steganography full report
#22
[attachment=14876]
ABSTRACT
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
INTRODUCTION
One of the reasons that intruders can be successful is the most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Stegranography include an array of secret communication methods that hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, streganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images.
The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity are requires to protect against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding
Information hiding is an emerging research area, which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography.
In watermarking applications, the message contains information such as owner identification and a digital time stamp, which usually applied for copyright protection.
Fingerprint, the owner of the data set embeds a serial number that uniquely identifies the user of the data set. This adds to copyright information to makes it possible to trace any unauthorized used of the data set back to the user.
Steganography hide the secrete message within the host data set and presence imperceptible and is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an information analysis.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on steganography pdf, bits pilani bitsat, didyma greece, redundant, robustness, full report and ppt for steganography, steganography seminar report pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: steganography full report - by seminar topics - 19-03-2010, 10:34 AM
RE: steganography full report - by soccer34 - 18-04-2010, 08:52 AM
RE: steganography full report - by projectsofme - 13-10-2010, 11:37 AM
RE: steganography full report - by shlok - 28-02-2011, 06:50 PM
RE: steganography full report - by rickytorson - 02-03-2011, 01:28 PM
RE: steganography full report - by seminar class - 02-03-2011, 03:22 PM
RE: steganography full report - by seminar class - 07-03-2011, 11:59 AM
RE: steganography full report - by seminar class - 09-03-2011, 10:19 AM
RE: steganography full report - by seminar class - 11-03-2011, 02:40 PM
RE: steganography full report - by seminar class - 31-03-2011, 11:21 AM
RE: steganography full report - by seminar class - 01-04-2011, 03:26 PM
RE: steganography full report - by seminar class - 02-04-2011, 12:43 PM
RE: steganography full report - by seminar class - 27-04-2011, 04:42 PM
RE: steganography full report - by seminar class - 12-05-2011, 05:01 PM
RE: steganography full report - by smart paper boy - 29-07-2011, 09:21 AM
RE: steganography full report - by seminar addict - 19-01-2012, 10:04 AM
RE: steganography full report - by seminar paper - 13-02-2012, 05:02 PM
RE: steganography full report - by seminar paper - 25-02-2012, 09:48 AM
RE: steganography full report - by seminar paper - 08-03-2012, 02:51 PM
RE: steganography full report - by seminar paper - 13-03-2012, 12:57 PM
RE: steganography full report - by seminar paper - 13-03-2012, 02:41 PM
RE: steganography full report - by seminar paper - 15-03-2012, 05:06 PM
RE: steganography full report - by Guest - 06-07-2015, 10:27 PM
RE: steganography full report - by hadil - 07-07-2015, 12:45 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,817 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 47,127 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,899 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 43,110 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,366 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,206 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 26,604 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,573 29-11-2015, 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,271 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,517 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: