Preview

Steganography

Satisfactory Essays
Open Document
Open Document
527 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
STEGANOGRAPHY IN
VIDEOS

SONAM GUMBER
1156357

OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA
Java is

a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible It is intended to let application developers
"write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another.
Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture.

INTRODUCTION TO
MATLAB
MATLAB (matrix laboratory)

is a multiparadigm numerical computing environment and fourth-generation programming language.
Developed by MathWorks, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C+
+, Java, Fortran and Python.
MATLAB is widely used in academic and research institutions as well as industrial enterprises.

STEGANOGRAPHY
DEFINED
oThe

word steganography is of Greek origin and means
"concealed writing" from the
Greek
words steganos meaning
"covered or protected", and graphein meaning
"writing".

VIDEO STEGANOGRAPHY
Video

Steganography is a technique to hide any kind of files or information into digital video format.
Video (combination of pictures) is used as carrier for hidden information. Video steganography uses such as
H.264, Mp4, MPEG, AVI or

EXAMPLES IN HISTORY oTattoos on shaved heads oWax-covered tablets oInvisible Inks - milk, fruit juice

STEGANOGRAPHY with
CRYPTOGRAPHY
oVery oA very strong when combined.



References: Google- Video Steganography at https://www.google.co.in/# q=video+steganography Wikipedia - The Free Encyclopedia. Steganography at http://en.wikipedia.org/wiki/Steganog raphy THANK YOU

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    I listened to Michael Savage’s talk show The Savage Nation. Once I clicked to listen to his show, the first thing I heard were a few advertisements. Afterward, an announcer introduced the show and Michael Savage himself. Some rock music played for about five seconds before Savage began talking. Once he began talking, anyone could notice that Savage is a Republican. The content of the show is that Savage talked for about ten minutes before an advertisement would come up. The only advertisements that I heard were the number to call in to the show, and for people to buy Savage’s book. When Savage is talking, anyone could notice that he is a Republican. He constantly insulted President Barak Obama, Democratic nominee Hillary Clinton, and…

    • 314 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Hidden

    • 697 Words
    • 3 Pages

    The essay “He Would Never Hurt a Fly: War Criminals on Trial in The Hague”…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Many of C.S. Lewis’ poems have spoken to me on a deep level over the last few years, this one in particular holds the most meaning for me and has impacted my life in multiple ways. In this paper, I will first discuss why I believe this piece to be about the regret Lewis felt in regard to the negative effect his selfishness had upon a relationship that he was a part of and how this relationship was with a woman he cared for deeply and romantically. I will then discuss how it has affected me on an emotional level and applies to my life personally as a follower of Christ.…

    • 1199 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Disguises

    • 543 Words
    • 3 Pages

    Shakespeare’s Twelfth Night’s subtitle, “What You Will”, entices the thought that you can make the play what you’d like it to be. The audience isn’t the only group that gets to change the shape of the play however. Through disguises and false identities, the characters in the play are able to alter the play in an attempt to fulfill their needs. Viola does this successfully by using her disguise as a servant to get close and personal with Orsino, who she would not have been close to normally. Sir Andrew’s guise on the other hand, doesn’t work as well as he’d hoped. His attempts to cloak his true joking, fun-loving personality with a mask of machismo. His disguise ends up turning Olivia off, instead of on. For both these characters, their attempts to change who they are, and make the play what they will, work to reconstruct the plot of the play.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Forensics

    • 322 Words
    • 2 Pages

    Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Forensics

    • 857 Words
    • 4 Pages

    * How to build a computer forensics lab with low cost by using open source software…

    • 857 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CRYPTOGRAPHY

    • 10720 Words
    • 43 Pages

    With the increasing popularity of internet, the e-commerce market where goods/products are being paid via an online medium has grown rapidly in recent past years, there is a glaring need for its payment information not to scrambled away or identified by unauthorised persons.…

    • 10720 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Triganometry

    • 2336 Words
    • 10 Pages

    The concept of angle is one of the most important concepts in geometry. The concepts of equality, sums, and differences of angles are important and used throughout geometry, but the subject of trigonometry is based on the measurement of angles.…

    • 2336 Words
    • 10 Pages
    Good Essays
  • Better Essays

    spoofing

    • 2478 Words
    • 10 Pages

    The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.…

    • 2478 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Invisible Cloak

    • 670 Words
    • 3 Pages

    Many discoveries in the scientific world cause much controversy due to their positive qualities, yet negative outcomes. Any inventor can sell their product to the public, nevertheless, should some inventions be banned if they can fall into the wrong hands and cause disruption to nature’s carefully balanced environment? In our lives the technological advancement has caused a great amount of ethical issues regarding the natural world. Throughout this essay the public distribution of the invisible cloak will be discussed.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Stealth Technology

    • 1024 Words
    • 3 Pages

    Stealth technology also termed LO technology (low observable technology) is a sub-discipline of military tactics and passive electronic countermeasures, which cover a range of techniques used with personnel, aircraft, ships, submarines, missiles and satellites to make them less visible (ideally invisible) to radar, infrared, sonar and other detection methods. It corresponds to camouflage for these parts of the electromagnetic spectrum.…

    • 1024 Words
    • 3 Pages
    Good Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.…

    • 2454 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012 [4] http://csrc.nist.gov/publications/nistpubs/800-12/80012-html/chapter19.html [5] http://searchsecurity.techtarget.com/definition/authent ication [6] http://en.wikipedia.org/wiki/Authentication [7] http://en.wikipedia.org/wiki/Digital_signature#Digital _signatures_vs._ink_on_paper_signatures [8] http://searchsecurity.techtarget.com/definition/digitalsignature [9] https://tspace.library.utoronto.ca/bitstream/1807/1930 7/1/Zhao_Yi_200911_PhD_Thesis.pdf [10] http://www.academypublisher.com/proc/wisa09/paper s/wisa09p363.pdf [11] http://electronicsbus.com/?s=Application+Of+Crypto graphy+Include+Credit+Cards [12] http://en.wikipedia.org/wiki/Encrypting_File_System [13] http://technet.microsoft.com/en/us/library/cc700811.as px…

    • 2044 Words
    • 9 Pages
    Powerful Essays