information security using steganography
#1

Presented by:
D.BALA KRISHNA
P.NAVEEN KUMAR

[attachment=9852]
information security using steganography
ABSTRACT

We propose a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography. Cryptography provides the security by concealing the contents and steganography provides security by concealing existence of information being communicated. Signal processing adds additional security by compressing and transforming the information. The proposed method, viz. Steganography Based Information Protection Method (SBIPM), consists of scanning, coding, encryption, reshaping, cover processing and embedding steps.
Scanning, coding, encryption steps make the information unintelligible so that one cannot extract plain message. Embedding make the message invisible so that one cannot detect it. Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers. Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding. Simulation and steganlysis results show the method provides high security and the information is safe from various attacks.
INTRODUCTION
Now days, various modes of communication like LAN, WAN and INTERNET are widely used for communicating information from one place to another around the globe. Such communication networks are open which any one can access easily. They are regularly monitored and an intercepted. In steganography, a message is embedded in a cover media in an invisible manner so that one could not suspect about its existence.
In this paper we present a substitution based information protection method where we combine cryptographic, steganographic and signal processing concepts together for achieving security. The method is known as Steganography Based Information Protection method. In this method we substitute the information bit in randomly selected pixels at random places within LSB region.
STEGANOGRAPHY TECHNIQUE
Steganography is the art and science of communicating in a way which hides the existence of the secret message communication. It aims to hide information /covered writing. Information to be protected is hidden in another data known as cover or carrier. Data containing hidden message are called as Steganos or Stegos. Steganos look like cover data and it is difficult to differentiate between them. Steganography based communication over easily accessible platforms to prevent leakage of information.
STEGANOGRAPHY METHODS
According to modification in covers, the methods can be categorized as
• Substitution
• Transform domain
• Spread spectrum
• Statistical
• Distortion
• Cover generation
SUBSTITUTION METHOD:
It is commonly used simple method in which we can put information bits in LSB sequentially at fixed place, randomly at fixed place or randomly at random places in cover pixels. The message to be protected passes through scanning, coding, encryption process to form an embedded message. In this method, there is a provision of increasing the robustness by spreading message bits randomly. This is done to detect the embedded message from distorted steganos
Many attacks on such steganographic systems are suggested. Some attacks that can be applied are given below:
i. Stego-Only Attack
ii. Message-Stego Attack
iii. Cover-Stego Attack
iv. Message-Cover-Stego Attack
Reply
#2



to get information about the topic INFORMATION SECURITY full report ,ppt and related topic refer the page link bellow
http://studentbank.in/report-information...anizations

http://studentbank.in/report-information...ity--20424

http://studentbank.in/report-information...al-hacking

http://studentbank.in/report-information...ndpractice

http://studentbank.in/report-information...are-system

http://studentbank.in/report-information...nd-attacks

http://studentbank.in/report-information...ity--10205

http://studentbank.in/report-information...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: information transmission in crime branch using steganography, information security using steganography pdf, ppt of steganography using matkab, steganography using 2d haarwavelet, ppt on information security using steganographycommmunication lab, ppt for information security using image steganography, steganography documentation and full information,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  information about satellite based project 1 2,152 09-03-2017, 12:26 PM
Last Post: jaseela123d
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,146 31-01-2015, 11:55 PM
Last Post: Guest
Lightbulb Ditgital Steganography seminar projects crazy 3 3,150 23-09-2013, 11:34 AM
Last Post: computer topic
  Android Mobile Security – An Issue of Future computer girl 2 2,390 24-08-2013, 10:26 AM
Last Post: computer topic
  A Disaster Information System by Ballooned Wireless Adhoc Network seminar surveyer 2 2,365 15-02-2013, 10:20 AM
Last Post: seminar details
  VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES seminar class 8 5,694 11-02-2013, 11:42 AM
Last Post: Guest
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,728 06-02-2013, 10:02 AM
Last Post: seminar details
Tongue Embedded Systems and Information Appliances Computer Science Clay 1 2,338 22-10-2012, 01:20 PM
Last Post: seminar details
Music CELL PHONE VIRUSES AND SECURITY Computer Science Clay 10 10,805 11-10-2012, 08:12 PM
Last Post: jerrysamon
  i-CAMS : a Mobile Communication Tool using Location Information computer girl 1 1,071 10-10-2012, 01:53 PM
Last Post: seminar details

Forum Jump: