Preview

An Overview of Steganography and Presentation of Associated Java Application

Powerful Essays
Open Document
Open Document
10575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Overview of Steganography and Presentation of Associated Java Application
Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide
Jessica Codr, jmc5@cec.wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download

ABSTRACT:
People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.

KEYWORDS: steganography, steganalysis, data hiding, data security, data embedding, stego-objects, watermarking, secret communications, secret messages, hidden messages, hidden channel, covert channel, LSB alterations

TABLE OF CONTENTS:
1. Introduction and Overview 1. Steganography Versus Cryptology 2. Characteristics of Strong Steganography 3. Origins of Steganography 2. Cover Media and General Steganography Techniques 1. Digital Media 2. Text 3. Network Communications 3. Specific Steganographic Tactics 1. Least Significant Bit Alterations 2. Transform Domain Techniques 3. Data Dispersal and Feature Modification Techniques 4. Non-Image Techniques 4. Cutting-Edge Developments 1. Novel View of Steganography 2. Advances with JPEGs 3. Advances with Networks 4. Steganalysis and Artificial Intelligence 5. Other Recent Developments

http://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano/index.html

1 of 21

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

5. Author's Application and Conclusions 1. My Application: Description 2. My Application:

You May Also Find These Documents Helpful

  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The general public have a vague understanding of what digital forensic is; thanks to shows like CSI and NCIS people have an idea of the kind of work done in digital forensics. A general definition of digital forensics is that it is the process and investigative methods used to find digital evidence and prepare it for legal proceedings. This can also be applied to non-legal matters such as penetration examination of a commercial network looking for vulnerabilities. Casey (2011) explains that digital evidence can be found in different computer systems and groups the systems into three categories; open computer system, communication systems and embedded computer systems. This grouping helps further explain where and what digital forensics can be applied.…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    History of Java

    • 1527 Words
    • 7 Pages

    Today, Java not only permeates the Internet, but also is the invisible force behind many of the applications and devices that power our day-to-day lives. From mobile phones to handheld devices, games and navigation systems to e-business solutions, Java is everywhere!…

    • 1527 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    exploited by the potential users in order to make valid use of this miracles network…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Steganography is the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret communication from a third party. Usually, a steganographic message will appear to be something else: a picture, an audio file, or some other message (the covertext). The advantage of steganography over cryptography alone is that steganographic message does not attract attention to communicating parties. An apparent encrypted message, no matter how unbreakable it is, can arouse suspicion and may in itself be incriminating. If suspicion is raised, then the goal of steganography is defeated. Since there is always a possibility that secret communication will be uncovered, steganography is often used together with cryptography. A steganographic message (the plaintext) is first encrypted by some modern encryption algorithms, and then a covertext is modified in some way to contain the encrypted message (the ciphertext), resulting in stegotext.…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Abstract- In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. We propose a robust quantization-based image watermarking scheme, called the gradient direction watermarking (GDWM), and based on the uniform quantization of the direction of gradient vectors. In GDWM, the watermark bits are embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. The proposed scheme has the following advantages: 1) Increased invisibility of the embedded watermark, 2) Robustness to amplitude scaling attacks, and 3) Increased watermarking capacity. To quantize the gradient direction, the DWT coefficients are modified based on the derived relationship between the changes in coefficients and the change in the gradient direction. This watermarking technique is more robust to various sizes of watermark images. The Gaussian filter is a local and linear filter that smoothens the whole image irrespective of its edges or details, whereas the bilateral filter is also a local but non-linear, considers both gray level similarities and geometric closeness of the neighbouring pixels without smoothing edges. The extension of bilateral filter: multi-resolution bilateral filter, where bilateral…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    plus radiologist or specialist’s inference could be embedded into medical images as watermark data so that error probability decreases. Watermarking methods could be classified into blind and non-blindbased on the information required at the detector to extract the watermark. In blind methods, which are also known as public watermarking schemes and are the most challenging type of watermarking systems, neither the host image nor watermark content are needed to extractthe watermark whereas in non-blind methods, which are also called private watermarking schemes, both the host image and embedded watermark contents are required to extract the watermark. It is clear that the non-blind methods offer better robustness compared to blind methods, but in the case when it is hard to get the original cover and watermark image forwatermark extraction, the blind methods are more desired. The watermarking schemes can alsobe categorized as spatial domain or frequency domain techniques depending on embedding of watermark contents into host image is done either in spatial or in transform…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    Abstract-A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by  minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.  Keywords - sensitive data; fake objects; data allocation strategies; I. INTRODUCTION In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. We call owner of the data,…

    • 2743 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Audio Steganography

    • 5008 Words
    • 21 Pages

    Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.…

    • 5008 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    PRogram 1

    • 313 Words
    • 2 Pages

    Security in terms of hiding code: Data hiding is a method used in object-oriented programming to hide information within computer code. Objects within a code are not privy to information considered hidden. It presents several advantages for programmers, because objects are unable to connect to irrelevant data and hackers are less likely to be able to access this hidden data. On the other hand; If an object does access hidden data, it will return an error. This can lead to possible destructive results if exposed to the user. Improper use of this data will prove detrimental.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays

Related Topics