you're reading...

Electronics seminar topics


Steganography comes from the Greek and literally means, “Covered writing”. It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishes steganography from covert channel techniques, which instead of trying to transmit data between two entities that were unconnected before.

The goal of steganography is to hide messages inside other “harmless” messages in a way that does not allow any “enemy” to even detect that there is a second secret message present. The only missing information for the “enemy” is the short easily exchangeable random number sequence, the secret key, without the secret key, the “enemy” should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place.

Steganography is closely related to the problem of “hidden channels” n secure operating system design, a term which refers to all communication paths that cannot easily be restricted by access control mechanisms. In an ideal world we would all be able to sent openly encrypted mail or files to each other with no fear of reprisals. However there are often cases when this is possible, either because the working company does not allow encrypted email or the local government does not approve of encrypt communication (a reality in some parts of the world). This is where steganography can come into play.

Data hiding techniques can also be classified with respect to the extraction process:
Cover Escrow methods need both the original piece of information and the   encoded one in order to extract the embedded data.Blind or Oblivious schemes can recover the hidden message by means only of the encoded data.

Steganography has developed a lot in recent years, because digital techniques allow new ways of hiding informations inside other informations, and this can be valuable in a lot of situations. The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible.
Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, after the international Wassenaar agreement, with which around thirty of the major – with respect to technology – countries in the world decided to apply restrictions in cryptography export similar to the US’s ones.

Another application of steganography is the protection of sensitive data. A file system can be hidden in random looking files in a hard disk, needing a key to extract the original files. This can protect from physical attacks to people in order to get their passwords, because maybe the attacker can’t even know that some files are in that disk.

The major concern of steganography is stealth, because if an attacker, either passive or active, can detect the presence of the message, from that point he can try to extract it and, if encrypted, to decrypt it. The resistance to attempt at destruction or noise is not required, since we consider the sender and the receiver equally interested in exchanging messages, so that they will try to transmit the stego-medium in the best way they can. If the stego-data can be transmitted over the selected channel, and this is usually the case with all the media that are used, like images or sounds, then the embedded data will be preserved along with them. Thus, data hiding techniques for steganography must focus on the maximum strength against detection and extraction.

As a second request, we would prefer a high data rate, because we will usually want to be able to exchange any amount of data, from simple messages to top secret images.

Click Here To Download Full Seminar

See more seminar topics:


19 Responses to “Steganography”

  1. plz send me seminar report & ppt to my mail id plz……….. sir………..

    Posted by vijay | February 10, 2012, 1:03 pm
  2. sir please forword me this topic in IEEE format.

    Posted by methri sunilkumar | February 14, 2012, 9:33 am
  3. plz send me seminar report and ppt to my mail id plzzzzz

    Posted by jashwanth | February 15, 2012, 9:06 pm
  4. sir plz send me full ppt of steganography plzzzzzzz

    Posted by john deevan | February 16, 2012, 2:43 am
  5. hello,

    pleasesend me the complete seminar report to my mail id please

    Posted by saritha | February 19, 2012, 12:25 am
  6. hello,sir will u plz send me seminor report of steganography to my mail id.

    Posted by swathi | February 27, 2012, 2:56 am
  7. sir plz send me d documntatn n ppt of steganography to my mail

    Posted by swathi | March 1, 2012, 8:46 am
  8. please send me seminar report on steganography with ppt

    Posted by shilpa | March 5, 2012, 10:07 am
  9. please send seminar report on steganography with ppt to my mail id

    Posted by shilpa | March 5, 2012, 10:09 am
  10. sir do you have the topic digital echo cancller

    sir if u have plzzz send me sir im having seminar on 14th march . . .
    so plz send me d complet topic as soon as posible sir

    Posted by skmoin | March 11, 2012, 7:03 am
  11. sir,pls send d full documentation and ppt of steganography…i have technical seminar on 17th march.pls send me sir.. its very urgent.

    Posted by navya | March 15, 2012, 7:45 am
  12. sir. plz send seminar report and abstract on steganography with ppt to my mail id

    Posted by upender | March 25, 2012, 4:18 am
  13. sir, plz send me ppt and documentation for technical seminar for this topic- “steganography”

    Posted by pradeep | March 27, 2012, 4:56 am
  14. vvry urgent….
    sir, plz send me ppt and documentation for technical seminar for this topic- “steganography”

    Posted by pradeep | March 27, 2012, 4:57 am
  15. plzzzzzzzzzz i want the ppt of this topic,i have a seminar on 16 th of this month….

    Posted by AMAIR BAIG | April 5, 2012, 12:57 pm
  16. Pls sir send this seminar topic steganography into my maill thanks.

    Posted by kingsley | April 22, 2012, 8:02 am
  17. sir pls send latest seminar topic to my mail id

    Posted by reeja | June 26, 2012, 4:59 am

    Posted by reeja | June 26, 2012, 5:00 am
  19. sir plz send me any electronics seminar topic in ppt format in my emAIL ID…

    Posted by ravinder rauthan | August 15, 2012, 11:40 am

Post a Comment