Download presentation
Presentation is loading. Please wait.
Published byJustin Norman Modified over 9 years ago
5
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave, concealed by hair growth, and exposed by shaving his head again. 3.A picture messages in microdots or microfilm. 4.In the computer age, steganography can be done by entering confidential documents into other documents. Each document can be used as a medium, for example text files, image files or multimedia files such as mp3 or video files. Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave, concealed by hair growth, and exposed by shaving his head again. 3.A picture messages in microdots or microfilm. 4.In the computer age, steganography can be done by entering confidential documents into other documents. Each document can be used as a medium, for example text files, image files or multimedia files such as mp3 or video files.
9
In Indonesian Messages
13
Concealment of Information in Text Documents Concealment of Information in the Multimedia Files
15
1.Open Space Method Data is hidden using a number of predetermined spacing from the end of each sentence. For example, two spaces will hide a bit, four spaces will hide two bits and eight spaces would generate three bits and so on. 2. Syntactic Methods the use of punctuation and structure of the text to hide the information without significantly changing the meaning of a message carrier. For example, there are two phrases "bread, butter, and milk" and "bread, butter and milk" grammatically correct but differ in the use of commas.
17
1.Low Bit coding This method is commonly used in digital steganography techniques that concealment of the relatively large size of the message, but the impact on audio quality results with a lot less noise. 2. Spread Spectrum With this method the message is encoded and distributed to each frequency spectrum allows. Thus it would be very difficult for those who will try to solve it unless he has access to such data or can reconstruct random signal is used to spread the message on frequency range. 1.Low Bit coding This method is commonly used in digital steganography techniques that concealment of the relatively large size of the message, but the impact on audio quality results with a lot less noise. 2. Spread Spectrum With this method the message is encoded and distributed to each frequency spectrum allows. Thus it would be very difficult for those who will try to solve it unless he has access to such data or can reconstruct random signal is used to spread the message on frequency range.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.