International Journal of Computer Engineering & Applications, Vol. II, Issue I/III IMAGE STAGENOGRAPHY
|
|
- Shonda Parks
- 6 years ago
- Views:
Transcription
1 IMAGE STAGENOGRAPHY Anand Paratap Singh 1, Esh Narayan 2 1 Master of Technology in IFTM University, Moradabad 1,2, Computer Science & Engineering 2 Dept. of Computer Science and Engineering PRABHAT ENGG COLLAGE KANPUR (UP) ABSTRACT: Stagenography is the art of science that involves the communication of secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, that the goal is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other art it can be use full for ill intentions. It has been propelled to the forefront of current security methods by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography s ultimate objectives, which are undetected, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Stage analysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed. Keywords- Digital image steganography; spatial domain; frequency domain; adaptive steganography; security 1. INTRODUCTION Steganography is the art of hiding information in ways that prevent the detection of hidden messages, this definition gives by the researchers Neil F. Johnson and Sushil Jajodia at George Mason University in Fairfax. Where cryptography encodes a message so it cannot be understood, steganography hides a message so its mere existence is not known. Steganography is the science and art of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message. Recently, many digital techniques have been developed that perform steganography on electronic media, most notably sound and image files. The outcome of this project is to create a tool that can effectively hide a message inside a digital image file. Steganography is a way of protecting information, same as to cryptography and watermarking. While watermarking ensures message integrity and cryptography scrambles a message, steganography hides it. The concept of steganography has been around since Ancient Greece, yet only in the past couple of decades has it been applied to digital information. Current digital techniques can provide reasonable security for the hidden message, but often leave marks that suggest the cover has been tampered with. Most of these marks are caused by the message being embedded into the cover without any regard to the cover s original content. Therefore, it is highly likely that if the original content was taken into account it would become significantly more difficult to discover whether steganography has been used. It would be 128
2 interesting to find out whether doing this makes it more complex Objective Objective of this project is to develop software, namely Steganos that can be used for steganography and stage analysis. An ideal steganography system should be unobtrusive, robust- to all types of image processing techniques, unambiguous, should not rely on the secrecy of the algorithm. My Project is not only a steganography system it could and should be extended to incorporate watermarking in multimedia. 1.2 problem statement The whole scope of problem can be stated as: a. Studying the various steganography and stage analysis methods. b. The Individual modules for driving with the core of the steganography engine i.e. the algorithms. c. Implementation of the Reverse process i.e stage analysis for some popular methods. d. Designing a interactive GUI for the user. e. Integrating all the individual modules so that the user could hide his/her data(any kind) i.e. any kind of data by choosing an algorithm from the algorithm library within a cover file. f. Testing for various kinds of multimedia files i.e. png images, tiff images, jpeg images both 8bit (grayscale) and 24bit (color images) and for wav files. 2. LITERATURE SURVEY Steganography comes from Greek and means covered writing. The ancient Greeks wrote text on wax-covered tablets. To pass a hidden message, a person would scrape off the wax and write the message on the underlying wood. He/she would then once again cover the wood with wax so it appeared unused. Many developments in steganography occurred during World War II. This included the development of invisible inks, microdots, and encoded messages. One known message sent by a German spy was: Apparently neutral s protest is thoroughly discounted and ignored. Is man hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suet and vegetables oils. Extracting second letter in each word reveals: Pershing sails from NY June Steganography has a long history, which can be traced back to Ancient Greece. In his Histories, Herodotus (c B.C.) tells how the head of a trusted slave was shaved and tattooed with a message. 2 The message was hidden after the hair had regrown, at which time the slave could travel without arousing any enemy suspicion. However, it is easy to see that once the enemy is aware of this method of hiding information, they can simply shave the head of every slave that passes through their territory, defeating the system. This modern steganography can be broken up into three categories: Pure steganography is hiding where no information other than the hiding technique is required, as this is sufficient knowledge to be able to retrieve the hidden message. The latter two categories, secret key and public key steganography, rely on the passing of a key (or keys) without which the hidden information cannot successfully be extracted. Most steganographic software available implements the secret key approach due to the facts that pure steganography is simple to break once you know the method and public key steganography is considered to be theoretically impossible. Despite the many incarnations of steganography methods and 129
3 the development over time, the result is still the same. A message is transmitted inside some sort of cover in such a way that a third party looking at the cover is not aware that the hidden message even exists. Algorithm Pure steganography No key is necessary E: Ca x M -> Ca D: Ca -> M Relies on the secrecy of the method Example:Using the first character in a letter to hide the secret message Null cipher (unencrypted message): News Eight Weather: Tonight increasing snow. Unexpected precipitation smothers eastern towns. Be extremely cautious and use snowtires especially heading east. The highways are knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday. First letter of each word: Newt is upset because he thinks he is President. Secret key steganography Algorithm Uses a secret stego-key: sender and receiver share stego-key E: Ca x (K x M) -> Ca D: Ca x K -> M Example Encrypt data using shared secret key before hiding within the carrier Public key steganography Algorithm Uses two keys: public/private key combo Public key encryption E: Ca x (U x M) -> Ca D: Ca x R -> M Private key encryption E: Ca x (R x M) -> Ca D: Ca x U -> M Various programs offered today Freeware/Shareware include: Hide and Seek: hides data in LSB of GIF & BMP Camouflage: hides data (ex: MP3 s) by encrypting and then appending the data to the end of a file S-Tools: LSB color reduction, then inserts additional data to hide color modification Flaws with Steganography Fig Features of JAVA Platform Independent The concept of Write-once-run-anywhere (known as the Platform independent) is one of the important key feature of java language that makes java as the most 130
4 powerful language. Not even a single language is ideal to this feature but java is closer to this feature. The programs written on one platform can run on any platform provided the platform must have the JVM. Simple There are various features that makes the java a simple language. Programs are easy to write and debug because java does not use the pointers explicitly. It is much harder to write the java programs that can crash the system but we can not say about the other programming languages. Java provides the bug free system due to the strong memory management. It also has the automatic memory allocation and deal location system. Object Oriented To be an Object Oriented language, any language must follow at least the four characteristics. Inheritance Encapsulation Polymorphism Dynamic binding Robust Java has the strong memory allocation and automatic garbage collection mechanism. It provides the powerful exception handling and type checking mechanism as compare to other programming languages. Compiler checks the program whether there any error and interpreter checks any run time error and makes the system secure from crash. All of the above features makes the java language robust. Distributed The widely used protocols like HTTP and FTP are developed in java. Internet programmers can call functions on these protocols and can get access the files from any remote machine on the internet rather than writing codes on their local system. Portable The feature Write-once-runanywhere makes the java language portable provided that the system must have interpreter for the JVM. Java also has the standard data size irrespective of operating system or the processor. This feature makes the java a portable language. 3. FORMULATIONS AND PRESENTATION OF THE PROBLEM 3.1. Data flow diagram Hiding the secret text Cover image Bit LSB Algorith m bits Stego image bit bit Plain text Key 131
5 Fig retrieving the hidden text Stego image bit LSB algo bit Plain text bit 3.2. Technology Used Fig key object oriented code and an extensive usage of objects, classes, methods etc has been done. The user with the help of the GUI provided to him selects the input files i.e. the cover and the data file. There is a separate file reading module which reads the cover file(which could be an image(.png, The Steganos has been developed in java using JDK1.5.0.The GUI was developed using Forte for Java CE. For editing photos for testing the program we used Adobe Photoshop. The whole Project was developed using Pentium IV 1.7 MHz and with proper graphics support and Memory Of 128MB RAM. The project is totally platform independent since it is developed by using java foundation classes (JFC).Faster processors are recommended for better results since a lot of computation is involved..jpeg,.tiff ),after the cover file is read the file where data is collected System Architecture The figure shows the overall system architecture. Some standard classes have been used from the java library. The architecture is quite simple. It s totally 132
6 of the code has strictly adhered to the Object-Oriented philosophy. This enabled a highly modular development approach and extensive code reuse. Modules developed are highly coherent and loosely coupled. Each module is able to inherit from any other module when needed and also instantiate any class of any other module. The user can hide data of any kind of his/her choice although of some limited size. Algorithm library allows choosing from high capacity algorithms to highly robust algorithms General Method of Steganography What we do in Steganography is we have a cover image where we hide data using an embedding function like the algorithms which we use by using a key. Fig: Software as the file resource provided by the user. There is no limitation to the kind of file which the user can hide and retrieve using this software and we support all kind of data file to be hide although there is limitation to the size of data that can be hidden in a cover file.the file reading module interacts the GUI Manager and the Algorithm Library to read the file from the hard disk and the Core Steganos Engine. The Core Steganos Engine takes the help of the Authentication Module and the Key Generation facility to implement the camouflage and retrieval of data. Proper error messages are generated to guide the user through the whole process of using the software if he goes wayward from the way the software should function Key Features The project has various unique features that enhance the functionality. The architecture Fig Diagram showing the various method of steganography Lower Order LSB Algorithm 133
7 The most widely used technique to hide data, is the usage of the LSB. Although there are several disadvantages to this approach, the relative easiness to implement it, makes it a popular method. To hide a secret message inside a image, a proper cover image is needed. Because this method uses bits of each pixel in the image, it is necessary to use a lossless compression format, otherwise the hidden information will get lost in the transformations of a lossy compression algorithm. When using a 24 bit color image, a bit of each of the red, green and blue color components can be used, so a total of 3 bits can be stored in each pixel. Thus, a pixel image can contain a total amount of bits ( bytes) of secret data. For example, the following grid can be considered as 3 pixels of a 24 bit color image, Using 9 bytes of memory: ( ) ( ) ( ) When the character A, which binary value equals , is inserted, the following grid results: ( ) ( ) ( ) This method uses the least significant bits (LSB) of the bytes of the cover to hide the message. A computer s file is made out of ones and zeros, called bits. A byte is a group of bits. Every type of file has a different format. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximal cover size. The resulting changes that are made to the least significant bits are too small to be recognized by the human eye, so the message is effectively hidden. While using a 24 bit image gives a relatively large amount of space to hide messages, it is also possible to use a 8 bit image as a cover source. Because of the smaller space and different properties, 8 bit images require a more careful approach. Where 24 bit images use three bytes to represent a pixel, an 8 bit image uses only one. Embedding process: least significant bit substitution(lsb Image) for i = 1,...,l(c) do si ci end for for i = 1...,l(m) do compute index ji where to store ith message bit sji cji mi end for Extraction process: least significant bit substitution for i = 1,...,l(M) do compute index ji where the ith message bit is stored mi 134
8 =LBS(C IJ ) End for Randomized Algorithm In case, the sender uses all cover-elements for information transfer, starting at the first element. Since the secret message will normally have less bits than l(c), the embedding process will be finished long before the end of the cover. In this case, the sender can leave all other cover elements unchanged. This can, however, lead to a serious security problem: the first part of the cover will have different statistical properties than the second part, where no modifications have been made. The embedding process the changes far more elements than the transmission of the secret would require. Therefore the probability that an attacker will suspect secret Communication increases. A more sophisticated approach is the use of a pseudorandom number generator to spread the secret message over the cover in a rather random manner; a popular approach is the random interval method.if both communication partners share a stego-key k usable as a seed for a random number generator, they can create a random sequence k1,..., kl(m) and use the elements with indices for information transfer. Thus, the distance between two embedded bits is determined pseudo randomly. Since the receiver has access to the seed k and knowledge of the pseudorandom number generator, he can reconstruct ki and therefore the entire sequence of element indices ji. This technique is especially efficient. 5. RESULTS AND IMPLEMENTATION 5.1 Testing Objectives Testing is a process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as-yet undiscovered error. A successful test is one that uncovers an asyet-undiscovered error. The above objectives imply a dramatic change in viewpoint. They move counter to the commonly held view that a successful test is one in which no errors are found. Our objective is to design tests that systematically uncover different classes of errors and do so with a minimum amount of time and effort. If testing is conducted successfully (according to the objectives stated above), it will uncover errors in the software. Testing cannot show the absence of defects, it can only show that software errors are present. 5.2 Testing Techniques The techniques followed throughout the testing of the system are as under Black- Box Testing Black box testing focuses on the functional requirements of the software. That is, Black Box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. Black Box Testing is not an alternative to white-box techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. Black-Box Testing attempts to find errors in the following categories: 1. Incorrect or missing functions. 2. Interface errors. 3. Errors in data structures or external data base access. 4. Performance errors. 135
9 5. Initialization and termination errors. Unlike White Box Testing, which is performed early in the testing process, Black Box Testing tends to be applied during later stages of testing. Because Black Box Testing purposely disregards control structure, attention is focused on the information domain. White-Box Testing White Box Testing knowing the internal workings of a product tests can be conducted to ensure that internal operations are performed according to specifications and all internal components have been adequately exercised. Using white box testing methods the test cases that can derived are: (1) All independent paths with in a module have been exercised at least once. (2) Exercise all logical decisions on their true and false sides. (3) Execute all loops at their boundaries and within their operational bounds. (4) Exercise internal data structures to ensure their validity. Control Structure Testing 1) Condition Testing Condition testing is a test case design method that exercises the logical conditions contained in a program module. If a condition is incorrect then at least one component of the condition are incorrect Therefore types of errors in a condition including the following? Boolean operator error Boolean variable error Boolean parenthesis error Relational operator error Arithmetic expression error 2) Loop Testing Loops are the corner stone for the vast majority of all algorithms implemented in software. Loop testing is a white-box testing technique that focuses exclusively on the validity of loop constructs. 3) Control Testing The dataflow testing method selects test paths of a program according to the location of definitions and uses of variables in the program. In this testing approach, assume that each statement in a program is assigned a unique statement number and that each function does not modify its parameters or global variables. It is useful for selecting test paths of a program containing nested if and loop statement. This approach is effective for error detection. However, the problems of measuring test coverage and selecting test paths for data flow testing are more difficult than the corresponding problems for condition testing. Unit Testing Unit testing focuses verification efforts on the smallest unit of software design. It is white box oriented. Unit testing is essentially for verification of the code produced during the coding phase and hence the goal is to test the intemallogic of the module. Others consider a module for integration and use only after it has been unit tested satisfactorily. The module interface is tested to ensure that information properly flows in and out of program. Local data structure is examined to ensure that data stored temporarily maintain its integrity. Boundary conditions are tested to ensure that modules operate properly at boundary limits of processing. All independent paths are exercised to ensure all statements in a module have been executed at least once. 136
10 Integration Testing Integration testing focuses on design and construction of the software architecture. For example: - We followed a systematic technique for constructing the program structure that is "putting them together"- interfacing at the same time conducting tests to uncover errors. We took unit tested components and build a program that has been dictated by design. 6. CONCLUSION AND FUTURE SCOPE We have implemented about 6 algorithms for image steganography 3 variants of audio steganography, and one algorithm for Steganalysis.Screen shots display the output of the software applied for different cases. There is no dearth to the type of information that the user can hide. Only exception is there to the amount of information that he can hide. Comparative analysis of the various algorithms Steganography, especially combined with cryptography, is a powerful tool which enables people to communicate without possible eavesdroppers even knowing there is a form of communication in the first place. The methods used in the science of steganography have advanced a lot over the past centuries, especially with the rise of the computer era. Although the techniques are still not used very often, the possibilities are endless. Many different techniques exist and continue to be developed, while the ways of detecting hidden messages also advance quickly. Since detection can never give a guarantee of finding all hidden information, it can be used together with methods of defeating steganography, to minimize the chances of hidden communication taking place. Even then, perfect steganography, where the secret key will merely point out parts of a cover source which form the message, will pass undetected, because the cover source contains no information about the secret message at all. In the near future, the most important use of steganographic techniques will probably lie in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials. Although it will not prevent the distribution itself, it will enable the content provider to start legal actions against the violators of the copyrights, as they can now be tracked down. Steganography might also become limited under laws, since governments already claimed that criminals use these techniques to communicate. ACKNOWLEDGEMENTS 137
11 I would like to add few heartfelt words for the people, who were part of this project in numerous ways, people who gave support in completing this report. Completion of the project would not have been possible without mutual efforts and integrated thoughts. I wish to express my gratitude and hearty appreciation to my Project Guide and Mentor Prof. Bharat Agarwal for providing a self-learning and congenial environment and for his continuous encouragement and enthusiastic guidance in the successful completion of the project work. REFERENCES [1] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) [2] D. Frith, Steganography approaches, options, and implications, Network Security, 2007(8)(2007)4-7 [3] H. Farid, A Survey of image forgery detection, IEEE Signal Processing Magazine, 26(2)(2009) [4] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, A secure and improved self-embedding algorithm to combat digital document forgery, Signal Processing, 89 (12)(2009) [9] Johnson, N. F. S. D, Z., Information Hiding: Steganography [10] Katzenbeisser, S. P., A. P, Information Hiding Techniques [11]. Saxena P.C., Gupta J.P., Gupta N., Web Page Ranking Based on Text Content of Linked Pages, International Journal of Computer Theory and Engineering (IJCTE), vol. 2, no. 1, pp , Feb [12] Benjamin C. M., Fung Ke, Wang M.E., Large hierarchical document clustering using frequent itemsets, Proc. Third SIAM International Conference on Data Mining 2003, pp , [13] Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Finding Authorities and Hubs from link structures on the World Wide Web, Proc. 10th WWW Conference, Hong Kong, pp , [14] Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Link analysis ranking: algorithms, theory, and experiments, ACM Transactions on Internet Technology, vol. 5, no. 1, pp , [15] S. Butcher, Charles LA. Clarke. A. Index compression is good, especially for random access. In Proc. of the 16th ACM CIKM, pages , 2007 [16]Borodin A., Roberts Gareth O., Rosenthal J.S., Tsaparas P., Link analysis ranking: algorithms, [5] H. Nakamura and Q. Zhao, Information hiding based on image morphing, in: Proceedings of 22ndInternational Conference on Advanced Information Networking and Applications Workshops, AINAW March 2008, [6] Avedissian, L.Z," Understanding Testing Strategies. [7] C. J. S. B, Modulation and Information Hiding in Images, [8] Dorothy, E.R, D.K, Cryptography and Data Security 138
CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment
CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which
More informationDIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography
More informationSteganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems
Steganography John Von Dollen Ron Lepper Coen 150: Information Security Systems May 17, 2004 Abstract: While technology increases, the amount of privacy provided by simply encrypting a message decreases.
More informationSteganography and Steganalysis
Steganography and Steganalysis J.R. Krenn January 2004 What is steganography? Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and
More informationSTEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE
STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE Joseph Dedy Irawan Informatics Engineering, Industrial Technology Faculty, Institut Teknologi Nasional Malang Jalan Raya Karangploso KM 2 Malang Email: joseph_dedy@yahoo.co.id
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationAnalysis of Steganography as a Security Technique
Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationIntroduction to Steganography
POLYTECHNIC UNIVERSITY Department of Computer and Information Science Introduction to Steganography K. Ming Leung Abstract: This material deals with the history and an introduction to the art and science
More informationSmart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationSteganography: A Security Model for Open Communication
Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationSecured Way of Ciphering Text Using Audio Steganography
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationA Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University
A Study Of Steganography 1 STEGANOGRAPHY STUDY A Study Of Steganography And The Art Of Hiding Information Alain C. Brainos II East Carolina University A Study Of Steganography 2 Abstract The recently created
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationInformation Hiding in BMP image Implementation, Analysis and Evaluation
Èíôîðìàöèîííûå ïðîöåññû, Òîì 6, 1, 2006, ñòð. 110 c 2006 Alkhraisat Habes. INFORMATION TRANSMISSIONS IN COMPUTER NETWORKS Information Hiding in BMP image Implementation, Analysis and Evaluation Alkhraisat
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationComparative Analysis of Different Transformation Techniques in Image Steganography
Comparative Analysis of Different Transformation Techniques in Image Steganography Sourav Kumar Kamila (111CS0127) Department of Computer Science and Engineering National Institute of Technology Rourkela
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationSecret Communication through Audio for Defense Application
Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationSteganography. Brent McClain Rob Carey
Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created
More informationNew Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)
New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationSteganography using MATLAB
ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationSeminar report Java Submitted in partial fulfillment of the requirement for the award of degree Of CSE
A Seminar report On Java Submitted in partial fulfillment of the requirement for the award of degree Of CSE SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org 1 Acknowledgement I would like
More informationText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationNathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers
Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made
More informationImage Analysis for Online Dynamic Steganography Detection
Vol. 1, No. 3 Computer and Information Science Image Analysis for Online Dynamic Steganography Detection Kevin Curran & Joanne Mc Devitt Intelligent Systems Research Centre Faculty of Engineering University
More informationImproved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal
Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal Abstract- Computer Technology and the Internet have made a breakthrough in the existence of data communication.
More informationProf.(Dr.) J. K. Mandal
Information Security Prof.(Dr.) J. K. Mandal Ex-Dean, Faculty of Engineering, Technology & Management Professor & Head, Department of Computer Science & Engineering University of Kalyani Kalyani, Nadia,
More informationSE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction
SE 4C03 Winter 2004 Steganography Derek Lunn (9943193) Last Revised: April 6th 2004 Introduction Steganography is a means of hiding information in a carrier medium. Although the concept itself is not new,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationSecret Sharing, Random Numbers, and Information Hiding. Prof. Tom Austin San José State University Spring 2014
Secret Sharing, Random Numbers, and Information Hiding Prof. Tom Austin San José State University Spring 2014 Summer University 2014 Summer CS program held in Yverdon-les-Bains, Switzerland. Applications
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationIntroducing Image Steganography in Bangla Language Communication
Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,
More informationSeminar report Steganography
A Seminar report on Steganography Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationNEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY
NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY 1. Introduction: New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications.
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING
More informationPart 5. Verification and Validation
Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this
More informationSteganography Workshop
Steganography Workshop About the Speaker 2 20 books (Including 3 on forensics, 5 on computer security, 1 on cryptology) 40 industry certifications Member of the American College of Forensic Examiners Diplomat
More informationCIS 121 Data Structures and Algorithms with Java Spring 2018
CIS 121 Data Structures and Algorithms with Java Spring 2018 Homework 6 Compression Due: Monday, March 12, 11:59pm online 2 Required Problems (45 points), Qualitative Questions (10 points), and Style and
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography
A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique
More informationGA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption
GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security
More informationEnhanced LSB Based Audio Steganography
Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com
More informationFast Real-Time Hardware Engine for Multipoint Text Steganography
Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,
More informationPrinciple of Graph Theoretic Approach to Digital Steganography
Computing For Nation Development, February 26 27, 2009 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Principle of Graph Theoretic Approach to Digital Steganography Vinay
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationComparision in cover media under Stegnography Digital media by Hide and Seek Approach
Comparision in cover media under Stegnography Digital media by Hide and Seek Approach Shruti Deptt. Of Computer science Guru Nank Dev University Gurdaspur, India Abstract:-Although every people have secrets
More informationSOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur
SOFTWARE ENGINEERING IT 0301 Semester V B.Nithya,G.Lakshmi Priya Asst Professor SRM University, Kattankulathur School of Computing, Department of IT 1 School of Computing, Department 2 SOFTWARE TESTING
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationSteganography: Hiding Data In Plain Sight. Ryan Gibson
Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationTopics. Number Theory Review. Public Key Cryptography
Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review
More informationJournal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION
Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationDigital Watermarking: Combining DCT and DWT Techniques
Digital Watermarking: Combining DCT and DWT Techniques 1 MR. D.G.VAGHELA, 2 MR. V.P.GOHIL, 3 PROF. RAMLAL YADAV 1 M.Tech. [CSE] Student, Department of Computer Engineering, Kautilya Institute Of Technology
More informationImage Steganography by Mapping Pixels to Letters
Journal of Computer Science 5 (1): 33-38, 2009 ISSN 1549-3636 2009 Science Publications Image Steganography by Mapping Pixels to Letters Mohammed A.F. Al-Husainy Department of Computer Science, Faculty
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationA Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]
RESEARCH ARTICLE A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] Department of Computer Science & Engineering [1] Dr. BAMU University, Osmanabad Department of Electronics
More informationLecture 1: Perfect Security
CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationSoftware Testing part II (white box) Lecturer: Giuseppe Santucci
Software Testing part II (white box) Lecturer: Giuseppe Santucci 4. White box testing White-box (or Glass-box) testing: general characteristics Statement coverage Decision coverage Condition coverage Decision
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationAnonymity. Assumption: If we know IP address, we know identity
03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationAn Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationAn Analysis of Various Techniques in Audio Steganography
An Analysis of Various Techniques in Audio Steganography B.Ramapriya 1, K.Bhuvanasundari 2, D.Bharathi 3 Assistant Professor, Dept. of Computer Science, Sri Akilandeswari Women s College, Wandiwash, Tamil
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationDistributed Steganography
Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into
More informationWatermarking for Security in Database
Watermarking for Security in Database Prof. Manoj Dhande Department of Computer Engineering of Shah and Anchor Kutchhi Engineering College, Chembur, University of manoj.dhande@gmail.com Aishwarya Kotyankar
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To
More informationSoftware Design Fundamentals. CSCE Lecture 11-09/27/2016
Software Design Fundamentals CSCE 740 - Lecture 11-09/27/2016 Today s Goals Define design Introduce the design process Overview of design criteria What results in a good design? Gregory Gay CSCE 740 -
More information