BY,,,,,,
MAYURI & APURVA
CONTAINS:
1. Cryptography
2. Cryptanalysis
3. Cryptology
4. SUBSTITUTION TECHNIQUES
5. TRANSPOSITON TECHNIQUES
Readable
text
Cryptographic
system
Unreadable
text
It convert the Readable text in a Unreadable text.
Unreadable
text
Cryptology
system
Readable
text
It convert the Unreadable text in a Readable text.
It I the combination of Cryptography and Cryptanalysis
INCRYPTION
DECRYPTION
ENCRYPTION:
Plain text ENCRYPT Cipher text
Plain text is convert to the Cipher text.
DECRYPTION:
Cipher text DENCRYPT Plain text
Cipher text is convert to the Plain text.
ENCRYPTION AND DECRYPTION:
SUBSTITUTION TECHNIQUES:
 CAESAR`S CIPHER
 VIGENERE CIPHER
CAESAR`S CHIPER:
VIGENERE CHIPHER:
CIPHER TEXT:
OVBRGGMJWYOIWRURGM
key
Plain
text
C R I N G E F R I N G E F R I N G E
M E T E A C H S O L I E R A M E A l
TRANSPOSITON TECHNIQUES:
 RAIL FENCE CIPHER
 COLUMNAR TRANSPOSITION
 STEGANOGRAPHY
RAIL FENCE CIPHER:
Plain text: COME HOME TOMORROW
Cipher text:
CMHMTMROOEOEOORW
COLUMNAR TRANSPOSITION:
KEYWORD: ZEBRAS
MASSAGE: WE ARE DISCOVERED FLEE AT ONCE
Z E B R A S
6 3 2 4 1 5
CIPHER TEXT:
EVLN ACDT ESEA ROFO DEEC WIREE
STEGANOGRAPHY
Message Hiding
CONCLUSION :-
It is major achievement in
computer engineering.
It will allow perfectly secure
messages ,secure discussion
etc. between sender and
receiver.
Message Hiding

More Related Content

PPTX
13. Casting
PPT
Security and Cryptography
PPTX
Ip security
PPTX
Network security & cryptography
PPT
PPT
Lecture 5 ip security
PPT
Cryptography and network security
PPTX
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
13. Casting
Security and Cryptography
Ip security
Network security & cryptography
Lecture 5 ip security
Cryptography and network security
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication

Viewers also liked (8)

PDF
Data Hiding Techniques
PPT
PPT
IPSec Overview
PPTX
IP Security
PPT
IP Security in Network Security NS6
PPTX
Image encryption and decryption
PPTX
ip security
Data Hiding Techniques
IPSec Overview
IP Security
IP Security in Network Security NS6
Image encryption and decryption
ip security
Ad

Similar to Message Hiding (20)

PDF
Enhancing security of caesar cipher using different
PDF
Enhancing security of caesar cipher using different
PPTX
Cyber security
PPTX
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
PDF
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
PPT
unit 2.ppt
PPTX
cryptography Transposition presentation.pptx
PPTX
Introduction to cryptography and types of ciphers
PPTX
Unit i
PDF
Bt0088 cryptography and network security1
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPT
classicalencryptiontechniques.ppt
DOC
MAJOR PROJECT FORMAT--2013(new 1)
PDF
Cipher techniques
PPTX
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
PPTX
cryptography symmentric.pptx
PPTX
Module 1.pptx
PPTX
Chapter-Three Part One.pptxghgjhhjghjhjhhj
PPTX
Classical encryption techniques
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
Cyber security
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
unit 2.ppt
cryptography Transposition presentation.pptx
Introduction to cryptography and types of ciphers
Unit i
Bt0088 cryptography and network security1
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
classicalencryptiontechniques.ppt
MAJOR PROJECT FORMAT--2013(new 1)
Cipher techniques
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
cryptography symmentric.pptx
Module 1.pptx
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Classical encryption techniques
Ad

Recently uploaded (20)

PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPT
Geologic Time for studying geology for geologist
PPTX
Tartificialntelligence_presentation.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
August Patch Tuesday
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
STKI Israel Market Study 2025 version august
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
1 - Historical Antecedents, Social Consideration.pdf
observCloud-Native Containerability and monitoring.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A contest of sentiment analysis: k-nearest neighbor versus neural network
O2C Customer Invoices to Receipt V15A.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Benefits of Physical activity for teenagers.pptx
Getting Started with Data Integration: FME Form 101
Geologic Time for studying geology for geologist
Tartificialntelligence_presentation.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
August Patch Tuesday
Assigned Numbers - 2025 - Bluetooth® Document
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
Group 1 Presentation -Planning and Decision Making .pptx
STKI Israel Market Study 2025 version august
sustainability-14-14877-v2.pddhzftheheeeee
1 - Historical Antecedents, Social Consideration.pdf

Message Hiding