SlideShare a Scribd company logo
1 of 12
Dr. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY
STEGANOGRAPHY
Dept. of Information Technology
WHAT IS STEGANOGRAPHY
Greek Words: STEGANOS – “Covered”
GRAPHIE – “Writing”
 Steganography : Art and science of hiding the existence
of messages.
 Embedding the message in image, audio or video.
INTRODUCTION
Problem Definition
Problems with now a days security systems
 Even after encryption, data is not secure.
 It require much time.
 People need a system having high security.
and user friendly environment.
A Steganography System
Secure communication on public network
Example of LSB Technique
Functions to be provide
Our software functions
 Embed text into Image.
 Retrieve secret message from Image.
 User friendly GUI.
 Send File using mail services.
Embedding message within
image
. Secret Message
Cover Image
Steganogr-
aphy Algo
Stego-Image
Applications
 Can be used wherever data security is
required.
 Govt. Agencies.
 Security company & militaries communication.
 Bank’s.
 Private Organization.
 Digital Watermarking.
Advantages
 Difficult to detect only receiver can
detect.
 LSB insertion is Quick ,Easy and
Secure.
 No visual change in image.
 Third party can’t suspect the secret.
Disadvantages
Secret message is plane text.
No key is used for encoding &
decoding
If the technique is gone in the wrong
hand (hackers,terrorist) it’s dangerous
Future Scope
 Use of key for encoding and decode.
 Steganography in printed media
Conclusion
Hide large amount of information.
Secret can’t be suspected.
Easy and safe for communicate.

More Related Content

What's hot

Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networksdimgkik
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackerstechnoxian
 
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmerFaruk32
 
captcha as graphical passwords—a new security
captcha as graphical passwords—a new securitycaptcha as graphical passwords—a new security
captcha as graphical passwords—a new securityswathi78
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 
Websense Financial Analyst Day 2013 - Threat Technology
Websense Financial Analyst Day 2013 - Threat TechnologyWebsense Financial Analyst Day 2013 - Threat Technology
Websense Financial Analyst Day 2013 - Threat TechnologyRuss Dietz
 

What's hot (20)

Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networks
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Research Overview
Research OverviewResearch Overview
Research Overview
 
ITTCourseDesc
ITTCourseDescITTCourseDesc
ITTCourseDesc
 
Steganography
Steganography Steganography
Steganography
 
Web profile
Web profileWeb profile
Web profile
 
KHULOOD SALIM RASHID
KHULOOD SALIM RASHIDKHULOOD SALIM RASHID
KHULOOD SALIM RASHID
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
 
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
 
AMU ID
AMU IDAMU ID
AMU ID
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
InnoSec_leaflet
InnoSec_leafletInnoSec_leaflet
InnoSec_leaflet
 
Methods
MethodsMethods
Methods
 
captcha as graphical passwords—a new security
captcha as graphical passwords—a new securitycaptcha as graphical passwords—a new security
captcha as graphical passwords—a new security
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
Websense Financial Analyst Day 2013 - Threat Technology
Websense Financial Analyst Day 2013 - Threat TechnologyWebsense Financial Analyst Day 2013 - Threat Technology
Websense Financial Analyst Day 2013 - Threat Technology
 

Similar to Steganography final presentation

Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganographyijtsrd
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image SteganographyNathan Mathis
 

Similar to Steganography final presentation (20)

Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
F1803023843
F1803023843F1803023843
F1803023843
 
Steganography
SteganographySteganography
Steganography
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
1.doc
1.doc1.doc
1.doc
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
Steganography
SteganographySteganography
Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 

More from ABHIJEET KHIRE

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...ABHIJEET KHIRE
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionABHIJEET KHIRE
 

More from ABHIJEET KHIRE (20)

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 question
 
Test resume
Test resumeTest resume
Test resume
 
Ddl
DdlDdl
Ddl
 
Create
CreateCreate
Create
 
All questions
All questionsAll questions
All questions
 
2 q on groups
2 q on groups2 q on groups
2 q on groups
 
1 q on operators
1 q on operators1 q on operators
1 q on operators
 
Q on subquery
Q on subqueryQ on subquery
Q on subquery
 
Q on joins
Q on joinsQ on joins
Q on joins
 
Q on functions
Q on functionsQ on functions
Q on functions
 
SQL QUERY PRACTICE
SQL QUERY PRACTICE SQL QUERY PRACTICE
SQL QUERY PRACTICE
 
Mysql schema emp dept
Mysql schema emp deptMysql schema emp dept
Mysql schema emp dept
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Steganography final presentation

  • 1. Dr. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY STEGANOGRAPHY Dept. of Information Technology
  • 2. WHAT IS STEGANOGRAPHY Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”  Steganography : Art and science of hiding the existence of messages.  Embedding the message in image, audio or video. INTRODUCTION
  • 3. Problem Definition Problems with now a days security systems  Even after encryption, data is not secure.  It require much time.  People need a system having high security. and user friendly environment.
  • 4. A Steganography System Secure communication on public network
  • 5. Example of LSB Technique
  • 6. Functions to be provide Our software functions  Embed text into Image.  Retrieve secret message from Image.  User friendly GUI.  Send File using mail services.
  • 7. Embedding message within image . Secret Message Cover Image Steganogr- aphy Algo Stego-Image
  • 8. Applications  Can be used wherever data security is required.  Govt. Agencies.  Security company & militaries communication.  Bank’s.  Private Organization.  Digital Watermarking.
  • 9. Advantages  Difficult to detect only receiver can detect.  LSB insertion is Quick ,Easy and Secure.  No visual change in image.  Third party can’t suspect the secret.
  • 10. Disadvantages Secret message is plane text. No key is used for encoding & decoding If the technique is gone in the wrong hand (hackers,terrorist) it’s dangerous
  • 11. Future Scope  Use of key for encoding and decode.  Steganography in printed media
  • 12. Conclusion Hide large amount of information. Secret can’t be suspected. Easy and safe for communicate.