Premium Essay

The Importance Of Digital Steganography

Submitted By
Words 4083
Pages 17
Abstract - : In today’s world, since the increase of web most of the communication and knowledge sharing is finished over the online. With the increasing unauthorized access of secret data, information security is of great importance. Thus, a big issue now a day is to reduce the chances of information detection during transmission. Cryptography deals with encryption of message but its presence arouse uncertainty about the communication, on the other hand, Steganography hides the presence of message in such a way that no one can even think about the communication going on between two parties. Due to rapid advancement in both computer technologies and Internet, the security of information is regarded as one of the most valuable factors of Information …show more content…
Almost all digital files can be used for steganography, but the formats of file that are more suitable are those with a high degree of redundancy. Redundancy can be defined as object bits that provide accuracy far greater than necessary for the object’s use and demonstration. The repetitive bits of an object are those bits that can be altered without the alteration being detected easily. Image and video files especially comply with this requirement, while research has also uncovered other file manuscripts that can be used for data hiding. This paper is mainly concentrating about image and video as carriers and their performance analysis based on its PSR and MSE …show more content…
The most widely used technique to hide secret bit inside the cover image. In image steganography image files like BMP, PNG, JPEG, TIFF, GIF etc. are used to hide data. Most image steganographic algorithms adopt an existing image as a cover medium. The cost of embedding secret data into this cover image is the image distortion encountered in the stego image. This leads to two defects.
First, since the dimension of the cover image is fixed, the more secret messages which are embedded creates more image distortion. Therefore, a compromise must be reached between the embedding capacity and the image clarity which leads in the minimum capacity provided in any specific cover image. Second, image steganalysis is a method used to find secret data hidden in the stego image. A stego image contains some distortion, and no matter how minute it is, this will contradict with the natural features of the cover image. This leads to the second defect because it is still easy that an image steganalytic algorithm can defeat the image steganography and thus reveal that a hidden message is being conveyed in a stego

Similar Documents

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented...

Words: 7291 - Pages: 30

Free Essay

Medical Images - Literature Review

...Literature Review When dealing with patients' sensitive medical records, it's always important how one also deals with medical images that should also be kept private. Health Insurance Portability and Accountability initiated on April 14, 2013 by the federal government, establishes all relevant standards to address the issue of privacy protection. The HIPAA requires for integrity and confidentiality in all of current, previous and future from hospitals, doctors, and other relevant professionals. In an era where digital technology has become of major importance, there is a series of medical images that can now be kept in digital format and become quite easy to retrieve, store and preserve. Watermarking – An Essential Aspect for the Protection of Medical Images A. Ethical reasons and relevant legislation define Medical Information Assurance & Watermarking Medical directions. USA's HIPAA and Europe's EC 95/46 Directive are the major legislations defining relevant directions. When dealing with medical information records, thus, which involve a series of clinical examinations, diagnoses, and EPR images, three major security attributes should be considered: • Confidentiality: only authorised users can view and evaluate medical information; • Availability: Scheduled accessing periods should be set when entering the information system containing the medical data; • Reliability: The information should be examined by authorised people and not changed by unauthorised...

Words: 2623 - Pages: 11

Free Essay

Text Compression Using Ambigrams

...Text Compression Using Ambigrams Arun Prasad R., Gowtham S., Iyshwarya G. ,Kaushik Veluru, Tamarai Selvi A., Vasudha J. Amrita School of Engineering, Coimbatore. {arun837, gowtham035, iysh16, kaushikveluru, tamarai1990, vasudha.1990}@gmail.com Abstract Networking field is looking forward for improved and efficient methods in channel utilization. For some text, data recovery becomes indispensable because of importance of data it holds. Therefore, a lossless decomposition algorithm which is independent of the nature and pattern of text is today’s top concern. Efficiency of algorithms used today varies greatly depending on the nature of text. Such algorithms need some characters to be frequently appearing in the text and randomness in the characters present distorts the consistency to a large extent. This paper brings in the idea of using an art form called ambigram to compress text with consistency in the efficiency of the compression. Keywords Ambigrams, lossless compression, steganography, stego key, embedded algorithms, encryption. 1. Introduction When so many algorithms are available for compressing text, they hamper the readability of the text once compressed. Compressing the text using ambigrams also reduces the text to nearly 50% of its size. When most of the other compressing techniques depend on the nature of the text to be compressed, this technique is independent of the type of the text and requires only...

Words: 1801 - Pages: 8

Premium Essay

Management

...Electronic Commerce, Seventh Annual Edition 10-1 Chapter 10 Electronic Commerce Security At a Glance Instructor’s Manual Table of Contents • • • • • • • Chapter Overview Chapter Objectives Instructor Notes Quick Quizzes Discussion Questions Additional Resources Key Terms Electronic Commerce, Seventh Annual Edition 10-2 Lecture Notes Chapter Overview In this chapter, you will explore security policy issues with a focus on how they apply to electronic commerce in particular. The electronic commerce security topics in this chapter are organized to follow the transaction processing flow, beginning with the consumer and ending with the Web server (or servers) at the electronic commerce site. Each logical link in the process includes assets that must be protected to ensure security: client computers, the communication channel on which the messages travel, and the Web servers, including any other computers connected to the Web servers. Chapter Objectives In this chapter, you will learn about: • • • • • Online security issues Security for client computers Security for the communication channels between computers Security for server computers Organizations that promote computer, network, and Internet security Instructor Notes Online Security Issues Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. There are two general types of security: physical and logical. Physical security includes tangible...

Words: 5468 - Pages: 22

Premium Essay

Ethical Hacking

...an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically important. One area that is very promising is penetration testing or Ethical Hacking. The purpose of this paper is to examine effective offerings within public and private sectors to prepare security professionals. These individuals must be equipped with necessary...

Words: 6103 - Pages: 25

Free Essay

Stenography

...“AN INFORMATIVE STUDY ABOUT SHORTHAND” _____________________________ PRESENTED TO THE FACULTY OF THE COLLEGE OF OFFICE ADMINISTRATION _____________________________ SUBMITTED TO: Professor 2012 BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION ACNOWLEDGEMENT We would like to dedicate this research study first to our almighty God for his Guidance and wisdom. To our family who gave us financial and moral support all throughout this research. To our professor, who thought us on the step by step process of this research and to all BSOA students that are interested to make this research as their guide for their future career. Bachelor of Science in Office Administration BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION TABLE OF CONTENTS Abstract . . . . . . . . . . pg 1 Statement of the Problem . . . . . . . pg 2 Review of Related Literature . . . . . . . pg 2-10 Design of Investigation . . . . . . . . pg 11 Measurement Technique Used . . . . . . . pg 12-13 Findings . . . . . . . . . . pg 14-24 Conclusion . . . . . . . . . . pg 25 Summary . . . . . . . . . . pg 26-32 BACHELOR OF SCIENCE IN OFFICE ADMINISTRATION LIST OF FIGURES Figure Page Pitman Shorthand . . . . . . . . . 3 Munson Shorthand . . . . . . . . 3 Thomas Natural Shorthand . . . . . . . 4 Eclectic shorthand . . . . . . . . . 4 Bezenšek Shorthand . . . . . . . . 4 Boyd's...

Words: 6830 - Pages: 28

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Premium Essay

Research Topic of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Uchendu, Prince | | BTM7102 | Dr. Dmitry Eremin | | | Research Topics of Interest | Assignment 2 | | | Although the main task instructions did not include the turning in of the 8 to 10 topics of interest list required, but it did not exclude its submission either. So I decided to add it at the end of the document post reference section. It can be disregarded if it does not need to be considered as part of the main task submission requirement. Thank you. ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Dr. Randy Brown Annotated Biographies Oreku, G. S., & Li, J. (2009). End user authentication (EUA) model and password for security. Journal of Organizational and End User Computing, 21(2), 28-43. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/199920202?accountid=28180 This article proposes an End User Authentication flexibility...

Words: 2303 - Pages: 10

Free Essay

Icttm

...------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ International Conference on Telecommunication Technology and Management (ICTTM 2015) April 11-12, 2015 ORGANIZED BY Bharti School of Telecommunication Technology and Management Indian Institute of Technology Delhi ACADEMIC PARTNERS Telecom Ecole de Management, France GSM Association (GSMA) PUBLICATION PARTNER SPONSORS 1 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ CONFERENCE SCHEDULE Day 1 (11th April, 2015) Registration (9:00 A.M. - 10:00 A.M.) Venue: Seminar Hall, IIT Delhi Inaugural Session (10:00 A.M. - 11:00 A.M.) Venue: Seminar Hall, IIT Delhi Networking High Tea (11:00 A.M.. - 11:30 A.M.) Panel Discussion (11:30 A.M. - 1:00 P.M.) Venue: Seminar Hall, IIT Delhi Lunch (1:00 P.M.- 2:00 P.M.) Venue: Cricket Ground, IIT Delhi Track 1 Venue: Room No 101, Ground Floor, Bharti School, IIT Delhi Session Coordinator: Ms. Shiksha Kushwah Session 1 Session 2 (2:00P.M. to 3:30 P.M.) (4:00P.M. to 6:00 P.M.) Session Chair(s) Session Chair(s) Prof. Sushil Prof. S. S. Yadav Prof. Kirankumar S. Momaya Dr. Sujata Joshi Track 2 Venue: Room No 106, Ground Floor, Bharti School, IIT Delhi Session Coordinator: Ms. Rojalin Pradhan ...

