STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY IN COMPUTER FORENSICS
#1

Presented By:
MELVIN PAUL

[attachment=15474]
ABSTRACT
Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency.
This paper discusses and compares the two methodologies.
Some similarities and differences are presented, in addition to discussing some of the best known algorithms for each.
Lastly, an idea for a possible algorithm which combines the use of both steganography and visual cryptography is suggested.
There are several ways of hiding data in files of different formats, leaving various signs of hidden data.
HISTORY
440 B.C.
Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
1st and 2nd World Wars
German spies used invisible ink to print very small dots on letters.
Microdots – Blocks of text or images scaled down to the size of a regular dot.
Null Cipher
Hide message among irrelevant data
Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: uses of visual cryptography, list of pdf advantages and disadvantages of visual cryptography, visual cryptography applications, computer forensics project report, disadvantages of visual cryptography, steganography and cryptography in spy craft family, abstract for seminar topic computer forensics,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,081 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,213 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Visual Learner Memory Game seminar presentation 2 1,940 25-03-2016, 12:03 PM
Last Post: dhanabhagya
  visual basic project ideas project topics 5 4,766 04-02-2016, 12:26 PM
Last Post: seminar report asees
  projects on computer networks? shakir_ali 2 1,611 25-01-2016, 02:26 PM
Last Post: seminar report asees
  steganography full report project report tiger 31 34,054 07-07-2015, 02:57 PM
Last Post: seminar report asees
  Cheating Prevention in Visual Cryptography project topics 3 2,844 07-10-2013, 02:00 PM
Last Post: Guest
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,839 04-02-2013, 04:49 PM
Last Post: seminar details
  Brain Computer Interface Design Using Band Powers Extracted During Mental Tasks seminar class 1 2,043 01-01-2013, 10:48 AM
Last Post: seminar details
  application projects in java and vb.net (titles and topics) project topics 1 5,504 28-11-2012, 01:11 PM
Last Post: seminar details

Forum Jump: