send me the algorithm on implementation of steganography based on lsb
#1

Hi im anannya, BE student, want algorithms to implement AUDIO & IMAGE steganography.
how to embed a secret file in SCATTERED way instead of continuous embidding, in cover file.
Reply
#2
For More Info About the algorithm on implementation of steganography based on lsb

http://scribddoc/20529/Seminar-on-Steganography

and kindly find out u r objectives from the above topic


Reply
#3
Have you been looking for new ways to make money with your wordpress blog? Ity.im offers five different ways for you to make more money with your wordpress blog TODAY!

We have created a plugin that will enable you to make money with your wordpress website. Once you install the plugin, certain links on your wordpress blog will be automatically converted to ity.im short url's. When someone on your wordpress blog clicks on one of these links you will earn revenue from:

1. Displaying interstitial ads
2. Text ad clicks in the top frame
3. Referral signups from referral page link in the top frame
4. Place your own ads in an adframe displayed on the destination page of shortened urls!
5. Add text ads and interstitial ads directly to your website with our javascript code

make money with Wordpress
Reply
#4
Redoeasetty,

No benefits to Indian bloggers. And please remember, this thread topic isn't 'new ways to make money'. you can post ur ad in its section or please do a payable ad in this forum. Smile
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: kruskal algorithm implementation i, steganography lsb in matlab sourcecode, lsb algorithm for image steganography source code in c, lsb algorithm steps with explanation, lsb algorithm for image steganography source code in visual basic, report on steganography project based on lsb algorithm, use of lsb algorithm in digital watermarking,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  edge adptive image steganography based on lsb matching revisited 1 1,168 29-11-2012, 01:57 PM
Last Post: seminar details
  PPTS FOR LIVE HUMAN DETECTION AND TRACKING USING GPS AND SEND SMS THROUGH GSM TO A sunnishreddy 1 1,306 07-03-2012, 09:51 AM
Last Post: seminar paper
  implementation of obstacle avoidance using zigbee for omni directional mobile robot raviteja439 1 1,033 27-02-2012, 12:30 PM
Last Post: seminar paper
  DISTORTION MINIMIZATION AND SECURED STEGANOGRAPHY USING CRYPTOGRAPHY KAVITHA MANIAN 0 867 26-02-2012, 07:17 PM
Last Post: KAVITHA MANIAN
Question edge adaptive image steganography based on lsb matching revisited marubaruka kavitha 1 3,359 08-02-2012, 10:31 AM
Last Post: seminar addict
  robust fuzzy image segmentation algorithm nisar.be4u 1 1,319 06-02-2012, 10:47 AM
Last Post: seminar addict
  Intrusion Detection in Computer Netwrks Usin Genetic Algorithm Approach sunilpawar 4 2,902 27-01-2012, 10:45 AM
Last Post: seminar addict
  help me in my project on steganography in java skhandre02 2 2,637 19-01-2012, 10:05 AM
Last Post: seminar addict
  silicon on insulator implementation 1990nandu19990 0 677 04-12-2011, 12:37 PM
Last Post: 1990nandu19990
  hiding data in images by simple lsb substitution ppt [email protected] 1 1,174 06-10-2011, 10:03 AM
Last Post: seminar addict

Forum Jump: