Abstract:-
Steganography is art of hiding the secret message within an ordinary message and extraction of its destination. Steganography take cryptography a step farther by hiding an encrypted message so that no one finds the existence of the message. If anyone scans your data will fail to know that it contain encrypted data. Steganography maintain the secure communication between the communicating parties. There are different techniques that are used for hiding the secret data as Steganography, Cryptography and Watermarking. There are various drawbacks of the cryptography that are covered by the Steganography. This paper reviews the Steganography techniques and various matrices for performance analysis of Steganography techniques.
Keyword: Steganography, Cryptography, Spatial Domain, Frequency Domain
…show more content…
The history of Steganography can be traced from 440BC. In the ancients steganography various method are used to send her secret message to
Information security is a major concept in today’s industrial and computer era, so security must be higher to protect the confidential data. Information security plays major role in computer and network security with the use of different cryptography algorithms that includes the encryption and decryption of data with the uses of the algorithm and the key. By means of text or numerical key for the encryption can be dangerous because with the several hack attacks that a key can be broken. So I have proposed a new mechanism that will replace the text key with the image pixels and can gain high security which cannot be easy to break without prior knowledge.
When a message is in its original form it is known as plaintext or cleartext and the process that involves masking the text to hide the content is known as encryption. Once a message is encrypted it is referred to as ciphertext . Cryptography or crypto for short has always served the same purpose of encrypting information for reasons of privacy, deception, or security. Cryptographic methodologies could date back to the ancient Egyptian era where standard hieroglyphs were altered to mask true meaning . It is more likely that the first introduction of crypto followed the invention of writing and evolved in line with forms of communication. The use of crypto has been seen as extremely advantageous in times of war, where communication
Cryptography, at least in some form, has been around since 1900 BC where the first known evidence had been seen in an Egyptian tomb of a nobleman, Khnuhotep II. Here, there are unusual hieroglyphic symbols that the scribe used in the place of more ordinary ones that one would expect. It is thought that the purpose of changing these symbols, it was not to hide the message, but make it seem like it was more dignified. However, evidence of cryptography has been traced back to the most of the major early civilizations. Arthasharta, an ancient Indian treatise, helps tell of an espionage service and mentions secret writing that their spies had used on assignements. Julias Caesar also had his very own cipher. It was a form of encryption to relay secret messages to his generals that were on the war front. It is a substitution cipher, and the most widely mentioned in history. A substitution cipher is where a plain text message would have each character
Protecting data through cryptography from unauthorized eyes is a high priority for organizations that store personal information. Cryptography is the process of hiding the real meaning of a message through a pre-determined code that is only known to the person encrypting and decrypting a message. Different forms of cryptography can be seen in our everyday life from the word puzzle in daily newspapers to secretaries writing in short hand. Cryptography has been around since the time of the Egyptians and has made many advances through the years.
Basically there are two hiding techniques and those are Cryptography and Steganography. In cryptography an encryption and decryption keys will be available for encoding and decoding purpose respectively and it is having triple key to provide secured data to the receiver safely. Now in steganography not only encryption and decryption are to be done but there is cover media to provide more security and that is known as chaotic image encryption. Steganography is providing four layer security to the user and it supports media like audio files, video files, images etc. Will be there. Hence by combining these two methods we can have more security.
Steganography is the science of hiding a secret message or data inside another text, image, audio or video file. It has been in use since ancient times. The distinguishing factors in the steganography techniques used back then and at present, is the medium to carry the secret data and the various algorithms which have been designed for it. We intend to uncover the pros and cons of these various steganography techniques, which use different mediums to carry the secret data.
In recent times providing security to the information is the major issue. There are many applications developed by the cyber terrorists, cyber criminals, script kidders etc. to steal the private information like passwords, ATM pin numbers, and credit card details so on. One of the solution to protect the information is Cryptography, which is the focus of this paper.
steganography and cryptography are distinctive sorts of strategies utilization to send secure information transmission. Steganography is the craftsmanship and art of concealing information into distinctive bearer records, for example, pictures, features, sound, content and so forth. In cryptography, there is parcel of degree to discover mystery message that we send by outsider
These can be avoided by making use of our proposed system. The mechanism, which is used to hide the information in the image files [11]. Here, to make the solution on the problems mentioned above, we have proposed the Advanced Video Steganography technique. This advance method consist of the combination of Compression, Encryption and Embedding technique, which is mentioned in our proposed system.
Biometric systems are used for recognising a user on the basis of biometric traits he have. During authentication some of the frequently asked questions are “Is he who he claims to be?”, “Is he a valid user for gaining access to the system?”. Biometric system answers all these questions by authenticating the users. Every second information is shared and transferred between people and it is important to make sure that what is sent by sender is what received by the receiver thus raising the demand of security. Steganography is one of the techniques used for securing the data. The secret message is hidden inside a cover media like audio, video or image with the help of a secret key. Biometric templates can also be secured with this technique. Instead of storing original templates in the database stego-image is stored. LSB is one of the common techniques that replace the LSB of every pixel of the cover image with the secret message to form stego-image.
A Digital image watermarking systems have been proposed as an efficient means for copyright protection & authentication of digital image content against unintended manipulation (spatial chromatic). Watermarking techniques tries to hide a message related to the actual content of the digital signal, watermarking is used for providing a kind of security for various type of data (it may be image, audio, video, etc). Digital watermarking generally falls into the visible watermarking technology and hidden watermarking technology visible and invisible watermarks both serve to deter theft but they do so in very different ways.
Here we introduce effective data hiding for image annotation, High fidelity is a demanding requirement for data hiding for images with artistic or medical value. This correspondence proposes image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, the model is built by mixing the outputs from entropy and a differential localized standard deviation filter. The mixture is then low-pass filtered and normalized to provide a model that produces substantially better perceptual hi-fidelity than existing tools of similar complexity. The model is built by embedding two basic watermarks: a pilot watermark that locate
A distinctive steganographic application includes covert communications among two parties whose reality is unidentified to a promising attacker and whose achievement depends on detection of existence of communication. Host medium which
[36], Abhilasha Sharma, et.al. The proposed watermarking technique is based on two TD techniques, DCT and DWT. In embedding method, the CI is divided into two separate
ABSTRACT: Digital Watermarking is a technology which is used to identify the owner, distributor of a given image. In recent years, digital watermarking plays a vital role in providing the appropriate solution and various researches have been carried out. In this paper, an extensive review of the literature related to the color image watermarking is presented together with compression by utilizing an assortment of techniques. The proposed method should provide better security while transferring the data or messages from one end to the other end. The main objective of the paper is to hide the message or a secret data into an image which acts as a carrier file having secret data and to transmit to the intention securely. The watermark can be extracted with minimum error. In terms of PSNR, the visual quality of the watermarked image is exceptional. The proposed algorithm is robust to many image attacks and suitable for copyright protection applications.