CHAPTER 3. Digital Carriers of Steganography
|
|
- Phillip Fields
- 5 years ago
- Views:
Transcription
1 CHAPTER 3 Digital Carriers of Steganography 3.1 Introduction It has been observed that all digital file formats can be used as digital carrier for steganography, but the formats those are with a high degree of redundancy are more suitable since the redundant bits can be replaced with secret information without the embedded information being perceivable. The redundant bits of an object are those bits that can thus be altered without the alternation being detected easily (Anderson and Petitcolas, 1998). Image, Text, Audio, Video and Network Protocol often have redundant data present in their binary representation and comply with the requirement of steganography. Thus, these file formats can be used as carrier of steganographic data as shown in figure 3.1. Steganography Text Protocol Audio Image Video Figure 3.1: Main categories of file formats used for steganography Each of these file format categories uses different techniques for hiding information based on the unique characteristics of the file format and the redundancy created in the digital representation of the file (Morkel et al., 2005). 28
2 3.2 Text Steganography In text based steganography data hiding takes place by introducing changes in the structure of the document without making a notable change in the concerned output. Text steganography is the art or process of hiding one text into another text for the purpose of secure communication so that the unauthorized user cannot get trace of the secret message. Text steganography methods are basically classified into three types which consist of subparts as shown in figure 3.2. Figure 3.2: Classification of Text Steganography techniques Format based Format based methods used physical text formatting of text as a place in which to hide information. They do not change any word or sentence, so it does not harm the value of the cover-text (Bhattacharyya et al., 2010). Format Based Method is of four types Line shifting method: In the line shifting method, the lines of the text are vertically shifted to some degree and information is hidden by creating a unique shape of the text (Shirali-Shahreza and Shirali-Shahreza, 2010). In a typical implementation, a line is moved up or down, while the line immediately above or below (or both) are left unmoved (Banerjee et al., 2011). The unmoved adjacent lines serve as reference locations in the decoding process. Though the human eye is particularly adapted at noticing deviations from uniformity, each vertical line can be shifted 1/300 inch up or 29
3 down and such changes less go unnoticed by human eye (Memon et al., 2008).. Word shifting method: In word shifting method, the horizontal alignment of some words are shifted by changing distances between words to embed information in the text and is acceptable for text where the distance between words is varied (Bhattacharyya et al., 2010). Readers accept a wide variation in text setting within a line and each horizontal words can be shifted 1/150 inch and such changes less go unnoticed by human eye (Brassil et al., 1999). In such process, a word is altered left or right, while the words immediately adjacent are left unmoved and these words serve as reference locations in the extracting process. Feature coding: In feature coding method, some of the features of the text are chosen and altered depending on the message to be inserted (Bhattacharyya et al., 2010). Such feature alterations can be a change to a character s height or its position within a given font relative to other characters. In such case document will have the same content and some character features are left unchanged to facilitate decoding process (Brassil et al., 1999). Feature coding method also involves the alterations of vertical lines of the individual characters and the length of those lines may be modified in a way that is imperceptible to the ordinary readers (Memon et al., 2008). White/null /open space: In the open spaces method, extra white/null spaces are added into the text of the cover message for hiding the secret message (Bhattacharyya et al., 2010). These whitespaces can be placed at the end of each line, at the end of each paragraph or sentence or between the words (Memon et al., 2008). This method can be implemented on any arbitrary text and does not raise attention of the reader (Bender et al., 1996). Although a little amount of data can be hidden in a document, this method can be applied to almost all kinds of text without revealing the existence of the hidden data (Banerjee et al., 2011). 30
4 3.2.2 Random and statistical generation methods Random and statistical generation methods are used to generate cover-text automatically according to the statistical properties of language (Bhattacharyya et al., 2010). This method use example grammars to produce cover-text in a certain natural language and is based on character sequences and words sequences. A probabilistic context-free grammar (PCFG) is used to generate word sequences by starting with the root node and recursively applying randomly chosen rules. The sentences are constructed according to the secret message to be hidden in it. The quality of the generated stego-message depends directly on the quality of the grammars used (Bhattacharyya et al., 2010). Another approach to character generation is to take the statistical properties of wordlength and letter frequency in order to create words (without lexical value) which will appear to have the same statistical properties as actual words in a given language (Shirali-Shahreza and Shirali-Shahreza, 2010). The hiding of information within word sequences, the actual dictionary items can be used to encode one or more bits of information per word using a codebook of mappings between lexical items and bit sequences, or words themselves can encode the hidden information (Banerjee et al., 2011) Linguistic method The final category is linguistic method which specifically considers the linguistic properties of generated and modified text, frequently uses linguistic structure as a place for hidden messages (Bennett, 2004). Linguistic steganography is defined as a technique of data hiding that embeds the secret message within texts based on some linguistic knowledge (Bhattacharyya et al., 2010). They are basically of two types: Semantic method: In the semantic method, the synonyms of certain words are used for hiding information in the text (Bhattacharyya et al., 2010). The synonym substitution may represent a single or multiple bit combination for the secret information. The semantic transformation method is the most sophisticated approach for linguistic steganography and perhaps impractical given the current state-of the- art for NLP technology (Bennett, 2004). 31
5 Syntactic method: In this approach the syntactic structure of the text is used to embed the secret message into text file. Syntactic method is a linguistic steganography method where some punctuation signs like comma (,) and fullstop (.) are placed in proper places in the document to embed data (Bhattacharyya et al., 2010; Memon et al., 2008). Syntactic method is based on the fact that a given sentence may be represented into various syntactic structures without any essential change in meaning. Syntactic methods include changing the diction and structure of text without significantly altering the meaning (Bender et al., 1996). 3.3 Network steganography Network steganography allows users to communicate secretly by embedding information within other messages and network control protocols used by common applications. This is possible because inserting hidden data into a chosen carrier remains unnoticeable for users not involved in steganographic communication (Handel and Sandford, 1996). Data hiding within network protocols were based on the discovery of covert channels and embedding took place in TCP/IP packets also in application layer protocols (Mazurczyk and Lubacz, 2010). Hidden communication network steganography utilizes network protocols and/or relationships between them as a secret message carrier. Handel and Sandford, (1996) described the existence of hidden channels within standard design of network protocols. The OSI model is a standard network model that is used for almost all the networks. In the OSI layers there are some places where secret information may be hidden. Some of the Network Steganography methods are as follows: Steganophony: Voice over IP (VoIP) is a real-time service, which enables users to make phone calls through data networks that use an IP protocol (Mazurczyk et al., 2011). A steganographic technique applied to VoIP traffic steganophony that involves information hiding techniques in any layer of the TCP/IP protocol-stack is proposed by Mazurczyk and Lubacz, (2010). According to them, for VoIP systems, four possible hidden communication 32
6 scenarios may be considered. In the first method, the sender and the receiver perform VoIP conversation while simultaneously exchanging secret messages. In the rest three methods only a part of the VoIP end-to-end path is used for hidden communication and thus the sender and/or receiver are unaware of the steganographic data exchange. TRANSTEG: Mazurczyk et al., (2011) presented a steganographic method for IP telephony called TranSteg (Transcoding Steganography) which is intended for a broad class of multimedia and real-time applications. The main idea of TranSteg is to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected with the least possible degradation in voice quality. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. LACK: In case of VoIP, when a packet does not reach the destination point or when it is delayed excessive amount of time, it is considered as packet lost and then discarded. This feature is used to create new steganographic technique called LACK (Lost Audio Packets Steganographic Method) (Mazurczyk and Szczypiorski, 2008). LACK is a hybrid steganographic method which modifies both packets and their time dependencies. Firstly, one packet is selected from the RTP stream and its voice payload is substituted with bits of the secret message (Mazurczyk and Lubacz, 2010). At the transmitter, some selected audio packets are intentionally delayed by a certain time before transmitting. If the delay of such packets at the receiver is considered excessive, the packets are discarded by a receiver which is not aware of the steganographic procedure. If the receiver knows about the hidden communication, then instead of deleting the packet the receiver extracts the payload. For unaware receivers the hidden data is invisible (Mazurczyk and Szczypiorski, 2008). Padding based Steganography: Padding can be found at any layer of the OSI model, but typically it is exploited for covert communications only in the data link, network and transport layers (Mazurczyk and Szczypiorski, 2008).According to Jankowski et al., (2010), Padding based Steganography is 33
7 the steganographic system that utilizes Ethernet (IEEE 802.3), ARP, TCP and other protocols and is designed for LANs only because it utilizes improper Ethernet frame padding in Ethernet. The method stated by them initiates by a process where each host willing to exchange secret messages should be able to locate and identify other hidden hosts. Due to incorrect handling of Ethernet frame padding a memory leakage occurs and is called Etherleak. Thus data is inserted in padding by Etherleak which is considered unlikely to contain any valuable information and does not pose serious threat to network security. However, it creates a perfect candidate for a carrier of the secret messages. SCTP Steganography: Steganographic methods may be applied to Stream Control Transmission Protocol (SCTP) which is a transport layer protocol and its main role is similar to both popular protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) as stated by Fraczek et al., (2010). According to them, information hiding methods that have been proposed for TCP and UDP protocols may be utilized due to several similarities between these transport layer protocols and SCTP. It provides ensuring reliability and transport of messages with congestion control. SCTPspecific steganographic methods can be divided in three groups- methods that modify content of SCTP packets, methods that modify how SCTP packets are exchanged and methods that modify both content of SCTP and the way they are exchanged i.e. hybrid methods. Multi-Level Steganography: Fraczek et al., (2012) proposed Multi-Level Steganography which is based on two steganographic methods. First, the upper-level method uses covert traffic as a secret data carrier. The second, the lower-level method, uses the way the upper-level method operates as a carrier. The indirect carriers for lower-level methods are still packets from covert communication, but the direct carrier is another (upper-level) method. In MLS the bandwidth of the lower-level method is a fraction of the bandwidth of the upper-level method. Also, the lower-level method is potentially harder to detect than the upper-level one. It results from the fact that the lower-level method functioning entirely depends on upper-level one. Thus, the adversary has to detect the upper-level method first in order to look for the lower-level one. 34
8 3.4 Audio Steganography Steganography can be applied to audio files. Audio files may be modified in such a way that they contain hidden information in such a way that it is difficult to remove the hidden data without destroying the original signal. Audio steganography takes advantage of the psycho acoustical masking phenomenon of the human auditory system (HAS) (Dutta et al., 2009). The HAS perceives the additive random noise and also the perturbations in a sound file can also be detected. While the HAS have a large dynamic range, it has a fairly small differential range. As a result, loud sounds tend to mask out quiet sounds. And there are also some distortions that are so common that the HAS ignores them Least significant bit encoding Least significant bit (LSB) coding is the simplest and popular way to embed information in a digital audio file that replaces the least significant bit of the cover audio file to hide a sequence of bytes containing the hidden data (Saroha and Singh, 2010). The technique doesn't cause significant quality degradation in audio and allows for a large amount of data to be encoded (Jayaram et al., 2011). In LSB coding, one LSB of the audio file is replaced with one bit of the message. In some implementations of such coding more LSBs of a sample are replaced with message bits. This increases the amount of data that can be encoded but also increases the amount of resulting noise in the audio file as well. There is also disadvantage associated with the use of methods like LSB coding. If a sound file embedded with a secret message using LSB coding was resampled, the embedded information would be lost (Saroha and Singh, 2010) Phase coding The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data (Jayaram et al., 2011). The phase of subsequent segments is adjusted in order to preserve the relative phase between segments (Malviya et al., 2012). Rather than introducing perturbations, the technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to-perceived noise ratio (Saroha 35
9 and Singh, 2010). In such coding data hiding starts by breaking the original sound signal into smaller segments whose lengths equal the size of the message to be encoded and a Discrete Fourier Transform (DFT) is applied to each segment to create a matrix of the phases and Fourier transform magnitudes (Dutta et al., 2009). Phase differences between adjacent segments are calculated and phase shifts between consecutive segments are used to embed secret data where the absolute phases of the segments can be changed but the relative phase differences between adjacent segments must be preserved (Jayaram et al., 2011). Then a new phase matrix is created using the new phase of the first segment and the original phase differences. Using the new phase matrix and original magnitude matrix, the sound signal is reconstructed by applying the inverse DFT and then concatenating the sound segments back together (Malviya et al., 2012) Parity coding One of the prior works in audio data hiding technique is parity coding technique. Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample region's parity bit (Malviya et al., 2012). If the parity bit of a selected region does not match the secret bit to be encoded, the process inverts the LSB of one of the samples in the region (Dutta et al., 2009). Parity files are created to accompany data files, and are used to preserve data integrity and assist in data recovery. Here a group of 'parity files' are built that record the structure of the files to be protected. Later, if any of the protected files are lost, the parity files can be used to re-create the missing files. The disadvantage of the method is that the attackers can still find the pattern to break or remove the information from the carrier media Spread spectrum In audio steganography, the basic spread spectrum (SS) method attempts to spread secret information across the frequency spectrum of the audio signal which is similar to a system which uses an implementation of the LSB that spreads the message bits over the entire sound file (Jayaram et al., 2011). However, unlike LSB coding, the Spread Spectrum method spreads the secret information over the frequency spectrum 36
10 of the sound file using a code which is independent of the actual signal (Saroha and Singh, 2010). As a result, the final signal occupies a bandwidth which is more than what is actually required for transmission. The Spread Spectrum can show better performance in some areas compared to LSB coding, phase coding, and parity coding techniques in that it offers a moderate data transmission rate and high level of robustness against removal techniques (Saroha and Singh, 2010). However, the Spread Spectrum method has one main disadvantage that it can introduce noise into a sound file (Jayaram et al., 2011) Echo hiding In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal (Malviya et al., 2012). Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior robustness when compared to the noise inducing methods (Dutta et al., 2009). To hide the data successfully, three parameters of the echo are varied: amplitude, decay rate, and offset (delay time) from the original signal (Saroha and Singh, 2010). All three parameters are set below the human hearing threshold so that the echo is not easily resolved. In addition, offset is varied to represent the binary message to be encoded. If only one echo was produced from the original signal, only one bit of information could be encoded (Jayaram et al., 2011). Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal (Malviya et al., 2012). 3.5 Image steganography In the domain of digital images many different image file formats exist. For these different image file formats, different steganographic algorithms exist. Image steganography is about exploiting the limited powers of the human visual system (HVS). Images are the most popular and useful cover image for steganography. Image steganography is basically divided into two categories: Steganography in the Image Spatial Domain and Frequency Domain. 37
11 3.5.1 Spatial domain based Spatial domain based steganographic method involves modification of the secret data in the spatial domain of the cover image, which is the embedding of the Least Significant Bits (LSBs).This method is based on the fact that the least significant bits of an image can be considered as random noise and thus they do not cause any changes to any modifications on the image Frequency domain based In the frequency domain cover images are transformed using a frequency-oriented mechanism such as discrete cosine transform (DCT), discrete wavelet transform (DWT) or similar mechanisms, after which the secret messages can be combined with the coefficients in the frequency-form images to achieve embedding. Frequency Domain are also known as transform domain. As this thesis is concentrated on image based methods a more detailed study of the image based methods is done in Chapter Video steganography A digital video is basically collection of images and audio, thus most of the steganographic techniques related to images and audio can be applied to video files too. Data hiding in videos is similar to that of data hiding in images, apart from information is hidden in each frame of the video (Bhaumik et al., 2009). The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of images and sounds. Therefore, any small but otherwise noticeable distortions might go by unobserved by humans because of the continuous flow of information. In video steganography the cover video is then broken down into frames and the secret data is embedded in these frames. The size of the message does not matter in video steganography as the message can be embedded in multiple frames. Although video based steganography can afford large volume of secret data, but the main problem is the size of such file and also the time computation is too high in such method. According to the working domain, video steganography techniques 38
12 are classified into): Spatial domain, Frequency domain and Format-specific (Jayamalar and Radha, 2010) Spatial domain The spatial domain techniques embed the secret data by modifying the pixel values of the host video directly. Least Significant Bit (LSB) method is the common and most simple approach for embedding information in a cover video and is used most frequently for data hiding (Chae and Manjunath, 1999). This method hides the secret message directly into the least significant bit of each color channel of the host video and thus a large amount of data can be hidden into the video file. This technique is most-straight forward method and uses the entire cover image to embed the secret message (Bhaumik et al., 2009). In spatial domain, it is possible to hide a significant amount of information in the covert file, by using the LSB of each color channel to carry the secret information (Swathi and Jilani, 2012). After concealing data in multiple frames of the carrier video, they are grouped together to form a stego video which to be used as normal sequence of streaming (Hanafy et al., 2008). The main advantage of the LSB coding method is a very high data hiding channel bit rate and a low computational complexity. With such a small variation in the colors of the video image it would be very difficult for the human eye to discern the difference thus providing high robustness to the system (Chae and Manjunath, 1999). In case of LSB method an attack that is set on a pixel to pixel basis can fully uncover the secret message, which is the major drawback of the system Frequency domain In frequency domain, host video is transformed to frequency components by transformation techniques and then messages are embedded in some or all of the transformed coefficients (Jayamalar and Radha, 2010). Embedding may be bit level or in block level. In frequency domain technique, the message is embedded distributively in overall domain of an original data. In this domain, DCT alters values of certain parts of the images by rounding them up. The digital video is composed of frames and the host frame is transformed to the DCT domain and each block of 8x8 host frame pixels is quantized by scaling the DCT coefficients using the quantization matrix (Bhaumik et al., 2009). The secret bits are then replaced with the bits of the 39
13 texture components of quantized DCT coefficients to form a fused block of DCT coefficients. The fused coefficients are then transformed inverse to produce an embedded frame. According to Chae and Manjunath, (1999) the human visual system is more sensitive to the changes in low frequency regions than in highly textured regions and so, insertions in the textured regions are less likely to result in visible distortions compared to less textured regions Format specific Techniques based on MPEG-2 and -4 have been proposed that involved modification for high frequency DCT coefficient manipulation and DCT block classification. Video steganography techniques that use MPEG-1, -2 and -4 coding structures as primitive components are primarily motivated by the goal of integrating data hiding and compression to reduce overall real-time video processing complexity (Morkel et al., 2005). In MPEG-4, video object (VO) is an area of the video scene and an instance of a VO at a particular point in time is a video object plane (VOP) (Vassaux et al., 2002). A compressed video stream is mainly composed of DCT coefficients, motion vectors, and other information (Mansouri and Khademi, 2009). Video compression is used to reduce redundancy in video file and operates on square-shaped groups of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Data embedding can take place in DCT coefficients and motion vectors (Mansouri and Khademi, 2009). Data can be embedded in the high or low textured area of DCT Coefficients of the VOP. In case of motion vectors embedding of secret data takes place in horizontal and vertical components of motion vector of the VOP. 40
A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationSurvey paper - Audio-Video Steganography Using Anti Forensics Technique
Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering
More informationHiding Data in Wave Files
Hiding Data in Wave Files Pushpa Aigal Department of Computer Science, Shivaji University, Kolhapur, Maharashtra 416004. Pramod Vasambekar Department of Computer Science, Shivaji University, Kolhapur,
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationSecret Communication through Audio for Defense Application
Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services
More informationA NOVEL METHOD FOR HIDING INFORMATION
A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University samir-alshebly@uokufa.edu.iq Abstract In this paper, we introduce a new method to hide information
More informationCODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala
CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In
More informationReLACK: A Reliable VoIP Steganography Approach
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement ReLACK: A Reliable VoIP Steganography Approach Mohammad Hamdaqa, Ladan Tahvildari Software Technologies Applied
More informationPerceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding
Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationCHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover
38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationAn Analysis of Various Techniques in Audio Steganography
An Analysis of Various Techniques in Audio Steganography B.Ramapriya 1, K.Bhuvanasundari 2, D.Bharathi 3 Assistant Professor, Dept. of Computer Science, Sri Akilandeswari Women s College, Wandiwash, Tamil
More informationA Performance of Embedding Process for Text Steganography Method
A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationVideo Compression An Introduction
Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationEFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN
PERPUSTAKAAN UMP 111111111111111111111111111111111111111111111111 00001 03237 EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN Thesis submitted in fulfillment of the requirement of the award of Degree
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationPerceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationImplementation of Random Byte Hiding algorithm in Video Steganography
Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication
More informationWebpage: Volume 4, Issue V, May 2016 ISSN
EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering
More informationAn introduction to steganography methods
World Applied Programming, Vol (1), No (3), August 2011. 191-195 ISSN: 2222-2510 2011 WAP journal. www.waprogramming.com An introduction to steganography methods Masoud Nosrati * minibigs_m@yahoo.co.uk
More informationSPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAudio-coding standards
Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.
More informationFiltering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.
Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationComplex Encryption Methodology Based On Two Level Encryption Technique
Complex Encryption Methodology Based On Two Level Encryption Technique Samir Kumar Bandyopadhyay University of Calcutta India skb1@vsnl.com ABSTRACT: In this paper a complex encryption methodology has
More informationBoth LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationClemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu
Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information
More informationPrinciples of Audio Coding
Principles of Audio Coding Topics today Introduction VOCODERS Psychoacoustics Equal-Loudness Curve Frequency Masking Temporal Masking (CSIT 410) 2 Introduction Speech compression algorithm focuses on exploiting
More informationSTEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?
Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding
More informationThe Steganography In Inactive Frames Of Voip
The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1
More informationDistributed Steganography
Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into
More informationSPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute
More informationIntroduction to LAN/WAN. Application Layer 4
Introduction to LAN/WAN Application Layer 4 Multimedia Multimedia: Audio + video Human ear: 20Hz 20kHz, Dogs hear higher freqs DAC converts audio waves to digital E.g PCM uses 8-bit samples 8000 times
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationDIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS
DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationEXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM
TENCON 2000 explore2 Page:1/6 11/08/00 EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and K. R. Rao The University
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles
More information15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION
15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:
More informationFundamentals of Video Compression. Video Compression
Fundamentals of Video Compression Introduction to Digital Video Basic Compression Techniques Still Image Compression Techniques - JPEG Video Compression Introduction to Digital Video Video is a stream
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationReview and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.
Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About
More informationCS 335 Graphics and Multimedia. Image Compression
CS 335 Graphics and Multimedia Image Compression CCITT Image Storage and Compression Group 3: Huffman-type encoding for binary (bilevel) data: FAX Group 4: Entropy encoding without error checks of group
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationRequest for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction
Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 29 Multimedia Department of Information Technology Eastern Mediterranean University 2/75 Objectives After completing this chapter you should be able to do the following:
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationELL 788 Computational Perception & Cognition July November 2015
ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationAppendix 4. Audio coding algorithms
Appendix 4. Audio coding algorithms 1 Introduction The main application of audio compression systems is to obtain compact digital representations of high-quality (CD-quality) wideband audio signals. Typically
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationIndex. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.
Index 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5. Literature Lossy Compression Motivation To meet a given target bit-rate for storage
More informationFrequency Domain Watermarking: An Overview
The International Arab Journal of Information Technology, Vol. 2, No. 1, January 2005 33 Frequency Domain Watermarking: An Overview Khaled Mahmoud, Sekharjit Datta, and James Flint Department of Electrical
More informationFast Real-Time Hardware Engine for Multipoint Text Steganography
Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationA Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability
A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability Prof. Samir Kumar Bandyopadhyay, Senior Fellow of IEEE Department of Computer Science
More informationDIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION
DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,
More informationUDP Lite for Real Time Multimedia Applications
UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se
More informationCN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data
More informationAudio-coding standards
Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.
More informationPart 1 of 4. MARCH
Presented by Brought to You by Part 1 of 4 MARCH 2004 www.securitysales.com A1 Part1of 4 Essentials of DIGITAL VIDEO COMPRESSION By Bob Wimmer Video Security Consultants cctvbob@aol.com AT A GLANCE Compression
More informationITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY
ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY Aditi Singh *1, K S Venkatesh 2 and Vikas Patidar 3 Department of Electrical Engineering, Indian Institute of Technology Kanpur, Kanpur-208016, Uttar
More informationCSCD 443/533 Advanced Networks Fall 2017
CSCD 443/533 Advanced Networks Fall 2017 Lecture 18 Compression of Video and Audio 1 Topics Compression technology Motivation Human attributes make it possible Audio Compression Video Compression Performance
More informationTHE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO
Journal of Science and Technology 52 (4A) (2014) 180-189 THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO Thanh Tung Nguyen *, Chan Nam Ngo, Tran Khanh Dang Faculty of Computer Science and Engineering,
More informationSteganography: A Security Model for Open Communication
Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology
More information