STEGANOGRAPHY Sonya Febiatiningsih (11103849) for further detail, please visit

Slides:



Advertisements
Similar presentations
for further detail, please visit
Advertisements

Information and Communication Technology (ICT). Curriculum Structure ICT includes three parts: 1. Compulsory Part (55%) 2. Elective Part (25%) 3. School-based.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information Hiding: Watermarking and Steganography
1 Undergraduate Curriculum Revision Department of Computer Science February 10, 2010.
for further detail, please visit
Overview of Digital Stenography
Introduction to Computers. Michael R. Izzo
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Web Fundamentals Training Series All About the Web.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
FACULTY OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY, UNIVERSITY OF MALAYA.
ICT TEACHERS` COMPETENCIES FOR THE KNOWLEDGE SOCIETY
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
ICT Cambridge National. Content Assessment = 75% coursework ◦Includes 2 teacher assessed assignments. ◦1 Controlled Conditions assessment. ◦1 Examination.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
AS GCE Applied ICT ICT Unit 1 – The Information Age.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Web Service Development Within Different Study Years Maja Pušnik, Boštjan Šumak Institute of Informatics, FERI Maribor.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
FACULTY OF ORGANIZATIONAL SCIENCES UNIVERSITY OF BELGRADE FACULTY OF ORGANIZATIONAL SCIENCES Studies in INTERNET TECHNOLOGIES & ELECTRONIC BUSINESS Božidar.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
Science Teaching & Instructional Technology By: Asma, Melissa & Susan.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Digital Watermarking
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
An Implementation of the Median Filter and Its Effectiveness on Different Kinds of Images Kevin Liu Thomas Jefferson High School for Science.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Introduction to IT Lecture – 01.
4. How did you use media technologies in the construction, research, planning and evaluation stages?
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
The way we communicate has changed over time. The Internet has changed many aspects of our lives, including the way we communicate with each other, how.
introductionwhyexamples What is a Web site? A web site is: a presentation tool; a way to communicate; a learning tool; a teaching tool; a marketing important.
Audio steganography is the embedding of data into an audio file. Current research in audio steganography has only shown that audio and image files can.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Network Security & Cryptography
Data & Network Security
STEGANOGRAPHY.
Steganography & Digital Watermarfking
Understanding How to Write about Literature
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
I UNDERSTAND CONCEPTS OF MULTIMEDIA
Formatting.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Cryptography and Network Security
STEGANOGRAPHY IN IMAGES
Presentation transcript:

STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit

Abstrak ABSTRACT Sonya Febiatiningsih ( ) STEGANOGRAPHY IMPLEMENTATION SOFTWARE TO PROTECT INFORMATION SECRECY USING JAVA PROGRAMMING LANGUAGE. Undergraduate Thesis, Information System Department, Faculty of Computer Science and Information Technology, Gunadarma University, 2007 Keywords: Steganography, Information Hiding, JCreator, Java (xvi Appendices) Broadband communication networks and multimedia data available in digital formats opened many challenges and opportunities. Nonetheless, the advantages of such an open medium can caused many problems in data security aspect. The commonly occur problem is illegal access into certain information by unauthorized parties. One of the ways to overcome that problem is by applying the practice of steganography. Steganography is the art and... for further detail, please visit

Bab 1 CHAPTER I INTRODUCTION 1.1. Background of the problem The rapid development of the Internet and the digital information revolution caused significant changes in the global society, ranging from the influence on the world economy to the way people nowadays communicate. Broadband communication networks and multimedia data available in a digital format (images, audio, video) opened many c... for further detail, please visit

Bab 2 CHAPTER II LITERATURE REVIEW 2.1. General Concepts of Steganography Since the beginnings of human communication, the desire to communicate in secrecy has existed. There have been many solutions to this problem, one of them is, steganography. Many people associated steganography with cryptography, which is not entirely wrong, because both of them share similar purpose to protect certain informat... for further detail, please visit

Bab 3 CHAPTER III DESIGN AND PROGRAMMING 3.1. General idea of the program SteganoSoft functioned to hide data or information beneath digital objects, or we can say here, digital files. Those objects can be picture files, audio files, and even video files. This application can hide information contained in plain message and digital file. SteganoSoft uses the Least Significant Bits modification method,... for further detail, please visit

Bab 4 CHAPTER IV EXPERIMENTS AND RESULT ANALYSIS 4.1. Program Experiments After accomplishing the design stage, the next level to obtain is the implementation stage. In the implementation stage, it is essential to perform several experiments to determine the degree of success of the application. In this chapter, four experiments will be performed, which are embedding secret message, retrieving secret... for further detail, please visit

Bab 5 CHAPTER V CONCLUSION AND SUGGESTION 5.1. Conclusion Nowadays, the practice of steganography has been widely used to secure confidential information from unauthorized use. This study meant to apply the concept of steganography in an application called SteganoSoft. In order to examine the quality and excellence owned by SteganoSoft, several experiments were made; one of them is the experiment of... for further detail, please visit