Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1.1 General Introduction
1.2 Scientific Background
1.3 Background of the Problem
1.4 Objective
1.5 Scope
2.1 Introduction
2.2.1 Steganography vs Cryptography
2.2.2 Steganography Applications
2.2.3 Steganography Techniques
2.3 Summary
3.1 Introduction
3.2 Least Significant Bit Insertion
3.3 Secure Information Hiding System (SIHS)
3.4 Advantage of LSB
3.5 Disadvantage of LSB
3.6 Summary
4.1 Introduction
4.2.1 Symmetric Encryption
4.2.2 Asymmetric Encryption
4.3 Asymmetric encryption schemes
4.4.1 History
4.4.2 Operation
4.5 Summary
5.1 Concealing Message
5.2 Extracting Message
5.3 Experimental Results
5.4 Discussion
6.1 Future thoughts
6.2 Conclusion
0 of .
Results for:
No results containing your search query
P. 1
Thesis Report Final v1

Thesis Report Final v1

Ratings: (0)|Views: 5|Likes:
Published by benito agus

More info:

Published by: benito agus on Apr 23, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as RTF, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 41 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->