SECURE FILE TRANSMISSION SYSTEM USING STEGANOGRAPHIC ALGORITHM: DATA EMBBEDMENT USING JPEG

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0321
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 50 Pages
  • Format: Microsoft Word
  • Views: 1.2K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Images are the most populous cover files for steganography algorithm because of their large amount of redundant bits that are suitable in the transmission of information over the internet. The joint photographic Expert Group (JPEG) is example of images formats that uses the compression techniques. The JPEG is the most populous image file format on the internet and the image sizes are smaller because of the compression thereby making it a least suspicious algorithm in use. 

Chpater one 
1.1 Introduction 
They have being several research contribution to the work of steganography with different approaches of hiding information or messages in carrier file and transmitting the carrier file as stego image to the intended recipient at a destination without human perception. 
Steganography is the art and science of invisible or hidden communication. Steganography is a method of hiding sensitive or confidential information or messages in carrier files in a way that no one apart from the sender and intended receiver no one even realizes that there is a hidden message inside the message cover (Conway M. 2003). 
Steganograpahy techniques are used to address digital right, information security and conceal secrets. Most steganographic systems in recent times use the images as cover media because digital images are mostly transmitted over the Internet communication (N.J Johnson and S. Jojodia 1998). 
Steganography and cryptography are two different techniques for hiding information that provides confidentiality, integrity and availability of data. Steganography as a technique is aimed at transmitting a message on a channel, where some other kind of information is already transmitted (J. Huang etal 2011). The goals being to hide messages inside other innocent or harmless digital media in a way that does not allow any person to even detect the presence of secret message.

SECURE FILE TRANSMISSION SYSTEM USING STEGANOGRAPHIC ALGORITHM: DATA EMBBEDMENT USING JPEG
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0321
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 50 Pages
  • Format: Microsoft Word
  • Views: 1.2K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0321
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 50 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Images are the most populous cover files for steganography algorithm because of their large amount of redundant bits that are suitable in the transmission of information over the internet. The joint photographic Expert Group (JPEG) is example of images formats that uses the compression techniques. The JPEG is the most populous image file... Continue Reading
    ABSTRACT The study was to access the role of electronic media in recording and updating criminals across the nation as a whole. Using Central Police Station as a case study, the objectives of the study were to provide ways how the Police could keep/store records of criminals across the country, to identify media programs that enable a police... Continue Reading
    ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In... Continue Reading
    ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In... Continue Reading
    ABSTRACT Considering the importance of roads to a community, stakeholders (Governments, Motorists etc) need up-to-date information about the state of roads for decision making . This problem inspired Vorgbe’s (2014) work in implementing a machine learning classifier that could accurately classify roads as “good”, “fair” or “bad”.... Continue Reading
    ABSTRACT This project work intends to provide architecture for the technology in building of a standard, sophisticated and user-friendly data warehouse system which is platform independent and secured. The proposed work surely addressed the limitations identified within the scope of this project... Continue Reading
    ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and... Continue Reading
    ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and... Continue Reading
    DESIGN AND IMPLEMENTATION OF COMPUTERIZED INFORMATION MANAGEMENT SYSTEM IN SEISMIC DATA PROCESSING (A CASE STUDY OF INTEGRATED DATA SERVICES LIMITED, IDSL BENIN-CITY) ABSTRACT Oil industry is a prominent aspect of modern economy and as it were exploration activities are very important for continuity of oil production. The exploration activities... Continue Reading
    ABSTRACT Oil industry is a prominent aspect of modern economy and as it were exploration activities are very important for continuity of oil production. The exploration activities involve the acquisition of data and processing.  As exploration activities increases in the modern world, the computer manufacturers are also working hard to produce... Continue Reading
    Call Us
    whatsappWhatsApp Us