STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY IN COMPUTER FORENSICS
#1

Presented By:
MELVIN PAUL

[attachment=15474]
ABSTRACT
Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency.
This paper discusses and compares the two methodologies.
Some similarities and differences are presented, in addition to discussing some of the best known algorithms for each.
Lastly, an idea for a possible algorithm which combines the use of both steganography and visual cryptography is suggested.
There are several ways of hiding data in files of different formats, leaving various signs of hidden data.
HISTORY
440 B.C.
Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
1st and 2nd World Wars
German spies used invisible ink to print very small dots on letters.
Microdots – Blocks of text or images scaled down to the size of a regular dot.
Null Cipher
Hide message among irrelevant data
Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: abstract of visual cryptography, ieee paper 2012 2013 in visual cryptography, visual cryptography with documentation 2012, visual cryptography futhure enhancement, literature of survey of aes and visual cryptography, visual cryptography algorithm, source code of online payment system using steganography and visual cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,068 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,179 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Visual Learner Memory Game seminar presentation 2 1,930 25-03-2016, 12:03 PM
Last Post: dhanabhagya
  visual basic project ideas project topics 5 4,758 04-02-2016, 12:26 PM
Last Post: seminar report asees
  projects on computer networks? shakir_ali 2 1,597 25-01-2016, 02:26 PM
Last Post: seminar report asees
  steganography full report project report tiger 31 33,894 07-07-2015, 02:57 PM
Last Post: seminar report asees
  Cheating Prevention in Visual Cryptography project topics 3 2,819 07-10-2013, 02:00 PM
Last Post: Guest
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,792 04-02-2013, 04:49 PM
Last Post: seminar details
  Brain Computer Interface Design Using Band Powers Extracted During Mental Tasks seminar class 1 2,030 01-01-2013, 10:48 AM
Last Post: seminar details
  application projects in java and vb.net (titles and topics) project topics 1 5,497 28-11-2012, 01:11 PM
Last Post: seminar details

Forum Jump: