Preview

Synopsis -Video Steganography

Powerful Essays
Open Document
Open Document
1368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Synopsis -Video Steganography
VEDIO-STEGNOGRAPHY Nidhi Pandey <nidhip56@gmail.com> Nupur Solanki <nupursolanki99@gmail.com> Nidhi Pare <nidhipare@gmail.com> IT2 (3rd year)

Name of the Supervisor : Sonal Dubey

ABSTRACT :

Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information fromun wanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.

INTRODUCTION :

Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography.
Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    This 57-year-old Cuban female was admitted from my office repeat severe stomatis, and mild volume depletion. Secondary to poor fluid and fluid intake. Initially, the possibility of erythema multiformlike picture was raised because she did have some skin lesions, however; dermatology consultation with Dr. Kato suggest this was most likely methotrexate related. She was given intravenous ?. And high- dose prednisone treatment. This along with her intravenous fluids stabilized her condition. At the time of discharge her oral ulcers have markedly decreased. She could swallow without difficulty, and her p.o. intake was adequate. During hospitalization and after consultation with Dr. Kato, treatment options were discussed with the patient, at this point she has elected to return to treatment with methotrexate bit of a lower dose with concurrent use folic acid.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wengie is a beauty blogger and is on one of the most popular YouTube beauty channels. Her beauty and makeup tutorials are visited millions of times a year. Wengie also has more than a million subscribers on her YouTube channel. The Australian based YouTuber shares plenty of sensational tips with her growing league of followers. In this video, Wengie shares her favorite life hacks with watchers. Check out this video here.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    HIM professionals have great responsibility of protecting the PHI of the patients. Following methods can be adapted to have superior privacy and security of the medical records…

    • 1261 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: [1] D. Kundur and D. Hatzinakos, “Digital watermarking for telltaletamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp.1167–1180, Jul. 1999.…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    IEEE—ICET 2006 2nd International Conference on Emerging Technologies Peshawar, Pakistan 13-14 November 2006 1-4244-0502-5/06/$20.00 ©2006 IEEE 689 Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques Jan M. Memon, Shams-ul-Arfeen, Asghar Mughal, Faisal Memon Department of Computer Science Isra University, Hyderabad, Pakistan {janmohd, shams, asghar, faisal}@isra.edu.pk Abstrac: Java programs are compiled into a platform independent byte code format. Much of the information contained in the source code is retained in the byte code.…

    • 3123 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    Therefore, we can define watermarking systems as systems in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand,…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Research Report- Durdans

    • 7797 Words
    • 32 Pages

    The ongoing journey of Durdans hospital began during World War II between the year 1939 and 1945. During this era Durdans hospital had been a haven for the sick and injured British military personnel stationed in Ceylon. By the end of World War II a group of visionary medical professionals incorporated a Company known as “Ceylon Hospitals Limited” to own and operate Durdans hospital.…

    • 7797 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    Lwod Char. Creation

    • 1354 Words
    • 6 Pages

    Background Limit: 5 (Generally 5, for some Background Types the limitation can be lower. For Specific Info, see "Available Background List")…

    • 1354 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lock Tool

    • 564 Words
    • 3 Pages

    It’s important to note that this will not actually conceal your data from somebody that knows what they are doing.…

    • 564 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays