Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
information security using steganography

Presented by:

.doc   information-security-using-steganography 12.doc (Size: 78 KB / Downloads: 89)
information security using steganography

We propose a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography. Cryptography provides the security by concealing the contents and steganography provides security by concealing existence of information being communicated. Signal processing adds additional security by compressing and transforming the information. The proposed method, viz. Steganography Based Information Protection Method (SBIPM), consists of scanning, coding, encryption, reshaping, cover processing and embedding steps.
Scanning, coding, encryption steps make the information unintelligible so that one cannot extract plain message. Embedding make the message invisible so that one cannot detect it. Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers. Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding. Simulation and steganlysis results show the method provides high security and the information is safe from various attacks.
Now days, various modes of communication like LAN, WAN and INTERNET are widely used for communicating information from one place to another around the globe. Such communication networks are open which any one can access easily. They are regularly monitored and an intercepted. In steganography, a message is embedded in a cover media in an invisible manner so that one could not suspect about its existence.
In this paper we present a substitution based information protection method where we combine cryptographic, steganographic and signal processing concepts together for achieving security. The method is known as Steganography Based Information Protection method. In this method we substitute the information bit in randomly selected pixels at random places within LSB region.
Steganography is the art and science of communicating in a way which hides the existence of the secret message communication. It aims to hide information /covered writing. Information to be protected is hidden in another data known as cover or carrier. Data containing hidden message are called as Steganos or Stegos. Steganos look like cover data and it is difficult to differentiate between them. Steganography based communication over easily accessible platforms to prevent leakage of information.
According to modification in covers, the methods can be categorized as
• Substitution
• Transform domain
• Spread spectrum
• Statistical
• Distortion
• Cover generation
It is commonly used simple method in which we can put information bits in LSB sequentially at fixed place, randomly at fixed place or randomly at random places in cover pixels. The message to be protected passes through scanning, coding, encryption process to form an embedded message. In this method, there is a provision of increasing the robustness by spreading message bits randomly. This is done to detect the embedded message from distorted steganos
Many attacks on such steganographic systems are suggested. Some attacks that can be applied are given below:
i. Stego-Only Attack
ii. Message-Stego Attack
iii. Cover-Stego Attack
iv. Message-Cover-Stego Attack

to get information about the topic INFORMATION SECURITY full report ,ppt and related topic refer the link bellow

Marked Categories : information security using steganography pdf, network security through steganography, information security in steganography, information security for steganography ppt, ppt on information using stenography, security methods, ppt on information security using steganography, information security using steganography, free download we propose a new method for strengthening the security of information through a combination of signal processin, cryptography and stenogrpahy and singal procssing to improve the security of information, information security, information security using steganography ppt, ppt for information security using image steganography,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF GAS LEAKAGE USING GSM seminar class 18 18,223,969 14-10-2017, 11:25 AM
Last Post: jaseela123
  Bluetooth Network Security presentation Abstract 1 250 21-09-2017, 12:06 PM
Last Post: jaseela123
  ATM Security ppt project girl 1 439 20-09-2017, 12:10 PM
Last Post: jaseela123
  Transport Layer Security (TLS) Extensions seminar ideas 1 1,220 14-09-2017, 12:17 PM
Last Post: jaseela123
  OBJECT COMMUNICATION USING STUB SERVER seminar flower 1 1,444 13-09-2017, 03:07 PM
Last Post: jaseela123
  Bluetooth Security Report study tips 1 561 12-09-2017, 12:40 PM
Last Post: jaseela123
  Controlling Household Appliances Using Digital Pen and Paper seminar project explorer 1 514,353 12-09-2017, 12:34 PM
Last Post: jaseela123
  A Comparative Analysis of Image Steganography project uploader 1 1,300 31-08-2017, 01:26 PM
Last Post: jaseela123
  ROF net-Transmission of RF Signals over Optical Fibers Using Radio Over Fiber Technol seminar class 1 3,031,523 29-08-2017, 02:53 PM
Last Post: jaseela123
  Speed Detection of moving vehicle using speed cameras REPORT & PPT study tips 1 217 29-08-2017, 02:34 PM
Last Post: jaseela123
This Page May Contain What is information security using steganography And Latest Information/News About information security using steganography,If Not ...Use Search to get more info about information security using steganography Or Ask Here