Steganography-A Modern Approach to Digital Security
#1

presented By:
Aryasindhu Sahu

[attachment=12330]
Introduction to Steganography
Steganography, the art of hiding informations in information, has been a major issue since decades. Its concept has been used since many years. But the recent developments in the fields of IT and Digital Security proved that steganography is the most efficient, reliable and secure way for information exchange.
In fields like Software Development, Web Development, Modern Digital Products, Masterpieces, etc steganography has got wider acceptance. Even steganography has been a major tool for communication by the terrorists around different parts of the globe.
Looking back into the history, steganography was used by around 450 BC by Ancient Greeks who covered tablets with wax and used them to write on. They used to put melted wax over a wooden plate with carved messages. And the recipient would melt the wax to wash away and reveal the hidden message. Even in the World War invisible inks were used to hide any important information.
The modern steganography is not just using physical things for hiding data, but securing the digital products and information. Steganography can be implemented over image, audio and video files or even text documents and executable files to carry the important messages within themselves.
The whole concept behind steganography is converting the original files into their respective binary files and modifying their lowest significant bits with the information to be hidden. The file after being affected by steganography looks and behaves the same as it would have behaved earlier. So the file’s content are hidden in front of the users but the recipient knows how to decrypt and get the original information
Example: “Mad enough! Else take @ 90% per month. ” Actually hides: ‘Meet @ 9PM’
, which was a text encryption steganography.
What is Steganography?
Stega- Covered, from greek word ‘Stegos’ or roof.
-nography- writing, from greek word ‘graphia’.
• It is the art of hiding information within information.
• A form of security through obscurity.
What is it used for?
 Hiding the fact that you are sending message,
 Hiding several messages inside data, and
 Digital Watermarking.
Hiding Several Messages:
 Deniable Cryptography
 Knowledge of encrypted data
 No proof how much information is stored
Digital watermarking:
 Not really hiding information
 Important: Not modifiable
 Uses the hiding property of Steganography
 Recent: MPAA hides watermarks in movies.
Implementations of Steganography:-
Texts/WebPages
• Use of codebook
• Layout of texts
• Every Nth Character
• Use of whitespaces and newlines
• Difficult to detect and decode
Images
• Cover Images
• Identify Redundant data
• Replace (a subset of ) redundant bits with data
Audios
• Use of frequencies inaudible to human
• Embedding data using LSB
• Encoding Musical tones
Videos
• Visible signals (gestures, movements)
• Using Image steganographic techniques
• Using audio steganographic techniques

Reply
#2

to get information about the topic digital staganography full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-steganograp...l-security

http://studentbank.in/report-steganograp...termarking

http://studentbank.in/report-steganograp...121?page=5

http://studentbank.in/report-steganograp...121?page=2

http://studentbank.in/report-steganograp...port--8121

http://studentbank.in/report-cryptograph...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography in modern world, modern railway information and security, aryasindhu, ppt for the project a dwt based approach for steganography using biometrics, a dwt based approach for steganography using biometrics project ppt, digital steganography docuemntation, digital steganography documentation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,062 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 818 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Steganography implemented in Java science projects buddy 14 12,139 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  steganography full report project report tiger 31 33,550 07-07-2015, 02:57 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,941 26-05-2015, 03:04 PM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,324 16-03-2015, 02:52 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,671 27-01-2015, 12:09 AM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,241 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,682 11-09-2014, 07:45 PM
Last Post: erhhk

Forum Jump: