ABSTRACT: Security and capacity is the primary concern to the digital data in transmission. Cryptography and the Steganography are the two fields which provide security to the data in transmission. Steganography is derived from Greek in which “Stegan” means covered and “graphy” means writing. In steganography data can be sent using any digital format like email, audio, video and text. The essence of any steganographic technique can be validated from parameters like capacity, Peak Signal to Noise Ratio (PSNR), distortion. There are different methods in steganography such as Least Significant bit method (LSB), Pixel Value Differencing Method (PVD), Edge Detection Method. This article proposes a study on various stages of Pixel Value Differencing …show more content…
Everything is getting digitalized in this modern world. So, the security to that huge amount of data is a big task. Cryptography and steganography are the two techniques which provide security to the data. Steganography is a technique of hiding the data inside another data. The word steganography is derived from Greek language in which “steganos” means covered and “graphien” means writing. The efficiency of steganography is determined mainly by three parameters. They are hiding capacity, security and robustness. Computer based Image steganography is a technique for hiding the data which provides security to the data in form of digital images. The main aim of this steganography is to embed the data into the image without any suspiciousness. The message to be embedded can be a plain text or any another image, but that data should be represented in the bit stream form. Before embedding, the secret message should be converted into the bit stream …show more content…
In this computer based image steganography the basic requirement that is taken into consideration is that the so called stego-image should not differ from the original image. Such robustness is taken into consideration and those steganographic techniques are used in various applications. In such cases even though the existence of data in the image is publicly known there is no chance of attacking from the outside world since the stego-image resembles exactly same with the cover- image. Here in these steganographic methods we use digital images as the carriers for the confidential data such as secret letters, military maps, defense secrets etc. So there is no worry about the attacks of hackers on the stego-images. Even though the hackers try to attack there is no chance for identifying the stego-image which include the embedded messages, so there is no chance for disturbance of stego-image. Here we use mainly non-robust
The history of the modern media surveillance systems begins first with the invention of the computer and the use of software. Before the internet, information was only transported between computers by a physical storage device or an extremely expensive network. Software for media surveillance was only used to scan the media that was available in data form for particular key words. It could then be stored and indexed to be later analyzed. (Sarlós, 1982)
Video is one of the most compelling forms of communication of this time. Over the course of the past few years, the gradual but sure drift from analog to digital in video technology has not only improved the abilities of visual communication media to distribute data, but has also improved their abilities to manipulate the data that they distribute. Digital video technology has advanced to the extent that still image manipulation has been usurped by more powerful technological developments that allow elements of a video image to be manipulated in real-time. That is, objects or persons in a video image can be edited out or edited in while the image is in broadcast without the slightest glitch to suggest that some change has occurred; everything would look “real.” The advantages that this technology opens for visual media are extensive. Similar to some technologies, however, it opens up an exploitive edge. Pixels are plastic (can be changed) and using them to distort or manipulate reality is an opportunity open to all users of video manipulation tools. The ethics of such uses and the social considerations of how copyright laws would deal with a technology which manipulates digital works of authorship, works to which copyright automatically attaches, are issues worth considering. This paper explores the possible and actual, reputable and less reputable uses of this technology in an attempt to stimulate discussions about how “well-intended” technologies can be utilized by users in unethical and harmful ways. The paper also attempts to see where possible infringements of copyright’s fair use doctrine has occurred or could possibly occur through use of this technology.
Abstract: This paper starts with the history of Digital Forensics since when it is being used. The paper then moves to the process of digital forensics and its limitation. We shall look into the legal methods of computer forensics and also how to overcome the disadvantages of computer forensics.
... of encryption named cryptography seems unreliable since it used plain text, but DNA authentication and stenography has been proven useful in the field. DNA computing has been proven to handle difficult computation problem and it still holds a possibility to solve even more complex problem and replacing the electrical computer in the future.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Every kind of digital file carries invisible ‘tags’. By taking a picture you can detect the
Most of the Digital crimes are done by using technology against technology which is a vital part of the computer security process. Now a days many corporate companies, government agencies are taking precautionary measures by impimenting solutions and tools to undergo Digital and Cybercrimes. As more knowledge is obtained about how crimes are committed with the use of computers, more forensic tools are to be implemented to gather evidence more efficiently and combat the crime wave on technology.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
In this paper focus is on the implementation of lossless image data codec, when the input image data is encry
Steganography is basically made from two greek words steganos and grapter.steganos means covered and grapter means writing so steganography means “covered writing”.steganography is writing the secret message.The goal of steganography is to hide the text by installed messages in objects such as digital images, audio,video or text files.The other area of steganography is a copyright marking where the message is inserted to copyright over a document. steganography and watermarking portray routines to insert data straightforwardly into a bearer signal. Data stowing away in sound signs is increasing boundless significance for secure correspondence of data, for example, clandestine front line and managing an account exchanges by means of open sound
Steganography is the art of hiding or concealment of secret information within an ordinary message or file. The purpose is to hide the existence of this information from a third party so as to covertly pass messages along without being detected. (1)
With the rapid development of image processing technology, it is getting easier to tamper with digital images without leaving any obvious visual trace. Today, seeing does no longer believe [1]. Image forgery, like any other illegal and pernicious activity, could cause serious harm to society.
Cryptography is the study or science of techniques of secret writing and message hiding. Cryptography constitutes any method in which someone attempts to hide a message, or the meaning in some medium. One specific element of cryptography is encryption, which hides the data or information by transforming it into an undecipherable code. Encryption uses a specified key to perform the data transformation. The length of the key for the encryption
Due to growth of multimedia application, security becomes an important issue of communication and storage of images.Encryption is one of the ways to ensure high securityImages are used in many fields such as medical science, military; they are stored or transfer through network, security of such image data is important.This work proposes a novel scheme for the security of such images by the method of separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted imageusing a data-hiding key to create a sparse space to accommodate some additionaldata.With an encrypted image containing additional data, if a receiverhas the data-hiding key, he can extract the additional data thoughhe does not know the image content. If the receiver has the encryption key,he can decrypt the received data to obtain an image similar to the originalone, but cannot extract the additional data. If the receiver has both thedata-hiding key and the encryption key, he can extract the additional dataand recover the original content without any error by exploiting the spatialcorrelation in natural image when the amount of additional data is not toolarge.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: