software requirement specification for image steganography
#1

Hi iam Gautham i would like to get details on software requirement specification for image steganography ..My friend Francis said software requirement specification for image steganography will be available here and now i am living at egmore and iam studing in the CEG college and i need help on SRS for Steganography.
Reply
#2
Abstract:
Steganography is the art of hiding the fact that communication is taking place, by hiding information in
other information. Many different carrier file formats can be used, but digital images are the most
popular because of their frequency on the Internet. For hiding secret information in images, there exists a
large variety of steganographic techniques some are more complex than others and all of them have
respective strong and weak points. Different applications have different requirements of the
steganography technique used. For example, some applications may require absolute invisibility of the
secret information, while others require a larger secret message to be hidden. This paper intends to give
an overview of image steganography, its uses and techniques. It also attempts to identify the requirements
of a good steganographic algorithm and briefly reflects on which steganographic techniques are more
suitable for which applications.
1. Introduction
Since the rise of the Internet one of the most important factors of information technology and communication
has been the security of information. Cryptography was created as a technique for securing the secrecy of
communication and many different methods have been developed to encrypt and decrypt data in order to keep
the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may
also be necessary to keep the existence of the message secret. The technique used to implement this, is called
steganography.
Steganography is the art and science of invisible communication. This is accomplished through hiding
information in other information, thus hiding the existence of the communicated information. The word
steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” [1]
defining it as “covered writing”. In image steganography the information is hidden exclusively in images.
The idea and practice of hiding information has a long history. In Histories the Greek historian Herodotus writes
of a nobleman, Histaeus, who needed to communicate with his son-in-law in Greece. He shaved the head of one
of his most trusted slaves and tattooed the message onto the slave’s scalp. When the slave’s hair grew back the
slave was dispatched with the hidden message . In the Second World War the Microdot technique was
developed by the Germans. Information, especially photographs, was reduced in size until it was the size of a
typed period. Extremely difficult to detect, a normal cover message was sent over an insecure channel with one
of the periods on the paper containing hidden information [3]. Today steganography is mostly used on
computers with digital data being the carriers and networks being the high speed delivery channels.
Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents
of a message secret, steganography focuses on keeping the existence of a message secret . Steganography and
cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect
and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of
steganography is partly defeated . The strength of steganography can thus be amplified by combining it with
cryptography.
Two other technologies that are closely related to steganography are watermarking and fingerprinting . These
technologies are mainly concerned with the protection of intellectual property, thus the algorithms have different
requirements than steganography. These requirements of a good steganographic algorithm will be discussed
below. In watermarking all of the instances of an object are “marked” in the same way. The kind of information
hidden in objects when using watermarking is usually a signature to signify origin or ownership for the purpose
of copyright protection . With fingerprinting on the other hand, different, unique marks are embedded in
distinct copies of the carrier object that are supplied to different customers. This enables the intellectual property
owner to identify customers who break their licensing agreement by supplying the property to third parties [5].
In watermarking and fingerprinting the fact that information is hidden inside the files may be public knowledge
– sometimes it may even be visible – while in steganography the imperceptibility of the information is crucial
. A successful attack on a steganographic system consists of an adversary observing that there is information
hidden inside a file, while a successful attack on a watermarking or fingerprinting system would not be to detect
the mark, but to remove it.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: digital steganography software, steganography encryption software, software requirement specification for content based image retrievl of sketch for match, steganography software color palette, software and hardware requirement for image steganography java project, image steganography project in java software requirements, steganography software,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  software testing lab viva questions and answers vtu 0 5,351 30-10-2018, 02:09 AM
Last Post: Guest
  maruti suzuki dms software download 0 2,535 22-10-2018, 09:46 PM
Last Post: Guest
  image steganography source code in java pdf 0 759 04-08-2018, 09:38 PM
Last Post: Guest
  10is65 software testing aradhya tutorials notes 0 609 02-07-2018, 10:34 AM
Last Post: Guest
  educomp visualizer software free download for pc 0 699 29-06-2018, 01:36 PM
Last Post: Guest
  aradhya notes for 8th sem cse software testing pdf 0 512 22-06-2018, 08:54 AM
Last Post: Guest
  aradhya notes software testing for 8th sem cse 2 940 08-06-2018, 12:42 PM
Last Post: Guest
Wink nagaland state lottery software hack 3 1,611 04-06-2018, 01:30 PM
Last Post: Guest
  10is65 software testing aradhya tutorials notes 0 607 15-05-2018, 10:03 AM
Last Post: Guest
  visual cryptography steganography matlab 0 449 01-05-2018, 02:48 PM
Last Post: Guest

Forum Jump: