SlideShare a Scribd company logo
1 of 23
http://isrc.ulster.ac.uk
9th May 2013
www.hidinimage.co.uk
Pratheepan Yogarajah
The role of Steganography in
Secure Information solutions
http://isrc.ulster.ac.uk
Securing Digital Information
2
http://isrc.ulster.ac.uk
Securing Digital Information
Paper document
Digital document
Server
http://isrc.ulster.ac.uk
4
Securing Digital Information
Closed System Open System
http://isrc.ulster.ac.uk
5
If we don’t secure information…
Scenario 1:
http://isrc.ulster.ac.uk
6
http://isrc.ulster.ac.uk
7
http://isrc.ulster.ac.uk
8
http://isrc.ulster.ac.uk
9
Integrity—How do we
know if the supporting
documents have been
altered?
Client logs into ABC Insurance portal and fills
in a claim application and submits along with
supporting documents.
Approved or rejected
application sent back to Client
Scenario 2:
If we don’t secure information…
http://isrc.ulster.ac.uk
10
Scenario 3:
If we don’t secure information…
http://isrc.ulster.ac.uk
Steganography
11
http://isrc.ulster.ac.uk
12
Steganography
Key
Encoder
Cover
Image
Secret
Data
Stego Object
Decoder
Secret
Data
Communications
Channel
http://isrc.ulster.ac.uk
HidInImage
 HidInImage enables the encryption and hiding
of secret information (text or images) inside
images using Steganography techniques.
 Secret information is hidden imperceptibly in
that it cannot be detected by the human eye.
 Our innovative Steganograpy-based
hiding solution plays a vital role in securing
digital media content.
http://isrc.ulster.ac.uk
Why HidInImage is Unique?
 Revolutionary software algorithm for
encryption
 Novel technique for embedding of data in
images using Steganography technique
Patented Encryption Software
Patented Embedding Software
http://isrc.ulster.ac.uk
15
Cover ImageProtected Image
What does HidInImage do?
+ Key =>
Secret Data
http://isrc.ulster.ac.uk
HidInImage Video
16
http://isrc.ulster.ac.uk 17
Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with her
information details, (b) encrypted secret data (payload) of (a), a clean image showing nature in which
the encrypted data will be embedded to and finally (d) shows the stego-image carrying the encrypted
patient data
Secret Communication
http://isrc.ulster.ac.uk
18
Secret Data Cover Image Stego Object
Document authentication
http://isrc.ulster.ac.uk
19
How to detect alterations
Altered Document Recovered Document
Grayscale image of
Altered Document
Final Result
http://isrc.ulster.ac.uk
Received Document Extracted original content
from received Document
Document authentication
http://isrc.ulster.ac.uk
Anti-Counterfeit & Track and Trace
Solution
http://isrc.ulster.ac.uk
Solutions for Digital Images
images used by creative individuals, enterprises,
governments and law enforcement
• Copyright Communication
– Identifies content owner and rights
• Copy Protection
– Controls copying of content
• Classification
– Classifies content so it is used appropriately;
• Authentication
– Verifies that content is genuine, from an authorized
source and has not been altered
http://isrc.ulster.ac.uk
23
Thank You

More Related Content

Viewers also liked

Sixth sense-final-ppt
Sixth sense-final-pptSixth sense-final-ppt
Sixth sense-final-pptThedarkangel1
 
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!Fathima Mizna Kalathingal
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationLauraConroy
 
Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of projectRuchi Gulati
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationSyed Absar
 

Viewers also liked (6)

Sixth sense-final-ppt
Sixth sense-final-pptSixth sense-final-ppt
Sixth sense-final-ppt
 
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Final ppt of project
Final ppt of projectFinal ppt of project
Final ppt of project
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 

Similar to The role of steganography in secure information solutions (Prathepan yogarajah)

Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...IJCNCJournal
 
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...IJCNCJournal
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 
Computer Security for institution
Computer Security for institutionComputer Security for institution
Computer Security for institutionhershanaarachchige
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling saltingMauryasuraj98
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 

Similar to The role of steganography in secure information solutions (Prathepan yogarajah) (20)

Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...
 
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 
Computer Security for institution
Computer Security for institutionComputer Security for institution
Computer Security for institution
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
M dgx mde0mdi=
M dgx mde0mdi=M dgx mde0mdi=
M dgx mde0mdi=
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
Exploring the Latest Innovations in CCTV Surveillance Solutions.pdf
Exploring the Latest Innovations in CCTV Surveillance Solutions.pdfExploring the Latest Innovations in CCTV Surveillance Solutions.pdf
Exploring the Latest Innovations in CCTV Surveillance Solutions.pdf
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
R04405103106
R04405103106R04405103106
R04405103106
 

More from campone

Intercultural Intelligence
Intercultural IntelligenceIntercultural Intelligence
Intercultural Intelligencecampone
 
Double Your world by Learning Mandarin
Double Your world by Learning Mandarin Double Your world by Learning Mandarin
Double Your world by Learning Mandarin campone
 
Vouching for success
Vouching for successVouching for success
Vouching for successcampone
 
Pavestone presentation
Pavestone presentationPavestone presentation
Pavestone presentationcampone
 
Innovative thermal energy storage technologies (Vincent O'Brien)
Innovative thermal energy storage technologies (Vincent O'Brien)Innovative thermal energy storage technologies (Vincent O'Brien)
Innovative thermal energy storage technologies (Vincent O'Brien)campone
 
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)Eco-Energy Retrofit 80% C02 reduction (Peter Keig)
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)campone
 
A Partnership Approach to Tackling Strategic Construction Initiatives (George...
A Partnership Approach to Tackling Strategic Construction Initiatives (George...A Partnership Approach to Tackling Strategic Construction Initiatives (George...
A Partnership Approach to Tackling Strategic Construction Initiatives (George...campone
 
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)campone
 
Creating a Sustainable Built Environment through Education and Collaboration ...
Creating a Sustainable Built Environment through Education and Collaboration ...Creating a Sustainable Built Environment through Education and Collaboration ...
Creating a Sustainable Built Environment through Education and Collaboration ...campone
 
Social media - Employment Law Pitfalls
Social media - Employment Law PitfallsSocial media - Employment Law Pitfalls
Social media - Employment Law Pitfallscampone
 
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASS
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASSGROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASS
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASScampone
 
Understanding Adwords - An Ecommerce Perspective
Understanding Adwords - An Ecommerce PerspectiveUnderstanding Adwords - An Ecommerce Perspective
Understanding Adwords - An Ecommerce Perspectivecampone
 
Digital Advertising – Maximising YOUR online return!
Digital Advertising – Maximising YOUR online return!Digital Advertising – Maximising YOUR online return!
Digital Advertising – Maximising YOUR online return!campone
 
Future trends digital
Future trends digitalFuture trends digital
Future trends digitalcampone
 
Case Studies in Web Design, Usability and SEO
Case Studies in Web Design, Usability and SEOCase Studies in Web Design, Usability and SEO
Case Studies in Web Design, Usability and SEOcampone
 
The Role of Innovation in Growing NI Connected Health
The Role of Innovation in Growing NI Connected HealthThe Role of Innovation in Growing NI Connected Health
The Role of Innovation in Growing NI Connected Healthcampone
 
Smart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted LivingSmart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted Livingcampone
 
Connected Health & Wellbeing – Collaborating with Healthcare for Innovative ...
Connected Health & Wellbeing –  Collaborating with Healthcare for Innovative ...Connected Health & Wellbeing –  Collaborating with Healthcare for Innovative ...
Connected Health & Wellbeing – Collaborating with Healthcare for Innovative ...campone
 
Sustainable Growth in Connected Health and the Economy
Sustainable Growth in Connected Health and the EconomySustainable Growth in Connected Health and the Economy
Sustainable Growth in Connected Health and the Economycampone
 
The future of healthcare
The future of healthcareThe future of healthcare
The future of healthcarecampone
 

More from campone (20)

Intercultural Intelligence
Intercultural IntelligenceIntercultural Intelligence
Intercultural Intelligence
 
Double Your world by Learning Mandarin
Double Your world by Learning Mandarin Double Your world by Learning Mandarin
Double Your world by Learning Mandarin
 
Vouching for success
Vouching for successVouching for success
Vouching for success
 
Pavestone presentation
Pavestone presentationPavestone presentation
Pavestone presentation
 
Innovative thermal energy storage technologies (Vincent O'Brien)
Innovative thermal energy storage technologies (Vincent O'Brien)Innovative thermal energy storage technologies (Vincent O'Brien)
Innovative thermal energy storage technologies (Vincent O'Brien)
 
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)Eco-Energy Retrofit 80% C02 reduction (Peter Keig)
Eco-Energy Retrofit 80% C02 reduction (Peter Keig)
 
A Partnership Approach to Tackling Strategic Construction Initiatives (George...
A Partnership Approach to Tackling Strategic Construction Initiatives (George...A Partnership Approach to Tackling Strategic Construction Initiatives (George...
A Partnership Approach to Tackling Strategic Construction Initiatives (George...
 
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)
Building Sustainable Stations: Technology and Collaboration (Clive Bradberry)
 
Creating a Sustainable Built Environment through Education and Collaboration ...
Creating a Sustainable Built Environment through Education and Collaboration ...Creating a Sustainable Built Environment through Education and Collaboration ...
Creating a Sustainable Built Environment through Education and Collaboration ...
 
Social media - Employment Law Pitfalls
Social media - Employment Law PitfallsSocial media - Employment Law Pitfalls
Social media - Employment Law Pitfalls
 
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASS
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASSGROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASS
GROWING YOUR BUSINESS IN THE DIGITAL ECONOMY - MASTERCLASS
 
Understanding Adwords - An Ecommerce Perspective
Understanding Adwords - An Ecommerce PerspectiveUnderstanding Adwords - An Ecommerce Perspective
Understanding Adwords - An Ecommerce Perspective
 
Digital Advertising – Maximising YOUR online return!
Digital Advertising – Maximising YOUR online return!Digital Advertising – Maximising YOUR online return!
Digital Advertising – Maximising YOUR online return!
 
Future trends digital
Future trends digitalFuture trends digital
Future trends digital
 
Case Studies in Web Design, Usability and SEO
Case Studies in Web Design, Usability and SEOCase Studies in Web Design, Usability and SEO
Case Studies in Web Design, Usability and SEO
 
The Role of Innovation in Growing NI Connected Health
The Role of Innovation in Growing NI Connected HealthThe Role of Innovation in Growing NI Connected Health
The Role of Innovation in Growing NI Connected Health
 
Smart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted LivingSmart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted Living
 
Connected Health & Wellbeing – Collaborating with Healthcare for Innovative ...
Connected Health & Wellbeing –  Collaborating with Healthcare for Innovative ...Connected Health & Wellbeing –  Collaborating with Healthcare for Innovative ...
Connected Health & Wellbeing – Collaborating with Healthcare for Innovative ...
 
Sustainable Growth in Connected Health and the Economy
Sustainable Growth in Connected Health and the EconomySustainable Growth in Connected Health and the Economy
Sustainable Growth in Connected Health and the Economy
 
The future of healthcare
The future of healthcareThe future of healthcare
The future of healthcare
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

The role of steganography in secure information solutions (Prathepan yogarajah)

Editor's Notes

  1. Secret Data can be image or text