SlideShare a Scribd company logo
1 of 2
Download to read offline
As per the above scenario, please find the short report below.
The art of sending the message that is hidden in the grapical images is mainly called as
"STEGANOGRAPHY".
It is mainly followed , to protect the message from the unknown source. were other they cannot
see the message that is hidded. Only the reciever and sender alone the way to encrypt or decrypt
the hidden message from the images that are sent.
1) To make the message hidden in the image, first choose the message. There are so many
softwares that are available, were the images if that are stored in the local drive, they can
choosen.
2) Then type the information that you like to transfer , in terms of message. It may ask you for
the password. Then you can create the password and enter it. Its mainly for the purporse of
security.
3) After that if you , click hide message button in the available software, the message will be
hidden. It will take few minutes to create the image with message. ONce it is created we will not
able to crop the image of resize the image.
Once the encryption is done, sender will send the message to intended reciepent.
After recieving the message, the reciever need to decrypt the message.
Following steps need to be followed to see the hidden messages.
1) Select the image needed for the decryption.
2) Enter the password that was sent by the sender, once the password is entered the password
check will be done and reveal your message option need to be clicked.
3) Atlast the hidden message will be shown. It can be stored in the local drive and used.
Solution
As per the above scenario, please find the short report below.
The art of sending the message that is hidden in the grapical images is mainly called as
"STEGANOGRAPHY".
It is mainly followed , to protect the message from the unknown source. were other they cannot
see the message that is hidded. Only the reciever and sender alone the way to encrypt or decrypt
the hidden message from the images that are sent.
1) To make the message hidden in the image, first choose the message. There are so many
softwares that are available, were the images if that are stored in the local drive, they can
choosen.
2) Then type the information that you like to transfer , in terms of message. It may ask you for
the password. Then you can create the password and enter it. Its mainly for the purporse of
security.
3) After that if you , click hide message button in the available software, the message will be
hidden. It will take few minutes to create the image with message. ONce it is created we will not
able to crop the image of resize the image.
Once the encryption is done, sender will send the message to intended reciepent.
After recieving the message, the reciever need to decrypt the message.
Following steps need to be followed to see the hidden messages.
1) Select the image needed for the decryption.
2) Enter the password that was sent by the sender, once the password is entered the password
check will be done and reveal your message option need to be clicked.
3) Atlast the hidden message will be shown. It can be stored in the local drive and used.

More Related Content

Similar to As per the above scenario, please find the short report below.The .pdf

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
SAMPATHKUMARS20
 

Similar to As per the above scenario, please find the short report below.The .pdf (20)

Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
C01111519
C01111519C01111519
C01111519
 
Steganography
SteganographySteganography
Steganography
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
Report
ReportReport
Report
 
Steganography
SteganographySteganography
Steganography
 
project-report-steganography.docx
project-report-steganography.docxproject-report-steganography.docx
project-report-steganography.docx
 
2.docx
2.docx2.docx
2.docx
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
DIGITAL SIGNATURE.pptx
DIGITAL SIGNATURE.pptxDIGITAL SIGNATURE.pptx
DIGITAL SIGNATURE.pptx
 

More from anushkaent7

1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
anushkaent7
 
Two advantages of using financial accounting information in decision.pdf
Two advantages of using financial accounting information in decision.pdfTwo advantages of using financial accounting information in decision.pdf
Two advantages of using financial accounting information in decision.pdf
anushkaent7
 
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdfThe phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
anushkaent7
 
The Program to find out the middle of a given linked listclass Lin.pdf
The Program to find out the middle of a given linked listclass Lin.pdfThe Program to find out the middle of a given linked listclass Lin.pdf
The Program to find out the middle of a given linked listclass Lin.pdf
anushkaent7
 
Plasma membrane of human is made of phospholipids; these are fluids .pdf
Plasma membrane of human is made of phospholipids; these are fluids .pdfPlasma membrane of human is made of phospholipids; these are fluids .pdf
Plasma membrane of human is made of phospholipids; these are fluids .pdf
anushkaent7
 
One of the functions of skin is to regulate the temperature. The ski.pdf
One of the functions of skin is to regulate the temperature. The ski.pdfOne of the functions of skin is to regulate the temperature. The ski.pdf
One of the functions of skin is to regulate the temperature. The ski.pdf
anushkaent7
 
Main class --------------------------import java.awt.FlowLayout.pdf
Main class --------------------------import java.awt.FlowLayout.pdfMain class --------------------------import java.awt.FlowLayout.pdf
Main class --------------------------import java.awt.FlowLayout.pdf
anushkaent7
 

More from anushkaent7 (20)

A. ASBRThe router is an ASBR type because all configured networks .pdf
A. ASBRThe router is an ASBR type because all configured networks .pdfA. ASBRThe router is an ASBR type because all configured networks .pdf
A. ASBRThe router is an ASBR type because all configured networks .pdf
 
A TetrahedralB polar becaue there is an uneven distribution of e.pdf
A TetrahedralB polar becaue there is an uneven distribution of e.pdfA TetrahedralB polar becaue there is an uneven distribution of e.pdf
A TetrahedralB polar becaue there is an uneven distribution of e.pdf
 
1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
1)Journal entriesT- AccountsCommon StockCommon Stock dividends.pdf
 
1) a.Seasonal H1N1 influenza Seasonal contaminate the superior or u.pdf
1) a.Seasonal H1N1 influenza Seasonal contaminate the superior or u.pdf1) a.Seasonal H1N1 influenza Seasonal contaminate the superior or u.pdf
1) a.Seasonal H1N1 influenza Seasonal contaminate the superior or u.pdf
 
1 mole of 12C contains 6.02 x 1023 carbon atomsSolution1 mole .pdf
1 mole of 12C contains 6.02 x 1023 carbon atomsSolution1 mole .pdf1 mole of 12C contains 6.02 x 1023 carbon atomsSolution1 mole .pdf
1 mole of 12C contains 6.02 x 1023 carbon atomsSolution1 mole .pdf
 
(-3,0)Solution(-3,0).pdf
(-3,0)Solution(-3,0).pdf(-3,0)Solution(-3,0).pdf
(-3,0)Solution(-3,0).pdf
 
Two advantages of using financial accounting information in decision.pdf
Two advantages of using financial accounting information in decision.pdfTwo advantages of using financial accounting information in decision.pdf
Two advantages of using financial accounting information in decision.pdf
 
their joint probability is the product of the probability of the eve.pdf
their joint probability is the product of the probability of the eve.pdftheir joint probability is the product of the probability of the eve.pdf
their joint probability is the product of the probability of the eve.pdf
 
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdfThe phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
The phylogenetic origin of the flu virus that caused the 2009 pandem.pdf
 
The Program to find out the middle of a given linked listclass Lin.pdf
The Program to find out the middle of a given linked listclass Lin.pdfThe Program to find out the middle of a given linked listclass Lin.pdf
The Program to find out the middle of a given linked listclass Lin.pdf
 
Question 1Answer b. The returned value, return address, paramete.pdf
Question 1Answer b. The returned value, return address, paramete.pdfQuestion 1Answer b. The returned value, return address, paramete.pdf
Question 1Answer b. The returned value, return address, paramete.pdf
 
Plasma membrane of human is made of phospholipids; these are fluids .pdf
Plasma membrane of human is made of phospholipids; these are fluids .pdfPlasma membrane of human is made of phospholipids; these are fluids .pdf
Plasma membrane of human is made of phospholipids; these are fluids .pdf
 
Please post the exact proplem in comments.SolutionPlease post .pdf
Please post the exact proplem in comments.SolutionPlease post .pdfPlease post the exact proplem in comments.SolutionPlease post .pdf
Please post the exact proplem in comments.SolutionPlease post .pdf
 
P( both correct) = P( first correct)P( second correct) = 1212 = .pdf
P( both correct) = P( first correct)P( second correct) = 1212 = .pdfP( both correct) = P( first correct)P( second correct) = 1212 = .pdf
P( both correct) = P( first correct)P( second correct) = 1212 = .pdf
 
One of the functions of skin is to regulate the temperature. The ski.pdf
One of the functions of skin is to regulate the temperature. The ski.pdfOne of the functions of skin is to regulate the temperature. The ski.pdf
One of the functions of skin is to regulate the temperature. The ski.pdf
 
None of the options.SolutionNone of the options..pdf
None of the options.SolutionNone of the options..pdfNone of the options.SolutionNone of the options..pdf
None of the options.SolutionNone of the options..pdf
 
Main class --------------------------import java.awt.FlowLayout.pdf
Main class --------------------------import java.awt.FlowLayout.pdfMain class --------------------------import java.awt.FlowLayout.pdf
Main class --------------------------import java.awt.FlowLayout.pdf
 
It is a test for iron(III) ion present in the solution , so it is a .pdf
It is a test for iron(III) ion present in the solution , so it is a .pdfIt is a test for iron(III) ion present in the solution , so it is a .pdf
It is a test for iron(III) ion present in the solution , so it is a .pdf
 
C. 12Solution C. 12.pdf
  C.  12Solution  C.  12.pdf  C.  12Solution  C.  12.pdf
C. 12Solution C. 12.pdf
 
I think that y=21SolutionI think that y=21.pdf
I think that y=21SolutionI think that y=21.pdfI think that y=21SolutionI think that y=21.pdf
I think that y=21SolutionI think that y=21.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

As per the above scenario, please find the short report below.The .pdf

  • 1. As per the above scenario, please find the short report below. The art of sending the message that is hidden in the grapical images is mainly called as "STEGANOGRAPHY". It is mainly followed , to protect the message from the unknown source. were other they cannot see the message that is hidded. Only the reciever and sender alone the way to encrypt or decrypt the hidden message from the images that are sent. 1) To make the message hidden in the image, first choose the message. There are so many softwares that are available, were the images if that are stored in the local drive, they can choosen. 2) Then type the information that you like to transfer , in terms of message. It may ask you for the password. Then you can create the password and enter it. Its mainly for the purporse of security. 3) After that if you , click hide message button in the available software, the message will be hidden. It will take few minutes to create the image with message. ONce it is created we will not able to crop the image of resize the image. Once the encryption is done, sender will send the message to intended reciepent. After recieving the message, the reciever need to decrypt the message. Following steps need to be followed to see the hidden messages. 1) Select the image needed for the decryption. 2) Enter the password that was sent by the sender, once the password is entered the password check will be done and reveal your message option need to be clicked. 3) Atlast the hidden message will be shown. It can be stored in the local drive and used. Solution As per the above scenario, please find the short report below. The art of sending the message that is hidden in the grapical images is mainly called as "STEGANOGRAPHY". It is mainly followed , to protect the message from the unknown source. were other they cannot see the message that is hidded. Only the reciever and sender alone the way to encrypt or decrypt the hidden message from the images that are sent. 1) To make the message hidden in the image, first choose the message. There are so many softwares that are available, were the images if that are stored in the local drive, they can choosen. 2) Then type the information that you like to transfer , in terms of message. It may ask you for
  • 2. the password. Then you can create the password and enter it. Its mainly for the purporse of security. 3) After that if you , click hide message button in the available software, the message will be hidden. It will take few minutes to create the image with message. ONce it is created we will not able to crop the image of resize the image. Once the encryption is done, sender will send the message to intended reciepent. After recieving the message, the reciever need to decrypt the message. Following steps need to be followed to see the hidden messages. 1) Select the image needed for the decryption. 2) Enter the password that was sent by the sender, once the password is entered the password check will be done and reveal your message option need to be clicked. 3) Atlast the hidden message will be shown. It can be stored in the local drive and used.