Data hiding Algorithm for Bitmap Images using Steganography
Department of computer science and Engineering,RBIEBT,Sahuran firstname.lastname@example.org Abstract: Steganography is related to cryptography and is the basis for many of the digital watermarking techniques currently being developed. The interest in data hiding has risen with the recent activity in digital copyright protection schemes. As the information age progresses and data become more and more valuable, methods need to be discovered to protect and secure sensitive data. This paper will discuss the applications of steganography including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for implementing steganography within bitmap images.
[Mamta Juneja. Data hiding Algorithm for Bitmap Images using Steganography. Researcher. 2010;2(12):6773]. (ISSN: 1553-9865). http://www.sciencepub.net.
Keywords: Steganography, Bitmap images, Cryptography.
Steganography can also be used to verify data integrity. For example, take a document or image and encode a few words such as “Hello world” over the entire document’s length. One can then ensure data integrity by reversing the steganography process to see if the “Hello World” comes back as the hidden data. If the data is mangled that means that the original file has been changed. This data verification is just a branch of the watermarking concept and similar methods are used to watermark copyrighted information. The technology as a whole isn’t perfect. The data is only secured because it isn’t apparent that
“hidden data” even exists. The more data that is hidden within a document the more the document changes. For instance, an image may become more distorted and artifacts may occur, a document’s formatting or content may change, and an mp3 may have additional static or white noise. Popular tools exist that detect this change in a document; the process is
References: D. Kahn, The Codebreakers, Macmillian, New York, 1967. B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973. Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996. Researcher, 2010;2(12) http://www.sciencepub.net/researcher to appear in the Proceedings of the IEEE, May, 1999 Contents, SPIE Vol. 3657, San Jose, CA, January 1999. UnZign software: http://altern.org/watermark, 1997. http://www.cl.cam.ac.uk/~fapp2/watermarking/st irmark, 1997. Computer Science, Vol. 1174, pp. 207-226, 1996. Vol. 1525, pp. 273-289, 1998. pp. 1673-1687, December 1997.