steganography full report
#26
steganography


[attachment=18112]
Introduction
1.1 What is Steganography?
Steganography comes from the Greek and literally means, "Covered or secret writing".
Although related to cryptography, they are not the same. Steganography’s intent is to hide theexistence of the message, while cryptography scrambles a message so that it cannot be understood.

Steganography is one of various data hiding techniques, which aims at transmitting amessage on a channel where some other kind of information is already being transmitted.This distinguishes Steganography from covert channel techniques, which instead of tryingto transmit data between two entities that were unconnected before.
The goal of Steganography is to hide messages inside other “harmless” messages ina way that does not allow any “enemy” to even detect that there is a second secret messagepresent. The only missing information for the “enemy” is the short easily exchangeablerandom number sequence, the secret key, without the secret key, the “enemy” should nothave the slightest chance of even becoming suspicious that on an observed communicationchannel, hidden communication might take place.

1.2 Introduction to Terms used:
In the field of steganography, some terminology has developed.
The adjectivesCover,Embedded Andstego were defined at the Information Hiding
Workshop held in Cambridge, England. The term ``cover'' is used to describe the origina
innocent message, data, audio, still, video and so on. When referring to audio signal
Steganography, the cover signal is sometimes called the ``host'' signal.



Steganography in Text
The illegal distribution of documents through modern electronic means, such aselectronic mail, means such as this allow infringers to make identical copies of documentswithout paying royalties or revenues to the original author. To counteract this possible wide-scale piracy, a method of marking printable documents with a unique codeword that isIndiscernible to readers, but can be used to identify the intended recipient of a document just byExamination of a recovered document
The techniques they propose are intended to be used in conjunction with standardsecurity measures. For example, documents should still be encrypted prior to transmission acrossa network. Primarily, their techniques are intended for use after a document has been decrypted,once it is readable to all.
An added advantage of their system is that it is not prone to distortion by methods such as
photocopying, and can thus be used to trace paper copies back to their source.
An additional application of text steganography suggested by Bender, et al. is annotationthat is, checking that a document has not been tampered with. Hidden data in text could even byused by mail servers to check whether documents should be posted or not.



2.1 Line-Shift Coding:
In this method, text lines are vertically shifted to encode the document uniquely.Encoding and decoding can generally be applied either to the format file of a document, or thebitmap of a page image.
By moving every second line of document either 1/300 of an inch up or down, it wasfound that line-shift coding worked particularly well, and documents could still be completelydecoded, even after the tenth photocopy.
However, this method is probably the most visible text coding technique to the reader.Also, line-shift encoding can be defeated by manual or automatic measurement of the number ofpixels between text baselines. Random or uniform respacing of the lines can damage anyattempts to decode the codeword.
However, if a document is marked with line-shift coding, it is particularly difficult toremove the encoding if the document is in paper format. Each page will need to be rescanned,altered, and reprinted. This is complicated even further if the printed document is a photocopy, asit will then suffer from effects such as blurring, and salt-and-pepper noise.

2.2 Word-Shift Coding:
In word-shift coding, codewords are coded into a document by shifting the horizontallocations of words within text lines, while maintaining a natural spacing appearance. Thisencoding can also be applied to either the format file or the page image bitmap. The method, ofcourse, is only applicable to documents with variable spacing between adjacent words, such as indocuments that have been text-justified.

Reply
#27

to get information about the topic" Stagenography" full report ppt and related topic refer the page link bellow
http://studentbank.in/report-steganograp...ars-report

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-steganograp...121?page=4

http://studentbank.in/report-steganograp...port--8121

http://studentbank.in/report-steganograp...121?page=9


Reply
#28
steganography

[attachment=18261]

Overview:
People use cryptography to send secret messages to one another without a third
party overseeing the message. Steganography is a type of cryptography in which
the secret message is hidden in a digital picture. Think of all those pixels in an
image and each pixel has three color numbers — there are zillions of numbers
in an image. If you were to change a few of these color numbers the resulting
picture would probably look a lot like the original image; in fact, most people
probably couldn’t tell that you had changed the image at all. Steganography works
by changing a few pixel color values; we will use selected pixel values to represent
characters instead of a color value.



Interaction
• Prompt the user if they want to encode or decode a message.
• Use the FileChooser dialog to prompt the user for an input file.
• If encode, prompt the user for an input message. Encode the message into
the picture (details below). Then use the FileChooser dialog to prompt the
user for an output file. Save the new picture/message in this file (using bmp
format).
• If decode, extract the message from the file. Print the message.
Encoding/Decoding Method
• You can extract the pixels of your target picture in one big array using the


textttgetPixels() method.
• Use the first pixel (at spot 0) to hide the length of your message (number of
characters). You will limit yourself to messages that are between 0 and 255
characters long.
• After that use every eleventh pixel to hide characters in your message. Start
at pixel 11, then pixel 22, and so on until you hide all characters in your
message.



Hiding Method
The problem with changing the red values in our encode/decode steps, is that
these often cause quite visible changes in the resulting image. This is especially
true if the pixels that are being changed are part of a large section of uniformly
colored pixels – the ”dots” stand out and are noticeable. As an option, we can
change only the lower order bits of each pixel color (red, blue, and green). This
will make subtle changes to each pixel’s color and will not be as evident.
Reply
#29
steganography

[attachment=18412]

INTRODUCTION

One of the reasons that intruders can be successful is the most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Stegranography include an array of secret communication methods that hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, streganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images.


What is Steganography?
Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them, although this software is available that can do what is called Steganography. The most common use of steganography is to hide a file inside another file.



History of Steganography:
Through out history Steganography has been used to secretly communicate information between people.
Some examples of use of Steganography is past times are:
1. During World War 2 invisible ink was used to write information on pieces of paper so that the paper appeared to the average person as just being blank pieces of paper. Liquids such as milk, vinegar and fruit juices were used, because when each one of these substances are heated they darken and become visible to the human eye.
2. In Ancient Greece they used to select messengers and shave their head, they would then write a message on their head. Once the message had been written the hair was allowed to grow back. After the hair grew back the messenger was sent to deliver the message, the recipient would shave off the messengers hair to see the secrete message.
3. Another method used in Greece was where someone would peel wax off a tablet that was


Why This Steganography?
This technique is chosen, because this system includes not only imperceptibility but also un-delectability by any steganolysis tool.

Project Scope:
This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.

Methodology:
User needs to run the application. The user has two tab options – encrypt and decrypt. If user select encrypt, application give the screen to select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only image file and ask path where user want to save the secrete file.











Reply
#30
can i get the code?????????????????????????????????????????????????????????/
Reply
#31
can i get the code??????????????????????????????????????//
Reply
#32

To get full information or details of steganography full report please have a look on the pages

http://studentbank.in/report-steganograp...port--8121

if you again feel trouble on steganography full report please reply in that page and ask specific fields in steganography full report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: 101 seminartopics com, bits pilani, tos bits dscp, lossy amull imge, base64 decrypt, bits pilani bitsat, steganography seminar report pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,727 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,833 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,737 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,785 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,146 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,093 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,855 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,094 29-11-2015, 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,205 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,115 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: