Cryptography with Steganography

Powerful Essays
Topics:
Contents
CONTENTS PAGE NO.

1. Acknowledgement 3
2. Project Description 4
3. Analysis and Requirement Specification 5
4. Software Design Specification
i. Execution Sequence 19 ii. Data Flow Diagram 22
5. Software and Hardware Required 23
6. Code Snippets 24
7. Screen Shots 28
8. Testing 35
9. Conclusion 38
10. Bibliography 39

2. PROJECT DESCRIPTION

What Is Steganography?

Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.

For many years Information Hiding has captured the imagination of researchers. Digital watermarking and steganography techniques are used to address digital rights management, protect information, and conceal secrets. Information hiding techniques provide an interesting challenge for digital forensic investigations. Information can easily traverse through firewalls undetected. Research into steganalysis techniques aids in the discovery of such hidden information as well as leads research toward improved methods for hiding information.

Related research themes include: anonymous communications, anonymous online transactions, covert channels in computer systems, covert/subliminal communications, detection of hidden information (steganalysis), digital forensics, information hiding aspects of privacy, steganography, subliminal channels in cryptographic protocols, watermarking for protection of intellectual property, and other applications

Steganography is a complex subject, please note that although it involves hiding messages, it is not cryptography. The

You May Also Find These Documents Helpful

  • Powerful Essays

    and steganography, both provide security to messages. But, it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image, Audio or Video. In this Paper, a combination of four techniques is done to analyze the level of security provided be them when they are combined. For cryptography, Diffie-Hellman and One Time Pad cryptography are…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    INTRODUCION Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Steganography

    • 1450 Words
    • 6 Pages

    Jaipur National University Dr. Amit Upadhyaya, Jaipur National University Shalini Agarwal, Pursuing M.Tech, Banasthali University, Banasthali ABSTRACT Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods…

    • 1450 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation…

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography…

    • 928 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 2046 Words
    • 9 Pages

    SteganoGRAPHY documentation 1. Introduction 1.1 Purpose This SDS describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. 1.2 Intended Audience and Reading Suggestions This SDS document is intended for any developers, project manager or documentation…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Assignment Requirements Part 1: Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class: 1. SSL certificates type of certificate is used to provide security on Web sites. 2. PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution. 3. Message authentication code provides authentication or proves integrity of a digital message. 4. SHA-1 encryption…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    International Journal of Science and Technology Volume 1 No. 3, March, 2012 A Survey on the Applications of Cryptography Shivangi Goyal University School Of Information Technology Guru Gobind Singh Indraprastha University 16-C, Dwarka, Delhi ABSTRACT This paper gives a brief summary of cryptography, where it is applied and its usage in various forms. Cryptography is a way of safeguarding the crucial data from unauthorized access. It has emerged as a secure means for transmission of information…

    • 2044 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer…

    • 1774 Words
    • 8 Pages
    Powerful Essays