Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Informally, steganography is the process of exchanging a secret message between two communicating entities so that an eavesdropper may not know that a message has been sent. After a review of some steganographic systems, we found that these systems have some defects. First, there are situations in which some concealment algorithms do not properly hide a secret message. Second, to conceal one bit of a secret message, some ask at least five documents and make at least two sampling operations, thus increasing their run-times. Considering the different ways to communicate with the receiver, we propose two steganographic systems adapted to the email communication whose algorithms are deterministic. To hide one bit of a secret message, our steganographic systems need only one document and performs one sampling operation and therefore significantly reduces the run-time.
2013
In this paper we hide the message (data), using the concept of Steganography; in such a way that on-one apart from the sender and intended recipient even realizes there is a hidden message. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The new approach is based on the LSB (Least Significant Bit) method. Also a new approach is proposed to securely sending the message using Cryptographic concept in Steganography. From the sender side the encrypted message is send and hides it in a saved picture and encodes the message. At the receiver side decryption is done to get original message.
2010
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information.
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.
In this paper we show a model of an anonymous covert mailing system for Internet communication. It is the system scheme of an ongoing project to develop a real-life secure mailing system in our group. In this system a sender can send a secret message even to a non-acquainted person in an anonymous way. The users of this system are assumed to be members of a closed organization. But it is not primarily limited only to such users. It is a quite easy-to-use system with very cheap cost. This project as of now is at a prototype-developing stage.
International journal of engineering research and technology, 2017
Steganography is the art of hiding information to prevent the detection of hidden messages. Cryptography can be defined as the conversion of plain text into a scrambled code. Both are two general ways of sending vital information in a secret way. A message in scrambled code aka cipher text, might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. But many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for a steganographic message. In this paper, we present a new steganographic technique to hide data inside an image. The newly planned technique withstands visual and statistical attacks, yet it still offers a large steganographic capacity. This method does not modify the image. Message to be hidden will be converted into a bit stream and divided into several blocks. The bit pattern of each block is identified inside the im...
Now days in the world of communication, securing the information is Main criteria while communication in the network. Usually users exchange the confidential data and documents during communication. So, that Security is important criteria in Communication. Security and communication are inseparable words. In order to provide security to the data we are using cryptography and Steganography techniques together. This paper proposes Assured Data Communication by Using Cryptography and Steganography together. The combination of these two techniques can provide robust platform for secured data communication System. Here, We Create a Cipher text (Encrypted) of text message Using Cryptography Techniques and then we hide the Cipher text into Multimedia Using Steganography [1] techniques. We used SDES algorithm in Cryptography for data Encryption and Decryption, LSB Method of Steganography to hide Cipher text into image. This Proposed System provides high Assured Communication System. So that Intruders fail to crack data Communication even in Non-Secure channels.
IJCSMC, 2021
Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.
Ijca Proceedings on National Conference on Communication Technologies Its Impact on Next Generation Computing 2012, 2012
Digital Steganography is a process of hiding confidential digital information into a file of any kind. Digital Information is a resource which holds a lot of value in the modern world. In this paper we propose Steganography with SMS alert which is an approach to send secure digital information over a network in a secure way. The proposed algorithm secures files and messages and targets enterprise level security to hide and deploy digital information without the risk of network attacks or data theft.
Abstract— Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentially and data integrity are required to protect against unauthorized access and use. This has resulted in an unstable growth in the field of information hiding. In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, Digital signature, coding and so on have been used. Steganography is the best suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, text and sounds. This paper focuses on the various techniques in steganography to enhance the security of communication over an open channel.
2018
With digitization, data hiding has become more important than ever. Steganography forms an undisputable tool to attain privacy during data sharing. Steganography is the art and science of hiding data within seemingly innocuous data so as to not draw suspicion. This paper provides a survey on steganography, its advantage over cryptography, the types of digital media over which steganography can be applied and the progress of steganographic methods and recent trends in steganography. Images, video, text, audio are the digital media which serve as cover-media through which secret data may be transmitted often by exchanging stego-key.
—Today's internetworking globe is full of busy roads for transferring data. Challenges on sending or receiving various kinds of hidden data, messages or information especially using this public networks. Hackers took place to leak this surreptitious data. That's the reason behind the need of a cover media where the furtive message has been hiding our information securely. Steganography, one of the popular technique for putting out of sight for a message surrounded by other media (cover) devoid of any hesitation or distrust to an additional one, which means the message will just identified by the authenticate and predetermined recipient. Using this concept a unique number system is introduced through a text message as a cover media. This paper will help the scholars as well as researchers to move towards an innovative area of research for secret message transfer.
—Cyber crime is the biggest shortcoming in this fully connected internetworking world. Third party attacks, phishing by intruder like hackers are always active to leak official, personal or legislative information in the form of a message using this public networks. This is why we call for Steganography where the sneaky message has been hiding the data/information firmly. Steganography is one of the best techniques for putting out of sight for a message surrounded by other media (cover) as if nothing is there. Here a unique number system is introduced and thus gets a number of coordinates by means of a new-fangled formula. These are then used in an innovative way to hide the actual message. Before transferring the message cover media is applied with these changed coordinates. The predetermined receiver is always concerned with this algorithm. It can be much realized by the scholars as well as researchers to progress towards a pioneering area of research for secret message transfer.
2015
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper is a tutorial review of the steganography techniques appeared in the literature.
2013 International Conference on Electronics, Computer and Computation (ICECCO), 2013
Information security is the process of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Nowadays, apart from the military and institutional information security, individual information security is very important. If individual information security is ignored, it can cause intangible damage and monetary loss. In this study, a steganography application was developed to increase personal information security. This application is intended to provide a more secure way of communication for emails which play an important role in personal data transfer. Thus, Steganography, which is one of the communication hiding techniques, is used. And also existing steganography methods are examined and a new application has been developed to be used for personal information security. Finally, this application was applied to an electronic mail communication.
2016
Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. In this paper, we design a system, which uses features of both cryptography as well as steganography, where TCP/IP header is used as a steganographic carrier to hide encrypted data. Steganography is a useful tool that allows covert transmission of information over the communications channel.
Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. In this paper, we design a system, which uses features of both cryptography as well as steganography, where TCP/IP header is used as a steganographic carrier to hide encrypted data. Steganography is a useful tool that allows covert transmission of information over the communications channel.
2015
In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.
Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. In this paper, we design a system, which uses features of both cryptography as well as steganography, where TCP/IP header is used as a steganographic carrier to hide encrypted data. Steganography is a useful tool that allows covert transmission of information over the communications channel.
Current techniques of steganography are not impervious to detection using thorough procedures. This paper proposes to ascertain security and precision in the process of Text Steganography by presenting a few unexplored techniques. It establishes reliable media to transfer any required message accompanied by hidden data. The process relies on RSA Algorithm to encrypt user data by generating subtle imperfections in the appearance or layout of the characters included in the memo. The message undergoes multilevel encryption and corresponding decryption using both the public and private keys, thus bearing invulnerability to cyber-attacks and security breaches. The receiver acquires the modified message in the sender's format, to fend off digital decryption from unauthorized users. As opposed to contemporary techniques of Text Steganography, the encrypted message has a relative constraint on the size as it depends on the size of the data to be hidden, bearing no definite restrictions on the amount of information to be conveyed.
The Art of secret writing has a long history and with the advent of computer science it has taken a different practice with application areas related to security and authentication. Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. This paper presents an overview of steganography model and the general principle behind its usage with a focus on model based on Key generation Unit. The focus is given on different techniques to hide secret messages into images. Applications of steganography are digital watermarking, secure communication, signature authentication and data storage and linkage.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.