Words: 6478 - Pages: 26

Free Essay

Mr. Loo

...Paper  to  be  presented  at  Oxford  Internet  Institute’s  “A  Decade  in  Internet  Time:  Symposium   on  the  Dynamics  of  the  Internet  and  Society”  on  September  22,  2011.       Social  Privacy  in  Networked  Publics:     Teens’  Attitudes,  Practices,  and  Strategies     danah  boyd  and  Alice  Marwick   Microsoft  Research   dmb@microsoft.com  and  amarwick@microsoft.com       Waffles,  17,  NC1:    Every  teenager  wants  privacy.  Every  single  last  one  of  them,   whether  they  tell  you  or  not,  wants  privacy.  Just  because  an  adult  thinks  they  know  the   person  doesn’t  mean  they  know  the  person.  And  just  because  teenagers  use  internet   sites  to  connect  to  other  people  doesn’t  mean  they  don’t  care  about  their  privacy.  We   don’t  tell  everybody  every  single  thing  about  our  lives.  We  tell  them  general   information  -­  names,  places,  what  we  like  to  do  -­  but  that’s  general  knowledge.  That’s   not  something  you  like  to  keep  private-­-­  “Oh,  I...

Words: 14838 - Pages: 60

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

Cissp

...CISSP: The Domains Table of Contents INTRODUCTION 4 DOMAIN 1: ACCESS CONTROL WHAT’S NEW IN ACCESS CONTROL? AN OVERVIEW 5 5 7 DOMAIN 2: SOFTWARE DEVELOPMENT SECURITY WHAT’S NEW IN APPLICATIONS SECURITY (NOW SOFTWARE DEVELOPMENT SECURITY)? AN OVERVIEW 9 9 10 DOMAIN 3: BUSINESS CONTINUITY & DISASTER RECOVERY WHAT’S NEW? AN OVERVIEW 12 12 13 DOMAIN 4: CRYPTOGRAPHY WHAT’S NEW? AN OVERVIEW 17 17 18 DOMAIN 5: INFORMATION SECURITY GOVERNANCE & RISK MANAGEMENT WHAT’S NEW? AN OVERVIEW 21 21 22 DOMAIN 6: LEGAL, REGULATIONS, INVESTIGATIONS, AND COMPLIANCE WHAT’S NEW? AN OVERVIEW 24 24 26 DOMAIN 7: SECURITY OPERATIONS WHAT’S NEW? AN OVERVIEW 28 28 29 DOMAIN 8: PHYSICAL & ENVIRONMENTAL SECURITY WHAT’S NEW? AN OVERVIEW 32 32 33 DOMAIN 9: SECURITY ARCHITECTURE & DESIGN WHAT’S NEW? AN OVERVIEW 36 36 38 DOMAIN 10: TELECOMMUNICATIONS & NETWORK SECURITY WHAT’S NEW? AN OVERVIEW 40 40 41 INFOSEC INSTITUTE’S CISSP BOOT CAMP COURSE OVERVIEW COURSE SCHEDULE 44 44 45 INTRODUCTION (ISC)²’s CISSP Exam covers ten domains which are:           Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal regulations, investigations, and compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications...

Words: 11687 - Pages: 47

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Bibliography

...Bibliography for Social Network Sites related thesis Aaltonen, S,, Kakderi, C,, Hausmann, V, and Heinze, A. (2013). Social media in Europe: Lessons from an online survey. In proceedings of the 18th UKAIS Annual Conference: Social Information Systems. (pp. Availalable online). USIR. , and 2013, , in: , 19-20 March 2013, Worcester College, Oxford, UK. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.In Golle, P. and Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies. (pp. 36--58).Cambridge, U.K. Robinson College. June 28-30. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2009). Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27), 10975-10980. (journal article) Adamic, Lada, Buyukkokten,Orkut, and Eytan Adar. (2003). A social network caught in the Web. First Monday, 8 (6). (journal article) Adrien Guille, Hakim Hacid, Cécile Favre, and Djamel A. Zighed. (2013). Information diffusion in online social networks: a survey. SIGMOD Record, 42 (2). (journal article) Agarwal, S., and Mital, M.. (2009). Focus on Business Practices: An Exploratory Study of Indian University Students' Use of Social Networking Web Sites: Implications for the Workplace. Business Communication Quarterly. (journal article) Ahmed OH, Sullivan SJ, Schneiders AG, and McCrory P. (2010). iSupport:...

Words: 18938 - Pages: 76