SUMMARY:
In this article, we strive to present a general introduction of steganography, or concealment, as sometimes just is not known. Then we turn to data hiding in images. In considering these data hiding techniques, we have in mind, Bender's technical characteristics, such as data loss, the cover should be minimized and hidden data should be made as immune as possible attack data manipulation cover. Steganography in images really come of age with the invention of fast, powerful computers. The software is easily available from the Internet any user to hide data inside images. This software is designed to combat the illicit proliferation of document images by stamping some recognizable feature in high-quality images of the most popular method is the least significant bit of the Insert, which we will see. In addition, we look at more complex methods, such as masking and filtering of data and algorithms and transformations, which offer the most security for attacks such as the scrappy which exploits the weaknesses of the human eye to change brightness.
We'll take a quick look at stegoanaliza, the science of detecting hidden messages and their destruction. We came to the conclusion, finding that steganography offers great potential to provide copyright data and detection of the offenders. Shortly after
Steganography, personal messages, files, all artwork, photos and songs can be protected from piracy.
Reference:
http://studentbank.in/report-steganograp...z3KAcrtsrM