0704-883-0675     |      dataprojectng@gmail.com

INFORMATION HIDING USING DIGITAL STEGANOGRAPHY

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for : Student Researchers
  • NGN 5000

ABSTRACT

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly recommended on which stenographic technique are more suitable for which applications.




FIND OTHER RELATED TOPICS


Related Project Materials

An assessment of the availability of specialized instructional materials for students with disabilities in Offa LGA, Kwara State

Background of the Study 
Specialized instructional materials are critical for creating an inclusive educational environment that caters...

Read more
An assessment of asset management efficiency on portfolio performance in banking: a case study of Keystone Bank

Background of the Study

Asset management efficiency is critical for optimizing portfolio performance and maximizing investment returns in...

Read more
The influence of cultural perceptions on students’ choice of STEM careers in Vandeikya LGA, Benue State

Background of the Study 
Cultural perceptions and societal norms play a pivotal role in shaping career choices among s...

Read more
Analysis of Zero-Day Vulnerability Exploits in University Networks: A Case Study of Federal University, Wukari, Taraba State

Background of the Study

Zero-day vulnerabilities are security flaws in software or hardware that are un...

Read more
THE ROLE OF FATHERS IN EARLY CHILDHOOD EDUCATION AND DEVELOPMENT

ABSTRACT: This study examined the role of fathers in early childhood education...

Read more
The effect of syntactic complexity on Igbo discourse in Enugu

Background of the study
Syntactic complexity refers to the degree of structural intricacy in sentence construction. In Igb...

Read more
An Examination of the Impact of Nurse-Led Weight Management Programs on Cardiovascular Health in Oyo State

Background of the Study
Obesity is a major risk factor for the development of cardiovascular diseases (CVD), and its prevalence is steadily...

Read more
INTEGRATION OF YORUBA TRADITIONAL HOUSING ELEMENTS IN THE DESIGN OF OLUBADAN PALACE

ABSTRACT

Yoruba traditional housing through semiotic principles using symbolic objects, signs, and elements to create visual expression a...

Read more
An Analysis of Virtual Private Networks (VPNs) and Data Privacy: A Study of Multinational Firms in Nasarawa State

Background of the Study

Virtual Private Networks (VPNs) are widely used by multinational firms to secure data transmissi...

Read more
The Effect of Voter Education on Electoral Integrity: A Study of Maiduguri LGA, Borno State

Chapter One: Introduction

1.1 Background of the Study
Voter education is essential for promoting...

Read more
Share this page with your friends




whatsapp