scispace - formally typeset
Search or ask a question

Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization

TL;DR: This paper has discussed a new steganographic technique based on the file hybridization that works on more than one image, and it has been shown that a multi-level of security of data can be achieved.
Abstract: Summary The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work on the principle of only one image file, the proposed method works on more than one image. The effectiveness of the proposed method is described pictorially and also has been shown that a multi-level of security of data can be achieved.
Citations
More filters
01 Jan 2010
TL;DR: This paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.
Abstract: In this paper we examine the behavior of Ad Hoc networks through simulations, using different routing protocols and various topologies. We examine the difference in performance, using CBR application, with packets of different size through a variety of topologies, showing the impact node placement has on networks performance. We show that the choice of routing protocol plays an important role on network’s performance. We also quantify node mobility effects, by looking into both static and fully mobile configurations. Our paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.

58 citations

01 Jan 2009
TL;DR: A security model is proposed which imposes the concept of secrecy over privacy for text messages which combines cryptography, steganography, and along with that an extra layer of security has been imposed in between them.
Abstract: In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less. The model proposed by us combines cryptography, steganography (taken as security layers) and along with that an extra layer of security has been imposed in between them. This newly introduced extra layer of security changes the format of normal encrypted message and the security layer followed by it embeds the encrypted message behind a multimedia cover object.

35 citations


Cites methods from "Designing an Embedded Algorithm for..."

  • ...The design of this technique is based on extensive analytical as well as experimental modeling of the data-hiding process....

    [...]

Proceedings ArticleDOI
07 Jan 2012
TL;DR: A new steganography method called JMQT based on modified quantization table is proposed that provides better capacity and JPEG-JSteg provides better stego-size.
Abstract: Digital images are the most common cover files used for steganography. In this paper, a new steganography method called JMQT based on modified quantization table is proposed. This steganography method is compared with steganography method JPEG-JSteg. Two performance parameters namely capacity and stego size has been compared. As a result capacity increases and stego size increases. So JMQT provides better capacity and JPEG-JSteg provides better stego-size.

28 citations


Cites background from "Designing an Embedded Algorithm for..."

  • ...Step 5: Select Ci[a,b] to hide _S respectively, where [a,b] equals to [0,4], [0,5], [0,6], [0,7], [1,3], [1,4], [1,5], [1,6], [2,2], [2,3], [2,4], [2,5], [3,1], [3,2], [3,3], [3,4], [4,0],...

    [...]

  • ...Ci[0,7], Ci[1,3], Ci[1,4], Ci[1,5], Ci[1,6], Ci[2,2], Ci[2,3],...

    [...]

  • ...[4,1], [4,2], [4,3], [5,0], [5,1], [5,2], [6,0], [6,1], and [7,0], respectively....

    [...]

  • ...Therefore, the embedding capacity is likely to be larger than the steganographic capacity [4]....

    [...]

  • ...Ci[2,4], Ci[2,5], Ci[3,1], Ci[3,2], Ci[3,3], Ci[3,4], Ci[4,0],...

    [...]

Book ChapterDOI
13 Dec 2008
TL;DR: A new technique for hiding the data of images is proposed to hide an image file entirely with in another image file keeping two considerations in mind which are Size and Degree of Security.
Abstract: In this paper, a new technique for hiding the data of images has been proposed This method is invented to hide an image file entirely with in another image file keeping two considerations in mind which are Size and Degree of Security At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image) Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique

18 citations


Cites methods from "Designing an Embedded Algorithm for..."

  • ...And due to this reason they have used a stego key for the embedding process [ 7 ]....

    [...]

Journal ArticleDOI
01 Jul 2021
TL;DR: A dynamic data publishing algorithm based on differential privacy, combined with the idea of data prediction, is proposed to improve data availability and reduces publishing errors.

16 citations

References
More filters
Journal ArticleDOI
01 Jul 1999
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Abstract: Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.

2,561 citations

Proceedings ArticleDOI
13 Nov 1994
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Abstract: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. This capability is envisaged to find application in image tagging, copyright enforcement, counterfeit protection, and controlled access. Two methods of implementation are discussed. The first is based on bit plane manipulation of the LSB, which offers easy and rapid decoding. The second method utilises linear addition of the water mark to the image data, and is more difficult to decode, offering inherent security. This linearity property also allows some image processing, such as averaging, to take place on the image, without corrupting the water mark beyond recovery. Either method is potentially compatible with JPEG and MPEG processing. >

1,407 citations

Journal ArticleDOI
01 May 2003
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Abstract: Although people have hidden secrets in plain sight-now called steganography-throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium's redundant bits (those that can be modified without destroying that medium's integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Here, we present recent research and discuss the practical application of detection algorithms and the mechanisms for getting around them.

1,245 citations


"Designing an Embedded Algorithm for..." refers background in this paper

  • ...The main goal of steganography is to communicate message securely in a complete undetectable manner [3, 4, 10]....

    [...]

Journal ArticleDOI

1,220 citations

Journal ArticleDOI
TL;DR: As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society and it is important that the authors are aware of digital Steganography technology and its implications.
Abstract: Digital steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of digital steganography technology and its implications. Equally important are the ethical concerns of using steganography and steganalysis. Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden. Likewise, steganography is not about keeping your message from being known - it's about keeping its existence from being known.

465 citations


"Designing an Embedded Algorithm for..." refers background in this paper

  • ...It has been emerged as a skill of concealing private information inside a carrier that can be considered for all intents and ideas [2, 8]....

    [...]