Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013
…
4 pages
1 file
To protect your secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get your original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive information has become of prime and first importance and concern. Information hiding is an art that involves communication of secret information in an appropriate carrier, e.g., image, video, audio etc. To protect information from unauthorized access various methods for information hiding like cryptography, stegnography, hashing, and authentication have been developed and are in practice today. In this paper we will be discussing one such information hiding techniques called Steganography. Steganography's main goal is to hide the very existence of secure informat...
International Journal on Data Science and Technology, 2017
Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
By the explosive development of internet and the reckless communication techniques in current years the security and the confidentiality of the data has become the prime importance. To guard the data from illegal access and interfering various methods for data hiding like cryptography, hashing, confirmation have been developed and are in practice today. In this paper we will be covering one such data hiding technique called Steganography. Steganography is the process of concealing sensitive data in any media to transfer it securely over the underlying untrustworthy and unsafe communication network. The paper presents a survey case study on various data hiding techniques in steganography that are in practice today.
Abstract— Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentially and data integrity are required to protect against unauthorized access and use. This has resulted in an unstable growth in the field of information hiding. In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, Digital signature, coding and so on have been used. Steganography is the best suited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips, text and sounds. This paper focuses on the various techniques in steganography to enhance the security of communication over an open channel.
2014
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this paper we will be discussing one such data hiding technique called Steganography. Stegnography is the process of concealing sensitive information in any media to transfer it securely over the underlying unreliable and unsecured communication network. Our paper presents a survey on various data hiding techniques in steganography that are in practice today along with the comparative analysis of these techniques. Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of...
2012
With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this paper we will be discussing one such data hiding technique called Steganography. Steganography is the process of concealing sensitive information in any media to transfer it securely over the underlying unreliable and unsecured communication network. Our paper presents a survey on various data hiding techniques in steganography that are in practice today along with the comparative analysis of these techniques.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
2015
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. This paper is a tutorial review of the steganography techniques appeared in the literature.
— The two important aspects of security that deal with transmitting information or data over some medium like internet are cryptography and steganography. Cryptography results in converting plain text into cipher text which is in unreadable or in non-explanatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is prevented. Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography and cryptography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of both techniques. This paper describes the various steganography techniques combined with cryptography.
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm. The stego -image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). It can be saved into BMP or PNG format. The reason that it can only be saved in these formats is because they are lossless -there is no information lost as part of the file formatting. The various applications of steganography include secure military communications, multimedia watermarking and fingerprinting applications for authentication purposed to curb the problem of digital piracy.
2014
Steganography is the technique of hiding information so that any intermediate third party is unaware about the presence of secret message. Digital steganography uses some digital media as the cover for the secret message, like in our case, we have used digital images as the cover media. Essence of steganography is that the third party should never be able to detect the presence of secret message in the cover image. Once the third party detects the secret message, it is assumed that the steganography technique has failed to serve its purpose. The proposed model presents a novel approach of develop a secure data hiding technique of Steganography using wavelet transform, Some logical operations, binary convertor, along with random number generation method. Keywords— Digital image, information hiding, steganography, PSNR value, LSB.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Emerging Research in Management and Technology, 2017
International Journal of Modern Trends in Engineering and Research, 2014
International Conference …, 2008
Advances in Multidisciplinary and scientific Research Journal Publication
Journal of emerging technologies and innovative research, 2018
Zenodo (CERN European Organization for Nuclear Research), 2022
Engineering, Technology & Applied Science Research
International journal of engineering research and technology, 2017