Steganography
#1

Definition
Steganography includes a vast array of techniques for hiding messages in a variety of media. Among these methods are invisible inks, microdots, digital signatures, covert channels and spread-spectrum communications. Today, thanks to modern technology, steganography is used on text, images, sound, signals, and more. The advantage of steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered. Often, using encryption might identify the sender or receiver as somebody with something to hide. For example, that picture of your cat could conceal the plans for your company's latest technical innovation.

However, steganography has a number of disadvantages as well. Unlike encryption, it generally requires a lot of overhead to hide a relatively few bits of information. However, there are ways around this. Also, once a steganographic system is discovered, it is rendered useless. This problem, too, can be overcome if the hidden data depends on some sort of key for its insertion and extraction.

In fact, it is common practice to encrypt the hidden message before placing it in the cover message. However, it should be noted that the hidden message does not need to be encrypted to qualify as steganography. The message itself can be in plain English and still be a hidden message. However, most steganographers like the extra layer of protection that encryption provides. If your hidden message is found, and then at least make it as protected as possible.

Methods for hiding data in three varied media (text, image, and audio) will be described, and some guidelines for users of steganography will be provided where necessary. In addition, we will take a brief look at steganalysis, the science of detecting steganography, and destroying it. In the field of steganography, some terminology has developed.
The adjectives cover, embedded and stego were defined at the Information Hiding Workshop held in Cambridge, England. The term ``cover'' is used to describe the original, innocent message, data, audio, still, video and so on. When referring to audio signal steganography, the cover signal is sometimes called the ``host'' signal.
The information to be hidden in the cover data is known as the ``embedded'' data. The ``stego'' data is the data containing both the cover signal and the ``embedded'' information. Logically, the processing of putting the hidden or embedded data, into the cover data, is sometimes known as embedding. Occasionally, especially when referring to image steganography, the cover image is known as the container.



Steganography under Various Media
Often, although it is not necessary, the hidden messages will be encrypted. This meets a requirement posed by the ``Kerckhoff principle'' in cryptography. This principle states that the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key. Without this secret key, the enemy should not have the chance to even suspect that on an observed communication channel, hidden communication is taking place. Most of the software that we will discuss later meets this principle.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography in c, steganography abstruct, sdlc for steganography, steganography seminar abstract, vedios on steganography seminars, er diagram of steganography, vedio steganography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  steganography full report project report tiger 15 41,638 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,829 08-06-2015, 03:26 PM
Last Post: seminar report asees
  A SEMINAR REPORT On STEGANOGRAPHY computer girl 0 2,272 09-06-2012, 03:59 PM
Last Post: computer girl
  3D Steganography Algorithm project report helper 6 3,584 25-02-2012, 10:24 AM
Last Post: seminar paper
  A Novel Technique for Image Steganography Based On Block-DCT and Huffman Encoding seminar project explorer 1 2,940 08-02-2012, 10:31 AM
Last Post: seminar addict
  DATA SECURITY An Information-Theoretic Model for Steganography full report seminar class 1 1,706 03-02-2012, 10:33 AM
Last Post: seminar addict
  AN OVERVIEW OF IMAGE STEGANOGRAPHY seminar class 1 2,525 19-01-2012, 10:07 AM
Last Post: seminar addict
  Steganography - The art of hiding information computer science crazy 2 3,968 07-05-2011, 11:44 AM
Last Post: seminar class
  MESSAGESECURITY USING STEGANOGRAPHY seminar class 0 1,643 24-03-2011, 10:01 AM
Last Post: seminar class
  Steganalysis:detecting steganography summer project pal 0 1,149 03-02-2011, 09:30 PM
Last Post: summer project pal

Forum Jump: