steganography
Transcript: steganography Algorithms and Transformation Some Techniques of Steganography LSB ( Least Significant Bit ) is referred to as the rightmost bit . Writing numbers less significant due more to the right . For example at 00011001 bytes , then it is a bit LSB - byte located on the far right is 1 . steganography method in this way is very useful if used on a computer steganography way because many digital file format that can be used as a medium to hide the message . Commonly used formats include: • Format image: bitmap ( bmp ) , GIF , PCX , JPEG , etc . • Audio formats : wav , voc , mp3 , etc . • Other formats : text files , html , pdf , etc . What is steganography ??? Steganographic techniques include a lot of communication methods to hide secret messages (text or images) in files that contain text, image, audio and even without showing the characteristics of a real or visible change in the quality and structure of the original file. This method includes ink does not appear, microdots, arrangement of words, digital signatures, hidden lines and a wide spectrum of communication. The purpose of steganography is conceal or hide the existence of a hidden message or piece of information . In practice , most of the message is hidden by making subtle changes to other digital data that it would not attract the attention of potential attackers , as an example of an image that looks harmless . These changes depend on the key ( the same in cryptography ) and messages to be hidden . The person who receives the image can then deduce information disguised by replacing the correct key into the algorithm used . Steganography advantages when compared with cryptography is the messages do not attract the attention of others . The messages coded in cryptography that is not hidden , though not resolved , will cause suspicion . Often , steganography and cryptography used simultaneously to ensure the safety of the secret message . by gruph 8 1. Endang Setiowati 2. Fatimah 3. Isvi Sari Lestari 4. Jamilah Compression algorithm is a method of steganography to hide data in a mathematical function. The purpose of steganography The Methode Of Steganography Redundant Pattern Encoding is drawing a small message on most images. Advantages of this method is that it can survive the cropping (failure). Least Significant Bit Insertion (LSB) Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message, a form of security through obscurity. Steganography advantages Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents. Spread Spectrum steganography Spread Spectrum steganography scattered as a message encrypted (encrypted) through image (unlike in LSB). To read a message, the recipient requires that crypto-key algorithm and stego-key. This method is still vulnerable, namely the destruction or the destruction of the compression and the image (picture). The word " steganography " is derived from the Greek Steganos , which means " Hidden OR veiled ", and graphein , " writing " . History Of Steganography There are four types of methods Steganography , namely : Least Significant Bit Insertion (LSB) Redundant Pattern Encoding