Explore chapters and articles related to this topic
Data Security and Privacy through Text Steganography Approaches
Published in Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, IoT Security Paradigms and Applications, 2020
Suvamoy Changder, Ratnakirti Roy, Narayan C. Debnath
In the era of digital communication, steganography tools can be beneficial for covert communication over potentially unsafe channels and also in situations where protocols prohibit transmission of secret messages between parties. Text documents are the most widely available media objects and can be used suitably as steganography covers that can offer a wide range of scope toward the development of advanced steganography techniques with text documents. The large variation in Indian languages in terms of scripts and their availability in the Unicode renders it a good choice of covers for the development of text steganography techniques. This chapter introduces steganography, its principles, and the domain of text steganography. Also, it elaborates the generic techniques that are applied for implementing text steganography and at the same time it puts light on the advanced techniques that pave the path for the new generation of text steganography. This chapter also provides a detailed parametric comparison chart of the different text steganography techniques, allowing easy comparison and requirement-based selection of the techniques.
Introduction
Published in Borra Surekha, Thanki Rohit, Dey Nilanjan, Digital Image Watermarking, 2018
Borra Surekha, Thanki Rohit, Dey Nilanjan
A digital signature, on the other hand, is a message-dependent data string that is appended to the original message using encryption techniques. The objective is to guarantee the data integrity and overcome attacks related to nonrepudiation. A digital signature can easily be removed and can be made invalid by changing the file content (Petrovic et al., 2006). Steganography and watermarking techniques address these problems (Langelaar et al., 2000; Thanki and Kothari, 2017; Thanki et al., 2017, 2018). Steganography is a kind of one-to-one secret communication technique that modifies a multimedia file to hide and detect the secret message, by authorized personnel only (Hartung and Kutter, 1999; Langelaar et al., 2000). While both steganography and encryption ensure confidentiality, steganography ensures that nobody has knowledge that entities are communicating in secret, and hence it is suitable for copyright marking. In contrast, watermarking has been part of one-to-many communications and is used to verify the owner of a multimedia file (Vellasques et al., 2010).
Introduction to Information Security Systems Primitives
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
Majid Khan, Syeda Iram Batool Naqvi
Cryptography is the examination of hiding information, while steganography oversees framing covered messages so simply the sender and the beneficiary understand that the message even exists. In steganography, simply the sender and the beneficiary know the nearness of the message, however in cryptography the nearness of the mixed message is clear to the world. Along these lines, steganography empties the bothersome thought set off to the covered message. Cryptographic procedures try to guarantee the substance of a message, while steganography uses techniques that would stow away both the message and the substance. By solidifying steganography and cryptography one can achieve better security. In essential words, cryptography is tied in with securing the substance of messages (their significance) and steganography is tied in with camouflaging the nearness of messages.
An Overview of Digital Audio Steganography
Published in IETE Technical Review, 2020
Hrishikesh Dutta, Rohan Kumar Das, Sukumar Nandi, S. R. Mahadeva Prasanna
In this modern world, data security has become concern for everyone. Steganography is the process of concealing message in other data (images, videos, and audio) so that these can be protected from unwanted access of unauthorized or unwanted recipients [1]. The term steganography originated from the Greek words “stegos” meaning cover and “graphia” meaning writing [2]. Thus, steganography as a whole means “covered writing”. In [3], steganography is defined as the practice of undetectably altering a work to embed a secret message. The secret data which is hidden using an appropriate cover appears to be something else and so cannot be detected by any third party unaware of the hiding procedure. At one end, the secret information to be delivered is hidden in an innocently looking cover while at the receiver end stego file is processed upon to retrieve the secret information. Steganography has now become the most popular and unbeatable mode of communication for secret messages between sender and receiver. The main principle used in all the techniques of steganography is that the hidden information should not be detectable to anyone.
A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix
Published in IETE Technical Review, 2018
Jianbin Wu, Yiwen Liu, Zhenwei Dai, Ziyang Kang, Saman Rahbar, Yanke Jia
Cryptography conceals the content of the messages secretly while steganography aims at hiding the existence of messages. According to the ways of hiding, the existing image steganography methods can be classified into two categories: spatial domain based and transform domain based. One of the most common methods of spatial domain is to replace the least significant bits (LSB) with secret data [1]. Reference [2] proposed a data hiding method based on pixel value difference (PVD), least significant bit (LSB) substitution, PVD shift, and modification of prediction error (MPE). Steganography in the transform domain is used to modify the statistical feature of the cover image for achieving data hiding [3]. Many transform domain methods are proposed to hide data into DCT (Discrete Cosine Transform) domain [4], DFT (Discrete Fourier Domain) domain [5], and DWT (Discrete Wavelet Domain) domain [6]. Reference [7] proposed a novel multi-watermarking scheme in DWT domain based on hybrid multi-bit multiplicative rules controlled by secret keys. Reference [8] proposed a method which combines the signal processing, cryptography and steganography to enhance the security of secret information. Reference [9] proposed a novel method which joints traditional data hiding and compression scheme to enhance the information hiding. In addition, some researchers applied the steganography technology in field of satellite communication, embedding low-speed data into the images transferred by the high-speed transmission system [10,11].
USAD: undetectable steganographic approach in DCT domain
Published in The Imaging Science Journal, 2019
Marwa Saidi, Olfa Mannai, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith
Steganography is the science of hiding secret messages within cover mediums such as images, audio or video files. The main concern about data hiding algorithms is to keep it ‘undetectable’. In fact, this demands a trade-off between the payload and the security of the data hiding scheme evaluated throughout steganalysis tests which is the art of detecting hidden communications. Many data hiding algorithms in various image processing domains have been widely investigated.