Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Thesis on steganography
Thesis on steganography
Thesis on steganography
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Thesis on steganography
IMAGE STEGANOGRAPHY REVIEW
1. INTRODUCTION
With the rapid development of computer technologies and internet, one can get any information through internet very easily. To transfer or convey a message from one point to another is also very convenient in today’s era. People who have internet and computer can get any type of information related to any field without any difficulty [1]. While transferring or communicating on internet safety and security remains an issue. Steganography schemes are used to get rid of these type of safety and security issues. The standard phrase “What You See Is What You Get (WYSIWYG)” is not true if the misuse or hacking is there. One can transfer secret information through internet using Steganography schemes very easily.
1.1 Nomenclature
Steganography is the word derived from a Greek word Steganos, which means, “Covered ” and graphy means “writing”. Steganography is a technique which is used to hide data in such a manner that the existence of hidden data is unknown. The original files can be referred to as cover text, cover image, or cover audio. Medium through which the information is hidden is Stego Medium. Steganalysis is the identifying the existence of the message.
1.2 Origin of Steganography
The origin of steganography was by Greeks in 500 B.C. They use slaves as a medium to send the hidden message. The slave’s head was shaved and the secret message is tattooed on the skull, after which hairs are allowed to regrow. The slave is then send to the destination who shave the slaves’ head and read the hidden message. This method is not time dependent. Then next strategies used by Greeks are stuffed rabbits and wax tables. In the middle ages i.e. 1400-1600 A.D., the concept of Biliteral ciphe...
... middle of paper ...
...chniques”, ASEE Northeast Section Conference
[2]. Streetman Kibbee D.,------,”Steganography Art of Covert Communication”----------
[3]. Ashok Jammi, Raju Y., S.Munishankaraiah, K.Srinivas, 2010, “Steganography:An Overview”, International Jornal of Engineering Science and Technology, Vol. 2, No.10,pp. 5985-5992.
[4]. Wu Hsien-Chu, Wang Hua-Cheng, Tsai Chwei-Shyong, Wang Chung-Ming, 2010, “Reversible Image Steganographic Scheme Via Predictive Coding” ,Displays Elsevier, Vol. 31, No. 1, pp. 35-43.
[5]. Chugh Gunjan,2013,”Image Steganography Techniques: A Review Article”, ACTA technical corviniensis-Bulletin of Engineering, Vol. 6,No. 3, pp.97-104.
[6]. Joshi Saurabh V., Bakil Ajinkya A., Jain Nikhil A., Koshti Deepali,2012,”Image Steganography Combination of Spatial and Frequency Domain”,International Journal of Computer Applications, Vol. 53, No. 5, pp. 25-29.
Bourzac, Katherine. "A Practical Way to Make Invisibility Cloaks." MIT Technology Rview. N.p., 11 June 2011. Web. 12 May. 2014. .
The assigned article pertains to how a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device. In order to track the accused person named Rigmaiden, the investigators had used a secret device called Stingray to pinpoint their target accurately. Agents traced the suspect’s AirCrd back to his apartment as a main evidence for the conviction. This kind of device is not authorized to use for the law enforcing agencies. That is why the device had to be kept secret, even from the courts. The suspect could able to unravel decades of secrecy, becoming the world’s foremost authority on the device that sent him to jail. Finally, Rigmaiden could able to prove the use of covert surveillance device and the secret system was exposed to the public for the very first time.
In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater. However, the effects of encryption on our lifestyle and the government's role in encryption has been (and will continue to be) debated for years to come.
At the first thought of steganography what is the first thing that pops into you mind? For me I would have to stay the court steganography. It is really the only way I heard steganography mention before, but after research I came to the realization that court steganography is just one part of the various types of steganography that there are. Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party (Gary). Going all the way back to the caveman error steganography exited. There form of usage were painting on the wall that they used to communicate with each other. Some were simpler than others to understand others are still being coded as I write on this
Image splicing forgery technique involves composition or merging of two or more images changing the original image significantly to produce a forged image. In case images with differing background are merged then it becomes very difficult to make the borders and boundaries indiscernible. Figure 2 below shows an example of image splicing where the face of two different people is combined to form a forged image.
5. Royal Philips Electronics, Imaging : its digital future, Briefing, Volume 3, Issue 2, article no. 19.
An onion is a data structure that is formed by wrapping a plaintext message with successive layers of encryption, such that each layer can be unwrapped or decrypted like the layers of an onion. The plaintext message is only viewable by the sender, exit node, recipient. This can be extended to end to end encryption so that the last intermediary cannot also view the message.
Jost, Kenneth. "Examining Forensics." CQ Researcher Online. N.p., 17 July 2009. Web. 29 Apr. 2014. . How criminals can use photoshop to eliminate evidence
It also had influence in other Kingdoms during that time. In 3200 B.C.E Hieroglyphics first appeared. The Egyptians created this symbolic writing because of the Mesopotamian influence of cuneiform. Hieroglyphics were extensively used in Egypt during 2600-600 B.C.E. Hieroglyphics were the ancient symbolic writing of the Egyptians.
The Sumerians of Mesopotamia implemented a pictograph writing system around 3500-3000 BCE. The most contributions came from the Sumerian city of Uruk, when they advanced it to the wedge-shape system that was based on sounds and not ideas or pictures.
In our modern society almost every online act is a freedom of a citizen or a professional expression. Some content is stored and kept safe amongst small groups and some is made publicly available. Yet all acts can generate transactional information which can be viewed by many other parties over the web. This m...
Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World Trade Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for safety reasons (USA Today). A " private key" is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).
Stantis, Scott. Fighting Cyber Spying. Digital image. US News. U.S.News & World Report, 2013. Web. 22 Nov. 2013. (Source K)
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: