...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...
Words: 3746 - Pages: 15
...big issue now a day is to reduce the chances of information detection during transmission. Cryptography deals with encryption of message but its presence arouse uncertainty about the communication, on the other hand, Steganography hides the presence of message in such a way that no one can even think about the communication going on between two parties. Due to rapid advancement in both computer technologies and Internet, the security of information is regarded as one of the most valuable factors of Information...
Words: 4083 - Pages: 17
...Information Hiding – Steganography Steganography Types and Techniques Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the knowledge...
Words: 1519 - Pages: 7
...Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text, or a picture or in a video files. Steganography is Greek word has the meaning of , “Stegano”...
Words: 2564 - Pages: 11
...Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented to the recognition, identification, individualization and evaluation of physical evidence by the application...
Words: 7291 - Pages: 30
...are taking advantage of new communications to make organizations more efficient, effective, and user friendly. These systems have superior advantages, but with the many advantages noted there are also disadvantages. The health care system has to decide if the financial impact of changing its system is beneficial in the long run. Because technology is always updating, incorporating a new communication system may only be useful for a short time. Immense growth in medical knowledge and technology spawned an era of specialization in which doctors focused on particular aspects of health called, ‘”specialization” (DuPre, p. 38). This paper will be discussing a new technology termed as “teleputers.” Teleputers are small mobile devices used as a computer, phone, and entertainment. In 1999 researches predicted that people would use teleputers to conduct research, play games, surf the internet, and transfer information (DuPre p. 321). Many people use smart phones. A smart phone is a mobile, hand held computer that is used as a phone, planner, clock, game and entertainment system, and much more. How is this important in health care communications? Health care systems sometimes have supportive groups to convey information through telephones and computers. These are virtual communities (Du Pre, p. 182). Having “teleputers” makes sharing information easier and more convenient. A patient would not have to rush home or get to the library to access his or her supportive resources. Easy access...
Words: 901 - Pages: 4
...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...
Words: 8940 - Pages: 36
...distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief history of watermarking and then go on to describe the basic components of any watermarking system, different uses for and characteristics of watermarking systems, types of attacks that watermarks are designed to defend against, all followed by a simple example of a watermarking system. We then conclude with an analysis of this watermarking system and an overview of topics of current...
Words: 3166 - Pages: 13
...Cache Coherence Considered Harmful Abstract Write-ahead logging and the Internet, while robust in theory, have not until recently been considered structured. In this paper, we validate the construction of digital-to-analog converters, which embodies the technical principles of concurrent steganography. We concentrate our efforts on disproving that the foremost event-driven algorithm for the study of the UNIVAC computer by Garcia et al. [5] is in Co-NP. Table of Contents 1 Introduction Unstable communication and multi-processors have garnered profound interest from both cyberneticists and systems engineers in the last several years. In this work, we verify the construction of massive multiplayer online role-playing games. An unfortunate quagmire in hardware and architecture is the visualization of the unfortunate unification of compilers and RPCs. Nevertheless, superblocks alone cannot fulfill the need for stable information. We question the need for scatter/gather I/O. In the opinions of many, the disadvantage of this type of solution, however, is that flip-flop gates can be made game-theoretic, low-energy, and amphibious. On a similar note, indeed, replication and IPv4 have a long history of synchronizing in this manner. Existing secure and extensible approaches use relational theory to visualize unstable configurations. We view programming languages as following a cycle of four phases: emulation, investigation, emulation, and creation. Combined with the World...
Words: 466 - Pages: 2
...|[pic] |Term Project Guideline |[pic] | Introduction The intent of this project is for your project group to conduct independent investigation and demonstrate an in-depth knowledge of a specific area related to Computer and Cyber Forensics (or digital forensics). The project can take several forms. Your team may (1) design a hands-on lab, (2) develop a comprehensive WWW portal on a topic related to cyber forensics, or (3) choose your own form and substance. Project Details The following paragraphs are guidelines for some of the project options: 1. Hands-on Lab Development Your team may elect to design a hands-on lab (similar to what you have practiced in this class). Your report should include an instructional guide for the lab and a report that documents your team’s exploration and results of the lab. The hands-on lab should cover the detailed process of conducting a complete forensic analysis (imaging, data recovery, and analysis) on selected digital devices or using criminal tools for attack, defense, and data recovery. Here is a list of possible devices or tools: Digital Devices: |Digital Music Device |Mobile Phone | |Flash Memory Cards |RIM (BlackBerry) Wireless Device ...
Words: 822 - Pages: 4
...“AN INFORMATIVE STUDY ABOUT SHORTHAND” _____________________________ PRESENTED TO THE FACULTY OF THE COLLEGE OF OFFICE ADMINISTRATION _____________________________ SUBMITTED TO: Professor 2012 BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION ACNOWLEDGEMENT We would like to dedicate this research study first to our almighty God for his Guidance and wisdom. To our family who gave us financial and moral support all throughout this research. To our professor, who thought us on the step by step process of this research and to all BSOA students that are interested to make this research as their guide for their future career. Bachelor of Science in Office Administration BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION TABLE OF CONTENTS Abstract . . . . . . . . . . pg 1 Statement of the Problem . . . . . . . pg 2 Review of Related Literature . . . . . . . pg 2-10 Design of Investigation . . . . . . . . pg 11 Measurement Technique Used . . . . . . . pg 12-13 Findings . . . . . . . . . . pg 14-24 Conclusion . . . . . . . . . . pg 25 Summary . . . . . . . . . . pg 26-32 BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION LIST OF FIGURES Figure Page Pitman Shorthand . . . . . . . . . 3 Munson Shorthand . . . . . . . . 3 Thomas Natural Shorthand . . . . . . . 4 Eclectic shorthand . . . . . . . . . 4 Bezenšek Shorthand . . . . . . . . 4 Boyd's...
Words: 6830 - Pages: 28
...138 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 1, FEBRUARY 2012 A Fusion Approach for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colors across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin detection approach that combines a smoothed 2-D histogram and Gaussian model, for automatic human skin detection in color image(s). In our approach, an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required, and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach. Index Terms—Color space, dynamic threshold, fusion strategy, skin detection. ...
Words: 5432 - Pages: 22
...Electronic Commerce, 7th Edition 14188-37032 Chapter 10 Solutions Review Questions 1. In about 200 words, explain why Web sites use cookies. In your answer, discuss the reasons that cookies were first devised and explain where cookies are stored. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to...
Words: 1430 - Pages: 6
...Discover an Invisible fluorescent ink | Introduction: (Initial Observation)Introduction: Invisible ink refers to any substance which can be used to write with, which is either invisible on application or disappears quickly, and can be subsequently restored by some means. The use of invisible ink is a form of steganography, and has been used in espionage. The simplest forms of invisible ink are lemon juice and milk. Write on paper with a fountain pen, toothpick or a finger dipped in the liquid. Once dry, the paper appears blank. The writing is made to appear by heating the paper, on a hot radiator for example. Invisible inks have been used for secrecy and security for many years. The Germans in World War II used invisible inks for secret writings. One suspected spy was found to have large numbers of keys in his motel room. After inspecting the keys it was found that some of the keys were modified to unscrew at the top to show a plastic nib. The keys contained special chemicals for invisible ink! However, codes and secret ink messages were very easily captured and decoded. Some of the more fun secret writings are concealment messages like invisible inks made out of potato juice, lemon juice, and other types of juices and sugars! Deciphering and decoding messages take a lot of time and can be very frustrating. With experience, strategies, and most of all luck, you'll be able to crack lots of codes and ciphers. | Information Gathering: Gather information about your project...
Words: 1755 - Pages: 8
...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...
Words: 3494 - Pages: 14