SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES
Author :
Publisher : V. Nagaraj
Total Pages : 229
Release :
ISBN-10 : 9789354264542
ISBN-13 : 9354264549
Rating : 4/5 (42 Downloads)

Book Synopsis SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES by : Dr. V. Nagaraj

Download or read book SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES written by Dr. V. Nagaraj and published by V. Nagaraj. This book was released on 2021-05-20 with total page 229 pages. Available in PDF, EPUB and Kindle. Book excerpt: Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on statistical analysis. Many other steganography algorithms have been developed such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Spread Spectrum Embedding. But the insertion capacities for all the above methods were not satisfied. Therefore, developing new steganography algorithms against statistical analysis seems to be the prime requirement in steganography. The LSB insertion method is the most common and easiest method for embedding messages in an image with high capacity. However, it is detectable by statistical analysis such as RS and Chisquare analysis. Hence, researchers are still in look out for steganography techniques with enhanced insertion capacity of secret data along with greater security and which can resist attacks. In this work, in order to enhance the embedding capacity of secret data four techniques for secret communication have been proposed. They are classified into two categories. In first category, cryptography is used along with steganography to enhance the security, while in second category only steganography is used. In the first category, two improved LSB substitution techniques have been proposed. The first technique is known as Zigzag Modulo Substitution Method in which embedding locations are Sequence based. The second technique is known as Random Modulo Substitution Method using Random Technique in LSB Steganography and user key based LSB substitution steganography for RGB images where in, RSA algorithm is used for encryption. The techniques under the first category are exclusively LSB array based. The first LSB array based technique embeds message bits into LSB arrays of cover image by using zigzag scanning. On the other hand the Random Modulo Substitution Method embeds secret data into the different locations of cover image by using pseudo random index generator. Moreover, both these LSB array based techniques use RSA algorithm to enhance security. Histogram and Statistical analysis performed on the stego image proved that the proposed techniques can effectively resist steganalysis. Comparison of the statistical parameters like Root Mean Square (RMS), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Matrix (SSIM) for the proposed techniques with cover image and stego image was carried out and analyzed. The Second category includes pixel value modification method and pixel value differencing method in which the embedding decision for a target pixel is taken by random technique. Data hiding by using pixel value modification with modulus function in color images guarantees that no pixel value will exceed the range 0 to 255 in stego image. In the existing PVD embedding methods, only one secret digit was embedded for two consecutive pixels, but the proposed method embeds one secret digit in only one pixel. Proposed method on color images gives more capacity and security than the PVD methods. It also provides better visual quality of stego image. Moreover, proposed method extracts the hidden secret message efficiently without using the range tables. In existing steganography algorithms like Pixel Value Differencing (PVD) methods, the secret data are embedded into the differences of adjacent pixels. This pair wise modification mechanism in cover image increases the histogram distortion.

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS
Author :
Publisher : Syngress
Total Pages : 326
Release :
ISBN-10 : 9780128044964
ISBN-13 : 0128044969
Rating : 4/5 (64 Downloads)

Book Synopsis Data Hiding Techniques in Windows OS by : Nihad Ahmad Hassan

Download or read book Data Hiding Techniques in Windows OS written by Nihad Ahmad Hassan and published by Syngress. This book was released on 2016-09-08 with total page 326 pages. Available in PDF, EPUB and Kindle. Book excerpt: - "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist - Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.

Information Hiding

Information Hiding
Author :
Publisher : Springer Science & Business Media
Total Pages : 438
Release :
ISBN-10 : 9783540004219
ISBN-13 : 3540004211
Rating : 4/5 (19 Downloads)

Book Synopsis Information Hiding by : Fabien A. P. Petitcolas

Download or read book Information Hiding written by Fabien A. P. Petitcolas and published by Springer Science & Business Media. This book was released on 2003-01-21 with total page 438 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.

Data Hiding

Data Hiding
Author :
Publisher : Newnes
Total Pages : 269
Release :
ISBN-10 : 9781597497411
ISBN-13 : 159749741X
Rating : 4/5 (11 Downloads)

Book Synopsis Data Hiding by : Michael T. Raggo

Download or read book Data Hiding written by Michael T. Raggo and published by Newnes. This book was released on 2012-12-31 with total page 269 pages. Available in PDF, EPUB and Kindle. Book excerpt: As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. - Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 - Dives deep into the less known approaches to data hiding, covert communications, and advanced malware - Includes never before published information about next generation methods of data hiding - Outlines a well-defined methodology for countering threats - Looks ahead at future predictions for data hiding

Investigator's Guide to Steganography

Investigator's Guide to Steganography
Author :
Publisher : CRC Press
Total Pages : 240
Release :
ISBN-10 : 9780203504765
ISBN-13 : 0203504763
Rating : 4/5 (65 Downloads)

Book Synopsis Investigator's Guide to Steganography by : Gregory Kipper

Download or read book Investigator's Guide to Steganography written by Gregory Kipper and published by CRC Press. This book was released on 2003-10-27 with total page 240 pages. Available in PDF, EPUB and Kindle. Book excerpt: Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable refer

Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems
Author :
Publisher : IGI Global
Total Pages : 434
Release :
ISBN-10 : 9781799812920
ISBN-13 : 1799812928
Rating : 4/5 (20 Downloads)

Book Synopsis Handbook of Research on Intelligent Data Processing and Information Security Systems by : Bilan, Stepan Mykolayovych

Download or read book Handbook of Research on Intelligent Data Processing and Information Security Systems written by Bilan, Stepan Mykolayovych and published by IGI Global. This book was released on 2019-11-29 with total page 434 pages. Available in PDF, EPUB and Kindle. Book excerpt: Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Digital Media Steganography

Digital Media Steganography
Author :
Publisher : Academic Press
Total Pages : 388
Release :
ISBN-10 : 9780128194393
ISBN-13 : 0128194391
Rating : 4/5 (93 Downloads)

Book Synopsis Digital Media Steganography by : Mahmoud Hassaballah

Download or read book Digital Media Steganography written by Mahmoud Hassaballah and published by Academic Press. This book was released on 2020-06-27 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography. - Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography - Provides new theoretical breakthroughs and a number of modern techniques in steganography - Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography