Steganography: A Security Model for Open Communication
نویسنده
چکیده
K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology and Science – 517325, AP, Email: [email protected] M.Chandra Sekhar, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur, AP, India. Email: [email protected]. Mr. K.Chokkanathan, Madanapalle Institute of Technology & Science, Madanapalle – 517325, AP, India Sri Krishnadevaraya University, Anantapur, AP, India. ---------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Steganography is the art and science of hiding messages. Steganography is basically about embedding a secret message in an innocuous wrapper; to communicate privately in an open channel. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The key difference between Cryptography and Steganography lies with the fact that when a message is encrypted, third party knows that the message exists and it is encrypted, whereas with Steganography third party might not even know (or observe) that there does exists a message too, simply because its hidden behind an image, video or an audio etc which without keen observation might go without any suspicion. In the proposed system Steganography involves the method of acquiring insignificant bits in the audio file. After acquiring the insignificant bits in the audio header, replace them with significant bits (covert message) of information hiding[6]. Video file consists of both audio and images so the above two methods can be combined implemented with this.
منابع مشابه
مروری بر روش های نهاننگاری در JPEG و بررسی امنیت آن ها
Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...
متن کاملSteganographic Secure Data Communication - A Hardware Approach
Steganography is a science dealing with writing hidden messages in a particular way that only the sender & the intended recipient are able to decipher so as to provide security in open environment like internet. Steganography attempts to hide the very existence of the message and make communication undetectable. Important domains, besides classic computing, where steganography can be applied ar...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملData Security and Authentication Using Steganography
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...
متن کاملSteganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model
The staggering growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Traditionally, encryption is used to realize then communication security. However, important information is not protected o...
متن کاملA Quick review of Network Security and Steganography
In this paper we present a classification of network security techniques such as: secrecy, authentication, non-repudiation and integrity control. The secrecy techniques are two categories: cryptography and steganography. Steganography like cryptography is a very useful technique to achieve secrecy in communication. If both cryptography and steganography are used then the communication becomes t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013