This paper intends to give an overview of image Steganography, its uses and techniques. Different applications have different requirements of the Steganography technique used. For hiding secret information in images, there exists a large variety of Steganography techniques some are more complex than others and all of them have respective strong and weak points. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. ![]() Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message. Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. The Steganography used to transport information from one place to other place through public channel in covert way. Steganography is the art of hiding information in ways that prevent detection. The results show that high security and robustness is achieved in smartphones when cryptography is combined with steganography.ĭata hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The performance Analysis was carried out using Peak-Signal-to –Noise-Ratio (PSNR). Least Significant Bit (LSB) technique is used to embed the message into the video. After the message has been encrypted, the process of embedding or hiding the message in the image is carried on. Before a message is embedded in the image, the message is first encrypted using RSA encryption algorithm. The system proposed in this study uses a cover object, image specifically to hide the message to be sent. Cryptography concerns itself with the masking of the content of a secret message whereas steganography deals with the concealment or hiding of a secreted message from the unauthorized person. The most novel approach to arrest the security challenges in the smartphone is cryptography and steganography. This is so because the security features of such devices are limited. The proliferation of smartphones raises much security issues. Modern advancement in communication technologies has resulted in the widely and increase in use of smartphones such as android, blackberry, iPhones and much more. ![]() This paper focuses on various pros and cons of steganography, overview to its techniques and relationship with cryptography. As steganography is very close to cryptography and its applications so both are widely used techniques that encrypt data in order to cipher or hide their existence. The crucial information is being encrypted into media file such as images, audio, text as well as video as it is the art of hiding information. Steganography provide us to conceal the presence of confidential data, difficult to detect the embedded data and enhancing the stealthiness of the encrypted data. Every day, confidential data has been jeopardize and unauthorized access of data has crossed the limits. Due to the rapid development in Technology and Communication and the use of Internet at alarming rate, the security of the data and information is a major concern these days. Today, it's being broadly used over Internet. Steganography is meant for confidential communication as well as secret data sharing between sender and a receiver using various media files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |