International Journal of Computer Engineering & Applications, Vol. II, Issue I/III IMAGE STAGENOGRAPHY

Size: px
Start display at page:

Download "International Journal of Computer Engineering & Applications, Vol. II, Issue I/III IMAGE STAGENOGRAPHY"

Transcription

1 IMAGE STAGENOGRAPHY Anand Paratap Singh 1, Esh Narayan 2 1 Master of Technology in IFTM University, Moradabad 1,2, Computer Science & Engineering 2 Dept. of Computer Science and Engineering PRABHAT ENGG COLLAGE KANPUR (UP) ABSTRACT: Stagenography is the art of science that involves the communication of secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, that the goal is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other art it can be use full for ill intentions. It has been propelled to the forefront of current security methods by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography s ultimate objectives, which are undetected, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Stage analysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed. Keywords- Digital image steganography; spatial domain; frequency domain; adaptive steganography; security 1. INTRODUCTION Steganography is the art of hiding information in ways that prevent the detection of hidden messages, this definition gives by the researchers Neil F. Johnson and Sushil Jajodia at George Mason University in Fairfax. Where cryptography encodes a message so it cannot be understood, steganography hides a message so its mere existence is not known. Steganography is the science and art of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message. Recently, many digital techniques have been developed that perform steganography on electronic media, most notably sound and image files. The outcome of this project is to create a tool that can effectively hide a message inside a digital image file. Steganography is a way of protecting information, same as to cryptography and watermarking. While watermarking ensures message integrity and cryptography scrambles a message, steganography hides it. The concept of steganography has been around since Ancient Greece, yet only in the past couple of decades has it been applied to digital information. Current digital techniques can provide reasonable security for the hidden message, but often leave marks that suggest the cover has been tampered with. Most of these marks are caused by the message being embedded into the cover without any regard to the cover s original content. Therefore, it is highly likely that if the original content was taken into account it would become significantly more difficult to discover whether steganography has been used. It would be 128

2 interesting to find out whether doing this makes it more complex Objective Objective of this project is to develop software, namely Steganos that can be used for steganography and stage analysis. An ideal steganography system should be unobtrusive, robust- to all types of image processing techniques, unambiguous, should not rely on the secrecy of the algorithm. My Project is not only a steganography system it could and should be extended to incorporate watermarking in multimedia. 1.2 problem statement The whole scope of problem can be stated as: a. Studying the various steganography and stage analysis methods. b. The Individual modules for driving with the core of the steganography engine i.e. the algorithms. c. Implementation of the Reverse process i.e stage analysis for some popular methods. d. Designing a interactive GUI for the user. e. Integrating all the individual modules so that the user could hide his/her data(any kind) i.e. any kind of data by choosing an algorithm from the algorithm library within a cover file. f. Testing for various kinds of multimedia files i.e. png images, tiff images, jpeg images both 8bit (grayscale) and 24bit (color images) and for wav files. 2. LITERATURE SURVEY Steganography comes from Greek and means covered writing. The ancient Greeks wrote text on wax-covered tablets. To pass a hidden message, a person would scrape off the wax and write the message on the underlying wood. He/she would then once again cover the wood with wax so it appeared unused. Many developments in steganography occurred during World War II. This included the development of invisible inks, microdots, and encoded messages. One known message sent by a German spy was: Apparently neutral s protest is thoroughly discounted and ignored. Is man hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suet and vegetables oils. Extracting second letter in each word reveals: Pershing sails from NY June Steganography has a long history, which can be traced back to Ancient Greece. In his Histories, Herodotus (c B.C.) tells how the head of a trusted slave was shaved and tattooed with a message. 2 The message was hidden after the hair had regrown, at which time the slave could travel without arousing any enemy suspicion. However, it is easy to see that once the enemy is aware of this method of hiding information, they can simply shave the head of every slave that passes through their territory, defeating the system. This modern steganography can be broken up into three categories: Pure steganography is hiding where no information other than the hiding technique is required, as this is sufficient knowledge to be able to retrieve the hidden message. The latter two categories, secret key and public key steganography, rely on the passing of a key (or keys) without which the hidden information cannot successfully be extracted. Most steganographic software available implements the secret key approach due to the facts that pure steganography is simple to break once you know the method and public key steganography is considered to be theoretically impossible. Despite the many incarnations of steganography methods and 129

3 the development over time, the result is still the same. A message is transmitted inside some sort of cover in such a way that a third party looking at the cover is not aware that the hidden message even exists. Algorithm Pure steganography No key is necessary E: Ca x M -> Ca D: Ca -> M Relies on the secrecy of the method Example:Using the first character in a letter to hide the secret message Null cipher (unencrypted message): News Eight Weather: Tonight increasing snow. Unexpected precipitation smothers eastern towns. Be extremely cautious and use snowtires especially heading east. The highways are knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday. First letter of each word: Newt is upset because he thinks he is President. Secret key steganography Algorithm Uses a secret stego-key: sender and receiver share stego-key E: Ca x (K x M) -> Ca D: Ca x K -> M Example Encrypt data using shared secret key before hiding within the carrier Public key steganography Algorithm Uses two keys: public/private key combo Public key encryption E: Ca x (U x M) -> Ca D: Ca x R -> M Private key encryption E: Ca x (R x M) -> Ca D: Ca x U -> M Various programs offered today Freeware/Shareware include: Hide and Seek: hides data in LSB of GIF & BMP Camouflage: hides data (ex: MP3 s) by encrypting and then appending the data to the end of a file S-Tools: LSB color reduction, then inserts additional data to hide color modification Flaws with Steganography Fig Features of JAVA Platform Independent The concept of Write-once-run-anywhere (known as the Platform independent) is one of the important key feature of java language that makes java as the most 130

4 powerful language. Not even a single language is ideal to this feature but java is closer to this feature. The programs written on one platform can run on any platform provided the platform must have the JVM. Simple There are various features that makes the java a simple language. Programs are easy to write and debug because java does not use the pointers explicitly. It is much harder to write the java programs that can crash the system but we can not say about the other programming languages. Java provides the bug free system due to the strong memory management. It also has the automatic memory allocation and deal location system. Object Oriented To be an Object Oriented language, any language must follow at least the four characteristics. Inheritance Encapsulation Polymorphism Dynamic binding Robust Java has the strong memory allocation and automatic garbage collection mechanism. It provides the powerful exception handling and type checking mechanism as compare to other programming languages. Compiler checks the program whether there any error and interpreter checks any run time error and makes the system secure from crash. All of the above features makes the java language robust. Distributed The widely used protocols like HTTP and FTP are developed in java. Internet programmers can call functions on these protocols and can get access the files from any remote machine on the internet rather than writing codes on their local system. Portable The feature Write-once-runanywhere makes the java language portable provided that the system must have interpreter for the JVM. Java also has the standard data size irrespective of operating system or the processor. This feature makes the java a portable language. 3. FORMULATIONS AND PRESENTATION OF THE PROBLEM 3.1. Data flow diagram Hiding the secret text Cover image Bit LSB Algorith m bits Stego image bit bit Plain text Key 131

5 Fig retrieving the hidden text Stego image bit LSB algo bit Plain text bit 3.2. Technology Used Fig key object oriented code and an extensive usage of objects, classes, methods etc has been done. The user with the help of the GUI provided to him selects the input files i.e. the cover and the data file. There is a separate file reading module which reads the cover file(which could be an image(.png, The Steganos has been developed in java using JDK1.5.0.The GUI was developed using Forte for Java CE. For editing photos for testing the program we used Adobe Photoshop. The whole Project was developed using Pentium IV 1.7 MHz and with proper graphics support and Memory Of 128MB RAM. The project is totally platform independent since it is developed by using java foundation classes (JFC).Faster processors are recommended for better results since a lot of computation is involved..jpeg,.tiff ),after the cover file is read the file where data is collected System Architecture The figure shows the overall system architecture. Some standard classes have been used from the java library. The architecture is quite simple. It s totally 132

6 of the code has strictly adhered to the Object-Oriented philosophy. This enabled a highly modular development approach and extensive code reuse. Modules developed are highly coherent and loosely coupled. Each module is able to inherit from any other module when needed and also instantiate any class of any other module. The user can hide data of any kind of his/her choice although of some limited size. Algorithm library allows choosing from high capacity algorithms to highly robust algorithms General Method of Steganography What we do in Steganography is we have a cover image where we hide data using an embedding function like the algorithms which we use by using a key. Fig: Software as the file resource provided by the user. There is no limitation to the kind of file which the user can hide and retrieve using this software and we support all kind of data file to be hide although there is limitation to the size of data that can be hidden in a cover file.the file reading module interacts the GUI Manager and the Algorithm Library to read the file from the hard disk and the Core Steganos Engine. The Core Steganos Engine takes the help of the Authentication Module and the Key Generation facility to implement the camouflage and retrieval of data. Proper error messages are generated to guide the user through the whole process of using the software if he goes wayward from the way the software should function Key Features The project has various unique features that enhance the functionality. The architecture Fig Diagram showing the various method of steganography Lower Order LSB Algorithm 133

7 The most widely used technique to hide data, is the usage of the LSB. Although there are several disadvantages to this approach, the relative easiness to implement it, makes it a popular method. To hide a secret message inside a image, a proper cover image is needed. Because this method uses bits of each pixel in the image, it is necessary to use a lossless compression format, otherwise the hidden information will get lost in the transformations of a lossy compression algorithm. When using a 24 bit color image, a bit of each of the red, green and blue color components can be used, so a total of 3 bits can be stored in each pixel. Thus, a pixel image can contain a total amount of bits ( bytes) of secret data. For example, the following grid can be considered as 3 pixels of a 24 bit color image, Using 9 bytes of memory: ( ) ( ) ( ) When the character A, which binary value equals , is inserted, the following grid results: ( ) ( ) ( ) This method uses the least significant bits (LSB) of the bytes of the cover to hide the message. A computer s file is made out of ones and zeros, called bits. A byte is a group of bits. Every type of file has a different format. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximal cover size. The resulting changes that are made to the least significant bits are too small to be recognized by the human eye, so the message is effectively hidden. While using a 24 bit image gives a relatively large amount of space to hide messages, it is also possible to use a 8 bit image as a cover source. Because of the smaller space and different properties, 8 bit images require a more careful approach. Where 24 bit images use three bytes to represent a pixel, an 8 bit image uses only one. Embedding process: least significant bit substitution(lsb Image) for i = 1,...,l(c) do si ci end for for i = 1...,l(m) do compute index ji where to store ith message bit sji cji mi end for Extraction process: least significant bit substitution for i = 1,...,l(M) do compute index ji where the ith message bit is stored mi 134

8 =LBS(C IJ ) End for Randomized Algorithm In case, the sender uses all cover-elements for information transfer, starting at the first element. Since the secret message will normally have less bits than l(c), the embedding process will be finished long before the end of the cover. In this case, the sender can leave all other cover elements unchanged. This can, however, lead to a serious security problem: the first part of the cover will have different statistical properties than the second part, where no modifications have been made. The embedding process the changes far more elements than the transmission of the secret would require. Therefore the probability that an attacker will suspect secret Communication increases. A more sophisticated approach is the use of a pseudorandom number generator to spread the secret message over the cover in a rather random manner; a popular approach is the random interval method.if both communication partners share a stego-key k usable as a seed for a random number generator, they can create a random sequence k1,..., kl(m) and use the elements with indices for information transfer. Thus, the distance between two embedded bits is determined pseudo randomly. Since the receiver has access to the seed k and knowledge of the pseudorandom number generator, he can reconstruct ki and therefore the entire sequence of element indices ji. This technique is especially efficient. 5. RESULTS AND IMPLEMENTATION 5.1 Testing Objectives Testing is a process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as-yet undiscovered error. A successful test is one that uncovers an asyet-undiscovered error. The above objectives imply a dramatic change in viewpoint. They move counter to the commonly held view that a successful test is one in which no errors are found. Our objective is to design tests that systematically uncover different classes of errors and do so with a minimum amount of time and effort. If testing is conducted successfully (according to the objectives stated above), it will uncover errors in the software. Testing cannot show the absence of defects, it can only show that software errors are present. 5.2 Testing Techniques The techniques followed throughout the testing of the system are as under Black- Box Testing Black box testing focuses on the functional requirements of the software. That is, Black Box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. Black Box Testing is not an alternative to white-box techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. Black-Box Testing attempts to find errors in the following categories: 1. Incorrect or missing functions. 2. Interface errors. 3. Errors in data structures or external data base access. 4. Performance errors. 135

9 5. Initialization and termination errors. Unlike White Box Testing, which is performed early in the testing process, Black Box Testing tends to be applied during later stages of testing. Because Black Box Testing purposely disregards control structure, attention is focused on the information domain. White-Box Testing White Box Testing knowing the internal workings of a product tests can be conducted to ensure that internal operations are performed according to specifications and all internal components have been adequately exercised. Using white box testing methods the test cases that can derived are: (1) All independent paths with in a module have been exercised at least once. (2) Exercise all logical decisions on their true and false sides. (3) Execute all loops at their boundaries and within their operational bounds. (4) Exercise internal data structures to ensure their validity. Control Structure Testing 1) Condition Testing Condition testing is a test case design method that exercises the logical conditions contained in a program module. If a condition is incorrect then at least one component of the condition are incorrect Therefore types of errors in a condition including the following? Boolean operator error Boolean variable error Boolean parenthesis error Relational operator error Arithmetic expression error 2) Loop Testing Loops are the corner stone for the vast majority of all algorithms implemented in software. Loop testing is a white-box testing technique that focuses exclusively on the validity of loop constructs. 3) Control Testing The dataflow testing method selects test paths of a program according to the location of definitions and uses of variables in the program. In this testing approach, assume that each statement in a program is assigned a unique statement number and that each function does not modify its parameters or global variables. It is useful for selecting test paths of a program containing nested if and loop statement. This approach is effective for error detection. However, the problems of measuring test coverage and selecting test paths for data flow testing are more difficult than the corresponding problems for condition testing. Unit Testing Unit testing focuses verification efforts on the smallest unit of software design. It is white box oriented. Unit testing is essentially for verification of the code produced during the coding phase and hence the goal is to test the intemallogic of the module. Others consider a module for integration and use only after it has been unit tested satisfactorily. The module interface is tested to ensure that information properly flows in and out of program. Local data structure is examined to ensure that data stored temporarily maintain its integrity. Boundary conditions are tested to ensure that modules operate properly at boundary limits of processing. All independent paths are exercised to ensure all statements in a module have been executed at least once. 136

10 Integration Testing Integration testing focuses on design and construction of the software architecture. For example: - We followed a systematic technique for constructing the program structure that is "putting them together"- interfacing at the same time conducting tests to uncover errors. We took unit tested components and build a program that has been dictated by design. 6. CONCLUSION AND FUTURE SCOPE We have implemented about 6 algorithms for image steganography 3 variants of audio steganography, and one algorithm for Steganalysis.Screen shots display the output of the software applied for different cases. There is no dearth to the type of information that the user can hide. Only exception is there to the amount of information that he can hide. Comparative analysis of the various algorithms Steganography, especially combined with cryptography, is a powerful tool which enables people to communicate without possible eavesdroppers even knowing there is a form of communication in the first place. The methods used in the science of steganography have advanced a lot over the past centuries, especially with the rise of the computer era. Although the techniques are still not used very often, the possibilities are endless. Many different techniques exist and continue to be developed, while the ways of detecting hidden messages also advance quickly. Since detection can never give a guarantee of finding all hidden information, it can be used together with methods of defeating steganography, to minimize the chances of hidden communication taking place. Even then, perfect steganography, where the secret key will merely point out parts of a cover source which form the message, will pass undetected, because the cover source contains no information about the secret message at all. In the near future, the most important use of steganographic techniques will probably lie in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials. Although it will not prevent the distribution itself, it will enable the content provider to start legal actions against the violators of the copyrights, as they can now be tracked down. Steganography might also become limited under laws, since governments already claimed that criminals use these techniques to communicate. ACKNOWLEDGEMENTS 137

11 I would like to add few heartfelt words for the people, who were part of this project in numerous ways, people who gave support in completing this report. Completion of the project would not have been possible without mutual efforts and integrated thoughts. I wish to express my gratitude and hearty appreciation to my Project Guide and Mentor Prof. Bharat Agarwal for providing a self-learning and congenial environment and for his continuous encouragement and enthusiastic guidance in the successful completion of the project work. REFERENCES [1] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) [2] D. Frith, Steganography approaches, options, and implications, Network Security, 2007(8)(2007)4-7 [3] H. Farid, A Survey of image forgery detection, IEEE Signal Processing Magazine, 26(2)(2009) [4] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, A secure and improved self-embedding algorithm to combat digital document forgery, Signal Processing, 89 (12)(2009) [9] Johnson, N. F. S. D, Z., Information Hiding: Steganography [10] Katzenbeisser, S. P., A. P, Information Hiding Techniques [11]. Saxena P.C., Gupta J.P., Gupta N., Web Page Ranking Based on Text Content of Linked Pages, International Journal of Computer Theory and Engineering (IJCTE), vol. 2, no. 1, pp , Feb [12] Benjamin C. M., Fung Ke, Wang M.E., Large hierarchical document clustering using frequent itemsets, Proc. Third SIAM International Conference on Data Mining 2003, pp , [13] Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Finding Authorities and Hubs from link structures on the World Wide Web, Proc. 10th WWW Conference, Hong Kong, pp , [14] Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Link analysis ranking: algorithms, theory, and experiments, ACM Transactions on Internet Technology, vol. 5, no. 1, pp , [15] S. Butcher, Charles LA. Clarke. A. Index compression is good, especially for random access. In Proc. of the 16th ACM CIKM, pages , 2007 [16]Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Link analysis ranking: algorithms, [5] H. Nakamura and Q. Zhao, Information hiding based on image morphing, in: Proceedings of 22ndInternational Conference on Advanced Information Networking and Applications Workshops, AINAW March 2008, [6] Avedissian, L.Z," Understanding Testing Strategies. [7] C. J. S. B, Modulation and Information Hiding in Images, [8] Dorothy, E.R, D.K, Cryptography and Data Security 138

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems

Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems Steganography John Von Dollen Ron Lepper Coen 150: Information Security Systems May 17, 2004 Abstract: While technology increases, the amount of privacy provided by simply encrypting a message decreases.

More information

Steganography and Steganalysis

Steganography and Steganalysis Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and

More information

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE Joseph Dedy Irawan Informatics Engineering, Industrial Technology Faculty, Institut Teknologi Nasional Malang Jalan Raya Karangploso KM 2 Malang Email: joseph_dedy@yahoo.co.id

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

Analysis of Steganography as a Security Technique

Analysis of Steganography as a Security Technique Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application

More information

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,

More information

Introduction to Steganography

Introduction to Steganography POLYTECHNIC UNIVERSITY Department of Computer and Information Science Introduction to Steganography K. Ming Leung Abstract: This material deals with the history and an introduction to the art and science

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Secured Way of Ciphering Text Using Audio Steganography

Secured Way of Ciphering Text Using Audio Steganography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University A Study Of Steganography 1 STEGANOGRAPHY STUDY A Study Of Steganography And The Art Of Hiding Information Alain C. Brainos II East Carolina University A Study Of Steganography 2 Abstract The recently created

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

Information Hiding in BMP image Implementation, Analysis and Evaluation

Information Hiding in BMP image Implementation, Analysis and Evaluation Èíôîðìàöèîííûå ïðîöåññû, Òîì 6, 1, 2006, ñòð. 110 c 2006 Alkhraisat Habes. INFORMATION TRANSMISSIONS IN COMPUTER NETWORKS Information Hiding in BMP image Implementation, Analysis and Evaluation Alkhraisat

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

Comparative Analysis of Different Transformation Techniques in Image Steganography

Comparative Analysis of Different Transformation Techniques in Image Steganography Comparative Analysis of Different Transformation Techniques in Image Steganography Sourav Kumar Kamila (111CS0127) Department of Computer Science and Engineering National Institute of Technology Rourkela

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

Steganography using MATLAB

Steganography using MATLAB ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant

More information

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.

More information

Seminar report Java Submitted in partial fulfillment of the requirement for the award of degree Of CSE

Seminar report Java Submitted in partial fulfillment of the requirement for the award of degree Of CSE A Seminar report On Java Submitted in partial fulfillment of the requirement for the award of degree Of CSE SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org 1 Acknowledgement I would like

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made

More information

Image Analysis for Online Dynamic Steganography Detection

Image Analysis for Online Dynamic Steganography Detection Vol. 1, No. 3 Computer and Information Science Image Analysis for Online Dynamic Steganography Detection Kevin Curran & Joanne Mc Devitt Intelligent Systems Research Centre Faculty of Engineering University

More information

Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal

Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Abstract- Computer Technology and the Internet have made a breakthrough in the existence of data communication.

More information

Prof.(Dr.) J. K. Mandal

Prof.(Dr.) J. K. Mandal Information Security Prof.(Dr.) J. K. Mandal Ex-Dean, Faculty of Engineering, Technology & Management Professor & Head, Department of Computer Science & Engineering University of Kalyani Kalyani, Nadia,

More information

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction SE 4C03 Winter 2004 Steganography Derek Lunn (9943193) Last Revised: April 6th 2004 Introduction Steganography is a means of hiding information in a carrier medium. Although the concept itself is not new,

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Secret Sharing, Random Numbers, and Information Hiding. Prof. Tom Austin San José State University Spring 2014

Secret Sharing, Random Numbers, and Information Hiding. Prof. Tom Austin San José State University Spring 2014 Secret Sharing, Random Numbers, and Information Hiding Prof. Tom Austin San José State University Spring 2014 Summer University 2014 Summer CS program held in Yverdon-les-Bains, Switzerland. Applications

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Introducing Image Steganography in Bangla Language Communication

Introducing Image Steganography in Bangla Language Communication Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,

More information

Seminar report Steganography

Seminar report Steganography A Seminar report on Steganography Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY

NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY 1. Introduction: New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications.

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Steganography Workshop

Steganography Workshop Steganography Workshop About the Speaker 2 20 books (Including 3 on forensics, 5 on computer security, 1 on cryptology) 40 industry certifications Member of the American College of Forensic Examiners Diplomat

More information

CIS 121 Data Structures and Algorithms with Java Spring 2018

CIS 121 Data Structures and Algorithms with Java Spring 2018 CIS 121 Data Structures and Algorithms with Java Spring 2018 Homework 6 Compression Due: Monday, March 12, 11:59pm online 2 Required Problems (45 points), Qualitative Questions (10 points), and Style and

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique

More information

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security

More information

Enhanced LSB Based Audio Steganography

Enhanced LSB Based Audio Steganography Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com

More information

Fast Real-Time Hardware Engine for Multipoint Text Steganography

Fast Real-Time Hardware Engine for Multipoint Text Steganography Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,

More information

Principle of Graph Theoretic Approach to Digital Steganography

Principle of Graph Theoretic Approach to Digital Steganography Computing For Nation Development, February 26 27, 2009 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Principle of Graph Theoretic Approach to Digital Steganography Vinay

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India Abstract:-Although every people have secrets

More information

SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur

SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur School of Computing, Department of IT 1 School of Computing, Department 2 SOFTWARE TESTING

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Steganography: Hiding Data In Plain Sight. Ryan Gibson Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G

More information

A Proposed Method for Cryptography using Random Key and Rotation of Text

A Proposed Method for Cryptography using Random Key and Rotation of Text Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf

More information

Digital Watermarking: Combining DCT and DWT Techniques

Digital Watermarking: Combining DCT and DWT Techniques Digital Watermarking: Combining DCT and DWT Techniques 1 MR. D.G.VAGHELA, 2 MR. V.P.GOHIL, 3 PROF. RAMLAL YADAV 1 M.Tech. [CSE] Student, Department of Computer Engineering, Kautilya Institute Of Technology

More information

Image Steganography by Mapping Pixels to Letters

Image Steganography by Mapping Pixels to Letters Journal of Computer Science 5 (1): 33-38, 2009 ISSN 1549-3636 2009 Science Publications Image Steganography by Mapping Pixels to Letters Mohammed A.F. Al-Husainy Department of Computer Science, Faculty

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010

More information

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] RESEARCH ARTICLE A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] Department of Computer Science & Engineering [1] Dr. BAMU University, Osmanabad Department of Electronics

More information

Lecture 1: Perfect Security

Lecture 1: Perfect Security CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

Software Testing part II (white box) Lecturer: Giuseppe Santucci

Software Testing part II (white box) Lecturer: Giuseppe Santucci Software Testing part II (white box) Lecturer: Giuseppe Santucci 4. White box testing White-box (or Glass-box) testing: general characteristics Statement coverage Decision coverage Condition coverage Decision

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Implementation of Security in Cloud Systems Based using Encryption and Steganography Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya

More information

An Analysis of Various Techniques in Audio Steganography

An Analysis of Various Techniques in Audio Steganography An Analysis of Various Techniques in Audio Steganography B.Ramapriya 1, K.Bhuvanasundari 2, D.Bharathi 3 Assistant Professor, Dept. of Computer Science, Sri Akilandeswari Women s College, Wandiwash, Tamil

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

Distributed Steganography

Distributed Steganography Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into

More information

Watermarking for Security in Database

Watermarking for Security in Database Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To

More information

Software Design Fundamentals. CSCE Lecture 11-09/27/2016

Software Design Fundamentals. CSCE Lecture 11-09/27/2016 Software Design Fundamentals CSCE 740 - Lecture 11-09/27/2016 Today s Goals Define design Introduce the design process Overview of design criteria What results in a good design? Gregory Gay CSCE 740 -

More information