Preview

An Overview of Steganography and Presentation of Associated Java Application

Powerful Essays
Open Document
Open Document
10575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Overview of Steganography and Presentation of Associated Java Application
Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide
Jessica Codr, jmc5@cec.wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download

ABSTRACT:
People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.

KEYWORDS: steganography, steganalysis, data hiding, data security, data embedding, stego-objects, watermarking, secret communications, secret messages, hidden messages, hidden channel, covert channel, LSB alterations

TABLE OF CONTENTS:
1. Introduction and Overview 1. Steganography Versus Cryptology 2. Characteristics of Strong Steganography 3. Origins of Steganography 2. Cover Media and General Steganography Techniques 1. Digital Media 2. Text 3. Network Communications 3. Specific Steganographic Tactics 1. Least Significant Bit Alterations 2. Transform Domain Techniques 3. Data Dispersal and Feature Modification Techniques 4. Non-Image Techniques 4. Cutting-Edge Developments 1. Novel View of Steganography 2. Advances with JPEGs 3. Advances with Networks 4. Steganalysis and Artificial Intelligence 5. Other Recent Developments

http://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano/index.html

1 of 21

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

5. Author's Application and Conclusions 1. My Application: Description 2. My Application:

You May Also Find These Documents Helpful

  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer forensics

    • 2184 Words
    • 8 Pages

    People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.…

    • 2184 Words
    • 8 Pages
    Better Essays
  • Good Essays

    exploited by the potential users in order to make valid use of this miracles network…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    History of Java

    • 1527 Words
    • 7 Pages

    Today, Java not only permeates the Internet, but also is the invisible force behind many of the applications and devices that power our day-to-day lives. From mobile phones to handheld devices, games and navigation systems to e-business solutions, Java is everywhere!…

    • 1527 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Abstract- In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. We propose a robust quantization-based image watermarking scheme, called the gradient direction watermarking (GDWM), and based on the uniform quantization of the direction of gradient vectors. In GDWM, the watermark bits are embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. The proposed scheme has the following advantages: 1) Increased invisibility of the embedded watermark, 2) Robustness to amplitude scaling attacks, and 3) Increased watermarking capacity. To quantize the gradient direction, the DWT coefficients are modified based on the derived relationship between the changes in coefficients and the change in the gradient direction. This watermarking technique is more robust to various sizes of watermark images. The Gaussian filter is a local and linear filter that smoothens the whole image irrespective of its edges or details, whereas the bilateral filter is also a local but non-linear, considers both gray level similarities and geometric closeness of the neighbouring pixels without smoothing edges. The extension of bilateral filter: multi-resolution bilateral filter, where bilateral…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    PRogram 1

    • 313 Words
    • 2 Pages

    Security in terms of hiding code: Data hiding is a method used in object-oriented programming to hide information within computer code. Objects within a code are not privy to information considered hidden. It presents several advantages for programmers, because objects are unable to connect to irrelevant data and hackers are less likely to be able to access this hidden data. On the other hand; If an object does access hidden data, it will return an error. This can lead to possible destructive results if exposed to the user. Improper use of this data will prove detrimental.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Audio Steganography

    • 5008 Words
    • 21 Pages

    Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.…

    • 5008 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    plus radiologist or specialist’s inference could be embedded into medical images as watermark data so that error probability decreases. Watermarking methods could be classified into blind and non-blindbased on the information required at the detector to extract the watermark. In blind methods, which are also known as public watermarking schemes and are the most challenging type of watermarking systems, neither the host image nor watermark content are needed to extractthe watermark whereas in non-blind methods, which are also called private watermarking schemes, both the host image and embedded watermark contents are required to extract the watermark. It is clear that the non-blind methods offer better robustness compared to blind methods, but in the case when it is hard to get the original cover and watermark image forwatermark extraction, the blind methods are more desired. The watermarking schemes can alsobe categorized as spatial domain or frequency domain techniques depending on embedding of watermark contents into host image is done either in spatial or in transform…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    Abstract-A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by  minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.  Keywords - sensitive data; fake objects; data allocation strategies; I. INTRODUCTION In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. We call owner of the data,…

    • 2743 Words
    • 11 Pages
    Better Essays

Related Topics