Steganography in text files thesis

  • RUB
    • RUB
    • USD
    • EUR
i agree with "Terms for Customers"
Sold: 0
Uploaded: 08.10.2013
Content: stego.rar 2033,66 kB
Loyalty discount! If the total amount of your purchases from the seller Ppman more than:
30 $the discount is3%
15 $the discount is2%
5 $the discount is1%
If you want to know your discount rate, please provide your email:
The total amount of your purchases from this seller is 0 $, the discount rate is 0%

Product description

Steganography in text files thesis Steganography in text files thesis

Thesis on "Investigation of steganographic methods of concealment of information in the text file"
Thesis contains a program in Delphi and the explanatory note for 102 sheets.

Description of work: master's thesis is devoted to research steganographic methods of concealment of information in relation to a text document.
This work consists of four chapters. In the first chapter the author analyzes the literary sources in which issues sanctified steganography, in particular books GV Kokhanovichi, AY Puzyrenko, VG Gribunin.
In reviewing the literature the author described the theoretical foundations of steganography, briefly describes the history of steganography get an idea about the features of the construction of steganographic systems, describes the main steganographic methods of concealment and-formation. The chapter concludes conclusion inappropriate use keyless steganosistem whose security is based only on the secrecy used steganographic changes.
The second chapter is devoted to the basic methods that are used in the text of steganography. This method is an arbitrary interval, syntactic and semantic methods and the replacement characters. At the end of ra-boats for the implementation of the two methods are selected from among the methods of arbitrary interval (a method of changing the interval between sentences, the method trailing spaces), as well as the method of replacement characters.
The third chapter is devoted to the implementation of selected methods in the programming environment Delphi. The description of the development environment, the algorithm described in detail the functioning of each of the methods. The value of this chapter is that the practical implementation of these methods in Delphi did not exist. Developments are the first author in the field.
After the implementation of the methods in the fourth chapter, the author evaluates the effectiveness of their operation. The methods are compared with each other according to different parameters. We also investigate the stability of these methods to modify information in the container.

The content of the work:
Chapter 1. Theoretical basis of steganography 9
1.1. The object and scope of the terminology 9
1.2. History and use of steganography 14
1.3. Features of construction of steganographic systems 16
1.4. Steganographic techniques to hide data and implementation 24
1.5. Steganography analysis 28
1.6. Conclusions 32
2. The analysis and selection methods of text steganography 33
2.1. Methods arbitrary interval 34
2.1.1. The method of changing the interval between the proposals 34
2.1.2. The method of changing the number of spaces at the end of lines of text 35
2.1.3. The method of changing the number of spaces between words aligned across the width of the text 36
2.2. Syntactic and semantic methods 37
2.3. Other methods 39
2.4. The choice of methods for implementing steganography 39
2.5. Conclusions 41
3. Development of algorithms PROGRAM 42
3.1. Description of the development environment 42
3.2. Mathematical model 44
3.3. Some algorithms of embedding information 46
3.4. Description of the method of the module replace the 50 symbols
3.5. Description of the method replace spaces 56
3.6. Description of the method terminal blanks 58
3.7. Conclusions 60
4.1. Method of estimation algorithms 63
4.2. Test program developed 64
4.3. Comparative analysis of stability to external influences steganoalgoritmov 65
4.4. Investigation of the stability of algorithms for steganography analysis 73
4.4.1. Algorithm study of the nature stego 78
4.4.2. Extracting information file 80
4.5. Conclusions 82

Additional information

Remember that each work needs to be improved to meet your requirements!


1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)