902031_634362160312422500

12

Upload: rahul-sahu

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 1/12

Page 2: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 2/12

What is Steganography?

Project Scope

Objective

MethodologySteganography Vs Cryptography

Steganography Technique

Software UsedApplications of MATLAB

Conclusion

Page 3: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 3/12

o Steganography is the art and

science of hiding information by

embedding messages within other,seemingly harmless messages.

o Steganography is the term applied

to any number of processes that willhide a message within an object,

where the hidden message will not be

apparent to an observer.

Page 4: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 4/12

This Pro ject is developed for 

hiding information in any image

file.The scope of the pro ject isimplementation of steganography

tools for hiding information

includes any type of information

file and image files and the path

where the user wants to save

Page 5: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 5/12

To Protect security tool based onsteganography techniques.

To explore techniques of hiding data

using encryption module of this pro ject To extract techniques of getting data

secret data using decryption module.

Page 6: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 6/12

Two Tab Options----Encrypt &

Decrypt«..

--The secrete

information is hiding in with any typeof image file.

-- It is getting

Page 7: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 7/12

CRYPTOGRAPHY 

(i) Message is not hidden.

(ii) Enemy can intercept the message.(iii) Enemy can decrypt the message.

STEGANOGRAPHY (i) Message is hidden.

(ii) Enemy must discover the medium.

Page 8: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 8/12

File encryption is based onencryption algorithms - a process

capable of translating data into a

secret code. In Cryptography, encrypted

message is sent. If it is intercepted,

the interceptor knows that the text isan encrypted message.

In Steganography, the fact that

the message is being sent is

Page 9: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 9/12

LSB ± Least Significant Bit Hiding (Image

Hiding) ±This method is probably the

easiest way of hiding information in an

image and yet it is surprisingly effective. Itworks by using the least significant bits of 

each pixel in one image to hide the most

significant bits of another.First load up both the host image and the image

you need to hide.

Next chose the number of bits you wish to hide

the secret image in. The more bits used in the host

Page 10: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 10/12

Page 11: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 11/12

Help Process Complex signal data

Process Video

Process Audio

Help Performing Engineering

Calculation

Calculate Angles Calculate Dimensions

Calculate Area of Complex Shapes

Map Characteristics In a multi-axis

Page 12: 902031_634362160312422500

8/4/2019 902031_634362160312422500

http://slidepdf.com/reader/full/902031634362160312422500 12/12

Steganography is a dynamic tool with a long history and

the capability to adapt to new levels of technology. It has its

own place in computer data security. By the amount of free

and commercial tools available today, one can deduce that

the use of steganography is growing. Steganography is  justanother tool for someone to use to hide data, and I believe it

will be used more often in the future, whether for covert

communication or personal data concealment. Security

professionals will surely need to be aware of its existence as

its use becomes more prevalent. Hiding a message with

steganography methods reduces the chance of a message

being detected. In and of itself, steganography is not a good

solution to secrecy, but neither is simple substitution and

short block permutation for encryption. But if these methodsare combined ou have much stron er encr tion routines.