Preview

Data Hiding Algorithm For Bitmap Images Using Steganography

Powerful Essays
Open Document
Open Document
3592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Hiding Algorithm For Bitmap Images Using Steganography
Researcher, 2010;2(12)

http://www.sciencepub.net/researcher

Data hiding Algorithm for Bitmap Images using Steganography
Mamta Juneja
Department of computer science and Engineering,RBIEBT,Sahuran er_mamta@yahoo.com Abstract: Steganography is related to cryptography and is the basis for many of the digital watermarking techniques currently being developed. The interest in data hiding has risen with the recent activity in digital copyright protection schemes. As the information age progresses and data become more and more valuable, methods need to be discovered to protect and secure sensitive data. This paper will discuss the applications of steganography including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for implementing steganography within bitmap images.
[Mamta Juneja. Data hiding Algorithm for Bitmap Images using Steganography. Researcher. 2010;2(12):6773]. (ISSN: 1553-9865). http://www.sciencepub.net.
Keywords: Steganography, Bitmap images, Cryptography.
Steganography can also be used to verify data integrity. For example, take a document or image and encode a few words such as “Hello world” over the entire document’s length. One can then ensure data integrity by reversing the steganography process to see if the “Hello World” comes back as the hidden data. If the data is mangled that means that the original file has been changed. This data verification is just a branch of the watermarking concept and similar methods are used to watermark copyrighted information. The technology as a whole isn’t perfect. The data is only secured because it isn’t apparent that
“hidden data” even exists. The more data that is hidden within a document the more the document changes. For instance, an image may become more distorted and artifacts may occur, a document’s formatting or content may change, and an mp3 may have additional static or white noise. Popular tools exist that detect this change in a document; the process is



References: D. Kahn, The Codebreakers, Macmillian, New York, 1967. B. Norman, Secret Warfare, Acropolis Books, Washington D.C., 1973. Journal, Vol. 35, No. 3 and 4, pp. 313-336, 1996. Researcher, 2010;2(12) http://www.sciencepub.net/researcher to appear in the Proceedings of the IEEE, May, 1999 Contents, SPIE Vol. 3657, San Jose, CA, January 1999. UnZign software: http://altern.org/watermark, 1997. http://www.cl.cam.ac.uk/~fapp2/watermarking/st irmark, 1997. Computer Science, Vol. 1174, pp. 207-226, 1996. Vol. 1525, pp. 273-289, 1998. pp. 1673-1687, December 1997.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Large data sets such as huge companies like Google to NHS hospital records to the Leather industry have similar ways of keeping huge amounts of data safe from other people’s eyes or keeping them tracked via a systematic barcode. All these data sets collect information in various ways. Their job is to keep it all protected for their customers and patients.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Better Essays

    E-Business Paper

    • 1010 Words
    • 5 Pages

    Steve Pain. (2007). Experts warn protection of data still not a top priority . Retrieved February 20, 2008, from University of Phoenix, Week Three, rEsource. BUS415 Web site.…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    Steganography relies on the fact that the human senses are inadequate when compared to analysis performed by machines or even in fact the senses of other animals of the earth. The human eye or the human ear cannot detect very subtle or minute changes in visual or aural presentations making steganography an effective means of concealing private information. One major factor in steganography is that it relies on the fact that a person does not know that a picture or a sound file or a block of text actually contains hidden information. It is a much more effective means of protecting information if the attacker (unintended or unauthorized recipient of information) does not know that the material presented before them…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Spam Image Identification Using an Artificial Neural Network Jason R. Bowling, Priscilla Hope, Kathy J. Liszka The University of Akron Akron, Ohio 44325-4003 {bowling, ph11, liszka}@uakron.edu Abstract We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam.…

    • 2824 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Stenography

    • 1124 Words
    • 5 Pages

    Before creating a procedure to retrieve the embedded message files within the four graphics I need to determine the different levels at which the message can be hidden. Stenography is the umbrella for many different types of methods to hide messages. The first level consists of two areas: technical stenography and linguistic stenography. The second level consists of two areas under the heading of linguistic stenography: semagrams and open codes. Technical stenography has no sublevels. The third level consists of four sublevels two under the heading of semagrams (visual and text) and two under the heading of open codes (jargon and covered ciphers). The fourth level consists of two ciphers that are found under the subheading of covered ciphers: null and grille. Now that the different levels have been identified it’s time to determine how the information is hidden using these stenographic components (Kessler 2004).…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that…

    • 6788 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media. For instance, image and video data hiding share many common points; however video data hiding necessitates more complex designs [6], [7] as a result of the additional temporal dimension. Therefore, video data hiding continues to constitute an active research area.…

    • 6460 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    A wide range of steganography techniques have been introduced which exploit spatial or transform domain characteristics of images to hide information. A survey of these techniques can be found in [2-7]. The message embedding into an image results in distortions which can be visible under human…

    • 2605 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem. Hence the technology of digital watermarking is received a large deal of attention. Generally, digital watermarking techniques are based on either spread spectrum methods or changing the least significant bits of selected coefficients of a certain signal transform. For speech watermarking, to ensure the embedded watermark is imperceptible, the audio marking phenomenon is considered together with these conventional techniques.…

    • 3244 Words
    • 13 Pages
    Powerful Essays

Related Topics