Secured Data Transmission Through Network
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP

Posts: 2,492
Joined: Mar 2010
22-04-2010, 12:20 AM

,This project and implimentation "Secured Data Transmission Through Network" handles hiding a secret message with in an image in such a way that others cannot discern the presence or contents of the hidden message. A message might be hidden with in an image by changing Least Significant Bit to be the message bits. Then the image can be transmitted through Network.

LSB based Steganography is perhaps the most simple and straight forward approach. In this project and implimentation we embed the message in to the least significant bit planes of the image. Since this will only affect each pixel by +/- 1, if at all, it is generally assumed with good reason that degradation caused by this embedding process would perceptually transaparent. Hence there are a number of LSB based steganography techniques in the passive warden model as it difficult to differentate cover-images from stegoimages, given the small changes that have been made.

The index terms used in this project and implimentation are

LSB Technique.
Image Viewer.
Here using LSB technique, the information is hidden in the least significant bits of the image data. By means of server sockets, the image containing information transmitted to network. Image viewer used to view the normal and stegoimages. Quality measures gives the variation between original and stegoimage information.

In the receiver side the same software is to be installed. When the image file is opened the software tells the user whether that contains any hiding information or not. If the image contains hidden information then client sockets will receive it.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: May 2010
02-05-2010, 07:41 PM

please send ppt for Secured data transmission through network

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,027 21-10-2015, 01:52 PM
Last Post: Guest
  Data Hiding in Video using Least Bit Technique seminar tips 1 603 18-10-2014, 05:40 AM
Last Post: wayan sukadana
  data mining full report project report tiger 35 199,299 03-10-2014, 04:30 AM
Last Post: kwfEXGu
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 4 1,879 18-09-2014, 03:49 PM
Last Post: Radhika.m
  Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storag seminar flower 3 3,197 23-05-2014, 10:04 AM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,057 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 617 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  The Use of Interval-Related Expert Knowledge in Processing 2-D and 3-D Data seminar projects maker 0 340 26-09-2013, 02:13 PM
Last Post: seminar projects maker
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 474 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  Data Hiding in Motion Vectors of Compressed Video Based on Their Associated pdf seminar projects maker 0 401 19-09-2013, 03:37 PM
Last Post: seminar projects maker