Preview

Data Hiding Algorithm For Bitmap Images Using Steganography

Powerful Essays
Open Document
Open Document
3592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Hiding Algorithm For Bitmap Images Using Steganography
Researcher, 2010;2(12)

http://www.sciencepub.net/researcher

Data hiding Algorithm for Bitmap Images using Steganography
Mamta Juneja
Department of computer science and Engineering,RBIEBT,Sahuran er_mamta@yahoo.com Abstract: Steganography is related to cryptography and is the basis for many of the digital watermarking techniques currently being developed. The interest in data hiding has risen with the recent activity in digital copyright protection schemes. As the information age progresses and data become more and more valuable, methods need to be discovered to protect and secure sensitive data. This paper will discuss the applications of steganography including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for implementing steganography within bitmap images.
[Mamta Juneja. Data hiding Algorithm for Bitmap Images using Steganography. Researcher. 2010;2(12):6773]. (ISSN: 1553-9865). http://www.sciencepub.net.
Keywords: Steganography, Bitmap images, Cryptography.
Steganography can also be used to verify data integrity. For example, take a document or image and encode a few words such as “Hello world” over the entire document’s length. One can then ensure data integrity by reversing the steganography process to see if the “Hello World” comes back as the hidden data. If the data is mangled that means that the original file has been changed. This data verification is just a branch of the watermarking concept and similar methods are used to watermark copyrighted information. The technology as a whole isn’t perfect. The data is only secured because it isn’t apparent that
“hidden data” even exists. The more data that is hidden within a document the more the document changes. For instance, an image may become more distorted and artifacts may occur, a document’s formatting or content may change, and an mp3 may have additional static or white noise. Popular tools exist that detect this change in a document; the process is



References: D. Kahn, The Codebreakers, Macmillian, New York, 1967. B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973. Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996. Researcher, 2010;2(12) http://www.sciencepub.net/researcher to appear in the Proceedings of the IEEE, May, 1999 Contents, SPIE Vol. 3657, San Jose, CA, January 1999. UnZign software: http://altern.org/watermark, 1997. http://www.cl.cam.ac.uk/~fapp2/watermarking/st irmark, 1997. Computer Science, Vol. 1174, pp. 207-226, 1996. Vol. 1525, pp. 273-289, 1998. pp. 1673-1687, December 1997.

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Large data sets such as huge companies like Google to NHS hospital records to the Leather industry have similar ways of keeping huge amounts of data safe from other people’s eyes or keeping them tracked via a systematic barcode. All these data sets collect information in various ways. Their job is to keep it all protected for their customers and patients.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Better Essays

    E-Business Paper

    • 1010 Words
    • 5 Pages

    Steve Pain. (2007). Experts warn protection of data still not a top priority . Retrieved February 20, 2008, from University of Phoenix, Week Three, rEsource. BUS415 Web site.…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stenography

    • 1124 Words
    • 5 Pages

    Before creating a procedure to retrieve the embedded message files within the four graphics I need to determine the different levels at which the message can be hidden. Stenography is the umbrella for many different types of methods to hide messages. The first level consists of two areas: technical stenography and linguistic stenography. The second level consists of two areas under the heading of linguistic stenography: semagrams and open codes. Technical stenography has no sublevels. The third level consists of four sublevels two under the heading of semagrams (visual and text) and two under the heading of open codes (jargon and covered ciphers). The fourth level consists of two ciphers that are found under the subheading of covered ciphers: null and grille. Now that the different levels have been identified it’s time to determine how the information is hidden using these stenographic components (Kessler 2004).…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem. Hence the technology of digital watermarking is received a large deal of attention. Generally, digital watermarking techniques are based on either spread spectrum methods or changing the least significant bits of selected coefficients of a certain signal transform. For speech watermarking, to ensure the embedded watermark is imperceptible, the audio marking phenomenon is considered together with these conventional techniques.…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Allebach, J., & Wong, P.W. (1996). Edge-directed interpolation, In International conference on image processing (pp. 707–710). Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14, 253–266. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474. Chen, W. J., Chang, C. C., & Le, T. H. N. (2010). High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 37, 3292–3301. Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31, 465–470. Lee, C. F., & Chang, W. T. (2010). Recovery of color images by composed associative mining and edge detection. Journal of Information Hiding and Multimedia Signal Processing, 1, 310–324. Lee, C. F., Chang, C. C., Pai, P. Y., & Huang, W. H. (2010). An effective demosaicing method for CFA image. International Journal of Innovative Computing, Information and Control, 6, 5485–5499. Lee, C. F., & Chen, H. L. (2010). A novel data hiding scheme based on modulus function. Journal of Systems and Software, 83, 832–843. Lehmann, T. M., Gonner, C., & Spitzer, K. (1999). Survey: interpolation methods in medical image processing. IEEE Transactions on Medical Imaging, 18, 1049–1075. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16, 354–362. Sun, H. M., Weng, C. Y., Lee, C. F., & Yang, C. H. (2011). Anti-forensics with Steganographic Data Embedding in Digital Images. IEEE Journal on Selected Areas in Communications, 29, 1392–1403. Thévenaz, P., Blu, T., & Unser, M. (2000). Interpolation revisited. IEEE Transactions on Medical Imaging, 19, 739–758. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13, 890–896. Weng, S. W., Zhao, Y., & Pan, J. S. (2008). A novel reversible data hiding scheme. International Journal of Innovative Computing, Information and Control, 4, 351–358. Xin, L., & Orchard, M. T. (2001). New edge-directed interpolation. IEEE Transactions on Image Processing, 10, 1521–1527. Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2008). Adaptive data hiding in edged areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3, 488–497.…

    • 6788 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Spam Image Identification Using an Artificial Neural Network Jason R. Bowling, Priscilla Hope, Kathy J. Liszka The University of Akron Akron, Ohio 44325-4003 {bowling, ph11, liszka}@uakron.edu Abstract We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam.…

    • 2824 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    KeywordsImage Quality Measures, Steganography, Steganalysis, HVS based IQM, Pixel based IQM. I. INTRODUCTION Hiding information in digital content has a wide class of application and the techniques involved in such applications are collectively referred to as information hiding techniques [1]. Steganography refers to the art/science of embedding information in the digital images, aiming to convey messages secretly by concealing its very existence. Compared with the Cryptography, modern steganography not only encrypts messages but also masks the very presence of the communication.…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays

Related Topics