03-05-2014, 12:30 PM
Data Hiding in Image using least significant bit with cryptography
Data Hiding in Image .pdf (Size: 630.06 KB / Downloads: 98)
Abstract:
To increase the security of messages sent over the internet steganography is u sed. This paper discu ssed a technique used
on the LSB (least significant bit) and a new encryption algorithm. By matching data to an image, there is less chance of an
attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it.
Introduction
Steganography is the art of hiding the fact that
communicat ion is taking place, by h iding info rmation in
other informat ion. It is the art of concealing a message
in a cover without leaving a remarkable track on the
original message. It Pronounced "ste-g&-'nä-gr&-fE”
and Derived fro m Greek roots
Steganos” = cover
“Graphie” = writ ing Its ancient origins can be traced
back to 440 BC. Histories the Greek historian
Herodotus writes of a nobleman, Histaeus, who used
steganography first time.3
The goal of Steganography1 is to mask the very
presence of communication making the true message
not discernible to the observer. As steganography has
very close to cryptography and its applications, we can
with advantage highlight the main differences.
Cryptography is about concealing the content of the
message. At the same time encrypted data package is
itself evidence of the existence of valuable informat ion.
Steganography goes a step further and makes the
ciphertext invisib le to unauthorized users.4
Conclusion
This paper is a short introduction to the world of
steganography. We have shown how the simp lest
methods work and how they can be explored. We have
used symmetric encryption algo to provide more
security. Research in this field has already begun. Next
to steganography, one of the most active fields of
research is mass detection tools for hidden contents.
The problems are really big. At first, known statistical
tests are fragile and for many embedding schemes we
still do not know which properties to test. At second,
the today traffic in public networks is so overwhelming,
that is too hard to rigorously check each file.