steganography full report
#17
Presented By:
POOJA YADAV

[attachment=11394]
STEGANOGRAPHY
Steganography - Definition
Steganography

– from the Greek word steganos meaning “covered”
– and the Greek word graphie meaning “writing”
• Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination
Modern digital steganography
– data is encrypted
– then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file
– This technique may simply append the data to the file, or disperse it
 Text Steganography
 Image Steganography
 Audio Steganography
 Video Steganography
• Audio and Image Steganography
• Steganography – Modern Day
• Steganography - Tools
Steganography Tools
• Steganos
• S-Tools (GIF, JPEG)
• StegHide (WAV, BMP)
• Invisible Secrets (JPEG)
• JPHide
Steganalysis - Definition
Definition

– Identifying the existence of a message
– Not extracting the message
– Note: Technically, Steganography deals with the concealment of a message, not the encryption of it
– Steganalysis essentially deals with the detection of hidden content
Steganalysis
• By identifying the existence of a hidden message, perhaps we can identify the tools used to hide it.
• If we identify the tool, perhaps we can use that tool to extract the original message.
• Steganalysis – Hiding Techniques
• Common hiding techniques
Appended to a file
 Hidden in the unused header portion of the file near the beginning of the file contents
 An algorithm is used to disperse the hidden message throughout the file
• Modification of LSB (Least Significant Bit)
• Steganalysis – Methods of Detection
Methods of detecting the use of Steganography
– Visual Detection (JPEG, BMP, GIF, etc.)
– Audible Detection (WAV, MPEG, etc.)
– Statistical Detection (changes in patterns of the pixels or LSB – Least Significant Bit) or Histogram Analysis
– Structural Detection - View file properties/contents
• size difference
• date/time difference
• contents – modifications
• checksum
– Steganalysis – Methods of Detection
• Goal
– Accuracy
– Consistency
– Minimize false-positives
– Applications
 Confidential Communication
• Secret Data storing
• Protection Of Data Alteration
• Anomaly – Visual Detection
• Detecting Steganography by viewing it
• Can you see a difference in these two pictures? (I can’t!)
• Steganalysis meets Cryptanalysis
Cryptanalysis
• In Steganography the goal is to hide the message, NOT encrypt it
• Cryptography provides the means to encrypt the message.
• Identify program used to hide message
• Identify the location of the program signature in the file
• Identify the location of the password in the file
• Identify location of the hidden message in the file
• Identify the algorithm used to encrypt the hidden message
ENCRYPTION ALGORITHMS
 XOR
 DES
 AES
Future Scope
• Due to time and computing limitation we could not explore all facts of steganography and detectation techniques.
• We studied the power in our images to test for hidden data.
• Adding hidden data adds random noise
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is derek bieber, lossy amull imge, stray dogs variety colors, a seminar report on steganography, 101 seminors com, seminar report on steganography ppt, transformations coralville,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: steganography full report - by seminar topics - 19-03-2010, 10:34 AM
RE: steganography full report - by soccer34 - 18-04-2010, 08:52 AM
RE: steganography full report - by projectsofme - 13-10-2010, 11:37 AM
RE: steganography full report - by shlok - 28-02-2011, 06:50 PM
RE: steganography full report - by rickytorson - 02-03-2011, 01:28 PM
RE: steganography full report - by seminar class - 02-03-2011, 03:22 PM
RE: steganography full report - by seminar class - 07-03-2011, 11:59 AM
RE: steganography full report - by seminar class - 09-03-2011, 10:19 AM
RE: steganography full report - by seminar class - 11-03-2011, 02:40 PM
RE: steganography full report - by seminar class - 31-03-2011, 11:21 AM
RE: steganography full report - by seminar class - 01-04-2011, 03:26 PM
RE: steganography full report - by seminar class - 02-04-2011, 12:43 PM
RE: steganography full report - by seminar class - 27-04-2011, 04:42 PM
RE: steganography full report - by seminar class - 12-05-2011, 05:01 PM
RE: steganography full report - by seminar addict - 19-01-2012, 10:04 AM
RE: steganography full report - by seminar paper - 13-02-2012, 05:02 PM
RE: steganography full report - by seminar paper - 25-02-2012, 09:48 AM
RE: steganography full report - by seminar paper - 08-03-2012, 02:51 PM
RE: steganography full report - by seminar paper - 13-03-2012, 12:57 PM
RE: steganography full report - by seminar paper - 13-03-2012, 02:41 PM
RE: steganography full report - by seminar paper - 15-03-2012, 05:06 PM
RE: steganography full report - by Guest - 06-07-2015, 10:27 PM
RE: steganography full report - by hadil - 07-07-2015, 12:45 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,780 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,939 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,806 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,959 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,218 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,148 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 26,134 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,318 29-11-2015, 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,231 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,345 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: