INFORMATION HIDING USING STEGANOGRAPHY
#1

INFORMATION HIDING USING STEGANOGRAPHY

[attachment=16433]
Introduction
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography.


Background of the Problem
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevent the detection of hidden messages. Steganography include an array of secret communication methods that hide the message from being seen or discovered.

Scope
The scope of the project as follow:
(i) Implementation of steganographic tools for hiding information includes text and image files.
(ii) Three different approaches being explored which are least significant bit, masking and filtering and algorithms and transformation.


Steganography vs. Cryptography
Basically, the purpose of cryptography and steganography is to provide secret communication. However, steganography is not the same as cryptography. Cryptography hides the contents of a secret message from a malicious people, whereas steganography even conceals the existence of the message.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: information transmission in crime branch using steganography, information hiding usind steganography doc, information hiding using steganography approach ppt, information security using steganography pdf, information hiding using steganography, steganography documentation and full information, ppt for information security using image steganography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
INFORMATION HIDING USING STEGANOGRAPHY - by seminar addict - 21-01-2012, 04:50 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,924 24-11-2012, 01:35 PM
Last Post: seminar details
  ONLINE PASSENGER INFORMATION SYSTEM seminar addict 1 1,898 24-11-2012, 01:03 PM
Last Post: seminar details
  COMPUTER SCIENCE AND INFORMATION TECHNOLOGY SYLABUS seminar details 1 1,471 23-11-2012, 01:00 PM
Last Post: seminar details
  Hiding Sensitive Association Rules with Limited Side Effects seminar paper 1 1,370 19-11-2012, 12:21 PM
Last Post: seminar details
  Audio Steganography Using Bit Modification Abstract seminar details 1 1,905 10-11-2012, 11:58 AM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,469 25-10-2012, 01:40 PM
Last Post: seminar details
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,795 15-10-2012, 03:25 PM
Last Post: seminar details
  INFORMATION TECHNOLOGY, INTERNET AND MARKETING seminar details 0 1,362 11-06-2012, 06:03 PM
Last Post: seminar details
  Enabling Data Hiding for Resource Sharing in Cloud Computing seminar details 0 896 07-06-2012, 11:55 AM
Last Post: seminar details
  MOBILE INFORMATION PROVIDER seminar details 0 1,401 06-06-2012, 03:23 PM
Last Post: seminar details

Forum Jump: