Digital Image Steganography

Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.

Cryptography ◽  
2020 ◽  
pp. 332-354
Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Author(s):  
Vera Shumilina ◽  
Elena Tetunashvili

The article is devoted to the study of information security as an integral part of the economic security of any modern enterprise. Threats are described that can lead to disclosure of confidential information, leakage of confidential information, unauthorized access to protected information, etc. Means and ways of countering the presented threats are also given


2000 ◽  
Vol 04 (04) ◽  
pp. 391-416 ◽  
Author(s):  
SALLY WYATT

This article examines two attempts to develop information networks by central government administrations in the UK and the US during the 1980s. These are examples of service innovations within public services, and can be viewed in the light of analyses of services innovation. They also mark a shift in public procurement, from acquiring a technology to purchasing services. The British attempted to develop a data communication network; the Americans attempted to develop an integrated voice, data and image communication network. Both networks were to be shared by different government departments and both were to be provided by a third-party supplier. The rhetoric and policy concerns behind these networks are similar to those expressed more recently in Britain by the new Labour Government. It is argued that these earlier attempts were unsuccessful because insufficient attention was paid to users, and because the systems were attempting to do too much. Not only were they expected to reduce costs and improve services, they were also intended to implement important elements of telecommunications and competition policies. Paradoxically, over-simplification of the systems, to make them comprehensible to a wide range of actors, may have contributed to their failure.


Sign in / Sign up

Export Citation Format

Share Document