28-06-2012, 06:01 PM
STEGANOGRAPHY
steganography.pptx (Size: 308.19 KB / Downloads: 36)
Digital Approaches
Today, it often exists within digital formats
It makes use of seemingly innocent cover files such as text, audio, and image files
The embedded message may be anything that can be encoded in binary
Image Compression
There are two types of compression while performing Image Steganography:
Lossy: Discards excess image data from original one.
Lossless: Never removes any information. Uses mathematical formulas.
Least Significant Bit Method
Replaces least significant bits with the message to be encoded
Best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color
steganography.pptx (Size: 308.19 KB / Downloads: 36)
Digital Approaches
Today, it often exists within digital formats
It makes use of seemingly innocent cover files such as text, audio, and image files
The embedded message may be anything that can be encoded in binary
Image Compression
There are two types of compression while performing Image Steganography:
Lossy: Discards excess image data from original one.
Lossless: Never removes any information. Uses mathematical formulas.
Least Significant Bit Method
Replaces least significant bits with the message to be encoded
Best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color