Anda di halaman 1dari 11

Table of Figures

Fig. 4.1 Flow process of Data Retrieval...................................................................................10

Table of Contents
INTRODUCTION......................................................................................................................4
1.1 STEGANOGRAPHY.......................................................................................................4
1.1.1 DEFINITION............................................................................................................4
1.1.2 HISTORY .................................................................................................................4
1.1.3 CRYPTOGRAPHY...................................................................................................4
1.1.4 STEGANOGRAPHY vs CRYPTOGRAPHY..........................................................4
1.2 PROBLEM DEFINITION...............................................................................................4
1.2.1 OBJECTIVES OF STEGANOGRAPHY.................................................................5
1.2.2 MOTIVATION.........................................................................................................5
1.3 ORGANISATION OF THESIS.......................................................................................5
1.4 STEGANOGRAPHY.......................................................................................................6
1.4.1 STEGANOGRAPHY PROCESS.............................................................................6
1.5 Xyz...................................................................................................................................6
1.5.1 STEGANALYSIS.....................................................................................................6
1.5.2 STEGANALYSIS PROCESS...................................................................................6
1.6 CRYPTPGRAPHY..........................................................................................................7
1.7 ANCIENT STEGANOGRAPHY....................................................................................7
1.8 HIDING DATA IN XYZ ................................................................................................7
1.9 Proposed Technique.........................................................................................................8
1.10 ALGORITHM DESCRPTON........................................................................................8
1.10.1 DATA PREPROCESSING STEP...........................................................................8
1.10.2 DATA ENCRYPTION STEP.................................................................................8
1.10.3 DATA COMPRESSION STEP..............................................................................9
1.10.4 DATA HIDING USING xyz ..................................................................................9
2

1.11 RESULTS.....................................................................................................................11
1.12 CONCLUSION............................................................................................................11
1.13 FUTURE SCOPE.........................................................................................................11
REFERENCES.........................................................................................................................11

INTRODUCTION
1.1 STEGANOGRAPHY
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.1.1 DEFINITION
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.1.2 HISTORY
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.1.3 CRYPTOGRAPHY
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.1.4 STEGANOGRAPHY vs CRYPTOGRAPHY


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.2 PROBLEM DEFINITION


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.2.1 OBJECTIVES OF STEGANOGRAPHY


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.2.2 MOTIVATION
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.3 ORGANISATION OF THESIS


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.
CHAPTER 1 This chapter describes the basic introduction, problem definition and
motivation.
CHAPTER 2 This chapter describes the various details related to Steganography and it
types. In end various Steganography and Steganalysis Tool has been discussed.
CHAPTER 3 This chapter includes the Literature Review of Steganography.
CHAPTER 4 This chapter describes the proposed work and results.
CHAPTER 5 This chapter describes the Conclusion and Future Scope.

STEGANOGRAPHY- A SURVEY
1.4 STEGANOGRAPHY
In the above sections both Steganography and Cryptography has been discussed individually.
Cryptography encrypts the message and converts it into cyphertext while Steganography on
the other hand, hide the message so there is no knowledge of the existence of the message.
With cryptography, comparison is made between portions of the plaintext and portions of the
cipher text. In steganography, comparisons may be made between the cover-media, the stegomedia, and possible portions of the message. The end result in cryptography is the cipher text,
while the end result in steganography is the stego-media. The message in steganography may
or may not be encrypted. If it is encrypted, then a cryptanalysis technique is applied

1.4.1 STEGANOGRAPHY PROCESS


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.5 Xyz
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.5.1 STEGANALYSIS
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.5.2 STEGANALYSIS PROCESS


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.6 CRYPTPGRAPHY
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

LITERATURE REVIEW OF STEGANOGRAPHY


1.7 ANCIENT STEGANOGRAPHY
Algorithm for Embedding process of GLM
This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.
Algorithm for Retrieval of data
1. while even number is mapped to zero
Advantages of xyz
Disadvantage of xyz
1. Vulnerable to Steganalysis.
2. Not immune to noise and compression.
3. This section contains how the work has been organized in this thesis. This thesis has
been divided into five chapters as listed

1.8 HIDING DATA IN XYZ


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

PROPOSED WORK
In this chapter proposed work of this thesis has been discussed. upcoming section
combination of Steganography and cryptography has been discussed.

1.9 Proposed Technique


when applied together give a phenomenal embedding capacity.
Disadvantage of Podar et al

1.10 ALGORITHM DESCRPTON


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.10.1 DATA PREPROCESSING STEP


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.10.2 DATA ENCRYPTION STEP


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.10.3 DATA COMPRESSION STEP


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

1.10.4 DATA HIDING USING xyz


This section contains how the work has been organized in this thesis. This thesis has been
divided into five chapters as listed below.

Flow process of data retrieval is shown in Error: Reference source not found
Stego
fgdfxcvdfv
dfvdfg

cvbgghgfh

gfhgfhghgh

gfhgfhgfhgh
gfhghghghgTechni
que

gfhgfhghghgDecryption
Technique

fhghghg
Compressed form

hghghghing
searching
Algorithm

Fig. 4.1 Flow process of Data Retrieval

10

1.11 RESULTS
Through our above technique the embedding capacity of transmission medium of

CONCLUSION AND FUTURE SCOPE


1.12 CONCLUSION
improved the capacity of transmission medium proposed method may vary with the length
and content of textual data.

1.13 FUTURE SCOPE


Steganography, of years. It appears to have been utilized primarily and most effectively in
time of war or civil strife.

REFERENCES
1. Katzenbeisser, S., Petitcolas, F.A.P., Information hiding techniques
steganography and digital watermarking, Artech House Publishers, 2000.

for

2. Feng, J. B., Wu, H. C, Tsai, C. S. and Chu, Y. P., A new multi-secret images
sharing scheme using largranges interpolation, Journal of Systems and Software,
vol. 76, no. 3, pp. 327339, June 2005.

3. Chang, C.C, Lin, I.C, Remarks on fingerprint- based remote user authentication
scheme using smart cards, ACM Operating Systems Review, vol. 38, no. 3, pp. 91
100, Oct. 2004.

4. Shoemaker, C., Hidden bits: A survey of techniques for digital watermarking,


Independent study, EER 290, spring 2002.

5. Wang, Y., Doherty, J.F., and Van Dyck, R.E., A watermarking algorithm for
fingerprinting Intelligence images, Conference on Information Science and
Systems, The John Hopkins University, March 21-23, 2001.

11

Anda mungkin juga menyukai