Preview

Stteganography: General Block Diagram Of Steganography

Good Essays
Open Document
Open Document
9982 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Stteganography: General Block Diagram Of Steganography
CHAPTER 1
INTRODUCTION

INTRODUCTION TO STEGANOGRAPHY
Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient realizes there is a hidden message. In this technique, a secret message is hidden within an ordinary message and the extraction of it is done at its destination. The term steganography combines the two Ancient Greek words Steganos and graphein, where “steganos” means “covered, concealed, or protected” and “graphein” means “writing or drawing”. Thus, steganography is covered writing. The main purpose of steganography is to hide the fact of communication. The need to ensure that only the right people have authorization to high-security accesses, has led to the
…show more content…
However, reformatting the text destroys the embedded content, hence the technique is not robust.

Image Steganography - Image Steganography is a technique of hiding the required message in an image. This technique is prevalent as almost no perceivable change occurs in the image after hiding a large amount of data along with wide variety of available images. Depending on the data hidden in the pixels directly or in the coefficients obtained after a suitable transform domain like FFT, DFT or DWT leads to spatial domain Steganography and frequency domain Steganography. Some of the commonly used methods of embedding payload in cover image are least Significant Bits (LSB) substitution in which the LSBs of cover image pixel are altered to hide the payload and more data can be hidden in
…show more content…
Both take a set of points from the spatial domain and transform them into an equivalent representation in the frequency domain. The difference is that while the DFT takes a discrete signal in one spatial dimension and transforms it into a set of points in one frequency dimension and the Discrete Cosine Transform (for an 8x8 block of values) takes a 64-point discrete signal, which can be thought of as a function of two spatial dimensions x and y, and turns them into 64 DCT coefficients which are in terms of the 64 unique orthogonal 2D spectrum as shown in Fig. 1.19.

The DCT coefficient values are the relative amounts of the 64 spatial frequencies present in the original 64-point input. The element in the upper most left corresponding to zero frequency in both directions is the “DC coefficient” and the rest are called “AC coefficients.”

Fig. 1.19: 64 two-dimensional spatial frequencies
Because pixel values typically change vary slowly from point to point across an image, the FDCT processing step lays the foundation for achieving data compression by concentrating most of the signal in the lower spatial frequencies. For a typical 8x8 sample block from a typical source image, most of the spatial frequencies have zero or near-zero amplitude and need not be

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Images, like the ones you make with your digital camera, cannot be stored as…

    • 435 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    “It is better to be defeated standing for high principle than to run by committing subterfuge,”1 is a quote by Grover Cleveland, which personifies his morals, and that he will never compromise them just for victory. Because of this and other reasons Grover Cleveland is the greatest president that America can boast when nerds get together to talk about great leaders in history. Unfortunately, except among Libertarians, Grover Cleveland is only known today for being the only president to serve two non-consecutive terms. He was born in New York to Puritan Parents. He did later leave the church, but the values instilled in the former president by his parent never left him. Later he became the mayor of Buffalo, and then, due to his impressive character, governor of New York. After this achievement…

    • 1295 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Fast Fourier Transform

    • 2163 Words
    • 9 Pages

    In 1965, Cooley and Turkey were two persons who discussed the FFT (Fast Fourier Transform) for the first time in history. In past years, researchers believed that a discrete Fourier transform can also be calculated and classified as FFT by using the Danielson-Lanczos lemma theorem. By using this theorem, this process is slower than other, as it is slightly tainted in speed due to the power of N (exponent of N) are not 2. Therefore, if the number of points i.e. N is not a power of two, then the transform will only gives you the sets of points matching to the prime factors of N [1]. FFT (Fast Fourier Transform) is a type of algorithm commonly known as discrete Fourier transform algorithm. This algorithm has much significance in the reduction of number of computations that governs for N points from the arithmetic expressions i.e. 2N2 to (2N log2 N), in this expression the ‘N’ is the number of computations and log2 is the logarithm having base 2. In Fourier analysis, if the above function is about to be transferred, not harmonically associated with the sampling frequency, then at this point, the reaction for this FFT behaves just like a sinc function i.e. commonly known as the sampling function, defined as a function used to rise the frequency in the signal processing and propagation, classified as Fourier transforms[4] . However, the other components such as integrated power and aliasing have different variations as the integrated power still gives you the correct values but aliasing can be reduced by using apodization function. This aliasing reduction will be spent for the expansion of the spectral response [1].…

    • 2163 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Law Contd

    • 2531 Words
    • 11 Pages

    Article 19 of the Universal Declaration of Human Rights calls for the protection of free expression in all media including cyberspace. In comparison to traditional print-based media, the accessibility and relative anonymity of cyber space has torn down traditional barriers between an individual and his or her ability to publish. Any person with an internet connection has the potential to reach an audience of millions with little-to-no distribution costs.…

    • 2531 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    Therefore, we can define watermarking systems as systems in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand,…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Communications

    • 469 Words
    • 2 Pages

    Data communications (Datacom) is the engineering discipline concerned with communication between the computers. It is defined as a subset of telecommunication involving the transmission of data to and from computers and components of computer systems. More specifically data communication is transmitted via mediums such as wires, coaxial cables, fiber optics, or radiated electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites.…

    • 469 Words
    • 2 Pages
    Satisfactory Essays