Preview

Data Mining

Better Essays
Open Document
Open Document
11085 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Mining
Nagham Hamid, Abid Yahya, R. Badlishah Ahmad & Osamah M. Al-Qershi

Image Steganography Techniques: An Overview

Nagham Hamid
University Malaysia Perils (UniMAP) School of Communication and Computer Engineering Penang, Malaysia

nagham_fawa@yahoo.com

Abid Yahya
University Malaysia Perlis (UniMAP) School of Communication and Computer Engineering Perlis, Malaysia

R. Badlishah Ahmad
University Malaysia Perlis (UniMAP) School of Communication and Computer Engineering Perlis, Malaysia

Osamah M. Al-Qershi
School of Electrical & Electronic Engineering University of Science Malaysia (USM) Penang, Malaysia

Abstract Steganography is one of the methods used for the hidden exchange of information and it can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed not only in terms of their ability to hide information in image files but also according to how much information can be hidden, and the robustness to different image processing attacks. Keywords: Adaptive Steganography, Current Techniques, Image Files, Overview, Steganography, Taxonomy.

1. INTRODUCTION
In this modern era, computers and the internet are major communication media that connect different parts of the world as one global virtual world. As a result, people can easily exchange information and distance is no longer a barrier to communication. However, the safety and security of long-distance communication remains an



References: [1] S.A. Halim and M.F.A Sani. “Embedding using spread spectrum image steganography with GF ( [2] ),” in Proc. IMT-GT-ICMSA, 2010, pp. 659-666.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    “If a Bag is purchased, a Blush is also purchased at that same transaction.” (“If Bag, then Blush.”) While Bag is antecedent, Blush represents consequent.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data Analysis

    • 1650 Words
    • 7 Pages

    1. In a questionnaire, respondents are asked to mark their gender as male or female. Gender is an example of the…

    • 1650 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    To overcome time difference challenges in telephone conversations, Songsri can set specific ground rules which all team members in the virtual community ought to adhere to. This will streamline the telephone conversation timelines and ensure every team member participates in the communication process (Filek 1). In avoiding communication challenges relating to e mail communications, it is best for the team leader to pursue one topic of conversation during one session. If she intends to discuss several topics in one session, she should be very clear (in communication) so that, instances of miscommunication is not realized. In overcoming security issues during instant messaging, it is important for Songsri to carry out independent verification questions to the recipients, like asking the respondent personal questions which the intended recipient (only) would know. In this manner, the probability of fraudulent persons hacking the system is effectively reduced. Introducing password verification measures before communication will also go a long way in ensuring the communication channel is…

    • 4728 Words
    • 19 Pages
    Good Essays
  • Better Essays

    Small businesses rely on network connectivity for communications. With the advancement in Voice Over Internet Protocol (VOIP), many businesses are using the internet to save on phone costs. Additionally, it is common for a business to have an in-house communications system. Take some installations in the Air Force for example; they use an Instant Messaging (IM) service for member-member contact. Many times, it is easier to reach someone through IM or social networking. However, these commodities present their own challenges about IT security. However, that is not all that needs protection. In fact, in a more broad view, communication is viewed as a small bite.…

    • 1348 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Better Essays

    is taken, the cameras attach a coded signature that is destroyed if the image is modified and resaved. An…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Data Mining

    • 1981 Words
    • 8 Pages

    Exforsys. (2006). Execution for System: Connection between Data Mining and Customer Interaction. Retrieved from: http://www.exforsys.com/tutorials/data-mining/the-connection-between-data-mining-and-customer-interaction.html…

    • 1981 Words
    • 8 Pages
    Best Essays
  • Best Essays

    During the past decade the technological advancements of the Internet has significantly changed the method of communications and access to information for millions of users worldwide. First developed as a secure communications mode for the military during the height of the cold war era, the Internet has become as commonplace for Americans as the telephone or automobile. Users, provided that they have the necessary computer hardware and browser application as well as a network connection to the Internet are able to access and exchange information at speeds measured in thousandths of a second. Each time a connection to the Internet is made, users risk compromising their privacy through many different channels, including Internet service providers,…

    • 3351 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.…

    • 928 Words
    • 4 Pages
    Better Essays
  • Good Essays

    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 4, April - 2014 Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space Complexity MD Asif Mushtaque Harsh Dhiman M.Tech(CS&E) School of Computing Science and Engineering Galgotias University, Greater Noida, U.P .…

    • 2278 Words
    • 17 Pages
    Good Essays