Presentation 2
Presentation 2
COLLEGE OF
TECHNOLOGY
MEMBERS
RISHAV - 26
Click to add text KISHAN RABI DAS - 03
AMISHA SINHA - 47
ROHAN RAJESH MISHRA - 10
• WHAT IS CRYPTOGRAPHY
• HISTORY OF CRYTOGRAPHY
• MODERN CRYPTOGRAPHY
• APPLICATION OF CRYPTOGRAPHY
CONTENT • WHAT IS STEGANOGRAPHY
S • EVOLUTION OF STEGANOGRAPHY
• TYPES OF STEGANOGRAPHY
• ADVANTAGES AND DISADVANTAGE
• CONCLUSION
What is Cryptography?
• ATM
• EMAIL
• QR CODE
• SECURE REMOTE ACCESS
• SMART CARD AND MANY MORE
WHAT IS STEGANOGRAPHY
• Steganography is the practice of hiding a secret message inside of (or
even on top of) something that is not secret. That something can be
just about anything you want. These days, many examples of
steganography involve embedding a secret piece of text inside of a
picture. Or hiding a secret message or script inside of a Word or Excel
document
Evolution of Steganography
• Codebreakers: The code breakers explain about the battle of codes
and ciphers.
• Invisible ink: A general letter may have a different message written in
between the lines with the invisible ink and the invisible ink may be
milk, vinegar, and fruit juice or urine.
• Microdots: The technology of microdots was developed by the
Germans and this applied science also works in the hiding of the
messages.
Types of Steganography
• Messages in the text: The messages in text program are also called as SPAM
MIMIC and the messages can be hidden in a form of text reframing the text
of the carrier file.
• Messages in still images: The messages in the still images are a very popular
tool in outguess.
• Messages in audio: The messages in the audio information in the layer III of
the encoding process of MP3 file and the messages in the audio are sent
along the noise.
• Messages in a video: The messages in the video integrating data into the
multimedia have got the attention very slowly. The video files are the best
carrier files as they have more irrelevant bits.
Application of Steganography
• Having confidential communication and storage of secret data.
• Giving protection to the data alteration
• Providing a control system for better distribution of digital content.
• It is hugely used in the media database systems