MESSAGESECURITY USING STEGANOGRAPHY
#1

[attachment=10882]
Steganography
Definition:

In Greek
Steganos = covered
Graphein = to write
Steganography is an art of secure communication where a message file is embedded in a carrier file and is send to the destination without the knowledge of third person
Carrier file can be image file.
Cryptography:
1) Message is not hidden
2) Enemy can intercept the message
3) Enemy can decrypt the message
Steganography:
1) Message is hidden
2) Enemy must discover the medium
DESIGNING PROCESS
 What formats can be supported
 What can I conceal in a image
 How does it work
what platforms are supported
 System Configuration
 Operating System:
Windows NT/XP/2000 Professional
 Software requirements:
Java JDK1.5 or any other higher versions
 Hardware requirements:
Pentium IV Processor with minimum of 300 MHz.,
Built in Cache of 256 KB,
RAM 128MB
Two Principles:
1) Files can be altered to a certain degree without losing functionality
2) The senses of humanbeings are not acute enough to distinguish minor changes in altered files
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
COLLABORATION DIAGRAM:
STATE DIAGRAM:
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
DATA FLOW
STEGO :
UNSTEGO :

Errors & Exceptions
 INPUT ERRORS:
LOGICAL FLOW :
CONCLUSION & FUTURE ENHANCEMENTS
Conclusion :

 The major direction in steganography is the technique of hiding messages in other files.
 Without a direct comparison of the original and the processed image, it is practically impossible to tell that anything has been changed.
 It is the most important technique that provides security to the maximum extent.
Future Enhancements :
 Another type of file that can be used to hide messages is digitized audio and video files
like WAV and MP3.
 Can also be implemented in other higher
specifications.
APPLICATION AREAS :
 Digital Forensics Examiners
 CBI
 Artificial Intelligence
 Department of Justice
 Air Force
 Navy
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppt of steganography using matkab, steganography using 2d haarwavelet,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  steganography full report project report tiger 15 42,079 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,070 08-06-2015, 03:26 PM
Last Post: seminar report asees
  A SEMINAR REPORT On STEGANOGRAPHY computer girl 0 2,279 09-06-2012, 03:59 PM
Last Post: computer girl
  3D Steganography Algorithm project report helper 6 3,616 25-02-2012, 10:24 AM
Last Post: seminar paper
  A Novel Technique for Image Steganography Based On Block-DCT and Huffman Encoding seminar project explorer 1 2,950 08-02-2012, 10:31 AM
Last Post: seminar addict
  DATA SECURITY An Information-Theoretic Model for Steganography full report seminar class 1 1,716 03-02-2012, 10:33 AM
Last Post: seminar addict
  AN OVERVIEW OF IMAGE STEGANOGRAPHY seminar class 1 2,536 19-01-2012, 10:07 AM
Last Post: seminar addict
  Steganography - The art of hiding information computer science crazy 2 3,987 07-05-2011, 11:44 AM
Last Post: seminar class
  Steganalysis:detecting steganography summer project pal 0 1,149 03-02-2011, 09:30 PM
Last Post: summer project pal
  Project build process: Building projects using make files (UNIX), using version contr computer science crazy 0 1,730 23-10-2009, 04:23 PM
Last Post: computer science crazy

Forum Jump: