Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
1998, Selected Areas in …
…
4 pages
1 file
Steganography, designed to conceal the existence of a message rather than its content, presents a unique challenge in the field of cryptography. This paper explores various ancient and modern techniques for steganography, the limitations posed by adversaries in the communication process, and introduces novel approaches such as public key steganography which may allow covert communication even under adverse conditions. A theoretical framework for understanding steganographic systems and the complications inherent in crafting a cohesive theory of information hiding are discussed, emphasizing the role of selection channels and error correction in secure communications.
IRJET, 2022
Steganography is used to hide information like text, images, videos in other media files like images, videos, music. We can use steganography to transfer messages from one host to another securely. Nowadays we cannot trust the server side to encrypt our messages end to end as the server side knows the keys of both the sender and receiver. Using steganography, we can make sure that the server does not decrypt and store our messages in plain text. We can secure our messages from server side and intruders also. In steganography we store our secret data into the least significant bits of the pixels. Storing data into the least significant bits does not affect the image that much as the values of the pixels change slightly. We can use different techniques to cipher data into images like sequential, prime and equations ciphering. To decipher such an image the intruder has to check for all the combinations of pixels which increases the time complexity of this task to exponential. Using this technique we can protect our messages not just from intruders but also server side proxy attacks. In this method the sender and receiver mutually decide some keys which will be used to cipher and decipher data from images. The user only needs to remember two keys, the starting point and the method used to cipher data into the image
in such a way that the carrier would appear as an ordinary file to the intruders.Steganography is the writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes that there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message.
Image Files are one among the foremost widely used file types today. This paper describes the utilization of JPEG image files in Steganography. Steganography is that the technique of hiding a message in a picture file (cover image) so as to not be known by people that don't have permission to access. This insertion utilizes the littlest little bit of pixel units in a picture file (Least Significant Bit). during this journal, steganography is going to be combined with AES. Steganography utilizes the weakness of the human eye in viewing the image file, steganography also uses mathematical calculations in inserting messages into the image file. this sort of insertion uses the binary of the ASCII code of a personality. This paper also compares the dimensions of a picture file to the dimensions of the knowledge which will be inserted.
Steganography is the study and analysis of the art and science of concealing or protecting sensitive communication. The concealed entity might be anything from a file, message, video, image or even audio and it is embedded into other videos ,images or files, etc. In this paper we will be presenting various types of Steganography as well as the factors driving the success of a good stego system.
Steganography is defined as study of imperceptible conversation. Steganography typically deals with approaches of hiding presence of communicated information in sort of manner that it stays confidential. It preserves secrecy among two communicating groups. In image steganography, secrecy is attained by means of embedding records into cover image and producing a stego- image. There are distinct kind of steganography strategies each have their strengths and weaknesses. In this paper, we review distinct security and data hiding approaches that are utilized to implement a steganography for instance LSB, ISB, and MLSB etc.
Security techniques such as: secrecy, authentication, non-repudiation and integrity control. Secrecy techniques are in two categories: cryptography and steganography. Steganography and cryptography is a very useful technique to achieve secrecy in communication. One hides the existence of the message as well as the further distorts the message itself. By means of cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper spotlights on the potency of combining cryptography and steganography methods to enhance the security of communication over an open channel.
akram dawood, 2019
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. Steganography-the art and science of hiding information into the other information so that the hidden information appears to be nothing to the human eyes has gained much attention. There are many ways to hide information inside an image, audio/video, document etc. But Image Steganography has its own advantages and is most popular among the others. This paper includes the important steganography methods and the main focus is on the review of steganography in digital images steganographic techniques in spatial domain such as least significant bit (LSB), pixel value differencing (PVD). The different aspects on which the steganography method depends are: robustness, capacity, undetectability. Keywords Steganography, Least significant bit (LSB), Pixel value differencing (PVD), Capacity, Stego-image, cover-image 1. Introduction Over the last two decades, the rapid development of internet requires confidential information that needs to be protected from the unauthorized users. This is accomplished through Data hiding. It is a method of hiding secret messages into a cover medium so that an unintended observer will not be aware of the existence of the hidden messages. This is achieved by steganography. The term steganography is retrieved from the Greek words stegos means cover and grafia meaning writing defining it as covered writing.[1]. Steganography is a technology that is used to hide secret information in digital media, thus hiding the fact that secret communication is taking place. By hiding secret information in less suspicious digital media, well-known channels, for example e-mail and social networking sites, are avoided, thereby reducing the risk of information being leaked in transit. Steganography is a technology concerned with ways of embedding a secret message in a cover message also known as a cover object in such a way that the existence of the embedded information is hidden. A secret message can be plaintext, ciphertext, an image, or anything that can be represented as a bit stream. The embedding process is sometimes parameterised by a secret key, called a stego key, and without knowledge of this key it is difficult for an unauthorised party to detect and extract the secret message. Once the cover object has information embedded in it, it is called a stego object. Steganography equation is 'Stego-medium = Cover medium + Secret message + Stego key. Theg eneral model
Organizations have desired to keep certain sensitive communications and information secret for years. In our new age of digital media and internet communications, this need often seems even more pressing. Today’s information age, were technology has made information sharing and transfer increased exponentially and also making the information vulnerable to unauthorized access, use, modification and interception both while in storage or in transmission. It is no surprise that countless encryption methods of protecting such information like cryptography, water marking and many more have evolved. One lesser- known but rapidly growing encryption method is Steganography. Though steganography is an ancient craft, the onset of computer technology has given it new life. Computer-based stenographic techniques introduce changes to digital covers such as Image, Audio and Video.
2005
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide secret messages into images strengthen the security of these techniques. However, adopting one of the available keyagreement protocols, to distribute stego-key(s) between the communicating parties, will destroy the infrastructure of the entire communication. The reason is that, these protocols perform their transactions on sight, while the desirable communications need to be completely hidden. In this paper, a key-generation unit is proposed to be added to the steganography general model. This unit utilizes a new key-agreement protocol, stego-KA, to help support the entire class of hidden communication techniques to exchange the sego-key(s) covertly. The proposed stego-KA protocol is based on Diffie-Hellman key establishment protocol and has significant advantages that support hidden communications.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
International Journal for Research in Applied Science and Engineering Technology, 2020
Indian Institute of Education, 2023
IJCRT(www.ijcrt.org), 2020
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2022
International Journal of Advanced Computer Science and Applications, 2016
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, 2019
International Journal for Research in Applied Science and Engineering Technology