DESIGNING OF ROBUST IMAGE STEGANGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT (LSB)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
29-12-2010, 03:33 PM


1. INTRODUCTION



1.1 INTRODUCTION

Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a technique for encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography.

Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” defining it as “covered writing”. In image steganography the information is hidden exclusively in images.

The idea and practice of hiding information has a long history. In Histories the Greek historian Herodotus writes of a nobleman, Histaeus, who needed to communicate with his son-in-law in Greece. He shaved the head of one of his most trusted slaves and tattooed the message onto the slave’s scalp. When the slave’s hair grew back the slave was dispatched with the hidden message .In the Second World War the Microdot technique was developed by the Germans. Information, especially photographs, was reduced in size until it was the size of a typed period. Extremely difficult to detect, a normal cover message was sent over an insecure channel with one of the periods on the paper containing hidden information .Today steganography is mostly used on computers with digital data being the carriers and networks being the high speed delivery channels.

Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret . Steganography and cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.

Two other technologies that are closely related to steganography are watermarking and fingerprinting. These technologies are mainly concerned with the protection of intellectual property, thus the algorithms have different requirements than steganography. In watermarking all of the instances of an object are “marked” in the same way. The kind of information hidden in objects when using watermarking is usually a signature to signify origin or ownership for the purpose of copyright protection. With fingerprinting on the other hand, different, unique marks are embedded indistinct copies of the carrier object that are supplied to different customers. This enables the intellectual property owner to identify customers who break their licensing agreement by supplying the property to third parties .In watermarking and fingerprinting the fact that information is hidden inside the files may be public knowledge– sometimes it may even be visible – while in steganography the imperceptibility of the information is crucial. A successful attack on a steganographic system consists of an adversary observing that there is information hidden inside a file, while a successful attack on a watermarking or fingerprinting system would not be to detect the mark, but to remove it.




Attached Files
.doc   seminar 4.doc (Size: 948.5 KB / Downloads: 62)
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing pdf jaseelati 0 331 15-01-2015, 03:17 PM
Last Post: jaseelati
  secure atm by image processing jaseelati 0 404 01-01-2015, 04:15 PM
Last Post: jaseelati
  RECONSTRUCTION OF UNDERWATER IMAGE BY BISPECTRUM Guest 0 341 02-04-2014, 09:24 PM
Last Post: Guest
  28/40-pin, 8-bit CMOS FLASH Microcontrollers pdf study tips 0 265 06-09-2013, 04:40 PM
Last Post: study tips
  IMAGE COMPRESSION USING DISCRETE COSINE TRANSFORM seminar class 4 5,648 22-07-2013, 09:25 AM
Last Post: study tips
  Single-chip 16-bit/32-bit microcontrollers; up to 512 kB flash with ISP/IAP, USB 2.0 study tips 0 311 20-07-2013, 03:37 PM
Last Post: study tips
  IMAGE CLASSIFICATION USING SEGMENTATION REPORT study tips 0 481 03-06-2013, 04:24 PM
Last Post: study tips
  Biorthogonal Wavelet Transform Digital Image Watermarking pdf study tips 0 476 29-05-2013, 03:59 PM
Last Post: study tips
  DESIGN OF M-CHANNEL PSEUDO NEAR PERFECT RECONSTRUCTION QMF BANK FOR IMAGE COMPRESSION study tips 0 504 21-05-2013, 12:37 PM
Last Post: study tips
  line-reflect-reflect technique electronics seminars 5 4,271 16-05-2013, 04:19 PM
Last Post: study tips