Introduction Steganography Steganography History History Classification Classification Working princple Least Significant Bit (LSB) Substitution Least.

Презентация:



Advertisements
Похожие презентации
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Module Summary In the OSI model, it is the transport layer that manages the reliability of.
TCP/IP Protocol Suite 1 Chapter 12 Upon completion you will be able to: Transmission Control Protocol Be able to name and understand the services offered.
© 2009 Avaya Inc. All rights reserved. 1 Features of 4 Port Expansion Card (Cont.) Some of the additional features of the 4 Port Expansion Cards are: The.
Lesson 3 - HTML Formatting. Text Formatting Tags TagDescription Defines bold text Defines big text Defines emphasized text Defines italic text Defines.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Connecting to Remote Networks Using Packet Switching in WANs.
7/29/2015Image Processing 1 Image Processing Using Matlab*
SPLAY TREE The basic idea of the splay tree is that every time a node is accessed, it is pushed to the root by a series of tree rotations. This series.
LOCATION INDEPENDENT NAMING. INTRODUCTION Location independent naming as a mechanism to support nomadic computing on the internet.
Copyright 2003 CCNA 3 Chapter 5 Switching Concepts By Your Name.
Convolutional Codes Mohammad Hanaysheh Mahdi Barhoush.
Management Information Systems Systems Development Management Information Systems Systems Development.
The role of information technology in human life.
Using Information Technology Chapter 1 Introduction to Information Technology.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Ensuring the Reliability of Data Delivery Establishing a TCP Connection.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Understanding the OSI Model.
Improving You Memory. Introduction Has anyone ever had trouble remembering someones name or forgot where you put something? I will be sharing with you:
Overview of the Paysonnel CE. Overview Paysonnel CE Go to URL- 1 Click [Login to Paysonnel CE] 2 How to Log-in to Paysonnel CE 1 2.
Транксрипт:

Introduction Steganography Steganography History History Classification Classification Working princple Least Significant Bit (LSB) Substitution Least Significant Bit (LSB) Substitution Injection Injection Flow Chart Flow Chart Steganography process Image as a carrier Image as a carrier Pixel representation in RGB Pixel representation in RGB Bandwidth reduced file transfer Bandwidth reduced file transfer Usage and Future application Modern printers Modern printers Water marking Water marking Future application Future applicationConclusion

STEGANOGRAPHY PROCESS Three basic ways to encode data in steganography : 1.Image as a carrier 2.Pixel representation in RGB 3.Bandwidth reduced file transfer

1.IMAGE AS CARRIER: It is an efficient technique for steganography, An image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. 2.PIXEL REPRESETATION IN RGB: Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha: degree of transparency Red: intensity of red color Green: intensity of green color Blue: intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.

3.BANDWIDTH REDUCED TRANSMISSION: If an image data takes six minutes to transfer between two systems and a text file takes 3 minutes. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six minutes. Two basic algorithms used for steganography are 1.Text on Image algorithm. 2.Image on Image algorithm.

Two basic algorithms used for steganography 1.Text on Image algorithm. 2.Image on Image algorithm. BASIC ALGORITHMS

Text on Image technique block diagram: Image on Image technique block diagram: BASIC ALGORITHMS

ILLUSTRATION

ADVANTAGES 1.Internet privacy. 2.Secret communication between the organizations like boarder security force and defense organization. 3.Effective than that of cryptography. 4.Additional layer for security than cryptography. cryptography

ADVANTAGES

CONCLUSION