Student Seminar Report & Project Report With Presentation (PPT,PDF,DOC,ZIP)

Full Version: dfd or er diagram of audio steganography
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

Guest

help for er diagram for audio stegnography
The existence of communication can be hidden from others using the technique of steganography which is the science and art of communication. This system can not detect other messages that are hidden in various ways. The word steganography is derived from a Greek work that means "writing cover".

[Image: 2-5-300x226.png]

It consists of a long chain of secret methods of communication that completely hide the existence of messages. Invisible ink, character arrangement, microdots, signatures in digital format, channel conversion and communications across the spread spectrum are some of the methods used in this technique.

Both cryptography and steganography techniques are twin cousins and act in the spy family. A message in the encrypted text format can easily arouse suspicion in the mind of the recipient, while on the other hand, the use of invisible messages created with the art of stenography will not do any of those things.

[Image: images?q=tbn:ANd9GcQjmxKLuWlEQxYObJid4xJ...M94VXczFWw]

Compared to the cryptography technique where the intruder is allowed to modify as well as intercept messages without violating the premises of the security that is guaranteed by the stethoscope's cryptosystem is used to hide messages in other messages in a format that never allows The hacker to detect that there even exists the existence of a second secret message.

The digital fingerprint and watermarks for video and audio is hugely in demand in today's industry and enhances the highly steganography technique. With the discovery of high-speed computers, steganography in the form of images has reached the limit. Less significant bit insertion is one of the most popular techniques used in the steganography image. There are several advantages to using this method and the best use is that it helps to transmit messages secretly without the risk of the message being discovered by the intruder.