Steganography is the art and science of writing hidden messages in such a way that no one, excluding the sender and deliberated recipient, suspects the message existence , a form of security through obscurity. Steganography techniques can be utilized to images, a video file or an audio file. Typically, steganography is written in characters including hash marking, but its usage within images is also usual. At any rate, steganography secures from pirating copyrighted materials as well as aiding in unauthorized viewing. In this paper, performance analysis of image steganography based on 2 level and 4 level DWT associated to colored images is done. Performance analysis of steganography is done for selecting better wavelet for application by analyzing Peak Signal Noise Ratio(PSNR) of different wavelet families like Haar, Daubechies, Biorthogonal, Reverse Biorthogonal & Meyer wavelet(dmey) on result oriented basis using Matlab environment..
Keywords
Steganography, Discrete Wavelet Transform, Haar, Daubechies, Biorthogonal, Reverse Biorthogonal , Meyer(dmey) , PSNR & MSE
1. Introduction
Steganography is ‘‘covered writing’’. Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its target. Steganography takes cryptography a step farther by hiding an encrypted message so that no one guess it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.
Ms.Suvarna Patil, Information Technology, RGPV University, Bhopal, India, e-mail: patilsuvarna555@gmail.com
Mr.Gajendra Singh Chandel, Information Technology, RGPV University, Bhopal, India, e-mail: hodcsit.sssist@yahoo.com
Mr.Ravindra Gupta, Information Technology, RGPV University, Bhopal, India, e-mail-
...
... middle of paper ...
... Wavelet transform). In this paper we using two technique of 2-level and 4-level discrete wavelet transform for hiding images has been proposed and implemented. This is done in MATLAB using simulink. Different wavelets analysed here are Haar,
Biorthogonal, Reverse Biorthogonal, Daubechies,and Meyer(dmey).Results provide a good reference for application developers to choose a good wavelet compression system for their application, with this result we conclude that 4-level Haar DWT has better PSNR as compared to 2-level Haar DWT and also provide best quality of image.
In Future we modified embedding & extraction formula for hiding audio data in cover image by using 2 level & 3 level wavelet decomposition of 3D-DWT which can be considered as a combination of three 1D DWT in the x, y and z directions and shows better performance in terms of both capacity and security.
Encryption is a strategy for changing data on a computer in a manner that it gets to be distinctly incomprehensible regardless of the possibility that somebody can access a PC with individual information on it.
One of the most important aspects of studying a history of a place is why that place came into existence in the first place. The FBI's Regional Computer Forensics Laboratories are perhaps not a terribly well-known entity within the general public, yet they play an essential part in both our justice system, and our everyday lives. So this begs the question, why would a laboratory centered strictly around computers, even more specifically the forensics around computers, come to be in an age where certainly all major government establishments have, and are familiar with, computers and the technology associated within them. These are a few of the questions that will be answered throughout this research paper, along with an analysis of where they are today, and where it appears the future of these labs will take them.
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ... ... middle of paper ... ...
Have you ever done something you regret very deeply? One may want to hide behind something; maybe something that creates comfort? A black cloth to cover most of the face can shield you from reality, making it easier to hide from the guilt, the shame, and the sins one may have committed. There is a story that stood out beyond belief with it’s dark areas of both metaphorical and literal aspects. The guilt does not just focus on the main character but even his friends and family in this story. Connecting to anyone who may be hiding behind this black veil. “The Minister’s Black Veil” by Nathaniel Hawthorne is, in this writer's opinion, a better story than “Rip Van Winkle” by Washington Irving because of it’s tone, symbolism,
An onion is a data structure that is formed by wrapping a plaintext message with successive layers of encryption, such that each layer can be unwrapped or decrypted like the layers of an onion. The plaintext message is only viewable by the sender, exit node, recipient. This can be extended to end to end encryption so that the last intermediary cannot also view the message.
In the early stages of the computer textual and numeric data were the only data which has to handle. As computer technology developed rapidly, technologies were introduced and multimedia representation of data has got the attention of the world. Now personal computers, hand held devices become very popular and use multimedia data. In these technological advance devices are capable of capturing and displaying high resolution multimedia data (Rivero and Doorn et al., 2006). Parallel to processing power growth on these devices to handle multimedia data, storage and data communication also have increased their capabilities in the recent past. Nowadays most of the electronic devices live with multimedia data and expected to grow tremendously in the future (Subrahmanian and Jajodia, 1996).
Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World Trade Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for safety reasons (USA Today). A " private key" is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).
Actual counterfeit items can be divided into four categories: Vanity Fakes which are low perceived value products, Overruns or copies made from left over material, Condoned Copies made by other designers of fashion houses, and Copies made by the fashion houses themselves.
This grayscale filtering algorithm has been designed to do the same type of filtering than the
Symmetric Encryption is a one of the technique in cryptography for encrypting the text, images etc. The method of encryption and decryption in Symmetric cryptography hang on the secret key, which is shared between the two parties (i.e. Sender and Receiver).
Oftentimes, a person can look at an image and draw a conclusion about it, only to find out later that he or she was incorrect. This phenomenon is due to what is called an optical illusion, in which an image is perceived incorrectly to be something else. This leads to the questions, why do optical illusions occur, and what can be done about them?
The 3-D DWT can be considered as a combination of three one dimensional DWT in the x, y and z directions, as shown in Fig. 3.1. The preliminary work in the DWT processor design is to build 1-D DWT modules, which are composed of high-pass and low-pass filters that perform a convolution of filter coefficients and input pixels. After a one-level of - discrete wavelet transform, the volume of image is decomposed into HHH, HHL, HLH, HLL, LHH, LHL, LLH and LLL signals as shown in the Fig. 3.1 [1].
The internet allows people to communicate sensitive information, and if received in the wrong hands can cause many problems for that person. Cryptography is the study or science of techniques of secret writing and message hiding. Cryptography constitutes any method in which someone attempts to hide a message, or the meaning, in some medium. One specific element of cryptography is encryption, which hides the data or information by transforming it into undecipherable code. Encryption uses a specified key to perform the data transformation.
Different vector quantization methods arc suggested for wavelet coefficients [2]. For all these methods vector formation is considered by two ways. I Intraband-, which groups the pixel at same level and same location. 2. Inter-band which groups the pixels... ...
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: