HOLY SPIRIT UNIVERSITY OF KASLIK
Steganography And Information Hiding
Prepared by: Gretta DAGHER Presented to: DR Charles SARRAF
Abstract:
Sending encrypted messages repeatedly will catch the attention of third parties, i.e. crackers and hackers, possibly causing attempts to break and make known the original contents. In a digital world, Steganography is introduced to hide the existence of the communication by covering up a secret message inside another unwary message.
Steganography is frequently being used with cryptography and offers privacy and security. This paper presents an outline of( text steganography and a brief history of steganography along with various existing text-based Steganography techniques).
There are
…show more content…
So as we can see, steganography is a powerful tool in this age of information.
III-Disadvantages of Steganography:
However, there are as well some disadvantages to mention. One of steganography’s disadvantages is that there is large overhead to hide very tiny amounts of information. Hiding short messages within wide text is limited by the size of the extensive text. Text files cleanly aren’t big enough to cover more complex data like images or audio files.
The biggest risk is the clash between an original image without the secret message and the steganated image with the secret message. Also, you could make cruel degradation of an image trying to analyze it.
Maybe we can argue that the main advantage to privately communicate is really worth the other disadvantages involved. Finally, it is important to point out the value of weighing the danger involved in using this technology, the risk of being exposed and discovered and its consequences.
IV-Stegonagraphy application scenario: The steganography application hides diverse kinds of data within a cover file. The result contains hidden information too, although it is virtually similar to the cover
Information security is a major concept in today’s industrial and computer era, so security must be higher to protect the confidential data. Information security plays major role in computer and network security with the use of different cryptography algorithms that includes the encryption and decryption of data with the uses of the algorithm and the key. By means of text or numerical key for the encryption can be dangerous because with the several hack attacks that a key can be broken. So I have proposed a new mechanism that will replace the text key with the image pixels and can gain high security which cannot be easy to break without prior knowledge.
The aim of this document is to provide an overview on the various cryptographic technologies in use today and what the future might hold. The document will cover the following subjects:
Data encryption and decryption have become increasingly important as more people are communicating over the internet. Although cryptology is not new, the demand for this technology has soared as its usefulness for security purposes has become more evident. Cryptology involves converting original messages into non-readable formats and plays an important role in keeping data safe while it is in transit (Agrawal & Mishra, 2012). Two popular forms of cryptology are symmetric and asymmetric.
To achieve this goal, I have organized my paper into three different sections. Each section will focus on a segment on the history of encryption. In the first section I discuss classical and medieval encryption methods: steganography, and substitution ciphers. In the second section I will exclusively talk about encryption methods used in World War II, such as: Enigma Machine, and JN-25. In the third section I will talk about modern encryption methods: symmetric vs asymmetric key systems. Lastly I will conclude with a finishing paragraph, with my works cited.
Dead files by dead accounts may not be removed without the cooperation of the corresponding users. In the paper “Steganographic Schemes for File System and B-Tree” [3], they have introduced StegFD, a practical scheme to implement a steganographic file system in which a plausible deniability to owners of protected files is offered. StegFD hides the selected files in a file system securely in such a way that, an attacker will not be able to trace their existence, even if the attacker has full knowledge of the hardware and software and data structures of the file system .They have also proposed two schemes for implementing Steganographic B-trees in a StegFD volume. In paper “A Multi-User Steganographic File System on Untrusted Shared Storage” [4] the threat to steganographic file systems (StegFS) is described which arises when the storage system is untrusted and is shared by multiple users. In such cases, the attacker could obtain multiple snapshots of the storage content and analyze them to deduce the existence of secret user data. To solve this problem, they have introduced a Dummy-Relocatable Steganographic (DRSteg) file system. It employs new techniques to share and relocate dummy data at
Abstract— Steganography is a technique of hiding the secret information. Steganography hides the existence of the secret data and make the communication undetectable. Secret data can be communicated in an appropriate multimedia carrier such as image, audio or video. Image steganography is extensively used technique. In this technique secret data is embedded within the image. Steganography techniques can be categorized into two groups - adaptive and non-adaptive. Each of these have its strengths and weaknesses. Adaptive steganography embeds the secret information in the image by adapting some of the local features of the image. Non-adaptive steganography embeds secret data equally in each and every pixel of the image. Several techniques have been proposed for hiding the
Image Steganography: In today’s digital world secret messages get embedded in to the digital image which is called as Image Steganography where cover object used is Image . Because of the limited power of the Human vision system this method is most commonly used [5].
Abstract- The utilization of PC systems for information transmissions has made the need of security. The security of this intuitive media data should be possible with encryption or information concealing calculations. To diminish the transmission time, the information pressure is necessary. Since couple of years, an issue is to attempt to join pressure, encryption and information covering up in a solitary stride. Picture security turns out to be progressively critical for some applications, e.g., secret transmission, video reconnaissance, military and therapeutic applications. These days, the transmission of pictures is an every day routine and it is important to locate a proficient approach to transmit them over systems. They send Secret message over channel utilizing Cryptography and Steganography calculations by AES (Advanced Encryption Standard). It is utilized to scramble the information from plain content to figure content the other way around. There are two sorts of keys accessible in the cryptography, symmetric and asymmetric. There are utilizing symmetric key which is separated into two key, for example, private and open key. Open key is utilized for encryption and private key is utilized for decoding. The reversible information concealing method is utilized to recover the information and picture
Steganography has been around since 1980’s. Various tools and software’s are available for Steganography as well as Steganalysis. The most common form of steganography is on digital images. For digital images there exist many steganographic techniques and furthermore there exist a lot of approaches to detect steganography in digital images. In this paper we will be looking at many tools comprising from various digital domains but we fund that almost all of the tools had support for image files. With the increasing number of new steganographic algorithms and methods for detecting steganography, the issue of comparing security of steganographic schemes in a fair manner is of the most importance. A fair benchmark for steganography should only
Email Encryption is the very important topic of todays need. Because it provides the proper security to the message. And in now days everybody wants the proper security for our message so that the original message as it is read by the recipient that are send by the sender without any changes/alternation in the message. So this is the very important topic to cover up and secure our messages from unauthorized user’s access. That provide the security to our communication. So, we can easily communicate without any afraid of hacking of data.
The Steganography method is different from the traditional cryptography method in the following ways. Cryptography is the practice and study of secure communication. Steganography is the art and science of covert communication. Cryptography is the practice of protecting the contents of a message alone,
If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States’ National Security Agency (NSA) and United Kingdom’s Government Communications Headquarters
The basic need of every growing area in today’s world is communication. Everyone wants to keep the inside information of work to be secret and safe. We use many insecure pathways in our daily life for transferring and sharing information using internet or telephonically, but at a certain level it 's not safe. Steganography and Cryptography are two methods which could be used to share information in a concealed manner. Cryptography includes modification of a message in a way which could be in digesting or encrypted form guarded by an encryption key which is known by sender and receiver only and without using encryption key the message couldn’t be accessed. But in cryptography it’s always clear to intermediate person that the message is in encrypted form, whereas in Steganography the secret message is made to hide in cover image so that it couldn’t be clearer to any intermediate person that whether there is any message hidden in the information being shared. The cover image containing the secret message is then transferred to the recipient. The recipient is able to extract the message with the help of retrieving process and secret key provided by the sender. A model of the Steganography process
In the current work various set of text images are used for crypto analysis. The sample image 1 and sample image 2 are the synthetically generated images for our own study. The Reference image 1 and the Reference image 2 are the image taken from the work done by base papers. And for the complex parametric evaluation a true colour image is also used for efficiency
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. (Rouse, Definition: Cryptography, 2016)