This book focuses on the implementation of Image steganography and modifying the existing technique to add more security to a normal steganography technique. The Book emphasizes various techniques used in steganography with methodology, algorithm, MAT LAB implementation and implementation in Java.
There is data everywhere, in the form of images, text and audio/video files. Some data is very crucial or personal and needs to be kept confidential. For that reason, we have cryptography. Cryptography is the science of encrypting a message such that an unauthorized party cannot comprehend what that message means. Only those who possess the key can decrypt the message. There might be cases where just encrypting the information is not enough, since an encrypted message can raise suspicion.
Steganography is the science of hiding a message completely inside another form of data so that the existence of the actual message is not revealed during communication. It is possible to hide the image in any of the digital formats whether it is images, videos or even audio files. Images are popular because they are really frequent on the internet and hence do not arouse suspicion.
This book intends to give an overview cryptography with image steganography.
Table of Contents
1. CYBER SECURITY
2. CRYPTOGRAPHY
2.1. PROCESS OF CRYPTOGRAPHY
2.1.1. TRAITS OF CRYPTOGRAPHY
2.2. SYMMETRIC KEY CRYPTOGRAPHY
2.3. PUBLIC-KEY CRYPTOGRAPHY
2.4. HASH FUNCTIONS
2.5. COMMON AREAS OF CRYPTOGRAPHY
3. STEGANOGRAPHY
3.1. DIGITAL STEGANOGRAPHY
3.2. USES OF STEGANOGRAPHY
3.3. WORKFLOW OF STEGANOGRAPHY
3.4. STEGANOGRAPHY USERS
3.5. STEGANOGRAPHY VS. CRYPTOGRAPHY
3.6. STEGANOGRAPHY USE BY CRIMINALS
3.7. STEGANOGRAPHY DETECTION
3.8. APPLICATIONS OF STEGANOGRAPHY
3.8.1. SECRET COMMUNICATION
3.8.2. COPYRIGHT PROTECTION
3.9. CHARACTERISTICS OF STEGANOGRAPHY
3.10. MODELS OF STEGANOGRAPHIC SYSTEM
3.10.1. TEXT STEGANOGRAPHY
3.10.2. IMAGE STEGANOGRAPHY
3.10.3. AUDIO STEGANOGRAPHY
3.10.4. VIDEO STEGANOGRAPHY
4. IMAGE STEGANOGRAPHY
4.1. ARCHITECTURE OF IMAGE STEGANOGRAPHY
4.2. TECHNIQUES FOR IMAGE STEGANOGRAPHY
4.2.1. SPATIAL DOMAIN TECHNIQUES
4.2.2. NORMALIZED HISTOGRAM
4.2.3. SPATIAL FILTERING
4.2.4. LEAST SIGNIFICANT BIT
4.2.5. THE BINARY PATTERN COMPLEXITY (BPC)
4.2.6. PIXEL VALUE DIFFERENCING (PVD)
4.2.7. TRANSFORM DOMAIN TECHNIQUES
4.2.8. SPREAD SPECTRUM TECHNIQUES
4.2.9. MASKING AND FILTERING TECHNIQUES
4.2.10. LSB BASED DATA HIDING METHOD
4.3. METHODOLOGY
4.4. BASIC STEGANOGRAPHY MODEL
4.5. ALGORITHM FOR STEGANOGRAPHY
4.6. PSEUDOCODE
4.6.1. ENCODER()
4.6.2. BIT MANIPULATION
4.6.3. DECODER( )
4.6.4. BYTE DATA
5. MATLAB IMPLEMENTATION
5.1. MATLAB TOOLBOX
5.1.1. COMMON FUNCTIONS USED IN MATLAB
5.1.2. GRAPHICAL USER INTERFACE (GUI)
6. IMPLEMENTATION OF STEGANOGRAPHY TECHNIQUE IN JAVA
6.1. TEXT HIDING USING BIT PLANE
6.1.1. ALGORITHMS
6.1.2. OUTPUTS
6.2. HIDE IMAGE USING BIT PLANE
6.2.1. ALGORITHM
6.2.2. OUTPUTS
6.3. EXTRACTION OF HIDED TEXT
6.3.1. EXTRACT TEXT USING BIT PLANE
6.3.2. OUTPUTS
6.3.3. EXTRACT IMAGE USING BIT PLANE
6.3.4. OUTPUTS
Research Objectives and Themes
The primary objective of this work is to provide a comprehensive security framework that integrates cryptography and steganography to protect digital data. The central research question explores how a multilayer security approach, specifically utilizing Least Significant Bit (LSB) steganography in conjunction with encryption, can enhance data confidentiality and integrity while minimizing the likelihood of detection by unauthorized parties.
- Theoretical foundations of cybersecurity, focusing on the synergy between cryptography and steganography.
- Implementation of Image Steganography techniques, including architectural models and algorithm design.
- Practical application and performance analysis using MATLAB for image processing tasks.
- Development of a Java-based software tool for hiding and extracting data within images.
- Evaluation of system robustness and effectiveness in ensuring secret communication.
Excerpt from the Book
3.1. Digital Steganography
One of the most widely used receptacle for steganographers is media files such as audios and visuals for e.g. a text document is excessively large which allows to hide a text document with minimal suspicion.
The secret data for example can be hidden inside a picture which has hundreds of pixels which has an elucidated data about its color. The secret data in requires about 2 to 3 bits of pixel. No visible changes are seen as such by the human eye. Special tools are used to extract the hidden information from the encrypted image. Codes are proven to be helpful in extracting the hidden data from the image.
Steganography is the way of covering or masking a particular message within another message. The application of steganography can be fused with encryption with an additional step for hiding or safeguarding data. Steganography can be used to secrete almost any type of data that is texts, audios, videos, images and even networks. It helps to hide fact and statistics from unwanted eyes and unauthorized users.
Different ways have been adopted to hide messages from one another. The types of steganography are –
Summary of Chapters
1. CYBER SECURITY: Defines the core concepts of safeguarding networks and digital data against malicious cyber threats.
2. CRYPTOGRAPHY: Details mathematical algorithms used for secure communication through encryption and decryption processes.
3. STEGANOGRAPHY: Explores the science of "covered writing" to conceal the existence of secret information within ordinary media.
4. IMAGE STEGANOGRAPHY: Provides a technical deep dive into embedding secret messages specifically within bitmap images.
5. MATLAB IMPLEMENTATION: Explains the usage of the Image Processing Toolbox and GUI development for cryptographic and steganographic experiments.
6. IMPLEMENTATION OF STEGANOGRAPHY TECHNIQUE IN JAVA: Outlines the software development process, including algorithms and classes, for practical data hiding and extraction.
Keywords
Cyber Security, Cryptography, Steganography, Data Security, Least Significant Bit, LSB, Image Processing, Encryption, Decryption, Algorithms, Java Implementation, MATLAB, Information Hiding, Digital Security, Steganalysis.
Frequently Asked Questions
What is the primary focus of this work?
The work primarily focuses on enhancing data security by combining cryptography and steganography into a multilayered, robust protection model.
What are the central thematic fields covered in the text?
The text covers the principles of cyber threats, cryptographic methods (symmetric and public-key), and various steganographic techniques including image, text, audio, and video hiding.
What is the overarching research goal?
The goal is to design and implement an efficient steganography algorithm that ensures secret communication with high invisibility and minimal data loss.
Which scientific methods are utilized?
The work employs algorithmic implementation, specifically focusing on LSB-based data hiding, and validation through MATLAB simulations and Java software development.
What topics are discussed in the main body?
The main body treats the architecture of image steganography, various transformation domain techniques, and provides technical pseudocode and Java implementation details for software developers.
Which keywords best characterize the study?
Key terms include Cyber Security, Steganography, Cryptography, LSB, Data Hiding, and Image Processing.
How does this document differ from standard cryptography?
Unlike cryptography, which makes data unreadable but visible, steganography hides the existence of the communication entirely, reducing the chance of suspicion.
Why is Java used for the implementation section?
Java is utilized to demonstrate the practical application of the proposed algorithms in a functional software environment, providing concrete code structures for developers.
What is the role of LSB in this research?
The Least Significant Bit (LSB) technique serves as the core mechanism for embedding binary data into images, as it causes negligible changes to visual quality.
Can steganography be used in professional industries?
Yes, the text notes applications in military and medical fields where the protection of highly confidential information is critical.
- Arbeit zitieren
- Jagdish Chandra Patni (Autor:in), Hitesh Kumar Sharma (Autor:in), 2021, Cryptography and Steganography. A multilayer Data Security Approach, München, GRIN Verlag, https://www.grin.com/document/1145619