IMAGE STEGANOGRAPHY REVIEW
1. INTRODUCTION
With the rapid development of computer technologies and internet, one can get any information through internet very easily. To transfer or convey a message from one point to another is also very convenient in today’s era. People who have internet and computer can get any type of information related to any field without any difficulty [1]. While transferring or communicating on internet safety and security remains an issue. Steganography schemes are used to get rid of these type of safety and security issues. The standard phrase “What You See Is What You Get (WYSIWYG)” is not true if the misuse or hacking is there. One can transfer secret information through internet using Steganography schemes very easily.
1.1 Nomenclature
Steganography is the word derived from a Greek word Steganos, which means, “Covered ” and graphy means “writing”. Steganography is a technique which is used to hide data in such a manner that the existence of hidden data is unknown. The original files can be referred to as cover text, cover image, or cover audio. Medium through which the information is hidden is Stego Medium. Steganalysis is the identifying the existence of the message.
1.2 Origin of Steganography
The origin of steganography was by Greeks in 500 B.C. They use slaves as a medium to send the hidden message. The slave’s head was shaved and the secret message is tattooed on the skull, after which hairs are allowed to regrow. The slave is then send to the destination who shave the slaves’ head and read the hidden message. This method is not time dependent. Then next strategies used by Greeks are stuffed rabbits and wax tables. In the middle ages i.e. 1400-1600 A.D., the concept of Biliteral ciphe...
... middle of paper ...
...chniques”, ASEE Northeast Section Conference
[2]. Streetman Kibbee D.,------,”Steganography Art of Covert Communication”----------
[3]. Ashok Jammi, Raju Y., S.Munishankaraiah, K.Srinivas, 2010, “Steganography:An Overview”, International Jornal of Engineering Science and Technology, Vol. 2, No.10,pp. 5985-5992.
[4]. Wu Hsien-Chu, Wang Hua-Cheng, Tsai Chwei-Shyong, Wang Chung-Ming, 2010, “Reversible Image Steganographic Scheme Via Predictive Coding” ,Displays Elsevier, Vol. 31, No. 1, pp. 35-43.
[5]. Chugh Gunjan,2013,”Image Steganography Techniques: A Review Article”, ACTA technical corviniensis-Bulletin of Engineering, Vol. 6,No. 3, pp.97-104.
[6]. Joshi Saurabh V., Bakil Ajinkya A., Jain Nikhil A., Koshti Deepali,2012,”Image Steganography Combination of Spatial and Frequency Domain”,International Journal of Computer Applications, Vol. 53, No. 5, pp. 25-29.
Back-masking is the process where a recording is normally recorded, but the message is embedded in the song in a way that if the record is played backwards there is some kind of message in the song. This means that the song can be played both forward and backwards and the song will have two different meanings. This process was made popular by the Beatles.
Murphy, S.D. 2004. “Steganography--the New Intelligence Threat.” Marine Corps War College, Marine Corps University, Marine Corps Combat Development Command. Quantico: VA. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA520517 (accessed November 31, 3013).
The first recorded use of steganography dates back to the early Greeks and the ruler, Demaratus. As king of Sparta, Demaratus ruled from 515 to 491 B.C. At this time, it was common to write on waxed tablets. To communicate a warning of an impending attack on Greece by the Persian ruler Xerxes, Demaratus scraped the wax off of a wooden tablet, inscribed a message, and then covered the tablet in wax once again. In this way, the tablets carried secret information to the intended recipient without arousing suspicion. Other times of conflict are rich with examples of steganography. The Underground Railroad used quilt patterns to direct slaves on their journey northward, cryptographic writing was used numerous times in both World War I and II, and
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
At the first thought of steganography what is the first thing that pops into you mind? For me I would have to stay the court steganography. It is really the only way I heard steganography mention before, but after research I came to the realization that court steganography is just one part of the various types of steganography that there are. Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party (Gary). Going all the way back to the caveman error steganography exited. There form of usage were painting on the wall that they used to communicate with each other. Some were simpler than others to understand others are still being coded as I write on this
First, we should establish that image manipulations are a common occurrence, and always have been. In an article on Fstoppers, Alex Cooke points out that “anything, anything at all, that modifies a capture
An onion is a data structure that is formed by wrapping a plaintext message with successive layers of encryption, such that each layer can be unwrapped or decrypted like the layers of an onion. The plaintext message is only viewable by the sender, exit node, recipient. This can be extended to end to end encryption so that the last intermediary cannot also view the message.
Imagery/computer composite- When a witness is present; a forensic sketch artist will get as much information as possible to do a composite drawing of a suspect; either manually or use a computer. Sometimes; they will use both, using
The second step, layering, is the first attempt to conceal or disguise the source of the ownership of the funds by creating complex layers of financial transactions designed to disguise the audit trail and provide anonymity. The purpose of layering is to disassociate the illegal moneys from the source of the crime by purposely creating a complex web of financial transactions aimed at concealing any audit trail as well as the source and ownership of the funds.
The new breakthrough technique that has been catching attention is the use of conformal-evaporated-film-by-rotation (CEFR). This approach looks at the geometry rather than the chemistry of each fingerprint. “Latent, sebaceous fingerprints were deposited on forensically relevant substrates, and then CTFs were deposited on these latent fingerprints using the conformal-evaporated-film-by-rotation (CEFR) technique. The specific objective of this basic research was to investigate the fundamental scientific and physical characteristics required to use CTFs to capture and visualize latent, sebaceous fingerprints by identifying the necessary CTF materials and deposition conditions required to develop fingerprints on selected forensically relevant substrates” (Shaler & Lakhtakia, The Acquisition of Sebaceous Fingerprint Topology Using Columnar Thin Films (CTF) on Forensically Relevant Substrates, 2013). For this research to even become helpful they had to test it out. “The research design included a comparison of CTF-developed prints with traditionally developed fingerprints on the same substrates, with minimum variability of
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
Steganography is basically made from two greek words steganos and grapter.steganos means covered and grapter means writing so steganography means “covered writing”.steganography is writing the secret message.The goal of steganography is to hide the text by installed messages in objects such as digital images, audio,video or text files.The other area of steganography is a copyright marking where the message is inserted to copyright over a document. steganography and watermarking portray routines to insert data straightforwardly into a bearer signal. Data stowing away in sound signs is increasing boundless significance for secure correspondence of data, for example, clandestine front line and managing an account exchanges by means of open sound
Steganography is the art of hiding or concealment of secret information within an ordinary message or file. The purpose is to hide the existence of this information from a third party so as to covertly pass messages along without being detected. (1)
Jost, Kenneth. "Examining Forensics." CQ Researcher Online. N.p., 17 July 2009. Web. 29 Apr. 2014. . How criminals can use photoshop to eliminate evidence
For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security. The internet allows people to communicate sensitive information, and if received into the wrong hands can cause many problems for that person.