there is our secret message.', 'start': 608.014, 'duration': 1.86}, {'end': 614.056, 'text': 'as you know, this is a secret information that we want to hide into cover object,', 'start': 609.874, 'duration': 4.182}], 'summary': 'Cover object can be image, video, audio, or network for steganography.', 'duration': 34.143, 'max_score': 579.913, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w579913.jpg'}, {'end': 697.296, 'src': 'heatmap', 'start': 621.098, 'weight': 1, 'content': [{'end': 632.921, 'text': 'So there is an steganographic encoder which uses some sort of steganography method or function to embed the secret message which is represented by M into our cover object or cover file X.', 'start': 621.098, 'duration': 11.823}, {'end': 640.463, 'text': "So, as you can see, there's a function which takes X, which is our cover file, M, that is secret message, and another input, that's K.", 'start': 632.921, 'duration': 7.542}, {'end': 643.103, 'text': 'like I said, K is nothing but key or stego key.', 'start': 640.463, 'duration': 2.64}, {'end': 647.684, 'text': 'It is a key to embed data in a cover and extract data from the stego medium.', 'start': 643.383, 'duration': 4.301}, {'end': 651.845, 'text': "Well, it's optional using a key provides extra security that is all.", 'start': 647.944, 'duration': 3.901}, {'end': 657.389, 'text': 'So, basically, our steganographic encoder method or function takes this cover image,', 'start': 652.245, 'duration': 5.144}, {'end': 662.252, 'text': 'secret message and key as an input and embeds our secret message into cover object.', 'start': 657.389, 'duration': 4.863}, {'end': 669.017, 'text': 'Embedding process generates a stego object and the stego object looks exactly like our cover object.', 'start': 662.853, 'duration': 6.164}, {'end': 674.901, 'text': 'Now this stego object is sent to receiver through the network without any encryption here.', 'start': 669.438, 'duration': 5.463}, {'end': 678.104, 'text': 'So this is where our steganographic encoding process ends.', 'start': 675.222, 'duration': 2.882}, {'end': 687.39, 'text': 'Now, if, on the other end, receiver wants to extract the secret message, all he has to do is feed the stigo object into steganography decoder,', 'start': 678.644, 'duration': 8.746}, {'end': 694.254, 'text': 'which also takes key as one of its input, and then, as a result, he gets secret message which was intended for him.', 'start': 687.39, 'duration': 6.864}, {'end': 697.296, 'text': "So, like I said, it's a very simple process, right?", 'start': 694.774, 'duration': 2.522}], 'summary': 'Steganographic encoder embeds secret message in cover file using a key for security, and decoder extracts it.', 'duration': 45.051, 'max_score': 621.098, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w621098.jpg'}, {'end': 758.679, 'src': 'embed', 'start': 731.06, 'weight': 3, 'content': [{'end': 735.302, 'text': 'Well, if I want to make this process more secure, I can add one more step which is encryption.', 'start': 731.06, 'duration': 4.242}, {'end': 736.563, 'text': "Let's see how to do that.", 'start': 735.662, 'duration': 0.901}, {'end': 742.107, 'text': "So like I said, there's a sender before actually feeding the secret information into steganographic encoder.", 'start': 737.003, 'duration': 5.104}, {'end': 746.39, 'text': 'He encrypts this secret message along with an encryption key as a result.', 'start': 742.387, 'duration': 4.003}, {'end': 753.235, 'text': 'He gets a ciphertext or, like we discussed when we were discussing cryptography, the meaningless text or the ciphertext.', 'start': 746.41, 'duration': 6.825}, {'end': 758.679, 'text': 'this ciphertext, along with steganography key or stego key and cover file, is fed into steganographic.', 'start': 753.235, 'duration': 5.444}], 'summary': 'Enhancing security by adding encryption step to the process.', 'duration': 27.619, 'max_score': 731.06, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w731060.jpg'}], 'start': 579.913, 'title': 'Steganography fundamentals', 'summary': 'Introduces steganography basics, covering its history, types, and a steganographic model. it also explains the process of embedding secret messages into cover objects and enhancing security through encryption.', 'chapters': [{'end': 614.056, 'start': 579.913, 'title': 'Steganography basics and model', 'summary': 'Covers the basic concepts of steganography, including its history, types, and a basic steganographic model, which involves using a cover object to hide a secret message.', 'duration': 34.143, 'highlights': ['The cover object is the file used to hide information, which could be an image, video, audio, or network data.', 'The secret message is the confidential information intended to be concealed within the cover object.', 'Understanding the technical terms and concepts involved in steganography is essential for implementing a steganographic model.']}, {'end': 801.919, 'start': 614.056, 'title': 'Steganography and encryption process', 'summary': 'Explains the process of steganography, involving embedding secret messages into cover objects using steganographic encoder and key, and enhancing security by adding encryption before the embedding process.', 'duration': 187.863, 'highlights': ['Steganographic encoder embeds secret message into cover object using steganography method and key The steganographic encoder takes cover file, secret message, and key as input to embed the secret message into the cover object, generating a stego object.', 'Enhancing security by adding encryption before embedding process Sender encrypts the secret message along with an encryption key before feeding it into the steganographic encoder, resulting in a ciphertext, which is then fed into the embedding process along with the stego key and cover file.', 'Process of extracting secret message using steganography decoder and key Receiver feeds the stego object into the steganography decoder along with the stego key to extract the secret message, and if encryption is used, the ciphertext is decrypted using the decryption key.']}], 'duration': 222.006, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w579913.jpg', 'highlights': ['The cover object is the file used to hide information, which could be an image, video, audio, or network data.', 'Steganographic encoder embeds secret message into cover object using steganography method and key.', 'Understanding the technical terms and concepts involved in steganography is essential for implementing a steganographic model.', 'Enhancing security by adding encryption before embedding process.', 'Process of extracting secret message using steganography decoder and key.']}, {'end': 1406.493, 'segs': [{'end': 945.691, 'src': 'heatmap', 'start': 802.479, 'weight': 0, 'content': [{'end': 806.242, 'text': 'So basically any type of steganography method or technique works this way.', 'start': 802.479, 'duration': 3.763}, {'end': 814.607, 'text': "It's just that the type of algorithm they use or the encryption algorithm or the technique they use to embed data into an image or an video,", 'start': 806.96, 'duration': 7.647}, {'end': 817.169, 'text': "or it could be anything that's cover object is different.", 'start': 814.607, 'duration': 2.562}, {'end': 823.815, 'text': "So guys till now we've learned about what steganography is and how a steganography technique actually works.", 'start': 817.689, 'duration': 6.126}, {'end': 829.9, 'text': "It's time that we should learn about one of the most popular steganography technique, which is LSP steganography.", 'start': 824.215, 'duration': 5.685}, {'end': 835.842, 'text': 'If you remember earlier we talked about image steganography, you know where we hide secret data inside an image.', 'start': 830.3, 'duration': 5.542}, {'end': 844.004, 'text': 'Well, one of the popular technique to hide secret message inside an image is LSB steganography or least significant bits steganography.', 'start': 836.142, 'duration': 7.862}, {'end': 847.525, 'text': 'Now before we jump into what LSB steganography is.', 'start': 844.484, 'duration': 3.041}, {'end': 851.006, 'text': "Let's take a look at few basic concepts on the screen.", 'start': 847.905, 'duration': 3.101}, {'end': 852.927, 'text': 'I have an image to be more precise.', 'start': 851.026, 'duration': 1.901}, {'end': 854.367, 'text': "Let's call it a digital image.", 'start': 852.967, 'duration': 1.4}, {'end': 859.069, 'text': 'Every digital image is a finite set of digital values called pixels.', 'start': 854.848, 'duration': 4.221}, {'end': 866.896, 'text': 'You have probably heard the term before and generally know that pixels make up an image pixel is actually short for picture element.', 'start': 859.77, 'duration': 7.126}, {'end': 872.882, 'text': "Well, you can think of them as dots of illumination, typically so small that you're unable to see them.", 'start': 867.277, 'duration': 5.605}, {'end': 876.885, 'text': 'thousands or even millions of individual pixels together make up an image.', 'start': 872.882, 'duration': 4.003}, {'end': 880.188, 'text': 'So each pixel can be one color at a time.', 'start': 877.405, 'duration': 2.783}, {'end': 884.652, 'text': 'However, pixels are so small that often blend together to form new colors.', 'start': 880.208, 'duration': 4.444}, {'end': 888.075, 'text': 'In this session, we will work with RGB color model.', 'start': 885.192, 'duration': 2.883}, {'end': 892.259, 'text': 'The RGB color model is an additive color model in which red,', 'start': 888.435, 'duration': 3.824}, {'end': 898.505, 'text': 'green and blue light are combined together in different ways to reproduce a broad array of colors.', 'start': 892.259, 'duration': 6.246}, {'end': 901.828, 'text': 'And each of these can be represented using a binary code.', 'start': 899.025, 'duration': 2.803}, {'end': 910.715, 'text': "So like I said, I have three values which are our GP that's red green and blue and each of this value is represented in a binary code.", 'start': 902.228, 'duration': 8.487}, {'end': 916.76, 'text': 'So, by mixing the 8-bit binary red, green and blue values, pixel can be any color,', 'start': 911.136, 'duration': 5.624}, {'end': 920.383, 'text': 'and the color is usually determined by number of bits used to represent it.', 'start': 916.76, 'duration': 3.623}, {'end': 924.947, 'text': 'Well in this case, we are using 8 bits so we can display for about 250 colors.', 'start': 920.784, 'duration': 4.163}, {'end': 931.994, 'text': 'Moving on when we are working with binary values, we have more significant bits and less significant bits.', 'start': 926.128, 'duration': 5.866}, {'end': 938.421, 'text': 'The leftmost bit is the most significant bit on the other hand rightmost bit is the less significant bit.', 'start': 932.495, 'duration': 5.926}, {'end': 945.691, 'text': 'Now if we change the leftmost bits that is most significant bit it will have a large impact on final value.', 'start': 939.008, 'duration': 6.683}], 'summary': "Steganography techniques like lsb work by embedding data in an image's pixels, using the rgb color model and binary codes.", 'duration': 64.417, 'max_score': 802.479, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w802479.jpg'}, {'end': 916.76, 'src': 'embed', 'start': 888.435, 'weight': 3, 'content': [{'end': 892.259, 'text': 'The RGB color model is an additive color model in which red,', 'start': 888.435, 'duration': 3.824}, {'end': 898.505, 'text': 'green and blue light are combined together in different ways to reproduce a broad array of colors.', 'start': 892.259, 'duration': 6.246}, {'end': 901.828, 'text': 'And each of these can be represented using a binary code.', 'start': 899.025, 'duration': 2.803}, {'end': 910.715, 'text': "So like I said, I have three values which are our GP that's red green and blue and each of this value is represented in a binary code.", 'start': 902.228, 'duration': 8.487}, {'end': 916.76, 'text': 'So, by mixing the 8-bit binary red, green and blue values, pixel can be any color,', 'start': 911.136, 'duration': 5.624}], 'summary': 'Rgb color model uses 8-bit binary codes for red, green, and blue to produce a wide range of colors.', 'duration': 28.325, 'max_score': 888.435, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w888435.jpg'}, {'end': 1100.121, 'src': 'heatmap', 'start': 989.094, 'weight': 0.929, 'content': [{'end': 996.159, 'text': 'So the point I want to state here is that if we change most significant bit or MSB, it will have larger impact on final value.', 'start': 989.094, 'duration': 7.065}, {'end': 1004.144, 'text': 'But if we change LSB the impact on final value is very less this very point is made use by LSB steganography.', 'start': 996.479, 'duration': 7.665}, {'end': 1014.951, 'text': 'So, in this method, which is LSB steganography, least significant bit of an image or of a pixel in an image is replaced with a bit of a secret image.', 'start': 1004.625, 'duration': 10.326}, {'end': 1018.554, 'text': 'the result of this process alters the original output very slightly.', 'start': 1014.951, 'duration': 3.603}, {'end': 1021.355, 'text': 'So your cover image and your stigo image.', 'start': 1019.114, 'duration': 2.241}, {'end': 1022.855, 'text': "that's your final result.", 'start': 1021.355, 'duration': 1.5}, {'end': 1026.776, 'text': 'after hiding, the data look exactly same, without any difference.', 'start': 1022.855, 'duration': 3.921}, {'end': 1030.736, 'text': 'this technique works very good for image audio and videos technology.', 'start': 1026.776, 'duration': 3.96}, {'end': 1032.696, 'text': "Well, it's considered a simple example.", 'start': 1031.076, 'duration': 1.62}, {'end': 1036.057, 'text': 'Suppose you want to insert later a into an image.', 'start': 1033.097, 'duration': 2.96}, {'end': 1040.818, 'text': 'the binary representation of a is one, followed by five zeros and again one.', 'start': 1036.057, 'duration': 4.761}, {'end': 1044.098, 'text': 'now, like I said earlier, we are using RGB color model here.', 'start': 1040.818, 'duration': 3.28}, {'end': 1051.703, 'text': "So and I'm using 8 bits to represent each of these value which is red green and blue So I'll be needing about three consecutive pixels.", 'start': 1044.398, 'duration': 7.305}, {'end': 1058.288, 'text': "That's about 9 bytes to replace all the least significant bits by the bits of the letter a well, don't worry about it.", 'start': 1052.063, 'duration': 6.225}, {'end': 1061.671, 'text': "You'll understand once you see the next image that I show you on the screen.", 'start': 1058.308, 'duration': 3.363}, {'end': 1064.913, 'text': "So like I said, I'm considering three pixels, which is about 9 bytes.", 'start': 1062.311, 'duration': 2.602}, {'end': 1069.968, 'text': 'So these are the pixels before insertion aspect like random pixels.', 'start': 1066.164, 'duration': 3.804}, {'end': 1074.033, 'text': 'So, as you can see, I have three pixels 1, 2, 3 and 9.', 'start': 1070.048, 'duration': 3.985}, {'end': 1082.322, 'text': 'so totally 9 bytes I have here and now, if we replace the last bit or LSP for each byte with a bit from binary representation of a,', 'start': 1074.033, 'duration': 8.289}, {'end': 1087.908, 'text': 'what we get is this so, as you can see, I have replaced the 0 with this one here.', 'start': 1082.322, 'duration': 5.586}, {'end': 1095.736, 'text': 'So as you can see zero is replaced with one and then I have five zeros zero zero like five zeros followed by one one, which is already one.', 'start': 1088.488, 'duration': 7.248}, {'end': 1097.018, 'text': "So I'm not replacing anything here.", 'start': 1095.756, 'duration': 1.262}, {'end': 1100.121, 'text': 'So, as you can see, all the color bits have been replaced your.', 'start': 1097.338, 'duration': 2.783}], 'summary': 'Lsb steganography utilizes least significant bit to hide data in images, audio, and videos, with minimal impact on the original output.', 'duration': 111.027, 'max_score': 989.094, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w989094.jpg'}, {'end': 1022.855, 'src': 'embed', 'start': 996.479, 'weight': 4, 'content': [{'end': 1004.144, 'text': 'But if we change LSB the impact on final value is very less this very point is made use by LSB steganography.', 'start': 996.479, 'duration': 7.665}, {'end': 1014.951, 'text': 'So, in this method, which is LSB steganography, least significant bit of an image or of a pixel in an image is replaced with a bit of a secret image.', 'start': 1004.625, 'duration': 10.326}, {'end': 1018.554, 'text': 'the result of this process alters the original output very slightly.', 'start': 1014.951, 'duration': 3.603}, {'end': 1021.355, 'text': 'So your cover image and your stigo image.', 'start': 1019.114, 'duration': 2.241}, {'end': 1022.855, 'text': "that's your final result.", 'start': 1021.355, 'duration': 1.5}], 'summary': 'Lsb steganography replaces least significant bit of an image with a bit of a secret image, resulting in a slight alteration of the original output.', 'duration': 26.376, 'max_score': 996.479, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w996479.jpg'}, {'end': 1216.984, 'src': 'embed', 'start': 1190.273, 'weight': 7, 'content': [{'end': 1194.716, 'text': "We'll see how to use the concept of LSB's technology and hide secret text in an image.", 'start': 1190.273, 'duration': 4.443}, {'end': 1196.697, 'text': 'So here are the steps involved.', 'start': 1195.336, 'duration': 1.361}, {'end': 1204.861, 'text': 'First, to encode the text into image, the program loads an image and looks or considers each pixel xrcms value.', 'start': 1197.319, 'duration': 7.542}, {'end': 1210.443, 'text': 'then the program asks you for the secret text and converts it into its binary form, and then, one by one,', 'start': 1204.861, 'duration': 5.582}, {'end': 1216.984, 'text': 'it stores the secret message bits into LSP of image pixels, which is our blue value bits of RGB model.', 'start': 1210.443, 'duration': 6.541}], 'summary': 'Using lsb technology to hide text in image pixels by modifying blue value bits.', 'duration': 26.711, 'max_score': 1190.273, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1190273.jpg'}], 'start': 802.479, 'title': 'Lsb steganography and rgb color model', 'summary': 'Introduces the concept of steganography and the rgb color model, focusing on lsb steganography which hides secret data inside an image using the least significant bits. it also explains how lsbs are utilized to hide secret messages in an image using 8-bit binary values, and practical steps for encoding and retrieving the hidden message.', 'chapters': [{'end': 866.896, 'start': 802.479, 'title': 'Lsb steganography basics', 'summary': 'Introduces the concept of steganography, explains the working of steganography techniques, and focuses on the popular technique of lsb steganography, which hides secret data inside an image using the least significant bits.', 'duration': 64.417, 'highlights': ['LSB steganography is one of the most popular techniques to hide secret messages inside an image.', 'Steganography works by using different algorithms or techniques to embed data into a cover object, such as an image or video.', 'Understanding the concept of pixels is crucial in comprehending digital image and LSB steganography.']}, {'end': 1406.493, 'start': 867.277, 'title': 'Rgb color model and lsb steganography', 'summary': 'Explains the rgb color model and the concept of least significant bit (lsb) steganography, demonstrating how lsbs are utilized to hide secret messages in an image using 8-bit binary values, and how the technique allows for the alteration of half of the bits in an image without noticeable changes to the human eye, with practical steps for encoding and retrieving the hidden message.', 'duration': 539.216, 'highlights': ['RGB color model is an additive color model using red, green, and blue light to produce a wide range of colors, represented by a binary code, with 8 bits allowing for approximately 250 colors. The RGB color model combines red, green, and blue light in different ways to produce a broad array of colors, with each represented using an 8-bit binary code, enabling the display of around 250 colors.', 'LSB steganography involves replacing the least significant bit (LSB) of an image pixel with a bit from a secret image, resulting in minimal alteration to the original output, making it suitable for hiding data in images, audio, and videos. LSB steganography entails replacing the least significant bit of an image pixel with a bit from a secret image, resulting in minimal alteration to the original output, making it suitable for hiding data in images, audio, and videos.', 'The technique of LSB steganography allows for the alteration of up to half of the bits in an image without discernible changes to the human eye, providing a method for hiding data within images. LSB steganography enables the alteration of up to half of the bits in an image without noticeable changes to the human eye, offering a means to conceal data within images.', 'The process of LSB steganography involves replacing the LSBs in the cover object with the binary bits of a secret message, ensuring that the final stego image appears nearly identical to the original cover object. LSB steganography entails replacing the LSBs in the cover object with the binary bits of a secret message, ensuring that the final stego image appears nearly identical to the original cover object.', 'The program for encoding and retrieving hidden messages involves loading an image, converting the secret text into its binary form, and storing the secret message bits into the LSB of the image pixels, followed by the extraction of the secret message from the stego image. The program for encoding and retrieving hidden messages includes loading an image, converting the secret text into its binary form, storing the secret message bits into the LSB of the image pixels, and then extracting the secret message from the stego image.']}], 'duration': 604.014, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w802479.jpg', 'highlights': ['LSB steganography is one of the most popular techniques to hide secret messages inside an image.', 'Steganography works by using different algorithms or techniques to embed data into a cover object, such as an image or video.', 'Understanding the concept of pixels is crucial in comprehending digital image and LSB steganography.', 'The RGB color model combines red, green, and blue light in different ways to produce a broad array of colors, with each represented using an 8-bit binary code, enabling the display of around 250 colors.', 'LSB steganography entails replacing the least significant bit of an image pixel with a bit from a secret image, resulting in minimal alteration to the original output, making it suitable for hiding data in images, audio, and videos.', 'The technique of LSB steganography allows for the alteration of up to half of the bits in an image without noticeable changes to the human eye, offering a means to conceal data within images.', 'The process of LSB steganography involves replacing the LSBs in the cover object with the binary bits of a secret message, ensuring that the final stego image appears nearly identical to the original cover object.', 'The program for encoding and retrieving hidden messages includes loading an image, converting the secret text into its binary form, storing the secret message bits into the LSB of the image pixels, and then extracting the secret message from the stego image.']}, {'end': 2121.561, 'segs': [{'end': 1430.831, 'src': 'embed', 'start': 1407.131, 'weight': 3, 'content': [{'end': 1414.017, 'text': "so getting back to program, like i said here, we're using an image and converting that to its excited symbol format and similarly,", 'start': 1407.131, 'duration': 6.886}, {'end': 1419.582, 'text': "while retrieving it, we're using the inverse function of it and our secret message, which is in string format.", 'start': 1414.017, 'duration': 5.565}, {'end': 1423.665, 'text': "we're converting into binary and binary to string and then there is encode.", 'start': 1419.582, 'duration': 4.083}, {'end': 1430.831, 'text': 'basically, it goes through the hex code and places the binary bit of a secret message into the hex code.', 'start': 1423.665, 'duration': 7.166}], 'summary': 'Program converts secret message to binary and encodes it in hex code.', 'duration': 23.7, 'max_score': 1407.131, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1407131.jpg'}, {'end': 1480.279, 'src': 'embed', 'start': 1445.491, 'weight': 4, 'content': [{'end': 1450.695, 'text': 'Like I said earlier, it checks for the hex code, hexadecimal code, and then replaces the bits.', 'start': 1445.491, 'duration': 5.204}, {'end': 1453.797, 'text': 'And decode, it checks if the hex code has zeros and ones.', 'start': 1451.115, 'duration': 2.682}, {'end': 1454.797, 'text': "It'll extract the data.", 'start': 1453.837, 'duration': 0.96}, {'end': 1457.179, 'text': "If hex code doesn't have any zeros and ones, it'll return none.", 'start': 1454.858, 'duration': 2.321}, {'end': 1458.54, 'text': 'So there you go.', 'start': 1457.739, 'duration': 0.801}, {'end': 1460.101, 'text': 'Now, these are the basic functions.', 'start': 1458.64, 'duration': 1.461}, {'end': 1462.763, 'text': 'And then comes the complex function, which is to hide a message.', 'start': 1460.201, 'duration': 2.562}, {'end': 1464.87, 'text': 'i have a high function here.', 'start': 1463.463, 'duration': 1.407}, {'end': 1465.755, 'text': 'i just go through it.', 'start': 1464.87, 'duration': 0.885}, {'end': 1466.74, 'text': "it's very simple.", 'start': 1465.755, 'duration': 0.985}, {'end': 1470.614, 'text': 'So basically, as you can see this hide function, it takes file name and the message.', 'start': 1467.412, 'duration': 3.202}, {'end': 1472.915, 'text': 'It opens the image library,', 'start': 1471.094, 'duration': 1.821}, {'end': 1480.279, 'text': 'where it gives the file name as input and then converts the message from string format to binary format and adds the delimiter,', 'start': 1472.915, 'duration': 7.364}], 'summary': 'The program checks and replaces hexadecimal code, decodes bits, and hides messages in images.', 'duration': 34.788, 'max_score': 1445.491, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1445491.jpg'}, {'end': 1616.384, 'src': 'embed', 'start': 1585.463, 'weight': 2, 'content': [{'end': 1586.623, 'text': 'So make sure you have Python.', 'start': 1585.463, 'duration': 1.16}, {'end': 1589.284, 'text': 'And after that, install pip and through pip install pillow.', 'start': 1586.923, 'duration': 2.361}, {'end': 1595.447, 'text': "And, like I said, we're converting our image into this XRSML format using this function and, inverse,", 'start': 1589.805, 'duration': 5.642}, {'end': 1599.268, 'text': 'using this function and our secret message to binary and binary to string.', 'start': 1595.447, 'duration': 3.821}, {'end': 1605.511, 'text': 'And code, it basically checks for each and every XRSML of our image and replaces that by zero or one of a secret message.', 'start': 1599.649, 'duration': 5.862}, {'end': 1606.943, 'text': 'And then you have decode.', 'start': 1606.041, 'duration': 0.902}, {'end': 1609.689, 'text': 'It checks if the hexadecimal code has zeros or ones.', 'start': 1607.204, 'duration': 2.485}, {'end': 1611.032, 'text': 'If it does, it extracts the data.', 'start': 1609.729, 'duration': 1.303}, {'end': 1612.215, 'text': 'Otherwise, it returns not.', 'start': 1611.172, 'duration': 1.043}, {'end': 1616.384, 'text': "And then there's our hide image, which actually embeds the data into our image.", 'start': 1612.716, 'duration': 3.668}], 'summary': 'Using python and pillow, we convert images to xrsml format, embed secret messages, and extract data.', 'duration': 30.921, 'max_score': 1585.463, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1585463.jpg'}, {'end': 1655.701, 'src': 'embed', 'start': 1627.176, 'weight': 5, 'content': [{'end': 1630.937, 'text': 'And then based on certain conditions, it emits the data properly into the image.', 'start': 1627.176, 'duration': 3.761}, {'end': 1636.718, 'text': "If there is some error regarding the bold of the image you're using or if the text file doesn't exist, it shows an error message.", 'start': 1631.157, 'duration': 5.561}, {'end': 1638.419, 'text': 'Same goes for the retrieval as well.', 'start': 1637.118, 'duration': 1.301}, {'end': 1643.04, 'text': 'It checks for the zeros and ones, extracts until it finds a delimiter, and then it gives you a success message.', 'start': 1638.499, 'duration': 4.541}, {'end': 1645.474, 'text': 'So there we go guys, the program is simple.', 'start': 1643.653, 'duration': 1.821}, {'end': 1652.138, 'text': "So if you guys want a copy of the code and please do post your email ID in the comment section below and we'll get back to you with the code.", 'start': 1645.915, 'duration': 6.223}, {'end': 1655.701, 'text': "And now that you've understood the code, let's go ahead and see if this works properly.", 'start': 1652.619, 'duration': 3.082}], 'summary': 'Program checks for errors, extracts data, and requests email ids for code distribution.', 'duration': 28.525, 'max_score': 1627.176, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1627176.jpg'}, {'end': 1851.96, 'src': 'embed', 'start': 1823.509, 'weight': 0, 'content': [{'end': 1827.751, 'text': "So we are going to take a look at few such tools and I'm going to show you how to use them.", 'start': 1823.509, 'duration': 4.242}, {'end': 1828.991, 'text': 'Maybe at least two or three.', 'start': 1827.851, 'duration': 1.14}, {'end': 1830.052, 'text': 'So there we go.', 'start': 1829.472, 'duration': 0.58}, {'end': 1831.632, 'text': 'The first tool is Stego Suite.', 'start': 1830.092, 'duration': 1.54}, {'end': 1834.774, 'text': 'Basically here you can hide any kind of text inside an image.', 'start': 1831.733, 'duration': 3.041}, {'end': 1836.134, 'text': 'Then you have Stego Hide.', 'start': 1835.154, 'duration': 0.98}, {'end': 1839.676, 'text': 'It hides a secret file in an image or audio file.', 'start': 1836.515, 'duration': 3.161}, {'end': 1841.777, 'text': 'Then you have SIO Steganography.', 'start': 1840.116, 'duration': 1.661}, {'end': 1846.835, 'text': "It's a free software where you can hide your files inside BMP images or WAV files.", 'start': 1842.29, 'duration': 4.545}, {'end': 1848.036, 'text': "That's W-A-V files.", 'start': 1846.875, 'duration': 1.161}, {'end': 1851.96, 'text': 'And then there is SU-Pixel, which works as in.', 'start': 1848.557, 'duration': 3.403}], 'summary': 'Demonstrating tools for steganography, including stego suite, stego hide, and sio steganography, to hide files in images and audio files.', 'duration': 28.451, 'max_score': 1823.509, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1823509.jpg'}], 'start': 1407.131, 'title': 'Image processing functions and steganography', 'summary': 'Covers image processing functions including encode, decode, hide, and retrieve, and also discusses steganography code in python for embedding and extracting data from images, as well as the usage and features of the steghide tool.', 'chapters': [{'end': 1548.914, 'start': 1407.131, 'title': 'Image processing functions', 'summary': 'Discusses image processing functions such as encode, decode, hide, and retrieve, where the encode function converts a secret message into binary and embeds it into the image, the hide function encodes the message into the image and the retrieve function extracts the hidden message from the image.', 'duration': 141.783, 'highlights': ['The encode function converts a secret message into binary and embeds it into the image. encode function, converts message to binary, embeds into image', 'The hide function encodes the message into the image by converting the message from string format to binary format and adding a delimiter for extraction. hide function, encodes message into image, converts message to binary, adds delimiter', 'The retrieve function extracts the hidden message from the image by checking for the delimiter and displaying the extracted message. retrieve function, extracts hidden message, checks for delimiter', 'The decode function checks the hex code for zeros and ones, and extracts the data from it. decode function, checks hex code, extracts data']}, {'end': 2121.561, 'start': 1549.314, 'title': 'Steganography code and tools', 'summary': 'Discusses a steganography code in python for embedding and extracting data from images, with a summary of the code functionality and explanation of steganography methods. it also introduces the usage and features of the steghide tool for hiding and extracting secret files within images, including the commands and examples for embedding and extracting data.', 'duration': 572.247, 'highlights': ['The program uses the pillow library and requires proper installation of Python and the pillow library for functionality. It involves converting the image into XRSML format and embedding a secret message into the image, and it checks for errors related to the image file and text file existence. The code utilizes the pillow library and necessitates correct installation of Python and the library. It includes steps for converting the image to XRSML format, embedding the secret message, and error checking for image and text file existence.', 'The steghide tool allows embedding and extraction of secret files within images, with options for compressing and encrypting the file before hiding it, and it provides a passphrase for security purposes. Steghide enables embedding and extraction of secret files within images, offering options for compressing and encrypting files before hiding them, and it ensures security by requiring a passphrase.', 'The chapter mentions various steganography tools such as Stego Suite, Stego Hide, SIO Steganography, SU-Pixel, and OpenPUF, highlighting their capabilities and intended usage for hiding data within different file types. Multiple steganography tools including Stego Suite, Stego Hide, SIO Steganography, SU-Pixel, and OpenPUF are introduced, emphasizing their functions for concealing data within various file formats.']}], 'duration': 714.43, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w1407131.jpg', 'highlights': ['The steghide tool allows embedding and extraction of secret files within images, with options for compressing and encrypting the file before hiding it, and it provides a passphrase for security purposes.', 'The chapter mentions various steganography tools such as Stego Suite, Stego Hide, SIO Steganography, SU-Pixel, and OpenPUF, highlighting their capabilities and intended usage for hiding data within different file types.', 'The program uses the pillow library and requires proper installation of Python and the pillow library for functionality. It involves converting the image into XRSML format and embedding a secret message into the image, and it checks for errors related to the image file and text file existence.', 'The encode function converts a secret message into binary and embeds it into the image.', 'The hide function encodes the message into the image by converting the message from string format to binary format and adding a delimiter for extraction.', 'The retrieve function extracts the hidden message from the image by checking for the delimiter and displaying the extracted message.', 'The decode function checks the hex code for zeros and ones, and extracts the data from it.']}, {'end': 2599.615, 'segs': [{'end': 2177.408, 'src': 'heatmap', 'start': 2121.981, 'weight': 2, 'content': [{'end': 2127.162, 'text': 'And then it actually skips that step and actually goes back to this embedding message and done step.', 'start': 2121.981, 'duration': 5.181}, {'end': 2129.623, 'text': "So yeah, that's all about state guide.", 'start': 2127.763, 'duration': 1.86}, {'end': 2131.404, 'text': "Now let's go back to other tools.", 'start': 2129.683, 'duration': 1.721}, {'end': 2135.223, 'text': "So the next tool we'll be using is a Stegosuite.", 'start': 2132.02, 'duration': 3.203}, {'end': 2139.546, 'text': 'It is a free steganography tool, which is written in Java.', 'start': 2136.103, 'duration': 3.443}, {'end': 2143.909, 'text': 'And with Stegosuite, you can easily hide in confidential information and image files.', 'start': 2140.146, 'duration': 3.763}, {'end': 2146.551, 'text': 'So I have a file called sample here.', 'start': 2144.91, 'duration': 1.641}, {'end': 2147.532, 'text': 'I have certain images.', 'start': 2146.571, 'duration': 0.961}, {'end': 2149.213, 'text': "It's in JPG format.", 'start': 2148.052, 'duration': 1.161}, {'end': 2150.534, 'text': "It's a BMP file.", 'start': 2149.313, 'duration': 1.221}, {'end': 2152.336, 'text': 'And then there is a PNG file as well.', 'start': 2150.814, 'duration': 1.522}, {'end': 2155.858, 'text': "So first tool that we're going to explore is Stegosuite.", 'start': 2153.276, 'duration': 2.582}, {'end': 2157.94, 'text': 'So Stegosuite, there we go.', 'start': 2155.958, 'duration': 1.982}, {'end': 2160.522, 'text': 'This is the Stegosuite tool.', 'start': 2158.961, 'duration': 1.561}, {'end': 2162.216, 'text': 'it looks very simple.', 'start': 2161.275, 'duration': 0.941}, {'end': 2163.637, 'text': "basically there's nothing here.", 'start': 2162.216, 'duration': 1.421}, {'end': 2169.542, 'text': 'so click on file open and select the file and which you want to embed, the text or the secret data.', 'start': 2163.637, 'duration': 5.905}, {'end': 2174.565, 'text': "let's go back to sample, and here i'm using this png image open.", 'start': 2169.542, 'duration': 5.023}, {'end': 2177.408, 'text': "here it's ask you for the test which you want to embed an image.", 'start': 2174.565, 'duration': 2.843}], 'summary': 'Stegosuite is a java-based steganography tool for hiding confidential information in image files.', 'duration': 55.427, 'max_score': 2121.981, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w2121981.jpg'}, {'end': 2292.505, 'src': 'embed', 'start': 2263.737, 'weight': 0, 'content': [{'end': 2270.359, 'text': "Well, it's a free software that can be used to hide secret files in BMP that's bitmap images or WAV files.", 'start': 2263.737, 'duration': 6.622}, {'end': 2272.14, 'text': 'Use of this tool is very easy.', 'start': 2270.819, 'duration': 1.321}, {'end': 2278.381, 'text': 'You can just open the software, load any BMP image or WAV file to its interface, and then add a file which you want to hide.', 'start': 2272.18, 'duration': 6.201}, {'end': 2280.042, 'text': 'And this also supports encryption.', 'start': 2278.662, 'duration': 1.38}, {'end': 2281.562, 'text': 'multiple formats.', 'start': 2280.362, 'duration': 1.2}, {'end': 2284.383, 'text': 'well, instead of telling all this to you, let me just show it you.', 'start': 2281.562, 'duration': 2.821}, {'end': 2286.324, 'text': 'so, as you can see, i have it already installed.', 'start': 2284.383, 'duration': 1.941}, {'end': 2292.505, 'text': "it's just one step installation and to add the file as into end code, you need to click on this add files option to extract.", 'start': 2286.324, 'duration': 6.181}], 'summary': 'Free software hides secret files in bmp or wav with easy interface and encryption support.', 'duration': 28.768, 'max_score': 2263.737, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w2263737.jpg'}, {'end': 2462.292, 'src': 'embed', 'start': 2429.016, 'weight': 1, 'content': [{'end': 2430.56, 'text': 'This is our application pixel.', 'start': 2429.016, 'duration': 1.544}, {'end': 2431.623, 'text': 'Click on that.', 'start': 2430.961, 'duration': 0.662}, {'end': 2441.183, 'text': 'So guys, even this is a tool where you can store any kind of hidden information, but it has a different approach when compared to other tools.', 'start': 2433.34, 'duration': 7.843}, {'end': 2445.505, 'text': 'It uses image file as a key to protect your hidden text inside an image.', 'start': 2441.543, 'duration': 3.962}, {'end': 2450.587, 'text': 'That is to hide and unhide text inside an image, you need to enter another image as a key.', 'start': 2445.705, 'duration': 4.882}, {'end': 2456.99, 'text': "So as you can see, you have three images here, original image, that's your target image, and delta image, which acts as a key.", 'start': 2451.147, 'duration': 5.843}, {'end': 2462.292, 'text': 'Instead of giving some password or anything, it takes another image as a key or passphrase.', 'start': 2457.39, 'duration': 4.902}], 'summary': 'The application uses an image file as a key to protect hidden text inside an image, offering a different approach compared to other tools.', 'duration': 33.276, 'max_score': 2429.016, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w2429016.jpg'}], 'start': 2121.981, 'title': 'Steganography tools overview', 'summary': 'Provides an overview of steganography tools, focusing on the usage of stegosuite for embedding and extracting text from images, and demonstrating xios technology tool and suit pixel for hiding data inside bmp and wav files using encryption and image-based keys.', 'chapters': [{'end': 2262.875, 'start': 2121.981, 'title': 'Steganography tools overview', 'summary': 'Introduces the usage of stegosuite, a steganography tool, detailing the process of embedding and extracting text from an image, demonstrating its functionality and simplicity, while emphasizing its practical application.', 'duration': 140.894, 'highlights': ['Stegosuite allows users to easily hide confidential information in image files, demonstrating the practical application of steganography tools.', "The demonstration of embedding and extracting a secret message from an image using Stegosuite showcases the tool's simplicity and functionality.", 'The chapter also mentions the next tool to be explored, SciOS Technography, thereby providing a smooth transition to the subsequent topic.', 'The steganography tool, Stegosuite, is written in Java and offers a user-friendly interface, enhancing its accessibility and ease of use.', "Stegosuite's basic and simple functionalities are highlighted, contributing to the understanding of its straightforward usage for hiding and extracting text from images."]}, {'end': 2599.615, 'start': 2263.737, 'title': 'Steganography tools overview', 'summary': 'Provides an overview of steganography tools, demonstrating the usage of xios technology tool and suit pixel for hiding and extracting data inside bmp and wav files using encryption and image-based keys.', 'duration': 335.878, 'highlights': ['The Xios Technology Tool allows for easy hiding and extraction of files in BMP and WAV files, supporting multiple encryption formats and demonstrating the embedding and extraction process with a cover image.', 'The Suit Pixel tool utilizes an image file as a key to protect hidden text inside an image, showcasing the process of hiding and extracting text using a different image as a key, providing a distinct approach to steganography.', 'The session concludes with an explanation of steganography as a method of hiding data in plain sight, covering the basic model, different tools, and popular methods like LSB steganography.']}], 'duration': 477.634, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/xepNoHgNj0w/pics/xepNoHgNj0w2121981.jpg', 'highlights': ['The Xios Technology Tool supports multiple encryption formats for hiding and extracting files in BMP and WAV files.', 'The Suit Pixel tool uses an image file as a key to protect hidden text inside an image, offering a distinct approach to steganography.', 'Stegosuite allows users to easily hide confidential information in image files, demonstrating the practical application of steganography tools.', "The demonstration of embedding and extracting a secret message from an image using Stegosuite showcases the tool's simplicity and functionality.", 'The steganography tool, Stegosuite, is written in Java and offers a user-friendly interface, enhancing its accessibility and ease of use.']}], 'highlights': ['LSB steganography is one of the most popular techniques to hide secret messages inside an image.', 'The growth of high-speed computer networks and the internet has increased the ease of communication, but raised concerns about data security during transmission.', "Steganography conceals the act of communication, making it ideal for hiding secret messages, contrasting with cryptography's focus on encrypting the content of the message.", 'The chapter delves into the ancient origins of steganography, including examples from the Roman Empire, highlighting its historical significance and continued relevance in modern communication.', 'The concept of steganography dates back to ancient times, with the specific term being introduced in 1499, reflecting its enduring presence in methods of concealing communication.', 'LSB steganography entails replacing the least significant bit of an image pixel with a bit from a secret image, resulting in minimal alteration to the original output, making it suitable for hiding data in images, audio, and videos.', 'The RGB color model combines red, green, and blue light in different ways to produce a broad array of colors, with each represented using an 8-bit binary code, enabling the display of around 250 colors.', 'The steghide tool allows embedding and extraction of secret files within images, with options for compressing and encrypting the file before hiding it, and it provides a passphrase for security purposes.', 'The chapter mentions various steganography tools such as Stego Suite, Stego Hide, SIO Steganography, SU-Pixel, and OpenPUF, highlighting their capabilities and intended usage for hiding data within different file types.', 'The Xios Technology Tool supports multiple encryption formats for hiding and extracting files in BMP and WAV files.']}