29-08-2011, 10:00 AM
Presented By:
MELVIN PAUL
[attachment=15474]
ABSTRACT
Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency.
This paper discusses and compares the two methodologies.
Some similarities and differences are presented, in addition to discussing some of the best known algorithms for each.
Lastly, an idea for a possible algorithm which combines the use of both steganography and visual cryptography is suggested.
There are several ways of hiding data in files of different formats, leaving various signs of hidden data.
HISTORY
440 B.C.
Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
1st and 2nd World Wars
German spies used invisible ink to print very small dots on letters.
Microdots – Blocks of text or images scaled down to the size of a regular dot.
Null Cipher
Hide message among irrelevant data
Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.