MESSAGESECURITY USING STEGANOGRAPHY
#1

[attachment=10882]
Steganography
Definition:

In Greek
Steganos = covered
Graphein = to write
Steganography is an art of secure communication where a message file is embedded in a carrier file and is send to the destination without the knowledge of third person
Carrier file can be image file.
Cryptography:
1) Message is not hidden
2) Enemy can intercept the message
3) Enemy can decrypt the message
Steganography:
1) Message is hidden
2) Enemy must discover the medium
DESIGNING PROCESS
 What formats can be supported
 What can I conceal in a image
 How does it work
what platforms are supported
 System Configuration
 Operating System:
Windows NT/XP/2000 Professional
 Software requirements:
Java JDK1.5 or any other higher versions
 Hardware requirements:
Pentium IV Processor with minimum of 300 MHz.,
Built in Cache of 256 KB,
RAM 128MB
Two Principles:
1) Files can be altered to a certain degree without losing functionality
2) The senses of humanbeings are not acute enough to distinguish minor changes in altered files
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
COLLABORATION DIAGRAM:
STATE DIAGRAM:
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
DATA FLOW
STEGO :
UNSTEGO :

Errors & Exceptions
 INPUT ERRORS:
LOGICAL FLOW :
CONCLUSION & FUTURE ENHANCEMENTS
Conclusion :

 The major direction in steganography is the technique of hiding messages in other files.
 Without a direct comparison of the original and the processed image, it is practically impossible to tell that anything has been changed.
 It is the most important technique that provides security to the maximum extent.
Future Enhancements :
 Another type of file that can be used to hide messages is digitized audio and video files
like WAV and MP3.
 Can also be implemented in other higher
specifications.
APPLICATION AREAS :
 Digital Forensics Examiners
 CBI
 Artificial Intelligence
 Department of Justice
 Air Force
 Navy
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography using 2d haarwavelet, ppt of steganography using matkab,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  steganography full report project report tiger 15 41,682 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,852 08-06-2015, 03:26 PM
Last Post: seminar report asees
  A SEMINAR REPORT On STEGANOGRAPHY computer girl 0 2,272 09-06-2012, 03:59 PM
Last Post: computer girl
  3D Steganography Algorithm project report helper 6 3,584 25-02-2012, 10:24 AM
Last Post: seminar paper
  A Novel Technique for Image Steganography Based On Block-DCT and Huffman Encoding seminar project explorer 1 2,940 08-02-2012, 10:31 AM
Last Post: seminar addict
  DATA SECURITY An Information-Theoretic Model for Steganography full report seminar class 1 1,709 03-02-2012, 10:33 AM
Last Post: seminar addict
  AN OVERVIEW OF IMAGE STEGANOGRAPHY seminar class 1 2,525 19-01-2012, 10:07 AM
Last Post: seminar addict
  Steganography - The art of hiding information computer science crazy 2 3,968 07-05-2011, 11:44 AM
Last Post: seminar class
  Steganalysis:detecting steganography summer project pal 0 1,149 03-02-2011, 09:30 PM
Last Post: summer project pal
  Project build process: Building projects using make files (UNIX), using version contr computer science crazy 0 1,719 23-10-2009, 04:23 PM
Last Post: computer science crazy

Forum Jump: