Steganography and its Advancements in Spatial Domain (original) (raw)
Related papers
Steganography is defined as study of imperceptible conversation. Steganography typically deals with approaches of hiding presence of communicated information in sort of manner that it stays confidential. It preserves secrecy among two communicating groups. In image steganography, secrecy is attained by means of embedding records into cover image and producing a stego- image. There are distinct kind of steganography strategies each have their strengths and weaknesses. In this paper, we review distinct security and data hiding approaches that are utilized to implement a steganography for instance LSB, ISB, and MLSB etc.
Implementation of LSB Steganography and Its Evaluation for Various Bits
2006 1st International Conference on Digital Information Management, 2007
Steganography is derived from the Greek word steganos which literally means "Covered" and graphy means "Writing", i.e. covered writing. Steganography refers to the science of "invisible" communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB Embedding technique and Presents the evaluation for various file formats.
Steganography: A Juxtaposition between LSB DCT, DWT
International Journal of Computer Applications, 2015
Steganography is the technique to concealing information to the extent which nobody, except for the transmitter and also the designated receiver, anticipate the presence of the hidden data. Steganography is the craft to concealing important information in such a way that restrict recognition. The Steganography utilized towards transportation important information from just one destination to some other location by using general public network as part of stealth way. Steganography hides the extremely existence of a information to ensure that if worthwhile that it usually appeals to no suspiciousness anyway. Steganography means that concealing a hidden information (the integrated message) inside a more substantial one (source cover) in such a way that an onlooker cannot identify the clear presence of contents of the hidden message [1]. A lot of different service provider file formats can be made use of, however digital images are the most prominent because of the consistency on the Internet. For hiding mysterious important facts in images, there exists a spacious assortment of Steganography strategies some are much more complicated as opposed to others and every one of them have respective robust as well as weak spots. Different programs have actually different specifications for the Steganography approach used. This Particular document promises to provide an introduction to image Steganography, its makes use of as well as strategies. It also initiatives to determine the prerequisites of a good Steganography algorithmic rule as well as quickly demonstrate upon which Steganography strategies tend to be more appropriate which applications.
New LSB Replacement based Steganography Technique
International Journal of Science Technology & Engineering
Steganography is an art of hidden communication. It provides secret channel between parties intended to communicate. Least significant bit replacement is a popular steganography technique in spatial domain. It replaces the LSBs in carrier media with secret information bits. The locations for replacing LSBs are identified using DCT coefficients and difference between neighboring pixel values. The embedding and retrieval of hidden information depends on different parameters. Separate transmission of these parameters adds security to the technique. The experimental results are evaluated for different images.
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information has become an important issue. In order to transfer data securely to the destination without unwanted disclosure or damage, nature inspired hide and seek tricks such as, cryptography and Steganography are heavily in use. Just like the Chameleon and many other bio-species those change their body color and hide themselves in the background in order to protect them from external attacks, Cryptography and Steganography are techniques those are used to encrypt and hide the secret data inside other media to ensure data security. This paper discusses the concept of a simple spatial domain LSB Steganography that encrypts the secrets using Fibonacci-Lucas transformation before hiding for better security.
Implementation and Performance Analysis of LSB Based Steganography
Abstract—Protecting privacy for exchanging information through the media has been a topic researched by many people. Up to now, cryptography has always had its ultimate role in protecting the secrecy between the sender and the intended receiver. How-ever, nowadays steganography techniques are used increasingly besides cryptography to add more protective layer to the hidden data.
Confidentiality of Data Through Steganography
Now-a-days providing security & making data to be confidential plays a major role. For the purpose of providing confidentiality we are employing the cryptography techniques. Even though the data get encrypted, the intruder easily modifies the data by knowing the presence of confidential data. Steganography, which can called as an extension to the cryptography. Hereby employing this technique, can remain the existence of information in confidential. For providing security an image is used as a carrier medium to hold the secret data. Thereby no one can have an idea there is a secret message with in an image. The LSB technique of steganography is going to be applied here and secret key is generated by using one of cryptography technique OTP. With this method we can hide the data efficiently and effectively.
Significance of steganography on data security
Information Technology: Coding …, 2004
With the ever increasing amount and variety of data to be stored and transmitted in various mediums, the specification of security which has to be established at various levels of medium access and the accompanying issues of authentication and authorization has become a critical factor. Various steganographic, watermarking and data-embedding algorithms have usually manipulated the actual data in order to either hide any coveted information or to provide some level of access control over the medium. The mediums are usually images, video, audio etc., wherein specific portions or the overall space is usually 'corrupted' with 'significant' data. This paper is an attempt to bring out the significance of the steganographic techniques that are employed in information processing algorithms for data security. It deals with the problem of data security, focusing mainly on images, and tries to state the various properties and characteristics that the steganographic algorithms should possess. The paper also highlights the technique of masking used in the conventional steganographic LSB algorithms and in its variants.
Protecting and Enhancing the Process of Data Steganography
2022
A method of data steganography will be proposed, this method will use simple operation to apply the process of data hiding and data extracting, it will be shown that using these operations will optimize the performance parameters values. The proposed method will use a simple way for message encoding-decoding to provide a necessary protection to LSB method. The proposed method will be implemented and compared with LSB method to show how the proposed method will enhance the values of MSE, PSNR, hiding time and extracting time. The proposed method will use bit plate from 1 (LSB) to 8 (MSB) to hide various messages (short and long messages) using various covering images, and it will be shown that even if use the MSB for data hiding the results will be acceptable.
Project Report on Data Security through Steganography by using LSB Replacement Algorithm
Spyro Infosys, 2017
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time, it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. This paper presents to provide the transfer of secret data embedded into master file to obtain new image, which is practically indistinguishable from the original image, so that other than the indeed user, cannot detect the presence of the secrete data sent. Here we use the Least Significant Bit (LSB) algorithm. Keywords: Steganography, Steganalysis, Information Security