SlideShare a Scribd company logo
Stenography
J
J I E M S A K K A L K U W A Page 1
CHAPTER 1
INTRODUCTION
Internet users frequently need to store, send, or receive private information. The most common
way to do this is to transform the data into a different form. The resulting data can be understood
only by those who know how to return it to its original form. This method of protecting
information is known as encryption. A major drawback to encryption is that the existence of data
is not hidden. Data that has been encrypted, although unreadable, still exists as data. If given
enough time, someone could eventually unencrypted the data. A solution to this problem is
steganography. The ancient art of hiding messages so that they are not detectable. No
substitution or permutation was used. The hidden message is plain, but unsuspecting
to the reader. Steganography's intent is to hide the existence of the message, while cryptography
scrambles a message so that it cannot be understood.
Before the invention of digital means, traditional methods were being used for sending or
receiving messages. Before phones, before mail messages were sent on foot. For the messages
where privacy was of prime concern, the ways of implementing security were following:
1. Choosing the messenger capable of delivering the message securely.
2. Write the message using such notations that actual meaning of the message was concealed.
Stenography
J
J I E M S A K K A L K U W A Page 2
CHAPTER 2
LITERATURE SURVEY
2.1 INFORMATION SECURITY:
In general, security denotes “the quality or state of being secure to be free from danger”
(Whitman,2007,pp. 09 ) .
Security is classified into different layers depending on the type of content intended to
be secured: Physical security: Defines the required issues that are needed to protect the physical
data or objects from unauthorized intrusion. Personal security: It is defined as the security of the
individuals who are officially authorized to access information about the company and its
operations Operational security: It mainly relies on the protection of the information of a
particular operation of the chain of activities
.
Communication’s security: The communication’s security encompasses the security
issues regarding the organization’s communication media, technology and content .Network
security: The network security is responsible for safeguarding the information regarding the„
networking components‟, „connections‟ and contents. Information security: Information security
is the protection of information and the systems and hardware that use, store, and transmit that
information. Information security can be defined as measures adopted to prevent the
unauthorized use or modification of use of data or capabilities. The main objective of the project
is to propose the method and critically discuss the properties which help to transmit the data or
information over a network without any modifications. The critical characteristics of information
are.
1. Availability
2. Accuracy
3. Authenticity
Stenography
J
J I E M S A K K A L K U W A Page 3
Fig 2.1 Digital Medium to Achieve Steganography
2.2 Image Steganography Terminologies:
Image steganography terminologies are as follows:-
• Cover-Image: Original image which is used as a carrier for hidden information.
• Message: Actual information which is used to hide into images. Message could be a plain text
or some other image.
• Stego-Image: After embedding message into cover image is known as stego-image.
• Stego-Key: A key is used for embedding or extracting the messages from cover-images and
stego-images.
Stenography
J
J I E M S A K K A L K U W A Page 4
CHAPTER 3
EXISTING SYSTEM
3.1 Least Significant Bit Manipulation:
The idea behind this scheme is to replace the LSB of the image pixels with the message bits.
Most steganographic programs available today use some variation of LSB manipulation in order
to hide messages in an image. The major advantage of the method is its quickness and easiness.
Typically, it achieves high payload and low perceptibility. However, a too naive implementation
may be susceptible to various visual and statistical attacks. The scheme also has a very low
resistance to removal. For more details, please refer to the LSB examples subsection.
3.2 Statistical approach:
An algorithm by Bender et al. called patchwork, works by altering the statistics of the image. It
pseudo randomly chooses pairs of patches (groups of pixels), then it brightens one patch and
darkens the other one. This way a specific statistics, one that has a Gaussian distribution, is
embedded into the image. This scheme falls into the category of watermarking techniques.
3.3 Spread Spectrum:
Widely used in RF (Radio Frequency) communication, the technique actually spreads the
bandwidth of a narrowband signal across wide band of frequencies. After spreading, the energy
of the narrowband signal at any given frequency is low, and therefore difficult to detect (and
jam). Several methods that utilize the principles of spread spectrum have been described in. We
will present and describe in detail an algorithm suggested by Marvel et al. in which uses
techniques of error-correcting coding, image restoration and spread spectrum communication in
order to construct a blind steganographic system.
Stenography
J
J I E M S A K K A L K U W A Page 5
Fig 3.1 stegno system
Stenography
J
J I E M S A K K A L K U W A Page 6
CHAPTER 4
PROPOSED SYSTEM
We expand the LSB matching revisited image steganography and propose an edge
adaptive scheme which can select the embedding regions according to the size of secret message
and the difference between two consecutive pixels in the cover image.
For lower embedding rates, only sharper edge regions are used while keeping the other smoother
regions as they are. When the embedding rate increases, more edge regions can be released
adaptively for data hiding by adjusting just a few parameters.
4.1 FEASIBILITY STUDY:
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are
 ECONOMICAL FEASIBILITY
 TECHNICAL FEASIBILITY
 SOCIAL FEASIBILITY
Stenography
J
J I E M S A K K A L K U W A Page 7
4.1.1 Economical Feasibility:
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development
of the system is limited. The expenditures must be justified. Thus the developed system as well
within the budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
4.1.2 Technical Feasibility:
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the available
technical resources. This will lead to high demands on the available technical resources. This
will lead to high demands being placed on the client. The developed system must have a modest
requirement, as only minimal or null changes are required for implementing this system.
4.1.3 Social Feasibility:
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system and
to make him familiar with it. His level of confidence must be raised so that he is also able to
make some constructive criticism, which is welcomed, as he is the final user of the system.
Stenography
J
J I E M S A K K A L K U W A Page 8
CHAPTER 5
ADVANTAGES & DISADVANTAGES
5.1 ADVANTAGES:
The advantage of steganography over cryptography alone is that messages do not attract
attention to themselves. Plainly visible encrypted messages no matter how unbreakable will
arouse suspicion, and may in themselves be incriminating in countries where encryption is
illegal. Therefore, whereas cryptography protects the contents of a message, steganography can
be said to protect both messages and communicating parties.
Steganography includes the concealment of information within computer files. In digital
steganography, electronic communications may include steganographic coding inside of a
transport layer, such as a document file, image file, program or protocol. Media files are ideal for
steganographic transmission because of their large size. As a simple example, a sender might
start with an innocuous image file and adjust the color of every 100th pixel to correspond to a
letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to
notice it.
Steganography is the art and science of writing hidden messages in such a way that no one, apart
from the sender and intended recipient, suspects the existence of the message, a form of security
through obscurity. The word steganography is of Greek origin and means "concealed writing"
from the Greek words stegno meaning "covered or protected", and graph in meaning "to write".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a
treatise on cryptography and steganography disguised as a book on magic. Generally, messages
will appear to be something else: images, articles, shopping lists, or some other cover text and,
classically, the hidden message may be in invisible ink between the visible lines of a private
letter.
Stenography
J
J I E M S A K K A L K U W A Page 9
5.2 DISADVANTAGES:
 Anti-computer forensics (section Steganography) functions has put the field of digital
forensics at a great disadvantage .Steganography is a technique where information or files
are hidden within another
 Cardan grille (section Disadvantages) at all. Such a disguised message is considered to be
an example of steganography, which is a sub-branch of general cryptography. But the
name Cardan
 Watermark (data file) Useful for tamper detection, though each has its own advantages
and disadvantages. A typical data hash will process an input file to produce an
alphanumeric 3
 Cipher Classification Encryption software Famous cipher texts Pretty Good Privacy
Steganography Telegraph code Ibrahim A. Al-Kadi, "Cryptography and Data Security:
Stenography
J
J I E M S A K K A L K U W A Page 10
CHAPTER 6
APPLICATION
6.1 Digital Watermarking:
Digital watermarking is the process of embedding information into a digital signal in a
way that is difficult to remove. The signal may be audio, pictures or video, for example. If the
signal is copied, then the information is also carried in the copy. A signal may carry several
different watermarks at the same time.
6.2 Visible Watermarking:
In this, the information is visible in the picture or video. Typically, the information is text or a
logo which identifies the owner of the media. When a television broadcaster adds its logo to the
corner of transmitted video, this is also a visible watermark.
6.3 Invisible Watermarking:
In this, information is added as digital data to audio, picture or video, but it cannot be perceived
as such (although it may be possible to detect that some amount of information is hidden). The
watermark may be intended for widespread use and is thus made easy to retrieve or it may be a
form of Steganography, where a party communicates a secret message embedded in the digital
signal. In either case, as invisible watermarking, the objective is to attach ownership or other
descriptive information to the signal in a way that is difficult to remove. It is also possible to use
hidden embedded information as a means of covert communication between individuals. Digital
Watermarking can be used for a wide range of applications such as: Copyright protection Source
Tracking (Different recipients get differently watermarked content). The numbers of possible
applications for digital watermarking technologies are increasing rapidly. For example, in the
field of data security, watermarks may be used for certification, authentication, and conditional
access. Certification is an important issue for official documents, such as identity cards or
passports.
Stenography
J
J I E M S A K K A L K U W A Page 11
CONCLUSION
AND
FUTURE SCOPE
CONCLUSION:
Steganography transmits secrets through apparently innocuous covers in an effort to
conceal the existence of a secret. Digital image steganography and its derivatives are growing in
use and application. In areas where cryptography and strong encryption are being outlawed,
citizens are looking at steganography to circumvent such policies and pass messages covertly. As
with the other great innovations of the digital age: the battle between cryptographers and
cryptanalysis, security experts and hackers, record companies and pirates, steganography and
Steganalysis will continually develop new techniques to counter each other.
FUTURE SCOPE:
In the near future, the most important use of steganographic techniques will probably be
lying in the field of digital watermarking. Content providers are eager to protect their
copyrighted works against illegal distribution and digital watermarks provide a way of tracking
the owners of these materials. Steganography might also become limited under laws, since
governments already claimed that criminals use these techniques to communicate. The possible
use of steganography technique is as following:
Hiding data on the network in case of a breach.
Peer-to-peer private communications.
Posting secret communications on the Web to avoid
transmission.
Embedding corrective audio or image data in case corrosion
occurs from a poor connection or transmission.
Stenography
J
J I E M S A K K A L K U W A Page 12
REFERENCES
 http://www.ece.tamu.edu/~deepa/pdf/txsecwrksh03.pdf.
 http://www.nicetext.com/doc/isc01.pdf
 www.w3school.com
 steganography.pdf
 www.wikkipedia.com

More Related Content

What's hot

Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
Sanjay Bhoyar
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
text in multimedia
text in multimediatext in multimedia
text in multimedia
wasrse
 
Introduction to Animation
Introduction to AnimationIntroduction to Animation
Introduction to Animation
mrnasim
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Implement collaboration platform
Implement collaboration platformImplement collaboration platform
Implement collaboration platform
Info-Tech Research Group
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Multimedia
MultimediaMultimedia
Multimedia
Ainun Syamila
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software toolsJay Patel
 
Fundamental of graphic
Fundamental of graphicFundamental of graphic
Fundamental of graphicDirz M
 
data compression technique
data compression techniquedata compression technique
data compression technique
CHINMOY PAUL
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
Mohammed Adam
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Multimedia ppt
Multimedia pptMultimedia ppt
Multimedia ppt
Piyush Gupta
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
Chapter 2 Digital Data
Chapter 2 Digital DataChapter 2 Digital Data
Chapter 2 Digital Data
shelly3160
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
9626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 119626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 11
Anthi Aristotelous
 

What's hot (20)

Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
text in multimedia
text in multimediatext in multimedia
text in multimedia
 
Introduction to Animation
Introduction to AnimationIntroduction to Animation
Introduction to Animation
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Implement collaboration platform
Implement collaboration platformImplement collaboration platform
Implement collaboration platform
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Multimedia
MultimediaMultimedia
Multimedia
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software tools
 
Fundamental of graphic
Fundamental of graphicFundamental of graphic
Fundamental of graphic
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Multimedia ppt
Multimedia pptMultimedia ppt
Multimedia ppt
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Chapter 2 Digital Data
Chapter 2 Digital DataChapter 2 Digital Data
Chapter 2 Digital Data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
9626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 119626 GCE A2 Information Technology Chapter 11
9626 GCE A2 Information Technology Chapter 11
 

Similar to 4.content (stenography)

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
finl.docx
finl.docxfinl.docx
finl.docx
Vishesh Aggarwal
 
F1803023843
F1803023843F1803023843
F1803023843
IOSR Journals
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
cscpconf
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
acijjournal
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video Clip
IOSR Journals
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
 
H017255560
H017255560H017255560
H017255560
IOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 

Similar to 4.content (stenography) (20)

Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
finl.docx
finl.docxfinl.docx
finl.docx
 
F1803023843
F1803023843F1803023843
F1803023843
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video Clip
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
H017255560
H017255560H017255560
H017255560
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 

More from JIEMS Akkalkuwa

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
JIEMS Akkalkuwa
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
JIEMS Akkalkuwa
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
JIEMS Akkalkuwa
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
JIEMS Akkalkuwa
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
JIEMS Akkalkuwa
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
JIEMS Akkalkuwa
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
JIEMS Akkalkuwa
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
JIEMS Akkalkuwa
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
JIEMS Akkalkuwa
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
JIEMS Akkalkuwa
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
JIEMS Akkalkuwa
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
JIEMS Akkalkuwa
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
JIEMS Akkalkuwa
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
JIEMS Akkalkuwa
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
JIEMS Akkalkuwa
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
JIEMS Akkalkuwa
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 

Recently uploaded

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

4.content (stenography)

  • 1. Stenography J J I E M S A K K A L K U W A Page 1 CHAPTER 1 INTRODUCTION Internet users frequently need to store, send, or receive private information. The most common way to do this is to transform the data into a different form. The resulting data can be understood only by those who know how to return it to its original form. This method of protecting information is known as encryption. A major drawback to encryption is that the existence of data is not hidden. Data that has been encrypted, although unreadable, still exists as data. If given enough time, someone could eventually unencrypted the data. A solution to this problem is steganography. The ancient art of hiding messages so that they are not detectable. No substitution or permutation was used. The hidden message is plain, but unsuspecting to the reader. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. Before the invention of digital means, traditional methods were being used for sending or receiving messages. Before phones, before mail messages were sent on foot. For the messages where privacy was of prime concern, the ways of implementing security were following: 1. Choosing the messenger capable of delivering the message securely. 2. Write the message using such notations that actual meaning of the message was concealed.
  • 2. Stenography J J I E M S A K K A L K U W A Page 2 CHAPTER 2 LITERATURE SURVEY 2.1 INFORMATION SECURITY: In general, security denotes “the quality or state of being secure to be free from danger” (Whitman,2007,pp. 09 ) . Security is classified into different layers depending on the type of content intended to be secured: Physical security: Defines the required issues that are needed to protect the physical data or objects from unauthorized intrusion. Personal security: It is defined as the security of the individuals who are officially authorized to access information about the company and its operations Operational security: It mainly relies on the protection of the information of a particular operation of the chain of activities . Communication’s security: The communication’s security encompasses the security issues regarding the organization’s communication media, technology and content .Network security: The network security is responsible for safeguarding the information regarding the„ networking components‟, „connections‟ and contents. Information security: Information security is the protection of information and the systems and hardware that use, store, and transmit that information. Information security can be defined as measures adopted to prevent the unauthorized use or modification of use of data or capabilities. The main objective of the project is to propose the method and critically discuss the properties which help to transmit the data or information over a network without any modifications. The critical characteristics of information are. 1. Availability 2. Accuracy 3. Authenticity
  • 3. Stenography J J I E M S A K K A L K U W A Page 3 Fig 2.1 Digital Medium to Achieve Steganography 2.2 Image Steganography Terminologies: Image steganography terminologies are as follows:- • Cover-Image: Original image which is used as a carrier for hidden information. • Message: Actual information which is used to hide into images. Message could be a plain text or some other image. • Stego-Image: After embedding message into cover image is known as stego-image. • Stego-Key: A key is used for embedding or extracting the messages from cover-images and stego-images.
  • 4. Stenography J J I E M S A K K A L K U W A Page 4 CHAPTER 3 EXISTING SYSTEM 3.1 Least Significant Bit Manipulation: The idea behind this scheme is to replace the LSB of the image pixels with the message bits. Most steganographic programs available today use some variation of LSB manipulation in order to hide messages in an image. The major advantage of the method is its quickness and easiness. Typically, it achieves high payload and low perceptibility. However, a too naive implementation may be susceptible to various visual and statistical attacks. The scheme also has a very low resistance to removal. For more details, please refer to the LSB examples subsection. 3.2 Statistical approach: An algorithm by Bender et al. called patchwork, works by altering the statistics of the image. It pseudo randomly chooses pairs of patches (groups of pixels), then it brightens one patch and darkens the other one. This way a specific statistics, one that has a Gaussian distribution, is embedded into the image. This scheme falls into the category of watermarking techniques. 3.3 Spread Spectrum: Widely used in RF (Radio Frequency) communication, the technique actually spreads the bandwidth of a narrowband signal across wide band of frequencies. After spreading, the energy of the narrowband signal at any given frequency is low, and therefore difficult to detect (and jam). Several methods that utilize the principles of spread spectrum have been described in. We will present and describe in detail an algorithm suggested by Marvel et al. in which uses techniques of error-correcting coding, image restoration and spread spectrum communication in order to construct a blind steganographic system.
  • 5. Stenography J J I E M S A K K A L K U W A Page 5 Fig 3.1 stegno system
  • 6. Stenography J J I E M S A K K A L K U W A Page 6 CHAPTER 4 PROPOSED SYSTEM We expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. 4.1 FEASIBILITY STUDY: The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are  ECONOMICAL FEASIBILITY  TECHNICAL FEASIBILITY  SOCIAL FEASIBILITY
  • 7. Stenography J J I E M S A K K A L K U W A Page 7 4.1.1 Economical Feasibility: This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. 4.1.2 Technical Feasibility: This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. 4.1.3 Social Feasibility: The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.
  • 8. Stenography J J I E M S A K K A L K U W A Page 8 CHAPTER 5 ADVANTAGES & DISADVANTAGES 5.1 ADVANTAGES: The advantage of steganography over cryptography alone is that messages do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words stegno meaning "covered or protected", and graph in meaning "to write". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.
  • 9. Stenography J J I E M S A K K A L K U W A Page 9 5.2 DISADVANTAGES:  Anti-computer forensics (section Steganography) functions has put the field of digital forensics at a great disadvantage .Steganography is a technique where information or files are hidden within another  Cardan grille (section Disadvantages) at all. Such a disguised message is considered to be an example of steganography, which is a sub-branch of general cryptography. But the name Cardan  Watermark (data file) Useful for tamper detection, though each has its own advantages and disadvantages. A typical data hash will process an input file to produce an alphanumeric 3  Cipher Classification Encryption software Famous cipher texts Pretty Good Privacy Steganography Telegraph code Ibrahim A. Al-Kadi, "Cryptography and Data Security:
  • 10. Stenography J J I E M S A K K A L K U W A Page 10 CHAPTER 6 APPLICATION 6.1 Digital Watermarking: Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The signal may be audio, pictures or video, for example. If the signal is copied, then the information is also carried in the copy. A signal may carry several different watermarks at the same time. 6.2 Visible Watermarking: In this, the information is visible in the picture or video. Typically, the information is text or a logo which identifies the owner of the media. When a television broadcaster adds its logo to the corner of transmitted video, this is also a visible watermark. 6.3 Invisible Watermarking: In this, information is added as digital data to audio, picture or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden). The watermark may be intended for widespread use and is thus made easy to retrieve or it may be a form of Steganography, where a party communicates a secret message embedded in the digital signal. In either case, as invisible watermarking, the objective is to attach ownership or other descriptive information to the signal in a way that is difficult to remove. It is also possible to use hidden embedded information as a means of covert communication between individuals. Digital Watermarking can be used for a wide range of applications such as: Copyright protection Source Tracking (Different recipients get differently watermarked content). The numbers of possible applications for digital watermarking technologies are increasing rapidly. For example, in the field of data security, watermarks may be used for certification, authentication, and conditional access. Certification is an important issue for official documents, such as identity cards or passports.
  • 11. Stenography J J I E M S A K K A L K U W A Page 11 CONCLUSION AND FUTURE SCOPE CONCLUSION: Steganography transmits secrets through apparently innocuous covers in an effort to conceal the existence of a secret. Digital image steganography and its derivatives are growing in use and application. In areas where cryptography and strong encryption are being outlawed, citizens are looking at steganography to circumvent such policies and pass messages covertly. As with the other great innovations of the digital age: the battle between cryptographers and cryptanalysis, security experts and hackers, record companies and pirates, steganography and Steganalysis will continually develop new techniques to counter each other. FUTURE SCOPE: In the near future, the most important use of steganographic techniques will probably be lying in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials. Steganography might also become limited under laws, since governments already claimed that criminals use these techniques to communicate. The possible use of steganography technique is as following: Hiding data on the network in case of a breach. Peer-to-peer private communications. Posting secret communications on the Web to avoid transmission. Embedding corrective audio or image data in case corrosion occurs from a poor connection or transmission.
  • 12. Stenography J J I E M S A K K A L K U W A Page 12 REFERENCES  http://www.ece.tamu.edu/~deepa/pdf/txsecwrksh03.pdf.  http://www.nicetext.com/doc/isc01.pdf  www.w3school.com  steganography.pdf  www.wikkipedia.com