Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
9Activity
0 of .
Results for:
No results containing your search query
P. 1
Steganography Synopsis

Steganography Synopsis

Ratings: (0)|Views: 1,937 |Likes:
Published by trisshh
Hi, This is a synopsis only. I will upload the whole project report in a few days time. In the meanwhile go ahead and read it and you are free to modify and submit it to your own project. No need for any credits !!
Hi, This is a synopsis only. I will upload the whole project report in a few days time. In the meanwhile go ahead and read it and you are free to modify and submit it to your own project. No need for any credits !!

More info:

Published by: trisshh on Jul 07, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

04/25/2013

pdf

text

original

 
 
MAJOR PROJECT PROGRESS REPORT
Project Title:
Analysis of various Steganographyalgorithms and their implementation.
Subm
itted By:
Group 5Eighth Semester Department of I.T.
 
Project Title:
 
Analysis of various Steganography algorithms andtheir implementation.
Project G
u
ide:
Mr. A.K. MajiAssistant Professor Department of Information Technology
Tea
m
Me
mb
ers:
Trinayan ChakrabortyHriday DasPranjal BharaliFiroz Ahmed Choudhury
Introd
u
ction and Project Briefing:
 
Steganography: Steganography in Greek means µcovered writing¶.Steganography is the process of hiding the one information into other sources of information like text, image or audio file, so that it is not visible to the naturalview. There are varieties of steganographic techniques available to hide the datadepending upon the carriers we use.Steganography and cryptography both are used for the purpose of sendingthe data securely. The same approach is followed in Steganography as incryptography like encryption, decryption and secret key. In steganography themessage is kept secret without any changes but in cryptography the originalcontent of the message is differed in different stages like encryption anddecryption.Steganography supports different types of digital formats that are used for hiding the data. These files are known as carriers. Depending upon theredundancy of the object the suitable formats are used. µRedundancy¶ is the process of providing better accuracy for the object that is used for display by the bits of object.
 
 Literature Survey:The main objectives of the project are‡
 
Overview of different steganographic algorithms andcomparing them in means of speed and quality of hiding.‡
 
Testing the efficiency and accuracy of hiding the datathrough algorithms using different software.In this project, we use a method of encrypting the text files in an imagefile in order to test the accuracy and efficiency of encryption. This process helpsto send the information to the authorised party without any potential risk. The proposed method will help to secure the content within the image and will helpto make the document much securer because even though if an unauthorised person succeeds in being able to hack the image, the person will not able to readthe message.In this project, we compared three steganographic algorithms in order tocompare the hiding capacity and efficiency of hiding the message with in animage. Whenever the data is encrypted using steganographic algorithms with inimage, neither the data nor the image it is embedded in should lose itsoriginality. Hence, we compare the different algorithms used for Steganographyfor the various hiding techniques and formats and analyse the results obtained.The different types of steganographic techniques available are:1. Pure Steganography2. Public key Steganography3. Secret key Steganography
P
u
re
S
teganography
: Pure Steganography is the process of embedding the datainto the object without using any private keys. This type of Steganographyentirely depends upon the secrecy. This type of Steganography uses a cover image in which data is to be embedded, personal information to be transmitted,and encryption decryption algorithms to embed the message into image. Thesetypes of steganography can¶t provide the better security because it is easy for 

Activity (9)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Sunil Panwar liked this
Arpit Gupta liked this
Abhishek Raj liked this
Vikrant Singh liked this
Hemant Hawale liked this
Sowmya Bhat liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->