Avc college of engineering
We propose a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography. Cryptography provides the security by concealing the contents and steganography provides security by concealing existence of information being communicated. Signal processing adds additional security by compressing and transforming the information. The proposed method, viz. Steganography Based Information Protection Method (SBIPM), consists of scanning, coding, encryption, reshaping, cover processing and embedding steps.
Scanning, coding, encryption steps make the information unintelligible sothat one cannot extract plain message. Embedding make the message invisible so that one cannot detect it. Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers. Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding. Simulation and steganlysis results show the method provides high security and the information is safe from various attacks.
Now a days, various modes of communication like LAN, WAN and INTERNET are widely used for communicating information from one place to another around the globe. Such communication networks are open which any one can access easily. They are regularly monitored and an intercepted. In steganography, a message is embedded in a cover media in an invisible manner so that one could not suspect about its existence.
In this paper we present a substitution based information protection method where we combine cryptographic, steganographic and signal processing concepts together for achieving security. The method is known as Steganography Based Information Protection method. In this method we substitute the information bit... [continues]
Cite This Essay
(2011, 02). Information Security Using Stegnography. StudyMode.com. Retrieved 02, 2011, from http://www.studymode.com/essays/Information-Security-Using-Stegnography-567584.html
"Information Security Using Stegnography" StudyMode.com. 02 2011. 02 2011 <http://www.studymode.com/essays/Information-Security-Using-Stegnography-567584.html>.
"Information Security Using Stegnography." StudyMode.com. 02, 2011. Accessed 02, 2011. http://www.studymode.com/essays/Information-Security-Using-Stegnography-567584.html.