SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES PDF Author: Dr. V. Nagaraj
Publisher: V. Nagaraj
ISBN: 9354264549
Category : Computers
Languages : en
Pages : 119

Get Book Here

Book Description
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on statistical analysis. Many other steganography algorithms have been developed such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Spread Spectrum Embedding. But the insertion capacities for all the above methods were not satisfied. Therefore, developing new steganography algorithms against statistical analysis seems to be the prime requirement in steganography. The LSB insertion method is the most common and easiest method for embedding messages in an image with high capacity. However, it is detectable by statistical analysis such as RS and Chisquare analysis. Hence, researchers are still in look out for steganography techniques with enhanced insertion capacity of secret data along with greater security and which can resist attacks. In this work, in order to enhance the embedding capacity of secret data four techniques for secret communication have been proposed. They are classified into two categories. In first category, cryptography is used along with steganography to enhance the security, while in second category only steganography is used. In the first category, two improved LSB substitution techniques have been proposed. The first technique is known as Zigzag Modulo Substitution Method in which embedding locations are Sequence based. The second technique is known as Random Modulo Substitution Method using Random Technique in LSB Steganography and user key based LSB substitution steganography for RGB images where in, RSA algorithm is used for encryption. The techniques under the first category are exclusively LSB array based. The first LSB array based technique embeds message bits into LSB arrays of cover image by using zigzag scanning. On the other hand the Random Modulo Substitution Method embeds secret data into the different locations of cover image by using pseudo random index generator. Moreover, both these LSB array based techniques use RSA algorithm to enhance security. Histogram and Statistical analysis performed on the stego image proved that the proposed techniques can effectively resist steganalysis. Comparison of the statistical parameters like Root Mean Square (RMS), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Matrix (SSIM) for the proposed techniques with cover image and stego image was carried out and analyzed. The Second category includes pixel value modification method and pixel value differencing method in which the embedding decision for a target pixel is taken by random technique. Data hiding by using pixel value modification with modulus function in color images guarantees that no pixel value will exceed the range 0 to 255 in stego image. In the existing PVD embedding methods, only one secret digit was embedded for two consecutive pixels, but the proposed method embeds one secret digit in only one pixel. Proposed method on color images gives more capacity and security than the PVD methods. It also provides better visual quality of stego image. Moreover, proposed method extracts the hidden secret message efficiently without using the range tables. In existing steganography algorithms like Pixel Value Differencing (PVD) methods, the secret data are embedded into the differences of adjacent pixels. This pair wise modification mechanism in cover image increases the histogram distortion.

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES

SOME INVESTIGATIONS ON STEGANOGRAPHY TECHNIQUES PDF Author: Dr. V. Nagaraj
Publisher: V. Nagaraj
ISBN: 9354264549
Category : Computers
Languages : en
Pages : 119

Get Book Here

Book Description
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the secret data. The Least Significant Bit (LSB) steganography that replaces the least significant bits of the host medium is a widely used technique with low computational complexity and high insertion capacity. Although it has good perceptual transparency, it is vulnerable to steganalysis which is based on statistical analysis. Many other steganography algorithms have been developed such as Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Spread Spectrum Embedding. But the insertion capacities for all the above methods were not satisfied. Therefore, developing new steganography algorithms against statistical analysis seems to be the prime requirement in steganography. The LSB insertion method is the most common and easiest method for embedding messages in an image with high capacity. However, it is detectable by statistical analysis such as RS and Chisquare analysis. Hence, researchers are still in look out for steganography techniques with enhanced insertion capacity of secret data along with greater security and which can resist attacks. In this work, in order to enhance the embedding capacity of secret data four techniques for secret communication have been proposed. They are classified into two categories. In first category, cryptography is used along with steganography to enhance the security, while in second category only steganography is used. In the first category, two improved LSB substitution techniques have been proposed. The first technique is known as Zigzag Modulo Substitution Method in which embedding locations are Sequence based. The second technique is known as Random Modulo Substitution Method using Random Technique in LSB Steganography and user key based LSB substitution steganography for RGB images where in, RSA algorithm is used for encryption. The techniques under the first category are exclusively LSB array based. The first LSB array based technique embeds message bits into LSB arrays of cover image by using zigzag scanning. On the other hand the Random Modulo Substitution Method embeds secret data into the different locations of cover image by using pseudo random index generator. Moreover, both these LSB array based techniques use RSA algorithm to enhance security. Histogram and Statistical analysis performed on the stego image proved that the proposed techniques can effectively resist steganalysis. Comparison of the statistical parameters like Root Mean Square (RMS), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Matrix (SSIM) for the proposed techniques with cover image and stego image was carried out and analyzed. The Second category includes pixel value modification method and pixel value differencing method in which the embedding decision for a target pixel is taken by random technique. Data hiding by using pixel value modification with modulus function in color images guarantees that no pixel value will exceed the range 0 to 255 in stego image. In the existing PVD embedding methods, only one secret digit was embedded for two consecutive pixels, but the proposed method embeds one secret digit in only one pixel. Proposed method on color images gives more capacity and security than the PVD methods. It also provides better visual quality of stego image. Moreover, proposed method extracts the hidden secret message efficiently without using the range tables. In existing steganography algorithms like Pixel Value Differencing (PVD) methods, the secret data are embedded into the differences of adjacent pixels. This pair wise modification mechanism in cover image increases the histogram distortion.

Investigator's Guide to Steganography

Investigator's Guide to Steganography PDF Author: Gregory Kipper
Publisher: CRC Press
ISBN: 0203504763
Category : Computers
Languages : en
Pages : 242

Get Book Here

Book Description
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable refer

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS PDF Author: Nihad Ahmad Hassan
Publisher: Syngress
ISBN: 0128044969
Category : Computers
Languages : en
Pages : 326

Get Book Here

Book Description
- "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist - Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.

Information Hiding

Information Hiding PDF Author: Fabien A. P. Petitcolas
Publisher: Springer Science & Business Media
ISBN: 3540004211
Category : Business & Economics
Languages : en
Pages : 438

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.

Human Computer Interaction Using Hand Gestures

Human Computer Interaction Using Hand Gestures PDF Author: Prashan Premaratne
Publisher: Springer Science & Business Media
ISBN: 9814585696
Category : Technology & Engineering
Languages : en
Pages : 182

Get Book Here

Book Description
Human computer interaction (HCI) plays a vital role in bridging the 'Digital Divide', bringing people closer to consumer electronics control in the 'lounge'. Keyboards and mouse or remotes do alienate old and new generations alike from control interfaces. Hand Gesture Recognition systems bring hope of connecting people with machines in a natural way. This will lead to consumers being able to use their hands naturally to communicate with any electronic equipment in their 'lounge.' This monograph will include the state of the art hand gesture recognition approaches and how they evolved from their inception. The author would also detail his research in this area for the past 8 years and how the future might turn out to be using HCI. This monograph will serve as a valuable guide for researchers (who would endeavour into) in the world of HCI.

Data Hiding

Data Hiding PDF Author: Michael T. Raggo
Publisher: Newnes
ISBN: 159749741X
Category : Computers
Languages : en
Pages : 269

Get Book Here

Book Description
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. - Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 - Dives deep into the less known approaches to data hiding, covert communications, and advanced malware - Includes never before published information about next generation methods of data hiding - Outlines a well-defined methodology for countering threats - Looks ahead at future predictions for data hiding

System Forensics, Investigation, and Response

System Forensics, Investigation, and Response PDF Author: John Vacca
Publisher: Jones & Bartlett Publishers
ISBN: 0763791342
Category : Business & Economics
Languages : en
Pages : 356

Get Book Here

Book Description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.

Multidisciplinary Approach to Modern Digital Steganography

Multidisciplinary Approach to Modern Digital Steganography PDF Author: Pramanik, Sabyasachi
Publisher: IGI Global
ISBN: 1799871622
Category : Computers
Languages : en
Pages : 380

Get Book Here

Book Description
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Digital Media Steganography

Digital Media Steganography PDF Author: Mahmoud Hassaballah
Publisher: Academic Press
ISBN: 0128194391
Category : Computers
Languages : en
Pages : 388

Get Book Here

Book Description
The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography. - Covers fundamental theories and algorithms for practical design which form the basis of modern digital media steganography - Provides new theoretical breakthroughs and a number of modern techniques in steganography - Presents the latest advances in digital media steganography such as using deep learning and artificial neural network as well as Quantum Steganography

Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice

Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799830268
Category : Law
Languages : en
Pages : 562

Get Book Here

Book Description
As computer and internet technologies continue to advance at a fast pace, the rate of cybercrimes is increasing. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security, while cyberbullying, cyberstalking, child pornography, and trafficking crimes are made easier through the anonymity of the internet. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. Highlighting a range of topics such as cybercrime, threat detection, and forensic science, this publication is an ideal reference source for security analysts, law enforcement, lawmakers, government officials, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.