Steganography

Steganography - Скачать Читать Лучшую Школьную Библиотеку Учебников
Смотреть онлайн
Поделиться с друзьями:
Steganography:
Презентация на тему Steganography к уроку по английскому языку

Презентация "Steganography" онлайн бесплатно на сайте электронных школьных учебников edulib.ru

Steganography By Tukenov Ilyas & Tleuov Adilet
1 слайд

Steganography By Tukenov Ilyas & Tleuov Adilet

Introduction Steganography History Classification Working princple Least Significant Bit (LSB) Subst
2 слайд

Introduction Steganography History Classification Working princple Least Significant Bit (LSB) Substitution Injection Flow Chart Steganography process Image as a carrier Pixel representation in RGB Bandwidth reduced file transfer Usage and Future application Modern printers Water marking Future application Conclusion Table of Contents

Cryptology Cryptography Cryptanalysis Steganography
3 слайд

Cryptology Cryptography Cryptanalysis Steganography

4 слайд

5 слайд

6 слайд

7 слайд

8 слайд

9 слайд

10 слайд

11 слайд

STEGANOGRAPHY process Three basic ways to encode data in steganography: Image as a carrier Pixel rep
12 слайд

STEGANOGRAPHY process Three basic ways to encode data in steganography: Image as a carrier Pixel representation in RGB Bandwidth reduced file transfer

1.IMAGE AS CARRIER:   It is an efficient technique for steganography, An image is used as cover for
13 слайд

1.IMAGE AS CARRIER:   It is an efficient technique for steganography, An image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. 2.PIXEL REPRESETATION IN RGB: Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha: degree of transparency Red: intensity of red color Green: intensity of green color Blue: intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.

3.BANDWIDTH REDUCED TRANSMISSION:    If an image data takes six minutes to transfer between two syst
14 слайд

3.BANDWIDTH REDUCED TRANSMISSION:    If an image data takes six minutes to transfer between two systems and a text file takes 3 minutes. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six minutes.   Two basic algorithms used for steganography are Text on Image algorithm. Image on Image algorithm.

  Two basic algorithms used for steganography Text on Image algorithm. Image on Image algorithm. BAS
15 слайд

  Two basic algorithms used for steganography Text on Image algorithm. Image on Image algorithm. BASIC ALGORITHMS

Text on Image technique block diagram: Image on Image technique block diagram: IMAGE FILE TEXT ON IM
16 слайд

Text on Image technique block diagram: Image on Image technique block diagram: IMAGE FILE TEXT ON IMAGE ALGORITHM TEXT EMBEDDED IMAGE FILE TEXT FILE IMAGE FILE TEXT ON IMAGE ALGORITHM TEXT EMBEDDED IMAGE FILE IMAGE FILE BASIC ALGORITHMS

ILLUSTRATION
17 слайд

ILLUSTRATION

18 слайд

http://mozaiq.org/encrypt/
19 слайд

http://mozaiq.org/encrypt/

ADVANTAGES   Internet privacy. Secret communication between the organizations like boarder security
20 слайд

ADVANTAGES   Internet privacy. Secret communication between the organizations like boarder security force and defense organization. Effective than that of cryptography. Additional layer for security than cryptography.

CONCLUSION
21 слайд

CONCLUSION

Thank you!
22 слайд

Thank you!

23 слайд

Отзывы на edulib.ru"Steganography" (0)
Оставить отзыв
Прокомментировать