Preview

Steganography

Satisfactory Essays
Open Document
Open Document
527 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
STEGANOGRAPHY IN
VIDEOS

SONAM GUMBER
1156357

OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA
Java is

a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible It is intended to let application developers
"write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another.
Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture.

INTRODUCTION TO
MATLAB
MATLAB (matrix laboratory)

is a multiparadigm numerical computing environment and fourth-generation programming language.
Developed by MathWorks, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C+
+, Java, Fortran and Python.
MATLAB is widely used in academic and research institutions as well as industrial enterprises.

STEGANOGRAPHY
DEFINED
oThe

word steganography is of Greek origin and means
"concealed writing" from the
Greek
words steganos meaning
"covered or protected", and graphein meaning
"writing".

VIDEO STEGANOGRAPHY
Video

Steganography is a technique to hide any kind of files or information into digital video format.
Video (combination of pictures) is used as carrier for hidden information. Video steganography uses such as
H.264, Mp4, MPEG, AVI or

EXAMPLES IN HISTORY oTattoos on shaved heads oWax-covered tablets oInvisible Inks - milk, fruit juice

STEGANOGRAPHY with
CRYPTOGRAPHY
oVery oA very strong when combined.



References: Google- Video Steganography at https://www.google.co.in/# q=video+steganography Wikipedia - The Free Encyclopedia. Steganography at http://en.wikipedia.org/wiki/Steganog raphy THANK YOU

You May Also Find These Documents Helpful

  • Powerful Essays

    Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 An Introduction to Hardware, Software, and the Internet An Introduction to Software Development Objects and Classes Algorithms Java Syntax and Style Data Types, Variables, and Arithmetic Boolean Expressions and if-else Statements Iterative Statements: while, for, do–while Implementing Classes and Using Objects Strings Class Hierarchies and Interfaces Arrays…

    • 3908 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Hidden

    • 697 Words
    • 3 Pages

    The essay “He Would Never Hurt a Fly: War Criminals on Trial in The Hague”…

    • 697 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    On-screen information : Information may be produced on-screen . This can be seen in multimedia TV and CD-ROMs that combine text , graphics , animation , audio and video .…

    • 4057 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2: Data Manipulation Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright © 2012 Pearson Education, Inc. Chapter 2: Data Manipulation • • • • • • 2.1 Computer Architecture 2.2 Machine Language 2.3 Program Execution 2.4 Arithmetic/Logic Instructions 2.5 Communicating with Other Devices 2.6 Other Architectures Copyright © 2012 Pearson Education, Inc. 0-2 1 Computer Architecture • Central Processing Unit (CPU) or processor – Arithmetic/Logic unit versus Control unit – Registers • General purpose • Special purpose • B Bus • Motherboard Copyright © 2012 Pearson Education, Inc. 0-3 Figure 2.1 CPU and main memory connected via a bus…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Disguises

    • 543 Words
    • 3 Pages

    Shakespeare’s Twelfth Night’s subtitle, “What You Will”, entices the thought that you can make the play what you’d like it to be. The audience isn’t the only group that gets to change the shape of the play however. Through disguises and false identities, the characters in the play are able to alter the play in an attempt to fulfill their needs. Viola does this successfully by using her disguise as a servant to get close and personal with Orsino, who she would not have been close to normally. Sir Andrew’s guise on the other hand, doesn’t work as well as he’d hoped. His attempts to cloak his true joking, fun-loving personality with a mask of machismo. His disguise ends up turning Olivia off, instead of on. For both these characters, their attempts to change who they are, and make the play what they will, work to reconstruct the plot of the play.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Forensics

    • 322 Words
    • 2 Pages

    Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Triganometry

    • 2336 Words
    • 10 Pages

    The concept of angle is one of the most important concepts in geometry. The concepts of equality, sums, and differences of angles are important and used throughout geometry, but the subject of trigonometry is based on the measurement of angles.…

    • 2336 Words
    • 10 Pages
    Good Essays
  • Better Essays

    spoofing

    • 2478 Words
    • 10 Pages

    The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.…

    • 2478 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Stealth Technology

    • 1024 Words
    • 3 Pages

    Stealth technology also termed LO technology (low observable technology) is a sub-discipline of military tactics and passive electronic countermeasures, which cover a range of techniques used with personnel, aircraft, ships, submarines, missiles and satellites to make them less visible (ideally invisible) to radar, infrared, sonar and other detection methods. It corresponds to camouflage for these parts of the electromagnetic spectrum.…

    • 1024 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Forensics

    • 857 Words
    • 4 Pages

    * How to build a computer forensics lab with low cost by using open source software…

    • 857 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CRYPTOGRAPHY

    • 10720 Words
    • 43 Pages

    With the increasing popularity of internet, the e-commerce market where goods/products are being paid via an online medium has grown rapidly in recent past years, there is a glaring need for its payment information not to scrambled away or identified by unauthorised persons.…

    • 10720 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Invisible Cloak

    • 670 Words
    • 3 Pages

    Many discoveries in the scientific world cause much controversy due to their positive qualities, yet negative outcomes. Any inventor can sell their product to the public, nevertheless, should some inventions be banned if they can fall into the wrong hands and cause disruption to nature’s carefully balanced environment? In our lives the technological advancement has caused a great amount of ethical issues regarding the natural world. Throughout this essay the public distribution of the invisible cloak will be discussed.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.…

    • 2454 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012 [4] http://csrc.nist.gov/publications/nistpubs/800-12/80012-html/chapter19.html [5] http://searchsecurity.techtarget.com/definition/authent ication [6] http://en.wikipedia.org/wiki/Authentication [7] http://en.wikipedia.org/wiki/Digital_signature#Digital _signatures_vs._ink_on_paper_signatures [8] http://searchsecurity.techtarget.com/definition/digitalsignature [9] https://tspace.library.utoronto.ca/bitstream/1807/1930 7/1/Zhao_Yi_200911_PhD_Thesis.pdf [10] http://www.academypublisher.com/proc/wisa09/paper s/wisa09p363.pdf [11] http://electronicsbus.com/?s=Application+Of+Crypto graphy+Include+Credit+Cards [12] http://en.wikipedia.org/wiki/Encrypting_File_System [13] http://technet.microsoft.com/en/us/library/cc700811.as px…

    • 2044 Words
    • 9 Pages
    Powerful Essays