Stteganography: General Block Diagram Of Steganography

Good Essays
CHAPTER 1
INTRODUCTION

INTRODUCTION TO STEGANOGRAPHY
Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient realizes there is a hidden message. In this technique, a secret message is hidden within an ordinary message and the extraction of it is done at its destination. The term steganography combines the two Ancient Greek words Steganos and graphein, where “steganos” means “covered, concealed, or protected” and “graphein” means “writing or drawing”. Thus, steganography is covered writing. The main purpose of steganography is to hide the fact of communication. The need to ensure that only the right people have authorization to high-security accesses, has led to the
…show more content…
However, reformatting the text destroys the embedded content, hence the technique is not robust.

Image Steganography - Image Steganography is a technique of hiding the required message in an image. This technique is prevalent as almost no perceivable change occurs in the image after hiding a large amount of data along with wide variety of available images. Depending on the data hidden in the pixels directly or in the coefficients obtained after a suitable transform domain like FFT, DFT or DWT leads to spatial domain Steganography and frequency domain Steganography. Some of the commonly used methods of embedding payload in cover image are least Significant Bits (LSB) substitution in which the LSBs of cover image pixel are altered to hide the payload and more data can be hidden in
…show more content…
Both take a set of points from the spatial domain and transform them into an equivalent representation in the frequency domain. The difference is that while the DFT takes a discrete signal in one spatial dimension and transforms it into a set of points in one frequency dimension and the Discrete Cosine Transform (for an 8x8 block of values) takes a 64-point discrete signal, which can be thought of as a function of two spatial dimensions x and y, and turns them into 64 DCT coefficients which are in terms of the 64 unique orthogonal 2D spectrum as shown in Fig. 1.19.

The DCT coefficient values are the relative amounts of the 64 spatial frequencies present in the original 64-point input. The element in the upper most left corresponding to zero frequency in both directions is the “DC coefficient” and the rest are called “AC coefficients.”

Fig. 1.19: 64 two-dimensional spatial frequencies
Because pixel values typically change vary slowly from point to point across an image, the FDCT processing step lays the foundation for achieving data compression by concentrating most of the signal in the lower spatial frequencies. For a typical 8x8 sample block from a typical source image, most of the spatial frequencies have zero or near-zero amplitude and need not be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    UNIVERSITI TEKNIKAL MALAYSIA MELAKA FAKULTI KEJURUTERAAN ELEKTRIK SUBJECT:INSTRUMENTATION BEKC 3563 Assignment 3 BEKC BEKC 3563 –INSTRUMENTASI ASSIGNMENT 2 Name: TENGKU SHERRY AZWEEN No Matrices:B010910134 No IC: 890711-14-5052 Student No Marks 41 1 PROBLEM STATEMENT Water (H2O) is the most abundant compound on Earth's surface, covering about 70%. In nature, it exists in liquid, solid, and gaseous states. In a daily human life, water is very important and without waters all human…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Block Diagram

    • 304 Words
    • 2 Pages

    ABSTRCT Every day when you wake up and explore the world, you tend to notice that the world around you is changing drastically. Technology is growing faster than the growth of population in world. But not all Technology is utilized for the betterment of the life of people. One of the greatest effects of technology is its utilization in the field of robbery. People have become so greedy that they find new and unique way of robbery. But not all brains work in worked way. We have utilized our…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    reliability block diagram

    • 1865 Words
    • 8 Pages

    CONTENTS 6 APPENDIX............................................................................................................ GLOSSARY WRD - Weibill's Reliability Distribution RBD - Reliability Block Diagram MSG - Maintenance Steering Group RCM - Reliability Centred Maintenance EDP - Engine Driven Pump EMDP - Electrical Motor Driven Pump FTA - Fault Tree Analysis ABSTRACT The reliability analysis of Boeing 737NG's hydraulically actuated…

    • 1865 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography…

    • 928 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    INTRODUCION Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy as covert communication to include the more general concept of covert computation. Steganographic…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 2046 Words
    • 9 Pages

    SteganoGRAPHY documentation 1. Introduction 1.1 Purpose This SDS describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. 1.2 Intended Audience and Reading Suggestions This SDS document is intended for any developers, project manager or documentation…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Steganography

    • 1450 Words
    • 6 Pages

    Pursuing M.Tech, Banasthali University, Banasthali ABSTRACT Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated…

    • 1450 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation…

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    The principles of John Von Neumann Model using a block diagram. John von Neumann Block Diagram John von Neumann Block Diagram John von Neumann is known as “The Father of the Computer” or subsequently as the “von Neumann architecture”. The main principles of John von Neumann were he devised a concept for computer architecture that remains with us to this day, the stored-program concept. The computer should operate completely electronically. An electronic stored-program computer where both…

    • 462 Words
    • 2 Pages
    Good Essays