Dissertations / Theses on the topic 'Steganografi'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 21 dissertations / theses for your research on the topic 'Steganografi.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Härö, Jonny. "Steganografi : Hur steganografi kan påverka nätverkssäkerhet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20107.
Full textNorman, Anton, and Niklas Paulsson. "En ny metod för steganalys." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-29532.
Full textAndersson, Amanda, and Daniel Karlsson. "Konsten att steganografera." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31996.
Full textStensmar, Isak. "Steganografi i bilder : En studie om bildformat och visuella bildrepresentationens påverkan vid lagring av data med hjälp av en steganografisk metod." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12887.
Full textContext. By using image steganography it is possible to hide a large amount of data without making big differences to the initial picture. One commonly used method is Least Significant Bit (LSB), which often is considered one of the first method implemented and used in Image Steganography. Apart from the method, the user also have a choice when deciding what picture he or she should use as the carrier of information. What people often try to accomplish is to have a very complex method that hides the data in an efficient way, but forgets about the picture used as a carrier. In the end, all measurements will be done on the picture. Objectives. This study will investigate if different image formats, BMP, PNG, JPEG and TIFF, have an impact on the differences when comparing the original picture with the modified, given that data is stored with a steganographic method and is gradually increased. The study will also investigate if what the picture visually represent will have an effect on the measurements. Methods. An extended method of the Least Significant Bit method will be implemented and used to create different pictures with different kinds of image formats. An experiment will investigate these formats by taking measurements with MSE (Mean Squared Error), PSNR (Peek Signal-to-Noise Ratio) and SSIM (Structural Similarity). Results. When comparing different formats one could say that JPEG showed better performance by having a lower differential value between each test, by looking at the graphs and tables. BMP, PNG and TIFF had minimal changes between each other for each test. As for the visual representation of the pictures, two pictures showed a higher differential value after each test than the remaining three. Conclusions. The results from the experiment showed that which compression method a format uses will have an impact on the measurement. The results also showed that the pictures’ visual representation could have some impact on the measurement of a picture but more data is needed to conclude this theory.
Vaske, Camilla. "Dolda meddelanden i musik : En ny metod för musikalisk steganografi." Thesis, Högskolan i Halmstad, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34787.
Full textSteganography is the science of hiding communication. Information is hidden in carrier objects such as images, software, movies and music. To be able to hide information in music, different techniques can be applied depending on the file formats used. This study describes musical steganography in general, but the primary focus of the report is the techniques of MIDI steganography. MIDI is a standard music technology protocol that is used around the world to create music and make it available for listening. Since no publically available method for MIDI steganography has been found (even though there are methods described in the literature), the study also aims to investigate how an algorithm for MIDI steganography can be designed so that it satisfies capacity and security criteria. As part of the study, a method for using velocity values to hide information in music has been designed and evaluated, during which the method is found to have capacity comparable with similar methods. In an audibility test, it is observed that audible impact on the music can not be distinguished at any reasonable significance level, which means that also a security criterion is met.
Pruccoli, Maichol. "Steganografia di immagini." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textPoremba, Tomáš. "Digitální steganografie a stegoanalýza." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385979.
Full textPaladino, Pasquale. "La Steganografia e i suoi molteplici usi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1962/.
Full textBayer, Peter, and Henrik Widenfors. "Information Hiding : Steganografic Content in Streaming Media." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2298.
Full textAndersson, Julius, and David Engström. "A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253021.
Full textDet är önskvärt för företag att kunna gömma data i videor så att de kan hitta källorna till obehörig delning av en video. Den data som göms borde skada den ursprungliga datan så lite som möjligt medans det också är så svårt som möjligt att radera den gömda datan utan att den ursprungliga datan skadas mycket. Studien kom fram till att det bästa stället att gömma data i videor är i den visuella delen så datan göms i bilderna i videon. Två metoder skapades för att injektera gömd data och tre skapades för att förstöra den gömda datan. En injektionsmetod ändrar pixelvärdet av bilden direkt för att gömma datat medans den andra transformerar bilden till cosinusvågor och ändrar sedan de vågorna för att gömma datat. Attacker utformades för att testa hur svårt det var att förstöra den gömda datan. Metoderna för att attackera den gömda datan var att lägga till eller ta bort ett slumpmässigt värde från varje pixel, att sätta varje bit av en särskild nivå till 1 och att komprimera bilden med JPEG. Resultatet av studien var att metoden som ändrade bilden direkt var mycket snabbare än metoden som först transformerade bilden och den hade också plats för mer gömd data. Injektionsmetoderna var olika bra på att skydda den gömda datan mot de olika attackerna så vilken metod som var bäst i den aspekten beror på vilken typ av attack som används.
Morkus, Filip. "Program pro skrývání dat v obrazových souborech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218835.
Full textHrebíček, Martin. "Skrytí dat v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236211.
Full textKortus, Jiří. "Laboratorní úloha skrývání dat ve zvukovém záznamu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220666.
Full textFedina, Jekaterina. "Statistiniai stegoanalizės metodai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_172603-70609.
Full textThe main goal of the thesis is to review the methods of steganography and steganalysis and to experiment with them. Steganography helps to embed hidden messages in such way that anyone except the intended recipient is unaware of the existence of the message but with the use of statistical steganalysis methods those hidden messages can be detected. This thesis consists of two steganography (LSB and LSBH) and two steganalysis methods (RS and PoV) description and implementation. All methods were implemented with JAVA code. Thesis is concluded with a comparison of these methods' quality.
Pacura, Dávid. "Neviditelné značení digitálních signálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240846.
Full textKOCIÁNOVÁ, Helena. "Digitální steganografie." Master's thesis, 2009. http://www.nusl.cz/ntk/nusl-85503.
Full textVacek, Jan. "Pokrývací množiny ve steganografii." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-330343.
Full textCinkais, Roman. "Aplikace samoopravných kódů v steganografii." Master's thesis, 2009. http://www.nusl.cz/ntk/nusl-282616.
Full textHrinčárová, Monika. "Audio steganografie a IP telefonie." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-347234.
Full textHrinčárová, Monika. "Audio steganografie a IP telefonie." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-357346.
Full textPrudil, Jan. "Moderní metody stegoanalýzy." Master's thesis, 2009. http://www.nusl.cz/ntk/nusl-87147.
Full text