scholarly journals Forensic steganalysis for identification of steganography software tools using multiple format image

Author(s):  
S. T. Veena ◽  
A. Selvaraj

<p>Today many steganographic software tools are freely available on the Internet, which helps even callow users to have covert communication through digital images. Targeted structural image steganalysers identify only a particular steganographic software tool by tracing the unique fingerprint left in the stego images by the steganographic process. Image steganalysis proves to be a tough challenging task if the process is blind and universal, the secret payload is very less and the cover image is in lossless compression format. A payload independent universal steganalyser which identifies the steganographic software tools by exploiting the traces of artefacts left in the image and in its metadata for five different image formats is proposed. First, the artefacts in image metadata are identified and clustered to form distinct groups by extended K-means clustering. The group that is identical to the cover is further processed by extracting the artefacts in the image data. This is done by developing a signature of the steganographic software tool from its stego images. They are then matched for steganographic software tool identification. Thus, the steganalyser successfully identifies the stego images in five different image formats, out of which four are lossless, even for a payload of 1 byte. Its performance is also compared with the existing steganalyser software tool.</p>

Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2006 ◽  
Vol 2 ◽  
pp. S670-S671
Author(s):  
Charles D. Smith ◽  
Hima Chebrolu ◽  
David R. Wekstein ◽  
Frederick A. Schmitt ◽  
Gregory Cooper ◽  
...  

2018 ◽  
Vol 4 (12) ◽  
pp. 142 ◽  
Author(s):  
Hongda Shen ◽  
Zhuocheng Jiang ◽  
W. Pan

Hyperspectral imaging (HSI) technology has been used for various remote sensing applications due to its excellent capability of monitoring regions-of-interest over a period of time. However, the large data volume of four-dimensional multitemporal hyperspectral imagery demands massive data compression techniques. While conventional 3D hyperspectral data compression methods exploit only spatial and spectral correlations, we propose a simple yet effective predictive lossless compression algorithm that can achieve significant gains on compression efficiency, by also taking into account temporal correlations inherent in the multitemporal data. We present an information theoretic analysis to estimate potential compression performance gain with varying configurations of context vectors. Extensive simulation results demonstrate the effectiveness of the proposed algorithm. We also provide in-depth discussions on how to construct the context vectors in the prediction model for both multitemporal HSI and conventional 3D HSI data.


2016 ◽  
Vol 106 (07-08) ◽  
pp. 544-549
Author(s):  
V. K. Bellmann ◽  
P. Prof. Nyhuis

Zur Erhaltung ihrer Wettbewerbsfähigkeit setzen Unternehmen sowohl prozessverbessernde als auch kompetenzsteigernde Methoden ein. Jedoch erschwert die Vielzahl an Methoden eine anwendungsspezifische Auswahl. Somit wird ein Software-Tool benötigt, das neben den individuellen Zielstellungen auch die Voraussetzungen für eine erfolgreiche Umsetzung der Methoden berücksichtigt. Dieser Fachbeitrag beschreibt die Entwicklung eines Software-Tools zur zielgerichteten Entscheidungsunterstützung. &nbsp; Companies apply process-improving and competence-increasing methods to maintain their competitiveness. However the huge amount of existing methods impedes an application-oriented selection. Thus a software tool is needed which considers individual objectives as well as requirements for a successful application of the methods. This paper describes the development of a software tool for a target-oriented decision support.


2018 ◽  
Vol 13 (1) ◽  
pp. 44-61 ◽  
Author(s):  
Lorraine Lee ◽  
William Kerler ◽  
Daniel Ivancevich

The ability to use various software and tools is important for students entering the accounting profession. In an exploratory study, we develop a survey to assess accounting practitioners' evaluations of the importance of various software tools, as well as the importance of data analytics and data visualization skills. Responses from 197 practitioners indicate that Excel is the most frequently utilized software / tool, the most important software tool for new hires, and that Excel should be emphasized in university accounting programs. We find that the importance of Excel is consistent across different accounting areas (audit, tax, advisory, and corporate) and across all experience levels. In addition, Adobe Acrobat, PowerPoint, accounting / ERP software, and the FASB Codification were identified as frequently utilized across the various accounting areas and experience levels. Finally, practitioners in each of the different accounting areas and at all experience levels indicate data analytic skills and data visualization skills are important, but that data analytic skills are perceived as more important than data visualization skills. Our study contributes to the accounting information systems literature by identifying the specific software and tools that are relevant to the profession and provides guidance on the software and tools that should be emphasized in university accounting programs.


Sign in / Sign up

Export Citation Format

Share Document