Beruflich Dokumente
Kultur Dokumente
• My name
• My Background
• My major
Steganography
By
Name: zaid alfawzan
AND Course: Lewis University
University: Capstone
Stegnalysis
Encryption and Decryption
• What is Encryption
• What is Decryption
Encryption
• What is Encryption ?
Decryption
• What is Decryption
• Steganography and Steganalysis
Introduction
Proposed research topic Steganography Data Protection & Encryption
through Information Security.
• A) Statistical Approach
• B) Structural Approach
• C) Visual Approach
Steganalysis Approaches
Statistical Approach
• Steganography
• Cryptography
Cryptography
• Cryptography
Research is divided into two parts; we can say start and end in starting
portion object or file is going to hide and ending portion the hidden file is
going to reshape into its original form and define as:
First Part:
What is Steganography?
How Steganography work?
What is the methodology of Steganography?
How algorithms use to perform Steganography?
During Steganography process which elements are
involve?
Second Part:
What is Steganalysis?
How Steganalysis work?
What is the methodology of Steganalysis?
How algorithms use to perform Steganalysis?
During Steganalysis process which elements are
involve?
Images Steganography
Communication Algorithms
• It a signal process
• Used to analysis part of spectrum
Discrete cosine transformation technique (DCT)
• It is devolved algorithm
Experiment & observations
Most significant bit of image is used for hidden the image in least
significant bit method and steganography.
Experiment & observations
Example-2
Two images are stored in memory locations one image worked as object
and other is host image.
Host image bits are selected for hide the object image as shown below.