Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
steganography full report
Post: #26

1.1 What is Steganography?
Steganography comes from the Greek and literally means, "Covered or secret writing".
Although related to cryptography, they are not the same. Steganography’s intent is to hide theexistence of the message, while cryptography scrambles a message so that it cannot be understood.

Steganography is one of various data hiding techniques, which aims at transmitting amessage on a channel where some other kind of information is already being transmitted.This distinguishes Steganography from covert channel techniques, which instead of tryingto transmit data between two entities that were unconnected before.
The goal of Steganography is to hide messages inside other “harmless” messages ina way that does not allow any “enemy” to even detect that there is a second secret messagepresent. The only missing information for the “enemy” is the short easily exchangeablerandom number sequence, the secret key, without the secret key, the “enemy” should nothave the slightest chance of even becoming suspicious that on an observed communicationchannel, hidden communication might take place.

1.2 Introduction to Terms used:
In the field of steganography, some terminology has developed.
The adjectivesCover,Embedded Andstego were defined at the Information Hiding
Workshop held in Cambridge, England. The term ``cover'' is used to describe the origina
innocent message, data, audio, still, video and so on. When referring to audio signal
Steganography, the cover signal is sometimes called the ``host'' signal.

Steganography in Text
The illegal distribution of documents through modern electronic means, such aselectronic mail, means such as this allow infringers to make identical copies of documentswithout paying royalties or revenues to the original author. To counteract this possible wide-scale piracy, a method of marking printable documents with a unique codeword that isIndiscernible to readers, but can be used to identify the intended recipient of a document just byExamination of a recovered document
The techniques they propose are intended to be used in conjunction with standardsecurity measures. For example, documents should still be encrypted prior to transmission acrossa network. Primarily, their techniques are intended for use after a document has been decrypted,once it is readable to all.
An added advantage of their system is that it is not prone to distortion by methods such as
photocopying, and can thus be used to trace paper copies back to their source.
An additional application of text steganography suggested by Bender, et al. is annotationthat is, checking that a document has not been tampered with. Hidden data in text could even byused by mail servers to check whether documents should be posted or not.

2.1 Line-Shift Coding:
In this method, text lines are vertically shifted to encode the document uniquely.Encoding and decoding can generally be applied either to the format file of a document, or thebitmap of a page image.
By moving every second line of document either 1/300 of an inch up or down, it wasfound that line-shift coding worked particularly well, and documents could still be completelydecoded, even after the tenth photocopy.
However, this method is probably the most visible text coding technique to the reader.Also, line-shift encoding can be defeated by manual or automatic measurement of the number ofpixels between text baselines. Random or uniform respacing of the lines can damage anyattempts to decode the codeword.
However, if a document is marked with line-shift coding, it is particularly difficult toremove the encoding if the document is in paper format. Each page will need to be rescanned,altered, and reprinted. This is complicated even further if the printed document is a photocopy, asit will then suffer from effects such as blurring, and salt-and-pepper noise.

2.2 Word-Shift Coding:
In word-shift coding, codewords are coded into a document by shifting the horizontallocations of words within text lines, while maintaining a natural spacing appearance. Thisencoding can also be applied to either the format file or the page image bitmap. The method, ofcourse, is only applicable to documents with variable spacing between adjacent words, such as indocuments that have been text-justified.
Post: #27
to get information about the topic" Stagenography" full report ppt and related topic refer the link bellow
Post: #28


People use cryptography to send secret messages to one another without a third
party overseeing the message. Steganography is a type of cryptography in which
the secret message is hidden in a digital picture. Think of all those pixels in an
image and each pixel has three color numbers — there are zillions of numbers
in an image. If you were to change a few of these color numbers the resulting
picture would probably look a lot like the original image; in fact, most people
probably couldn’t tell that you had changed the image at all. Steganography works
by changing a few pixel color values; we will use selected pixel values to represent
characters instead of a color value.

• Prompt the user if they want to encode or decode a message.
• Use the FileChooser dialog to prompt the user for an input file.
• If encode, prompt the user for an input message. Encode the message into
the picture (details below). Then use the FileChooser dialog to prompt the
user for an output file. Save the new picture/message in this file (using bmp
• If decode, extract the message from the file. Print the message.
Encoding/Decoding Method
• You can extract the pixels of your target picture in one big array using the

textttgetPixels() method.
• Use the first pixel (at spot 0) to hide the length of your message (number of
characters). You will limit yourself to messages that are between 0 and 255
characters long.
• After that use every eleventh pixel to hide characters in your message. Start
at pixel 11, then pixel 22, and so on until you hide all characters in your

Hiding Method
The problem with changing the red values in our encode/decode steps, is that
these often cause quite visible changes in the resulting image. This is especially
true if the pixels that are being changed are part of a large section of uniformly
colored pixels – the ”dots” stand out and are noticeable. As an option, we can
change only the lower order bits of each pixel color (red, blue, and green). This
will make subtle changes to each pixel’s color and will not be as evident.
Post: #29



One of the reasons that intruders can be successful is the most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Stegranography include an array of secret communication methods that hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, streganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images.

What is Steganography?
Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them, although this software is available that can do what is called Steganography. The most common use of steganography is to hide a file inside another file.

History of Steganography:
Through out history Steganography has been used to secretly communicate information between people.
Some examples of use of Steganography is past times are:
1. During World War 2 invisible ink was used to write information on pieces of paper so that the paper appeared to the average person as just being blank pieces of paper. Liquids such as milk, vinegar and fruit juices were used, because when each one of these substances are heated they darken and become visible to the human eye.
2. In Ancient Greece they used to select messengers and shave their head, they would then write a message on their head. Once the message had been written the hair was allowed to grow back. After the hair grew back the messenger was sent to deliver the message, the recipient would shave off the messengers hair to see the secrete message.
3. Another method used in Greece was where someone would peel wax off a tablet that was

Why This Steganography?
This technique is chosen, because this system includes not only imperceptibility but also un-delectability by any steganolysis tool.

Project Scope:
This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.

User needs to run the application. The user has two tab options – encrypt and decrypt. If user select encrypt, application give the screen to select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only image file and ask path where user want to save the secrete file.
Post: #30
can i get the code?????????????????????????????????????????????????????????/
Post: #31
can i get the code??????????????????????????????????????//
Post: #32
To get full information or details of steganography full report please have a look on the pages

if you again feel trouble on steganography full report please reply in that page and ask specific fields in steganography full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hdlc byte stuffing, robustness, bits pilani, retrieve, full seminar report on steganography, seminar report on steganography pdf, steganography full seminar report doc,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 3,646 01-10-2016 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 39,868 03-09-2016 11:20 AM
Last Post: jaseela123
  Steganography implemented in Java science projects buddy 14 9,913 24-05-2016 10:15 AM
Last Post: dhanyavp
  Employee Cubicle Management System full report computer science technology 4 3,740 07-04-2016 11:37 AM
Last Post: dhanyavp
  e-Post Office System full report computer science technology 27 22,246 30-03-2016 02:56 PM
Last Post: dhanyavp
  college website project full report project report tiger 28 62,697 29-11-2015 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 1,357 10-11-2014 09:15 PM
Last Post: Guest
  data mining full report project report tiger 35 164,090 07-10-2014 09:10 PM
Last Post: ToPWA
  Visa Processing System full report and asp source code project topics 2 4,495 19-06-2014 06:54 PM
Last Post: seminar report asees
  ONLINE BLOOD BANK FULL REPORT computer topic 0 1,028 25-03-2014 11:48 PM
Last Post: computer topic