Steganography (Download Full Report And Abstract)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-02-2009, 01:52 AM


INTRODUCTION

Steganography comes from the Greek and literally means, "Covered writing". It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishes steganography from covert channel techniques, which instead of trying to transmit data between two entities that were unconnected before.
The goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present. The only missing information for the enemy is the short easily exchangeable random number sequence, the secret key, without the secret key, the enemy should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place.
Steganography is closely related to the problem of hidden channels n secure operating system design, a term which refers to all communication paths that cannot easily be restricted by access control mechanisms. In an ideal world we would all be able to sent openly encrypted mail or files to each other with no fear of reprisals. However there are often cases when this is possible, either because the working company does not allow encrypted email or the local government does not approve of encrypt communication (a reality in some parts of the world). This is where steganography can come into play.

Data hiding techniques can also be classified with respect to the extraction process:

Cover Escrow methods need both the original piece of information and the encoded one in order to extract the embedded data.
Blind or Oblivious schemes can recover the hidden message by means only of the encoded data.

Steganography has developed a lot in recent years, because digital techniques allow new ways of hiding informations inside other informations, and this can be valuable in a lot of situations. The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible.
Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, after the international Wassenaar agreement, with which around thirty of the major - with respect to technology - countries in the world decided to apply restrictions in cryptography export similar to the USâ„¢s ones.
Another application of steganography is the protection of sensitive data. A file system can be hidden in random looking files in a hard disk, needing a key to extract the original files. This can protect from physical attacks to people in order to get their passwords, because maybe the attacker canâ„¢t even know that some files are in that disk.
The major concern of steganography is stealth, because if an attacker, either passive or active, can detect the presence of the message, from that point he can try to extract it and, if encrypted, to decrypt it. The resistance to attempt at destruction or noise is not required, since we consider the sender and the receiver equally interested in exchanging messages, so that they will try to transmit the stego-medium in the best way they can. If the stego-data can be transmitted over the selected channel, and this is usually the case with all the media that are used, like images or sounds, then the embedded data will be preserved along with them. Thus, data hiding techniques for steganography must focus on the maximum strength against detection and extraction.
As a second request, we would prefer a high data rate, because we will usually want to be able to exchange any amount of data, from simple messages to top secret images.


(Download Full Report And Abstract)

Download
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#2
19-03-2010, 10:35 AM

please read topicideashow-to-steganography-full-report--8121 for more about Steganography seminar and presentation information
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
workdude
Active In SP
**

Posts: 1
Joined: Jul 2010
#3
30-07-2010, 05:54 PM

haiHeartfdfhddfdfddfhd dfghdfcx dgvxcvdsgsdxvxcvgdc g dgcx efxc xcvdg ddg cvdxvxrohitrohitreddy_sunny90@yahoo.comreddy_sunny90@yahoo.comcrohitreddy_sunny90@yahoo.com
Reply
sp007
Active In SP
**

Posts: 1
Joined: Jul 2010
#4
03-08-2010, 11:21 AM

pl gimme d full report on steganography
Reply
vidhya subramani
Active In SP
**

Posts: 4
Joined: Jul 2010
#5
06-08-2010, 07:05 PM

pls send me a full report about steganography to vinu.vidhya7@gmail.com .............
Reply
akshay2911
Active In SP
**

Posts: 1
Joined: Dec 2010
#6
20-01-2011, 07:54 PM

plsea send me full seminar and presentation report
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#7
22-01-2011, 11:54 AM

hi
i can't send but you can download the full report from the below post.

topicideashow-to-steganography-download-full-report-and-abstract?pid=1639#pid1639
Reply
project_2011
Active In SP
**

Posts: 1
Joined: Jan 2011
#8
29-01-2011, 05:00 PM

I need a full abstract on Steganography
Reply
rajisurendra
Active In SP
**

Posts: 3
Joined: Feb 2011
#9
01-02-2011, 10:19 AM

plz send to me full report to my mail rajisurendra.m@gmail.com
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#10
01-02-2011, 11:02 AM

hi
go through the following thread for more details on this topic.

topicideashow-to-steganography-full-report--8121?pid=11668#pid11668
Reply
sonam singh
Active In SP
**

Posts: 1
Joined: Feb 2011
#11
06-02-2011, 08:52 AM

hey pls send me a complete report of the steganography project and implimentation including aal the necessary headings...
Reply
kamadanihemu
Active In SP
**

Posts: 1
Joined: Feb 2011
#12
09-02-2011, 09:42 AM

I wanna hav the abstract of steganography.
Reply
heartthief420
Active In SP
**

Posts: 1
Joined: Apr 2011
#13
18-04-2011, 06:45 PM

hey please send me if possible
Reply
safiyullah
Active In SP
**

Posts: 1
Joined: Dec 2011
#14
21-12-2011, 05:29 PM

any ideas for cryptographyAngel
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#15
22-12-2011, 09:57 AM

i can't send but you can download the full report from the "Steganography" bellow.

topicideashow-to-steganography-download-full-report-and-abstract?pid=1639#pid1639
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  digital parking system project abstract jaseelati 0 734 15-01-2015, 02:42 PM
Last Post: jaseelati
  nuclear battery abstract jaseelati 0 245 10-01-2015, 01:31 PM
Last Post: jaseelati
  clutch ppt free download jaseelati 0 238 05-01-2015, 04:01 PM
Last Post: jaseelati
  military radars abstract jaseelati 0 216 01-01-2015, 01:42 PM
Last Post: jaseelati
  hydrogen superhighway abstract jaseelati 0 264 30-12-2014, 04:51 PM
Last Post: jaseelati
  transmission lines and waveguides by bakshi free download jaseelati 0 225 27-12-2014, 02:14 PM
Last Post: jaseelati
  large scale power generation using fuel cell ppt download jaseelati 0 224 20-12-2014, 02:01 PM
Last Post: jaseelati
  underwater wireless communication ppt download jaseelati 0 354 11-12-2014, 04:41 PM
Last Post: jaseelati
  transmission lines and waveguides by bakshi pdf free download jaseelati 0 235 11-12-2014, 03:23 PM
Last Post: jaseelati
  witricity full report project report tiger 28 38,165 30-08-2014, 02:26 AM
Last Post: radiopodarok.ru