22-03-2012, 01:12 PM
Can I see the source code for this? The snapshots are quite clear though but would like to see the coding part of this as well
..
..
22-03-2012, 01:12 PM
Can I see the source code for this? The snapshots are quite clear though but would like to see the coding part of this as well
..
24-03-2012, 01:36 PM
steganography
Synopsis.docx (Size: 77.7 KB / Downloads: 65) Objective : Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. In this software we can hide information in an image file. The information is carefully encrypted and hidden so you cannot easily find it. Methodology : For each bit in the message,this program picks a random pixel in the image and a random red, green, or blue component in that pixel. It then sets the least significant bit in that component to the bit value it is encoding.These changes are so small they are almost impossible to detect. In a photographic image, you will not be able to tell the difference just by looking.The program uses a password to initialize the random number generator Rnd. When you decode the message, the program initializes the random number generator using the same seed so it produces the same series of pseudo-random numbers. Outcome: This program will hide a message in an image ,so only the sender and receiver know it's there.While everyone may see the public data, they won't know the secret message is present.Data will be Secured.
25-04-2012, 12:22 PM
steganography
STEGNOGRAPHY.pdf (Size: 82.39 KB / Downloads: 56) INTRODUCTION Steganography comes from the Greek and literally means, "Covered writing". It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishes steganography from covert channel techniques, which instead of trying to transmit data between two entities that were unconnected before. The goal of steganography is to hide messages inside other “harmless” messages in a way that does not allow any “enemy” to even detect that there is a second secret message present. The only missing information for the “enemy” is the short easily exchangeable random number sequence, the secret key, without the secret key, the “enemy” should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place. STEGANOGRAPHY AND CRYPTOGRAPHY Steganography and cryptography are cousins in spy-craft family. Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in cipher text for instance might arouse suspicion on the part of the recipient while an “invisible” message created with steganographic methods will not. Some history The first description of the use of steganography dates back to the Greeks. Herodotus tells how a message was passed to the Greeks about Xerses’ hostile intentions underneath the wax of a writing tablet, and describes a technique of dotting successive letters in a cover text with a secret ink, due to Aeneas the Tactician. SOME DEFINITIONS We give some definitions common to the steganography field: Cover medium: This is the medium in which we want to hide data, it can be an innocent looking piece of information for steganography, or some important medium that must be protected for copyright or integrity reasons. Embedded message: This is the hidden message we want to put in the cover. It can be some data for steganography and some copyright informations or added content for digital watermarking. Stegokey: This is represented by some secret information, which is needed in order to extract the embedded message from the stegomedium File compression There are two types of file compression methods- lossless and lossy. Both methods save storage space but have different results, interfer9ing with the hidden information, when information is uncompressed. Lossless compression lets us reconstruct the original message exactly; therefore it is preferred when the original information must remain intact (as with steganographic images). Lossless compression us typical of mages saved as GIF and 8-bit BMP. Robustness Spread spectrum techniques are usually quite robust. Every transformation that adds noise to the image isn’t able to destroy the message. Anyway, a determined attacker can quite easily compromise the embedded data using some digital processing, like for example Steganography - Seeing the Unseen noise reduction filters, the same that are used in decoding to estimate the original cover. CONCLUSION In this paper we tried to give an all-round view of steganography, both used to exchange messages and watermarking. First we gave an outline of the problem, telling also some of the history of this quickly developing field.
05-05-2012, 01:39 PM
steganography
jitendriya dash.ppt (Size: 4.36 MB / Downloads: 74) DEFINITION The definition of Steganography is literally, covered writing. The idea behind Steganography is to pass a hidden message within another seemingly harmless message so that no one determines that hidden communication is taking place. So, Steganography can be called The art of hiding information . Cryptography VS. Steganography Cryptography: the message itself is being encrypted or coded such that, everybody knows the existence of the secret message, but without knowing the proper method of decryption, none can decrypt it. Steganography: the message is being hidden without any change of its form such that, unless the carrier object is being analyzed, the Steganography secret message can’t be found out. Steganography in Digital Images:- There are many ways to hide information in digital images. But these methods are basic methods for hiding information. Least significant bit insertion Algorithms and transformations Conclusion Steganography is an emerging method which provides more security than other conventional methods. So it is definitely going to develop with vast uses in various fields.
18-05-2012, 11:40 AM
Steganography
Seminar report on steganography.docx (Size: 261.92 KB / Downloads: 63) INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos (στεγανός) meaning "covered or protected", and graphei (γράφη) meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. [1] The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable-will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. ANCIENT STEGANOGRAPHY The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in his Histories. Demaratussent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. [4] PHYSICAL STEGANOGRAPHY Steganography has been widely used, including in recent historical times and the present day. Possible permutations are endless and known examples include: • Hidden messages within wax tablets — in ancient Greece, people wrote messages on the wood, then covered it with wax upon which an innocent covering message was written. • Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on a slave's shaved head, hidden by the growth of his hair, and exposed by shaving his head again. The message allegedly carried a warning to Greece about Persianinvasionplans. This method has obvious drawbacks, such as delayed transmission while waiting for the slave's hair to grow, and the restrictions on the number and size of messages that can be encoded on one person's scalp. NETWORK STEGANOGRAPHY All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003. Contrary to the typical steganographic methods which utilize digital media (images, audio and video files) as a cover for hidden data, network steganography utilizes communication protocols' control elements and their basic intrinsic functionality. As a result, such methods are harder to detect and eliminate. [4]
20-07-2012, 10:05 AM
to get iformation about the topic "steganography" full report ppt and related topic refer the link bellow
https://seminarproject.net/Thread-stegan...port--8121 https://seminarproject.net/Thread-stegan...d-abstract https://seminarproject.net/Thread-stegan...ull-report https://seminarproject.net/Thread-stegan...tion--3465 https://seminarproject.net/Thread-stegan...nar-report https://seminarproject.net/Thread-steganography--10609 https://seminarproject.net/Thread-stegan...121?page=4 https://seminarproject.net/Thread-stegan...2#pid86052 https://seminarproject.net/Thread-stegan...termarking
19-12-2012, 12:34 PM
to get information about the topic "steganography synopsis " full report ppt and related topic refer the link bellow
https://seminarproject.net/Thread-stegan...port--8121 https://seminarproject.net/Thread-stegan...ort--69027 https://seminarproject.net/Thread-secure...ganography
11-02-2014, 07:48 PM
i need this urgently and also source code in java.plzzz
|
|