difference between cryptography and steganography ppt
#1

Hi am syam i would like to get details on difference between cryptography and steganography ppt ..My friend said difference between cryptography and steganography ppt will be available here and i need help on this.
Reply
#2
Introduction
Steganography comes from the Greek word meaning �covered writing.�� Dictionary.com defines steganography as the hiding of a message within another so that the presence of the hidden message is indiscernible<� The key concept behind steganography is that the message to be transmitted is not detectable to the casual eye.� In fact, people who the are not intended to be the recipients of the message should not even suspect that a hidden message exists.

The difference between steganography and cryptography is that in cryptography, one can tell that a message has been encrypted, but he cannot decode the message without knowing the proper key.� In steganography, the message itself may not be difficult to decode, but most people would not detect the presence of the message.� When combined, steganography and cryptography can provide two levels of security.� Computer programs exist which encrypt a message using cryptography, and hide the encryption within an image using steganography.




Historical methods of steganography
In ancient Greece, people used to write on wax-covered tablets.� The first documented occurrence of steganography was in the document The Histories of Herodotus, when Demeratus sent a secret message past guards by removing the wax from the tablet, writing on the tablet itself, and covering the tablet with wax again to disguise the message.� Invisible ink is a form of steganography used in recent centuries.�

Another form of steganography is in null ciphers, or unencrypted text messages.� For example, one could hide a text message within a paragraph of words, so that by isolating every 10th word, the secret message can be detected.� The paragraph itself would sound innocent to escape detection.� This form of steganography was often used in wars among spies.

Recently, computerized steganography has become popular.� Using different methods of encoding, secret messages can be hidden in digital data, such as .bmp or .jpg images, .wav audio files, or e-mail messages.� These methods are described below.� Authors are able to watermark their property in this manner.� Unfortunately, steganography is also suspected to play a role in the communication among terrorist groups around the world.� In the past year, several suspected that Osama Bin Laden may have been posting images on Ebay with hidden messages inside to send to different terrorist groups.� Recent attempts to detect the presence of such images on Ebay have not uncovered anything, though.




Types of encoding

Least Significant Bit encoding
This method is the more popular one among encoding images.� Programs that use the Least Significant Bit, or LSB, method encode the message in the least significant bit of every byte in an image.� By doing so, the value of each pixel is changed slightly, but not enough to make significant changes to the image.� In a 24-bit image, 3 bytes are used for each pixel, so each pixel could encode 3 bits of a secret message.� The altered image would look identical to the human eye, even when compared to the original.� However, 24-bit images are quite large, and are not a popular method of sending images around the web, so the fact that they are so large would arouse suspicion.� A more plausible �container image� would be a 256 color image, where 1 byte is used for each pixel.� A 640 x 480 image of this quality would be able to store 300 kilobits of data.� With a large enough image, one could even hide an image within another image.� Popular commercial programs that use LSB encoding include White Noise Storm and S-Tools.




Frequency Domain encoding
This method encodes messages within images by working with the 2-dimensional Fast Fourier Transform, or 2-D FFT of the container image.� The 2-D FFT separates the frequencies of the image into rings centered around an axis.� Those rings closest to the axis represent the low frequencies of the image, and those furthest away represent the high frequencies.� In the frequency domain encoding method, the secret message is encoded in the middle frequencies of the image.� This is done by converting the message text to bits and overlaying these bits in a ring shape in the desired frequency band on the 2-D FFT.� Although the ring of bits appears dark and outstanding on the 2-D FFT, the effect on the image itself is very slight. �Also, an image encoded by this method is able to better withstand noise, compression, translation, and rotation, than images encoded by the LSB method.� All of the images we worked with in this project were encoded by the nPhaze Boys in this manner using Matlab.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: difference between stegnography and visual cryptography, 50 differences between cryptography and steganography, what is main difference between visual cryptography and stegnography, difference b w stagenograpy and visual cryptography, visual cryptography steganography difference, difference between visual cryptography and steganography, cryptography and steganography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  well-spring some homemade barbecue backchat and moistureless rubs and the actuality 0 1,025 10-09-2019, 05:48 PM
Last Post:
  agent some homemade barbecue cheek and prosaic rubs and suit 0 942 10-09-2019, 07:04 AM
Last Post:
  pass some homemade barbecue coolness and arid rubs and module 0 898 09-09-2019, 06:35 PM
Last Post:
  full project on enhancing lan using cryptography and other modules 0 621 16-08-2018, 01:19 PM
Last Post: Guest
  Recruitment and selection procedure in itc limited and hul ltd 1 1,598 13-08-2018, 08:20 AM
Last Post: Alima
  image steganography source code in java pdf 0 749 04-08-2018, 09:38 PM
Last Post: Guest
  enhancing lan using cryptography and other modules ppt download for free 0 674 06-07-2018, 09:12 AM
Last Post: Guest
  advantages and disadvantages of crank and slider mechanism 0 1,579 05-06-2018, 06:45 PM
Last Post: Guest
  to use newspaper to study and report on sahres and dividends 0 1,059 02-05-2018, 02:29 PM
Last Post: Guest
  visual cryptography steganography matlab 0 447 01-05-2018, 02:48 PM
Last Post: Guest

Forum Jump: