Abstract - The main objective of Steganography is to communicate securely in such a way that the true message is not visible to the observer. Depending on the type of the cover object there are many suitable steganographic techniques which are followed in order to obtain security. The seganographic techniques can be classified as audio, video, text, image and network steganography. In this paper we have analyzed various data hiding techniques in encrypted images.
Keywords: steganography, data hiding, security.
I. INTRODUCTION
In modern time data hiding is associated with digital forms such as cryptography, steganography and watermarking. Fig 1. Steganography Concepts
Cryptography is obscuring the content of the message, but not the communication of the message. Watermarking attempts to add sufficient metadata to a message to establish ownership, provenance, source, etc. The word steganography combines the
…show more content…
Such as Audio, Video, Image, Text and Image files. In this paper we focused image stegnography method.
III. IMAGE STEGANOGRAPHY METHODS
Image steganography has been widely studied by researchers. There are a variety of methods used in which information can be hidden in images. In the following section, we present the most common methods. There are three common methods of steganography: Replacing Moderate Significant Bit, Transformation Domain Techniques, and Replacing Least Significant Bit [4].
In this paper we will be presenting the survey of various data hiding techniques in image steganography to facilitate the secure data transmission over the communication channels.
A. LITERATURE SURVEY
Shamin Ahmed Laskar et.al [1] proposed, to encrypt a message using transposition cipher method and then embed the encrypted message inside an image using LSB embedding method. Data hiding using LSB Steganography is described, yi=2| xi/2 |+
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
by the internal computers of the instrument, to create an image of internal body tissues. These images were then displayed on the screen for the user,
If this was a perfect world, the moment a person underwent a surgery there would be no risk of having after effects of a major surgery. The doctors would be able to diagnose, treat and cure patients without causing any harmful side effects but reality is the total opposite of this. There is something that is helping to improve the perfect world that we reside upon in the medical field with Medical Imaging this fact has been improving. The use of medical imaging has provided the opportunity to the doctors to see inside a patient without having to cut them open. Medical imaging is the visualization of body parts, tissues, or organs, for use in clinical diagnosis, treatment and disease monitoring. It has also helped on many other fields for example it the field of neurobiology and human behavior. Imaging techniques encompass the fields of radiology, nuclear medicine and optical imaging and image-guided intervention, furthermore medical imaging is justified also to follow the course of a disease already diagnosed and/or treated.
In order to really understand where medical imaging is currently at one must have a basic understanding of where it came from. Twenty years ago radiologist would read and dictate the images on film. They were able to accomplish this by holding the film up to light boxes. This method provided no way for the radiologist to interact or manipulate the images
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ... ... middle of paper ... ...
In many countries the used of surveillance videos have been growing intensively. As a consequence, a large number of crimes were successfully recorded by the surveillance videos. Therefore, the question of identification of the person on the recording media or digital images is sent to the forensic experts more frequently. However, this can be a formidable task especially when the recordings are in bad quality and enhanced footage have failed to reveal the face (identity) of the suspect. Most of this problem is caused by the resolution of the system, uncalibrated equipment and the lack of efficient and practical method to identify the criminal suspect through surveillance images.
The history of the modern media surveillance systems begins first with the invention of the computer and the use of software. Before the internet, information was only transported between computers by a physical storage device or an extremely expensive network. Software for media surveillance was only used to scan the media that was available in data form for particular key words. It could then be stored and indexed to be later analyzed. (Sarlós, 1982)
Encryption: - Data encryption is the best way to reduce risks associated with misplaced, lost or stolen data.
Video is one of the most compelling forms of communication of this time. Over the course of the past few years, the gradual but sure drift from analog to digital in video technology has not only improved the abilities of visual communication media to distribute data, but has also improved their abilities to manipulate the data that they distribute. Digital video technology has advanced to the extent that still image manipulation has been usurped by more powerful technological developments that allow elements of a video image to be manipulated in real-time. That is, objects or persons in a video image can be edited out or edited in while the image is in broadcast without the slightest glitch to suggest that some change has occurred; everything would look “real.” The advantages that this technology opens for visual media are extensive. Similar to some technologies, however, it opens up an exploitive edge. Pixels are plastic (can be changed) and using them to distort or manipulate reality is an opportunity open to all users of video manipulation tools. The ethics of such uses and the social considerations of how copyright laws would deal with a technology which manipulates digital works of authorship, works to which copyright automatically attaches, are issues worth considering. This paper explores the possible and actual, reputable and less reputable uses of this technology in an attempt to stimulate discussions about how “well-intended” technologies can be utilized by users in unethical and harmful ways. The paper also attempts to see where possible infringements of copyright’s fair use doctrine has occurred or could possibly occur through use of this technology.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
The internet allows people to communicate sensitive information, and if received in the wrong hands can cause many problems for that person. Cryptography is the study or science of techniques of secret writing and message hiding. Cryptography constitutes any method in which someone attempts to hide a message, or the meaning, in some medium. One specific element of cryptography is encryption, which hides the data or information by transforming it into undecipherable code. Encryption uses a specified key to perform the data transformation.
Medical tools in the modern day are almost all made with small, programmed computers inside. “Medical imaging is a vast field that deals with the techniques to create images of the human body. Many of the modern methods of scanning and imaging are largely based on computer technology” ("Importance of Computers in Medicine."). We have been able to apply many of the advanced medical imaging techniques, over the years, thanks to developments in computer science. Magnetic quality imaging uses computer software. To obtain high-resolution images, doctors ...
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: