Professional Documents
Culture Documents
Steganography :
Technology of Data
Encryption
Guided by,
Mrs. BISMI A S Presented by,
AP, Dept. of CSE BIBIN BABU
Date : 15/07/2014 S7, CSE
Roll no: R11U005
1
CONTENTS
INTRODUCTION
BACKGOUND/ RELATED WORK
SYSTEM OVERVIEW
EXISTING SYSTEM
PROPOSED SYSTEM
ALGORITHMS USED IN STEGANOGRAPHY
TYPES OF STEGANOGRAPHY
ADVANTAGES & LIMITATIONS
APPLICATIONS
CONCLUSION
FUTURE WORK
REFERENCES
2
INTRODUCTION
4
BACKGROUND / RELATED WORK
5
WORKING
Basis of steganography - hiding bits of message among bits of
image
The message is undetectable, but
Recoverable by intended recipients
6
WORKING (Contd..)
7
SYSTEM OVERVIEW
8
SYSTEM OVERVIEW (Contd..)
Administrator :
Create, and monitor accounts of authorities.
Authenticated users
encrypt the important and essential data.
During encryption phase user provide a Carrier image and the data that
is to be encrypted.
11
SYSTEM OVERVIEW (Contd..)
12
EXISTING SYSTEM
Mostly data stored in consequent pixel bits of the cover image.
If at all random pixels used data can be decrypted by any unauthorized
user by the using same application.
High risk of data loss or data sniffing while communication over the
network.
Restriction of file size of the data as compared to the cover image, data
size should be smaller than the cover image.
Cannot manage his files and data that were previously encrypted by the
particular user.
13
PROPOSED SYSTEM
Data stored in random pixel bits of the cover image.
User can very well share his encrypted data without worrying about
the security.
14
ADVANTAGES
Covert communication using images (secret message is hidden
in a carrier image)
15
ADVANTAGES (Contd..)
16
APPLICATIONS
Access control system for digital content distribution.
17
CONCLUSION
Steganography means “ Covered or Hidden writing ”
Different medias have been used as the cover media such as: image,
audio, text, protocol and video.
18
FUTURE WORK
Genetic Algorithms
Ant Colony Optimization
Particle Swarm Optimization
Artificial Immune Systems
19
REFERENCES
A Randomized Secure Data Hiding Algorithm Using
File Hybridization for Information Security.
21