Тексты на английском Скачатьпрезентацию <<  Painting Conflict  >>
 Steganography Table of Contents Cryptology Steganography Steganography Steganography Steganography Steganography Steganography Steganography Steganography STEGANOGRAPHY process 1.IMAGE AS CARRIER: It is an efficient technique for steganography, An 3.BANDWIDTH REDUCED TRANSMISSION: If an image data takes six minutes BASIC ALGORITHMS BASIC ALGORITHMS ILLUSTRATION Steganography http://mozaiq ADVANTAGES ADVANTAGES CONCLUSION Thank you
Слайды из презентации «Steganography» к уроку английского языка на тему «Тексты на английском»

Автор: Tukenov. Чтобы увеличить слайд, нажмите на его эскиз. Чтобы использовать презентацию на уроке, скачайте файл «Steganography.pptx» бесплатно в zip-архиве размером 1264 КБ.

Скачать презентацию

## Steganography

содержание презентации «Steganography.pptx»
СлайдТекст
1

### Steganography

By Tukenov Ilyas & Tleuov Adilet

2

Introduction Steganography History Classification Working princple Least Significant Bit (LSB) Substitution Injection Flow Chart Steganography process Image as a carrier Pixel representation in RGB Bandwidth reduced file transfer Usage and Future application Modern printers Water marking Future application Conclusion

3

Cryptography

Cryptanalysis

Steganography

4
5
6
7
8
9
10
11
12

### STEGANOGRAPHY process

Three basic ways to encode data in steganography:

Image as a carrier Pixel representation in RGB Bandwidth reduced file transfer

13

### 1.IMAGE AS CARRIER: It is an efficient technique for steganography, An

image is used as cover for hiding the actual data. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. 2.PIXEL REPRESETATION IN RGB: Basic RGB color model, every pixel is represented by the four bytes namely Alpha, red, green, blue Alpha: degree of transparency Red: intensity of red color Green: intensity of green color Blue: intensity of blue color The alpha bit is used to carry the data, as it has no much importance in image representation.

14

### 3.BANDWIDTH REDUCED TRANSMISSION: If an image data takes six minutes

to transfer between two systems and a text file takes 3 minutes. One can use steganography technique in order to reduce the time taking by embedding the text in the image and the total content will be transferred in six minutes. Two basic algorithms used for steganography are Text on Image algorithm. Image on Image algorithm.

15

### BASIC ALGORITHMS

Two basic algorithms used for steganography Text on Image algorithm. Image on Image algorithm.

16

### BASIC ALGORITHMS

Text on Image technique block diagram:

Image on Image technique block diagram:

TEXT ON IMAGE ALGORITHM

TEXT EMBEDDED IMAGE FILE

IMAGE FILE

TEXT FILE

TEXT ON IMAGE ALGORITHM

TEXT EMBEDDED IMAGE FILE

IMAGE FILE

IMAGE FILE

17

18
19

### http://mozaiq

org/encrypt/.

20

Internet privacy. Secret communication between the organizations like boarder security force and defense organization. Effective than that of cryptography. Additional layer for security than cryptography.

21

22

23

### Thank you

«Steganography»
http://900igr.net/prezentatsii/anglijskij-jazyk/Steganography/Steganography.html
cсылка на страницу
Урок

## Английский язык

28 тем
Слайды
Презентация: Steganography.pptx | Тема: Тексты на английском | Урок: Английский язык | Вид: Слайды