Preview

Data Hiding Algorithm For Bitmap Images Using Steganography

Powerful Essays
Open Document
Open Document
3592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Hiding Algorithm For Bitmap Images Using Steganography
Researcher, 2010;2(12)

http://www.sciencepub.net/researcher

Data hiding Algorithm for Bitmap Images using Steganography
Mamta Juneja
Department of computer science and Engineering,RBIEBT,Sahuran er_mamta@yahoo.com Abstract: Steganography is related to cryptography and is the basis for many of the digital watermarking techniques currently being developed. The interest in data hiding has risen with the recent activity in digital copyright protection schemes. As the information age progresses and data become more and more valuable, methods need to be discovered to protect and secure sensitive data. This paper will discuss the applications of steganography including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for implementing steganography within bitmap images.
[Mamta Juneja. Data hiding Algorithm for Bitmap Images using Steganography. Researcher. 2010;2(12):6773]. (ISSN: 1553-9865). http://www.sciencepub.net.
Keywords: Steganography, Bitmap images, Cryptography.
Steganography can also be used to verify data integrity. For example, take a document or image and encode a few words such as “Hello world” over the entire document’s length. One can then ensure data integrity by reversing the steganography process to see if the “Hello World” comes back as the hidden data. If the data is mangled that means that the original file has been changed. This data verification is just a branch of the watermarking concept and similar methods are used to watermark copyrighted information. The technology as a whole isn’t perfect. The data is only secured because it isn’t apparent that
“hidden data” even exists. The more data that is hidden within a document the more the document changes. For instance, an image may become more distorted and artifacts may occur, a document’s formatting or content may change, and an mp3 may have additional static or white noise. Popular tools exist that detect this change in a document; the process is



References: D. Kahn, The Codebreakers, Macmillian, New York, 1967. B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973. Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996. Researcher, 2010;2(12) http://www.sciencepub.net/researcher to appear in the Proceedings of the IEEE, May, 1999 Contents, SPIE Vol. 3657, San Jose, CA, January 1999. UnZign software: http://altern.org/watermark, 1997. http://www.cl.cam.ac.uk/~fapp2/watermarking/st irmark, 1997. Computer Science, Vol. 1174, pp. 207-226, 1996. Vol. 1525, pp. 273-289, 1998. pp. 1673-1687, December 1997.

You May Also Find These Documents Helpful

  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Large data sets such as huge companies like Google to NHS hospital records to the Leather industry have similar ways of keeping huge amounts of data safe from other people’s eyes or keeping them tracked via a systematic barcode. All these data sets collect information in various ways. Their job is to keep it all protected for their customers and patients.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Better Essays

    E-Business Paper

    • 1010 Words
    • 5 Pages

    Steve Pain. (2007). Experts warn protection of data still not a top priority . Retrieved February 20, 2008, from University of Phoenix, Week Three, rEsource. BUS415 Web site.…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    In the other methods, the watermarks are embedded by the use of counterfeit human speech. It is unfortunate that such type of method also has the defect of weak robustness especially when the counterfeit human speech is destroyed. The distortion of the counterfeit human speech will also lead to the damage of the watermark…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Spam Image Identification Using an Artificial Neural Network Jason R. Bowling, Priscilla Hope, Kathy J. Liszka The University of Akron Akron, Ohio 44325-4003 {bowling, ph11, liszka}@uakron.edu Abstract We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam.…

    • 2824 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that…

    • 6788 Words
    • 28 Pages
    Powerful Essays
  • Better Essays

    Stenography

    • 1124 Words
    • 5 Pages

    Before creating a procedure to retrieve the embedded message files within the four graphics I need to determine the different levels at which the message can be hidden. Stenography is the umbrella for many different types of methods to hide messages. The first level consists of two areas: technical stenography and linguistic stenography. The second level consists of two areas under the heading of linguistic stenography: semagrams and open codes. Technical stenography has no sublevels. The third level consists of four sublevels two under the heading of semagrams (visual and text) and two under the heading of open codes (jargon and covered ciphers). The fourth level consists of two ciphers that are found under the subheading of covered ciphers: null and grille. Now that the different levels have been identified it’s time to determine how the information is hidden using these stenographic components (Kessler 2004).…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Better Essays

    are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media. For instance, image and video data hiding share many common points; however video data hiding necessitates more complex designs [6], [7] as a result of the additional temporal dimension. Therefore, video data hiding continues to constitute an active research area.…

    • 6460 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    6. Petitcolas, Fabian Anderson, Ross J Kuhn, Markus. Attacks on copyright marking systems, in David Aucsmith (Ed), “Information Hiding – A Survey”, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219- 239. And Fabien A. P. Petitcolas. Watermarking schemes evaluation. I.E.E.E. Signal Processing, vol. 17, no. 5, pp. 58–64, September 2000.…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    KeywordsImage Quality Measures, Steganography, Steganalysis, HVS based IQM, Pixel based IQM. I. INTRODUCTION Hiding information in digital content has a wide class of application and the techniques involved in such applications are collectively referred to as information hiding techniques [1]. Steganography refers to the art/science of embedding information in the digital images, aiming to convey messages secretly by concealing its very existence. Compared with the Cryptography, modern steganography not only encrypts messages but also masks the very presence of the communication.…

    • 2605 Words
    • 11 Pages
    Powerful Essays

Related Topics