Что такое findslide.org?

FindSlide.org - это сайт презентаций, докладов, шаблонов в формате PowerPoint.


Для правообладателей

Обратная связь

Email: Нажмите что бы посмотреть 

Яндекс.Метрика

Презентация на тему Steganography

IntroductionSteganographyHistoryClassificationWorking princpleLeast Significant Bit (LSB) Substitution InjectionFlow ChartSteganography processImage as a carrierPixel representation in RGBBandwidth reduced file transferUsage and Future applicationModern printersWater marking Future applicationConclusion Table of Contents
SteganographyBy  Tukenov Ilyas & Tleuov Adilet IntroductionSteganographyHistoryClassificationWorking princpleLeast Significant Bit (LSB) Substitution InjectionFlow ChartSteganography processImage as a carrierPixel CryptologyCryptographyCryptanalysisSteganography STEGANOGRAPHY processThree basic ways to encode data in steganography:Image as a carrierPixel 1.IMAGE AS CARRIER: It is an efficient technique for steganography, An image is 3.BANDWIDTH REDUCED TRANSMISSION:  If an image data takes six minutes to transfer between  Two basic algorithms used for steganographyText on Image algorithm.Image on Image algorithm.BASIC ALGORITHMS Text on Image technique block diagram:Image on Image technique block diagram:IMAGE FILETEXT ILLUSTRATION http://mozaiq.org/encrypt/ ADVANTAGES Internet privacy.Secret communication between the organizations like boarder security force and defense ADVANTAGES CONCLUSION Thank you!
Слайды презентации

Слайд 2 Introduction
Steganography
History
Classification

Working princple
Least Significant Bit (LSB) Substitution
Injection
Flow Chart

Steganography

IntroductionSteganographyHistoryClassificationWorking princpleLeast Significant Bit (LSB) Substitution InjectionFlow ChartSteganography processImage as a

process
Image as a carrier
Pixel representation in RGB
Bandwidth reduced file

transfer

Usage and Future application
Modern printers
Water marking
Future application

Conclusion

Table of Contents


Слайд 3 Cryptology
Cryptography
Cryptanalysis
Steganography

CryptologyCryptographyCryptanalysisSteganography

Слайд 12 STEGANOGRAPHY process
Three basic ways to encode data in

STEGANOGRAPHY processThree basic ways to encode data in steganography:Image as a

steganography:
Image as a carrier
Pixel representation in RGB
Bandwidth reduced file

transfer

Слайд 13 1.IMAGE AS CARRIER:
 
It is an efficient technique for

1.IMAGE AS CARRIER: It is an efficient technique for steganography, An image

steganography, An image is used as cover for hiding

the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility.

2.PIXEL REPRESETATION IN RGB:

Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha: degree of transparency Red: intensity of red color Green: intensity of green color Blue: intensity of blue color
The alpha bit is used to carry the data, as it has no much importance in image representation.


Слайд 14 3.BANDWIDTH REDUCED TRANSMISSION:
  
If an image data takes six

3.BANDWIDTH REDUCED TRANSMISSION:  If an image data takes six minutes to transfer

minutes to transfer between two systems and a text

file takes 3 minutes. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six minutes.
 
Two basic algorithms used for steganography are

Text on Image algorithm.
Image on Image algorithm.


Слайд 15  
Two basic algorithms used for steganography


Text on Image

 Two basic algorithms used for steganographyText on Image algorithm.Image on Image algorithm.BASIC ALGORITHMS

algorithm.
Image on Image algorithm.

BASIC ALGORITHMS


Слайд 16 Text on Image technique block diagram:
Image on Image

Text on Image technique block diagram:Image on Image technique block diagram:IMAGE

technique block diagram:
IMAGE FILE
TEXT ON IMAGE ALGORITHM
TEXT EMBEDDED

IMAGE FILE

TEXT FILE

IMAGE FILE

TEXT ON IMAGE ALGORITHM

TEXT EMBEDDED IMAGE FILE

IMAGE FILE

BASIC ALGORITHMS


Слайд 17 ILLUSTRATION

ILLUSTRATION

Слайд 19 http://mozaiq.org/encrypt/

http://mozaiq.org/encrypt/

Слайд 20 ADVANTAGES
 
Internet privacy.

Secret communication between the organizations like boarder

ADVANTAGES Internet privacy.Secret communication between the organizations like boarder security force and

security force and defense organization.

Effective than that of cryptography.

Additional

layer for security than cryptography.


Слайд 21 ADVANTAGES

ADVANTAGES

Слайд 22 CONCLUSION

CONCLUSION

  • Имя файла: steganography.pptx
  • Количество просмотров: 152
  • Количество скачиваний: 0