0% found this document useful (0 votes)
36 views1 page

Steganography

This document discusses image steganography. Steganography hides covert messages within unsuspecting multimedia files like images or audio. It works by replacing unused or insignificant bits of a cover file with secret data. While not as robust as encryption, steganography can provide double security when combined with cryptography. The scope of this project is to develop tools for hiding any type of information file within image files. Potential application areas of steganography include copy protection, secret document annotations, authentication, concealed communication, and data protection. The technologies used are Windows 7, Java, NetBeans IDE, Swings, and JDK 1.4 or higher.

Uploaded by

Sonam Gumber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views1 page

Steganography

This document discusses image steganography. Steganography hides covert messages within unsuspecting multimedia files like images or audio. It works by replacing unused or insignificant bits of a cover file with secret data. While not as robust as encryption, steganography can provide double security when combined with cryptography. The scope of this project is to develop tools for hiding any type of information file within image files. Potential application areas of steganography include copy protection, secret document annotations, authentication, concealed communication, and data protection. The technologies used are Windows 7, Java, NetBeans IDE, Swings, and JDK 1.4 or higher.

Uploaded by

Sonam Gumber
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IMAGE STEGANOGRAPHY

ABSTRACT
Steganography relies on hiding covert message in unsuspected multimedia data and is generally
used in secret communication between acknowledged parties. Steganography is a method of
encryption that hides data among the bits of a cover file, such as a graphic or an audio file. The
technique replaces unused or insignificant bits with the secret data. Steganography is not as
robust to attacks since the embedded data is vulnerable to destruction. This project is developed
for hiding information in any image file. The scope of the project is implementation of
steganography tools for hiding information includes any type of information file and image files
and the path where the user wants to save Image and extruded file.This project is developed for
hiding information in any image file.The scope of the project is to implement steganography
tools for hiding information including any type of information file and image files.
Steganography is a method of encryption that hides data among the bits of a cover file. Digital
images have high degree of redundancy in representation and pervasive applications in daily life,
thus appealing for hiding data. The primary reason for selecting steganography was due to the
unfamiliarity of the word that twigged an interest in the subject. Steganography will work best
with cryptography by providing double security to the data. Steganography can and will be used
for both good and evil purposes. By using a steganographic program, passwords, phone numbers
or other confidential items could be placed inside the image and no one would ever be the wiser.
APPLICATION AREA
1. Copy protection: e-commerce, copy control (DVD).
2. Documents secret annotation: medical images, cartography.
3. Authentication: e-commerce, voice mail, electronical communication paperwork.
4. Concealed communication: military and reconnaissance applications, and in cases when
cryptography cannot be used.
5. Protection of data alteration
6. Access control system for digital content distribution
TECHNOLOGIES USED

Operating System : Windows 7


Programming Language : Java and NetBeans 7.3 IDE
GUI : Swings
System Requirements: JDK 1.4 or Higher.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy