Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
200Activity
P. 1
Steganography: Data hiding using LSB algorithm

Steganography: Data hiding using LSB algorithm

Ratings: (0)|Views: 44,005 |Likes:
Published by Nani Koduri
A brief discussion about Data security issues and brief

about Cryptography and Steganography.
A brief discussion about Data security issues and brief

about Cryptography and Steganography.

More info:

Published by: Nani Koduri on Feb 14, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/28/2014

pdf

text

original

 
MSc Information Security and Computer Forensics
0919879Nani Koduri Page 1
INFORMATION SECURITY THROUGH IMAGE STEGANOGRAPHYUSINGLEAST SIGNIFICANT BIT ALGORITHM
 
By
NANI KODURI
Master of ScienceinInformation Security and Computer ForensicsUniversity of East London
 
MSc Information Security and Computer Forensics
0919879Nani Koduri Page 2
ACKNOWLEDGEMENT:
I am extremely satisfied in successfully completing the dissertation for mycourse MSc Information Security and Computer Forensics. I take this opportunity tothank all my faculties and mentors who took a huge part in my progress. I wouldespecially like to thank
Dr. David Preston
who helped in completing the dissertationwith valuable suggestions and feedback ensuring my direction is correct in my firstresearch project. The UEL library and the Journal Access systems were extremelyhelpful in providing me with the necessary knowledge to actively engage in theproject. I would like to thank my friends for helping me with their expertise inMicrosoft .NET technologies for building the steganographic application. Above all, Iam grateful to my parents for helping me to pursue this course.
 
MSc Information Security and Computer Forensics
0919879Nani Koduri Page 3
TABLE OF CONTENTS
 
ABSTRACTCHAPTER 11. INTRODUCTION
……………………………………………………………
....71.1. PROBLEM STATEMENT
…………………………………………
......91.2. OBJECTIVES OF THE STUDY
……………………………………
...91.3. RESEARCH METHOD
……………………………………………
.....91.4. SCOPE AND LIMITATIONS
………………………………………
...101.5. THESIS OF THE PROJECT
………………………………………...
11CHAPTER 22. LITERATURE REVIEW
……………………………………………………
..122.1. INFORMATION SECURITY
………………………………………
...122.1.1. SECURITY
ATTACKS…………………………………………..14
 2.2. CRYPTOGRAPHY
…………………………………………………
..172.2.1. SYMMETRIC ENCRYPTION
…………………………………
..192.2.2. ASYMMETRIC ENCRYPTION
………………………………
...212.3. STEGANOGRAPHY
………………………………………………...
222.3.1. LSB ALGORITHM
………………………………………………
..242.3.2. JSTEG ALGORITHM
……………………………………………
.262.3.3. F5 ALGORITHM
…………………………………………………
.262.4. DIGITAL WATERMARKING
………………………………………
...27CHAPTER 33. DESIGN
………………………………………………………………………
.293.1. ENCRYPTION PHASE
……………………………………………...
303.2. TRANSMISSION PHASE
…………………………………………...
313.3. DECRYPTION PHASE
……………………………………………
...323.4. DATA FLOW DIAGRAMS
…………………………………………
...323.4.1. CONSTRUCTING DATA FLOW DIAGRAM
…………………
..343.4.2. DATA FLOW DIAGRAM LEVEL 0
……………………………
..343.4.3. DATA FLOW DIAGRAM LEVEL 1
……………………………
..35

Activity (200)

You've already reviewed this. Edit your review.
gaurav100in liked this
Beshayeraloliwi liked this
1 thousand reads
1 hundred reads
Jaya Sharma added this note
sir can i get the project u made on img stegno??
Sarkar Hasan liked this
Sarkar Hasan liked this
Sarkar Hasan liked this
Sarkar Hasan liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->