steganography full report
#13
presented by:
Heema Jain

[attachment=9372]
STEGANOGRAPHY -Security Through Obscurity
WHAT IS STEGANOGRAPHY?

• Steganography - \Steg`a*nog"ra*phy\,
[Greek steganos (covered or secret) + graphy (writing or drawing).]
• Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of SECURITY THROUGH OBSCURITY.
• Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol
STEGANOGRAPHY V/S CRYPTOGRAPHY
 Both are used as means to protect information .
 Cryptographic techniques "scramble" messages so if intercepted, the messages cannot be understood .
 Steganography,"camouflages" a message to hide its existence and make it seem "invisible" thus concealing the fact that a message is being sent altogether.
 The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves or arouse suspicion. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.
HISTORY OF STEGANOGRAPHY
 Hidden messages within wax tablets: in ancient Greece, people wrote messages on the wood, then covered it with wax upon which an innocent covering message was written.
 Hidden messages on messenger's body: also used in ancient Greece. Herodutus tells the story of a message tatooed on a slave's shaved head, hidden by the growth of his hair, and exposed by shaving his head again. The message allegedly carried a warning to Greece about Persian invansion plan. This method has obvious drawbacks, such as delayed transmission while waiting for the slave's hair to grow, and the restrictions on the number and size of messages that can be encoded on one person's scalp.
 The milk of thithymallus plant is dried to transparency when applied to paper but darkened to brown when subsequently heated .
 In WWII, the French Resistance sent some messages written on the backs of couriers using invisible ink. Common sources for invisible inks are milk, vinegar and fruit juices.
 With the advent of photography, microfilm was created as a way to store a large amount of information in a very small space. In both world wars, the Germans used "microdots" to hide information. A secret message was photographed, reduced to the size of a printed period, then pasted into an innocuous cover message, magazine, or newspaper.
MODERN STEGANOGRAPHY
 Modern steganography entered the world in 1985 with the advent of the personal computer being applied to classical steganography problems.
 What to hide
– Texts
– Images
– Sound
 Hide or embed
– text in text/images/sound files
– image in image/sound files
– sound in sound files
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: tos byte values, interpreter arabic, full report on steganography, hdlc byte stuffing, steganography full ppt, uic cs 109, how to hide,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: steganography full report - by seminar topics - 19-03-2010, 10:34 AM
RE: steganography full report - by soccer34 - 18-04-2010, 08:52 AM
RE: steganography full report - by projectsofme - 13-10-2010, 11:37 AM
RE: steganography full report - by shlok - 28-02-2011, 06:50 PM
RE: steganography full report - by rickytorson - 02-03-2011, 01:28 PM
RE: steganography full report - by seminar class - 02-03-2011, 03:22 PM
RE: steganography full report - by seminar class - 07-03-2011, 11:59 AM
RE: steganography full report - by seminar class - 09-03-2011, 10:19 AM
RE: steganography full report - by seminar class - 11-03-2011, 02:40 PM
RE: steganography full report - by seminar class - 31-03-2011, 11:21 AM
RE: steganography full report - by seminar class - 01-04-2011, 03:26 PM
RE: steganography full report - by seminar class - 02-04-2011, 12:43 PM
RE: steganography full report - by seminar class - 27-04-2011, 04:42 PM
RE: steganography full report - by seminar class - 12-05-2011, 05:01 PM
RE: steganography full report - by seminar addict - 19-01-2012, 10:04 AM
RE: steganography full report - by seminar paper - 13-02-2012, 05:02 PM
RE: steganography full report - by seminar paper - 25-02-2012, 09:48 AM
RE: steganography full report - by seminar paper - 08-03-2012, 02:51 PM
RE: steganography full report - by seminar paper - 13-03-2012, 12:57 PM
RE: steganography full report - by seminar paper - 13-03-2012, 02:41 PM
RE: steganography full report - by seminar paper - 15-03-2012, 05:06 PM
RE: steganography full report - by Guest - 06-07-2015, 10:27 PM
RE: steganography full report - by hadil - 07-07-2015, 12:45 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,780 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,939 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,806 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,959 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,220 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,148 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 26,134 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,318 29-11-2015, 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,231 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,345 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: