Premium Essay

Steganography: Encryption And Steganography

Submitted By
Words 731
Pages 3
Sensitive information is usually hidden behind an innocent looking document usually an image thus making the document undetectable to human eye. Steganography has a number of nefarious applications; most notably hiding records of illegal activity, financial fraud, industrial espionage, and communication among members of criminal or terrorist organizations. This was the technique used by terrorists involved in 11 September 2001 demolition of World Trade Centre [12]. The misuse of the technology cannot be blamed on the technology itself but it totally depends upon the users of the technology. It is the inner conscious which covers the human being. If we follow our moral ethics and values and give respect to our culture we can prevent misuse of …show more content…
Steganography’s success thus relies heavily on the naïveté of human beings; for example, when did you last check your e-mail headers for hidden messages? Encryption and steganography achieve separate goals. Encryption encodes data such that an unintended recipient cannot determine its intended meaning. Steganography, in contrast, does not alter data to make it unusable to an unintended recipient. Instead, the steganographer attempts to prevent an unintended recipient from suspecting that the data is there. Those who seek the ultimate in private communication can combine encryption and steganography. Encrypted data is more difficult to differentiate from naturally occurring phenomena than plain text is in the carrier medium. Several existing steganography tools can encrypt data before …show more content…
The most common technique is to exploit the constraints of popular file formats. The larger the original file, the larger the payload it can carry. The smaller the payload file, the harder it is to find. This is a key behind efficient Steganography[2]. Today's steganographic programs can hide any type of binary data into nearly any type of text, image, audio, or video file. Data can even be hidden inside executable files and spam messages. There are many other ways in which messages can be hidden in digital media. Message/Data that remains in file slack or unallocated space as the remnants of previous files, and programs can be written to access slack and unallocated space directly. Small amounts of data can also be hidden in the unused portion of file headers .Information can also be hidden on a hard drive in a secret partition. A hidden partition will not be seen under normal circumstances, although disk configuration and other tools might allow complete access to the hidden partition . This theory has been implemented in a steganographic ext2fs file system for Linux. Under this system users can hide the number of files on the drive, guarantee the secrecy of the files' contents, and not disrupt non-hidden files by the removal of the Steganography file driver

Similar Documents

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Free Essay

Steganography

...International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information...

Words: 3246 - Pages: 13

Premium Essay

Motion Vector

...Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text, or a picture or in a video files. Steganography is Greek word has the meaning of , “Stegano”...

Words: 2564 - Pages: 11

Premium Essay

Steganography Research Paper

...Adaptive steganography based enhanced cipher hiding technique for secure data transfer Sudipta Sahana, Asst. Professor, JIS College of Engineering, West Bengal, India, ss.jisce@gmail.com Goutami Dey, U.G. Student, JIS College of Engineering, West Bengal, India, goutamidey783@gmail.com Madhurhita Ganguly, U.G. Student, JIS College of Engineering, West Bengal, India, madhurhita.ganguly@gmail.com Priyankar Paul, U.G. Student, JIS College of Engineering, West Bengal, India, priyankar.3110@gmail.com Subhayan Paul, U.G. Student, JIS College of Engineering, West Bengal, India, subhayanp@gmail.com Abstract: There have been enormous number of attacks recorded...

Words: 965 - Pages: 4

Premium Essay

The Importance Of Digital Steganography

...information security is of great importance. Thus, a big issue now a day is to reduce the chances of information detection during transmission. Cryptography deals with encryption of message but its presence arouse uncertainty about the communication, on the other hand, Steganography hides the presence of message in such a way that no one can even think about the communication going on between two parties. Due to rapid advancement in both computer technologies and Internet, the security of information is regarded as one of the most valuable factors of Information...

Words: 4083 - Pages: 17

Premium Essay

Security Issues and Principles Research Paper

...SECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stə nóggrəfi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or "covered," and graphie, or "writing". Synonymous to abstraction, the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular...

Words: 6118 - Pages: 25

Free Essay

Child Pornography on the Internet

...Internet use grows, so do the risks of children being exposed to inappropriate material, in particular, criminal activity by paedophiles and child pornographers. Many children first come in contact with the Internet at a very young age. Some children become victims of child pornography through close relatives who may have abused them. Some children become involved with chat services or newsgroup threads. It is usually through these sites that they meet child pornographers. Children may be asked to send explicit pictures of themselves taken either by a digital camera or scanned from a polaroid. The pornographer will then post the pictures on their web site, sometimes hiding them through encryption, steganography or password protecting them using a javascript or applet. Certain efforts have been made to control child pornography through legislation. In 1977 the Sexual Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18, Section 2251-2253) The law prohibits the use of a minor in the making of pornography, the transport...

Words: 1297 - Pages: 6

Premium Essay

Cis 60

...individual’s time on a website. * Store data about a user during his or her navigation of a website, even over a number of visits. When a cookie is used like this, it can be used as a shopping cart application on the website. Cookies are stored on the user's hard drive. The directory is different for each platform. RQ2: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. Further,...

Words: 665 - Pages: 3

Free Essay

Digital Forensics - Uganda’s Preparedness

...to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented to the recognition, identification, individualization and evaluation of physical evidence by the application of natural science to law-science problems (Gialamas, 2000) [1]. Digital forensics is the process of identifying, preserving, analysing, and presenting...

Words: 7291 - Pages: 30

Free Essay

Steganography

...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...

Words: 8940 - Pages: 36

Free Essay

Watermark

...International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010 Invisible Digital Watermarking Through Encryption Samir Kumar Bandyopadhyay Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata – 700009, India Tuhin Utsab Paul Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India Avishek Raychoudhury Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India ABSTRACT Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view. keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of...

Words: 2120 - Pages: 9

Premium Essay

Case Bibliofind

...Chapter 10 – Security for Electronic Commerce |Chapter Case | | |General Accounting Office |http://www.gao.gov/ | | | | |Online Security Issues Overview | | | Security Policy and Integrated Security | | |Network Security Library |http://secinf.net/ | |Information Security Policy World |http://www.information-security-policies-and-standards.com/ | | | | |Security for Client Computers | | | Cookiess | | |Cookie Central...

Words: 912 - Pages: 4

Free Essay

Is4560 Unit 2 Assignment 1

...Web sites. a. SSL 2. __________ is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution. b. PKI 3. __________ provides authentication or proves integrity of a digital message. c. MAC 4. ___________ encryption scheme was broken and was replaced with a third round version of itself. d. 3DES 5. _________ is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems. e. RSA 6. The entity that issues certificates is a __________. f. Certificate Authority 7. The document to check to verify whether a certificate has been revoked is __________. g. CRL 8. Each bit of length _______the number of keys. h. Increases 9. Currently, _______ bit certificates are commonly used for web communications. i. 128 10. Triple DES provides ________ bits of security, despite using a 168 bit key. j. 112 11. Thawte, Verisign, and Comodo are all examples of _____________. k. SSL Certificate Providers 12. Hiding data in images is an example of ____________. l. Steganography 13. Data Encryption Standard (DES), ROT13, and Enigma are all examples of ______________. m. Cryptography 14. A digitally signed email provides _____________. n. Asymmetric Encryption 15. A digitally encrypted e-mail provides ___________. Public Key Cryptography ...

Words: 273 - Pages: 2

Free Essay

Medical Images - Literature Review

...Literature Review When dealing with patients' sensitive medical records, it's always important how one also deals with medical images that should also be kept private. Health Insurance Portability and Accountability initiated on April 14, 2013 by the federal government, establishes all relevant standards to address the issue of privacy protection. The HIPAA requires for integrity and confidentiality in all of current, previous and future from hospitals, doctors, and other relevant professionals. In an era where digital technology has become of major importance, there is a series of medical images that can now be kept in digital format and become quite easy to retrieve, store and preserve. Watermarking – An Essential Aspect for the Protection of Medical Images A. Ethical reasons and relevant legislation define Medical Information Assurance & Watermarking Medical directions. USA's HIPAA and Europe's EC 95/46 Directive are the major legislations defining relevant directions. When dealing with medical information records, thus, which involve a series of clinical examinations, diagnoses, and EPR images, three major security attributes should be considered: • Confidentiality: only authorised users can view and evaluate medical information; • Availability: Scheduled accessing periods should be set when entering the information system containing the medical data; • Reliability: The information should be examined by authorised people and not changed by unauthorised...

Words: 2623 - Pages: 11

Premium Essay

Teleputers

...Teleputers: Communication and Information New technology for communication is growing rapidly. Health care systems are taking advantage of new communications to make organizations more efficient, effective, and user friendly. These systems have superior advantages, but with the many advantages noted there are also disadvantages. The health care system has to decide if the financial impact of changing its system is beneficial in the long run. Because technology is always updating, incorporating a new communication system may only be useful for a short time. Immense growth in medical knowledge and technology spawned an era of specialization in which doctors focused on particular aspects of health called, ‘”specialization” (DuPre, p. 38). This paper will be discussing a new technology termed as “teleputers.” Teleputers are small mobile devices used as a computer, phone, and entertainment. In 1999 researches predicted that people would use teleputers to conduct research, play games, surf the internet, and transfer information (DuPre p. 321). Many people use smart phones. A smart phone is a mobile, hand held computer that is used as a phone, planner, clock, game and entertainment system, and much more. How is this important in health care communications? Health care systems sometimes have supportive groups to convey information through telephones and computers. These are virtual communities (Du Pre, p. 182). Having “teleputers” makes sharing information easier and more convenient...

Words: 901 - Pages: 4