INFORMATION HIDING USING STEGANOGRAPHY
#1

INFORMATION HIDING USING STEGANOGRAPHY

[attachment=16433]
Introduction
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography.


Background of the Problem
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevent the detection of hidden messages. Steganography include an array of secret communication methods that hide the message from being seen or discovered.

Scope
The scope of the project as follow:
(i) Implementation of steganographic tools for hiding information includes text and image files.
(ii) Three different approaches being explored which are least significant bit, masking and filtering and algorithms and transformation.


Steganography vs. Cryptography
Basically, the purpose of cryptography and steganography is to provide secret communication. However, steganography is not the same as cryptography. Cryptography hides the contents of a secret message from a malicious people, whereas steganography even conceals the existence of the message.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: information security using steganography pdf, information hiding usind steganography doc, steganography using 2d haarwavelet, information security steganography, seminar on steganography the art of hiding information, information hiding using steganography approach ppt, ppt for information security using image steganography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,918 24-11-2012, 01:35 PM
Last Post: seminar details
  ONLINE PASSENGER INFORMATION SYSTEM seminar addict 1 1,897 24-11-2012, 01:03 PM
Last Post: seminar details
  COMPUTER SCIENCE AND INFORMATION TECHNOLOGY SYLABUS seminar details 1 1,468 23-11-2012, 01:00 PM
Last Post: seminar details
  Hiding Sensitive Association Rules with Limited Side Effects seminar paper 1 1,363 19-11-2012, 12:21 PM
Last Post: seminar details
  Audio Steganography Using Bit Modification Abstract seminar details 1 1,898 10-11-2012, 11:58 AM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,459 25-10-2012, 01:40 PM
Last Post: seminar details
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,795 15-10-2012, 03:25 PM
Last Post: seminar details
  INFORMATION TECHNOLOGY, INTERNET AND MARKETING seminar details 0 1,360 11-06-2012, 06:03 PM
Last Post: seminar details
  Enabling Data Hiding for Resource Sharing in Cloud Computing seminar details 0 894 07-06-2012, 11:55 AM
Last Post: seminar details
  MOBILE INFORMATION PROVIDER seminar details 0 1,399 06-06-2012, 03:23 PM
Last Post: seminar details

Forum Jump: