1. KALYANI GOVERNMENT ENGINEERING COLLEGE
Steganography & Cryptography
Presented by
NILANJANA SAHA
INFORMATION TECHNOLOGY DEPARTMENT
1th year
SESSION: ODD SEMESTER ,2020
12. Objectives
• The objective is to provide a secret and secured
communication between people. So that only
the sender and the receiver know that the
message even exists.
• This is implemented to hide a text message
inside a cover file like audio , image and text.
13. Conclusion
• It is very simple to implement, and generally quite
difficult to detect.
• However, none of steganography methods we examined
could resist a concerted attack
• If someone knew that there was a message in a given
document. For the greatest level of secrecy, a
combination of both steganography and cryptography is
necessary.
• We have selected some random positions in the samples
for embedding the message bits, so that the data
remains more secure.
14. Future Scope
• Cryptography and steganography can be merged together
to make the system more secure.
• The embedding can be started from any random position
within the audio or image or text sample
• The video files can be selected as carrier medium.
15. References
• Jassim Mohmmed Ahmed and Zulkarnain Md Ali, “Information
Hiding using LSB technique” , IJCSN International 18 Journal of
Computer Science and Network Security, VOL.11 No.4, April
2011.
• Shawn D. Dickman,” An Overview of Steganography”, Computer
Forensics Term Paper, James Madison University.
• M. M. Amin, et al., "Information hiding using steganography,“ in
Telecommunication Technology, 2003. NCTT 2003 Proceedings.
4th National Conference on, 2003, pp. 21-25.
• Richard Popa ,” An Analysis of Steganographic Techniques”.