Aj QBB 1 STYUCJWf 9 Z745

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

INTRODUCTION

CHAPTER-1
INTRODUCTION
Steganography is the art of hiding information in ways that prevent the
detection of hidden messages. Steganography derived from Greek, literally means
“covered Writing”. It includes a vast array of secret communication methods,
that conceal the messages very eśistence. The goal of cryptography is to
make data unreadable by a third party, the goal of steganography is to hide
the data from a third party.
Steganography includes the concealment of information within
computer files. In digital steganography, electronic communications may
include steganographic coding inside of a transport layer, such as a document file,
image file, program or protocol. There are many ways to conceal information
using steganography. the most common method is by embedding information
into digital images. we all know digital images say, a JPEG image, contains
several megabytes of data in the form of piśels. this allows some room for
someone to embed steganographic information within the digital file. with the
use of steganographic applications, a hacker alters the least significant bits of
the data file and embeds a malicious code into the image. Media files are ideal
for steganographic transmission because of their large siie. Steganography is
more secure, as the very eśistence of the message embedded in the image is
concealed. In cryptography, the original message is converted into
meaningless teśt, which can draw suspicion.

Steganography is the branch of information hiding technology which


encompasses applications for protection against detection and protection. This
simple fact is that an encrypted message does not resemble anything else but an
encrypted message. once a third party determines that you are communicating in
secret, they may feel compelled to force you or the person you are
communicating with to tell them what you re hiding. The most commonly
discussed steganography is embedded images. This is also the form that has the
most

YSR ENGINEERING COLLEGE OF YPGI VEMANA


UNIVERSITY
INTRODUCTION

research investigating it. while there are many types of algorithms.


The three most common are LSB, DCT, and Append types. LSB
stands for Least Significant Bit. It embeds data in the photo by replacing the least
significant bit in a BMP type picture. DCT stands for Discrete Cosine Transform.
This works on many types of photo types.it works by calculating the “frequencies”
of the image and then replacing some of them. DCT algorithms are more suitable
in the way they manipulate photos and so are harder to detect. just about the
worst of these algorithms is the class of Append algorithms. Rather than hide the
data in the photo by manipulating the picture, It instead appends the data to the
end of the file as padding.

The uses of steganography are as varied as the uses of


communication itself. Obviously, you can use it to send secret messages to a
friend, colleague, or co-conspirator. A variety tools have been created to use
steganography to hide files on computers. generally, steganography tools can be
classified into image, audio, and /or network steganography tools.

Note that cryptography and steganography have complementary


purposes and can be used together. A message can be encrypted to preserve the
secrecy of its contents and then hidden using steganography. If steganography is
successful, the eśistence of the message will be unsuspected and encryption
unnecessary, but breaking the steganography of an unencrypted message means
that the message is completely revealed.

YSR ENGINEERING COLLEGE OF YPGI VEMANA


UNIVERSITY
INTRODUCTION

YSR ENGINEERING COLLEGE OF YPGI VEMANA


UNIVERSITY

You might also like