Слайд 2

Introduction
Steganography
History
Classification
Working princple
Least Significant Bit (LSB) Substitution
Injection
Flow Chart
Steganography process
Image as a carrier
Pixel

Introduction Steganography History Classification Working princple Least Significant Bit (LSB) Substitution Injection
representation in RGB
Bandwidth reduced file transfer
Usage and Future application
Modern printers
Water marking
Future application
Conclusion

Table of Contents

Слайд 3

Cryptology

Cryptography

Cryptanalysis

Steganography

Cryptology Cryptography Cryptanalysis Steganography

Слайд 12

STEGANOGRAPHY process

Three basic ways to encode data in steganography:

Image as a carrier
Pixel

STEGANOGRAPHY process Three basic ways to encode data in steganography: Image as
representation in RGB
Bandwidth reduced file transfer

Слайд 13

1.IMAGE AS CARRIER:
It is an efficient technique for steganography, An image is

1.IMAGE AS CARRIER: It is an efficient technique for steganography, An image
used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility.
2.PIXEL REPRESETATION IN RGB:
Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha: degree of transparency Red: intensity of red color Green: intensity of green color Blue: intensity of blue color
The alpha bit is used to carry the data, as it has no much importance in image representation.

Слайд 14

3.BANDWIDTH REDUCED TRANSMISSION:
If an image data takes six minutes to transfer between

3.BANDWIDTH REDUCED TRANSMISSION: If an image data takes six minutes to transfer
two systems and a text file takes 3 minutes. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six minutes.
Two basic algorithms used for steganography are
Text on Image algorithm.
Image on Image algorithm.

Слайд 15

 
Two basic algorithms used for steganography
Text on Image algorithm.
Image on Image algorithm.

BASIC

Two basic algorithms used for steganography Text on Image algorithm. Image on Image algorithm. BASIC ALGORITHMS
ALGORITHMS

Слайд 16

Text on Image technique block diagram:

Image on Image technique block diagram:

IMAGE FILE

TEXT

Text on Image technique block diagram: Image on Image technique block diagram:
ON IMAGE ALGORITHM

TEXT EMBEDDED IMAGE FILE

TEXT FILE

IMAGE FILE

TEXT ON IMAGE ALGORITHM

TEXT EMBEDDED IMAGE FILE

IMAGE FILE

BASIC ALGORITHMS

Слайд 17

ILLUSTRATION

ILLUSTRATION

Слайд 19

http://mozaiq.org/encrypt/

http://mozaiq.org/encrypt/

Слайд 20

ADVANTAGES

 
Internet privacy.
Secret communication between the organizations like boarder security force and defense

ADVANTAGES Internet privacy. Secret communication between the organizations like boarder security force
organization.
Effective than that of cryptography.
Additional layer for security than cryptography.

Слайд 21

ADVANTAGES

ADVANTAGES

Слайд 22

CONCLUSION

CONCLUSION
Имя файла: Steganography.pptx
Количество просмотров: 126
Количество скачиваний: 1