05-11-2012, 04:20 PM
Steganography Using Image, Audio
Steganography.docx (Size: 12.7 KB / Downloads: 21)
Abstract:
Security often requires that data be kept safe from unauthorized access. And the best line of defense is physical security (placing the machine to be protected behind physical walls). However, physical security is not always an option (due to cost and/or efficiency considerations). Instead, most computers are interconnected with each other openly, thereby exposing them and the communication channels that they use.
Steganography secures information by protecting its confidentiality. It can also be used to protect information about the integrity and authenticity of data. Stronger Steganographic techniques are needed to ensure the integrity of data stored on a machine that may be infected or under attack.
So far Steganography is used in many forms but using it with Audio, Video & Image files is another Stronger Technique. The process of Steganography happens with Audio, Video & Image File for transferring more secure sensitive data. The Sensitive Data is Encoded with an Audio, Video & Image File and Passed over Insecure Channels to other end of Systems. Here we can use any file Format for Encryption and Decryption of Message.
The given message will be encrypted with a given Audio, Video & Image file using a secret key. The System will then embed the secret message into the Audio, Video & Image file. The result will be a new Audio, Video & Image file, which has the secret message in it. While decrypting the same key should be given for encrypted Audio, Video & Image file to get the secret message from it.