Cryptography & Steganography with Watermarking

Cryptography & Steganography with Watermarking -...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Cryptography & Steganography with Watermarking By Ch.Rajesh kumar , V.Srujan kumar Dept:C.S.E, Dept:C.S.E, Balaji institute of technology & science Balaji institute of technology & Science For TECHNTRENDZ
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
of SR ENGINEERING COLLEGE. Contents: 1Introduction 2Methods in steganography 3Steganography in text 4Secret images 5LSB encoding 6Steganography in audio 2Watermarking 3Visible and invisible watermarking 4Advantages 5Drawbacks 6Enhancements 7Conclusions 7References
Background image of page 2
ABSTRACT Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique called digital watermarking is discussed which provides a means to embed copyright and other information for identification and tracking.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1.Introduction Steganography is the art of passing information in a manner that the very existence of the message is unknown. Steganography’s intent is to hide message, while cryptography scrambles a message so that it cannot be understood. “The goal of Steganography is to hide message inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present”. Steganographic messages are often first encrypted by some traditional means, and then a cover text is modified in some way to contain the encrypted message, resulting in Stegotext. Steganography includes a vast array of techniques for hiding messages in variety of media. Among these methods are invisible inks, microdots, digital signatures, and covert channels and spread spectrum communication. Steganography is being vastly used through the media of text, images, and audio. 2. Methods in Steganography 2.1 Steganography in Text In this the idea is that a codeword is embedded in the document by altering particular textual features .As infringes make identical copies of documents without paying royalties or revenues to the original author this method is used. Printable documents are marked with a unique codeword that is indiscernible to readers, but can be used to identify the intended recipient of a document just by examination of a recovered document. Three features are identified in this method as follows: Line-shift coding
Background image of page 4
Word-shift coding Feature coding 2.2 Secret Images Digital technology offers new ways to apply Steganography techniques, including the ability to hide information inside digital images. A digital image is "
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

Cryptography & Steganography with Watermarking -...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online