Essays about: "Steganography"

Showing result 6 - 10 of 10 essays containing the word Steganography.

  1. 6. Implementation of Recursive method in Image Steganography

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Pavan Kumar Uppala; Bharath Sangasani; [2015]
    Keywords : Splitting; Encryption; Decryption; Recursive; Steganography; Master of Science Programme in Electrical Engineering with emphasis on Signal Processing Masterprogram i Elektroteknik med inriktning mot signalbehandling;

    Abstract : Nowadays steganographic techniques are with us and in everywhere because we are using information more and more and we need to have or transform the information as secure as possible. In these techniques we need to secure the information by encrypting (coding) and decrypting (decoding). READ MORE

  2. 7. Steganographic embedding and steganalysisevaluation : An evaluation of common methods for steganographic embedding and analysis indigital images.

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : SIMON JOHANSSON; EMIL LENNGREN; [2014]
    Keywords : ;

    Abstract : Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis is the technique that is used to discover the use of steganography. Usuallyit is difficult to extract the exact hidden message because itis usually encrypted. READ MORE

  3. 8. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  4. 9. Secure Text Communication for the Tiger XS

    University essay from Institutionen för systemteknik

    Author : David Hertz; [2006]
    Keywords : source coding; text compression; cryptography; steganography; PPM;

    Abstract : The option of communicating via SMS messages can be considered available in all GSM networks. It therefore constitutes a almost universally available method for mobile communication. The Tiger XS, a device for secure communication manufactured by Sectra, is equipped with an encrypted text message transmission system. READ MORE

  5. 10. Information Hiding : Steganografic Content in Streaming Media

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Peter Bayer; Henrik Widenfors; [2002]
    Keywords : Information hiding; steganography; information security; hidden communication;

    Abstract : For a long time, information hiding has focused on carriers like images and audio files. A problem with these carriers is that they do not support hiding in new types of network-based services. Nowadays, these services often arise as a consequence of the increasingly demand for higher connection speed to the Internet. READ MORE