
Distributed Key-Based Steganography Implementation & Analysis
Explore the implementation and analysis of distributed key-based steganography, a technique for hiding secret messages within non-secret data. The project involves conducting a literature review, designing and implementing a distributed approach, performing steganalysis to test robustness, and demonstrating practicality. Progress includes stages like literature review, design, implementation, steganalysis, and reporting. Key resources for the project include academic papers on steganography.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Distributed Key Based Steganography Implementation and Analysis Mayur Mehta 10-23-15
Objective Steganography is the practice of hiding secret messages in nonsecret data (cover file) The goal of this project is to build and analyze a distributed steganography system Approach: Perform a literature review Design and implement a distributed approach to steganography Perform steganalysis to determine robustness Demonstrate practicality of implementation
Design Secret Key Cover1 Cover2 Cover3 CoverN Key Received Secret
Progress Literature Review Design Implementation Steganalysis Report Demo
Resources Dickman, Shawn D. "An Overview of Steganography."Department of Computer Science, James Madison University Infosec Techreport(2007). Fridrich, Jessica, Miroslav Goljan, and David Soukal. "Searching for the stego-key."Electronic Imaging 2004. International Society for Optics and Photonics, 2004. Morkel, Tayana, Jan HP Eloff, Martin S. Olivier. "An overview of image steganography."ISSA. 2005. Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction to steganography."Security & Privacy, IEEE1.3 (2003): 32-44.