{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

lecture26_alomari - CLASS IN INFORMATION SECURITY AND...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU 1 C LASS IN I NFORMATION S ECURITY AND C RYPTOGRAPHY 1902322 L26: S TEGANOGRAPHY T ECHNIQUES : I MAGES ! By Dr. Raja S. Alomari Fall 2010 Dec 5 th , 2010 R ECAP : L ECTURE 25 ring4 Steganography Techniques in Documents: circle5 Hiding in a simple text by defining a key for places, e.g., 2 nd letter of each word. circle5 In binary files, insertion of binaries that do not affect execution. circle5 Spam-like generation from messages. circle5 Defining a codeword for document steganography: ring4 Line shift, word shift, and feature coding. ring4 White space manipulations, sentence grammar, and embedding of cipher text. circle5 XML: ring4 Tag structure, white space, containment of tags, order of elements. 2 Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU I MAGE T ECHNIQUES ring4 Simple Watermarking circle5 A simple way of watermarking images is to embed another image into them. circle5 This embedded image can be a company logo or name etc.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}