Synopsis -Video Steganography

Powerful Essays
VEDIO-STEGNOGRAPHY Nidhi Pandey <nidhip56@gmail.com> Nupur Solanki <nupursolanki99@gmail.com> Nidhi Pare <nidhipare@gmail.com> IT2 (3rd year)

Name of the Supervisor : Sonal Dubey

ABSTRACT :

Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information fromun wanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.

INTRODUCTION :

Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography.
Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, I need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Lock Tool

    • 564 Words
    • 3 Pages

    It’s important to note that this will not actually conceal your data from somebody that knows what they are doing.…

    • 564 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The presentation of an invisible sign such as an idea or a quality into something visible.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IJLTEMAS VOLUME I ISSUE VII 2ICAE-2012 GOA Steganalysis and Image Quality Measures Neha Singh Assoc. Prof., Department of Electronics and Communication Engineering Institute of Engineering and Technology Alwar, India Abstract—Steganography is the art/ science of covert communication and steganalysis is the counter to it. Though the first goal of steganalysis is detection of hidden message, there can be additional goals such as…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Cryptography is the science of hiding information in plain sight, in order to conceal it from unauthorized parties.…

    • 1364 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Uptil now most of the work is done on image, video, audio.but today the Database watermarking becomes the research topic because of the increasing the use of relational database systems. Which deals with the legal issue of copyright protection of database systems. .Watermarking is an information hiding technique which is used to embed a mark within some host content. In this paper,we have focused on the review of four relational database watermarking techniques proposed by researchers [R.Agarwal & Jerry Kiernan, ZHU Qin, Brijesh B. Mehta, A.Odeh and A. Al-Haj].…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Robust Digital Image Watermarking Based on Gradient Vector Quantization and Denoising using Bilateral filter and its method noise ThresholdingI. Kullayamma, P. Sathyanarayana,…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for…

    • 3592 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Transaction are proposed to enhance the security of confidential data. This technique increases the data…

    • 3115 Words
    • 13 Pages
    Powerful Essays