scholarly journals Steganography Using Bin-Walk Tool & Its Overview

Author(s):  
Pooja Gaikwad ◽  
Priyanka Ghumare ◽  
Gayatri Chaudhari ◽  
Sayali Nikam ◽  
Rupali Murtdak ◽  
...  

In this paper, a detailed overview on steganography & its Types, tools, techniques is conducted to study and look over them. This research involves the steganography using binwalk tool in the Necromancer. Necromancer is the vulnerable virtual machine, in order to gain the root access of VM (Virtual Machine) there are 11 flags to collect on the way, Few flags are found by using the Binwalk tool, to know the hint behind image, so we have used an Image steganography in one of flag of Necromancer. Flags are nothing but any encrypted code. Steganography refers to the act of camouflage the secret data within any image, audio, video in order to avoid the detection. The secret data is then extracted at its destination. The use of steganography are often combined with encryption as an additional step for hiding or protecting data.

In this growing internet world, secret data communication is increasing day by day. There are various methods to communicate secretly. Steganography is one of those techniques in which data is concealed within cover data such that it cannot get detected. Steganography is usually used today on pcs where digital data is the high-speed distribution channels for carriers and networks. Steganography is the skill of understanding of unnoticeable activity at intervals. Steganalysis is the science of concealed data detection. Steganography of data which is of any form like images, audio, video or text information is done by various techniques. Image steganography is done by various technique. Least Significant Bit (LSB) with XORing and Discrete Cosine Transform (DCT) are used to test the image steganography. Images are converted to grey scale to get better accuracy. Results are tested with mean square error (MSE) and peak signal-to-noise ratio (PSNR) values.


2018 ◽  
Vol 45 (6) ◽  
pp. 767-778 ◽  
Author(s):  
Amjad Rehman ◽  
Tanzila Saba ◽  
Toqeer Mahmood ◽  
Zahid Mehmood ◽  
Mohsin Shah ◽  
...  

In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of personal and copyrighted material has become a critical issue. Consequently, secure means of data transfer are the most urgent need of the time. Steganography is the science and art of protecting the secret data from an unauthorised access. The steganographic approaches conceal secret data into a cover file of type audio, video, text and/or image. The actual challenge in steganography is to achieve high robustness and capacity without bargaining on the imperceptibility of the cover file. In this article, an efficient steganography method is proposed for the transfer of secret data in digital images using number theory. For this purpose, the proposed method represents the cover image using the Fibonacci sequence. The representation of an image in the Fibonacci sequence allows increasing the bit planes from 8-bit to 12-bit planes. The experimental results of the proposed method in comparison with other existing steganographic methods exhibit that our method not only achieves high embedding of secret data but also gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR). Furthermore, the robustness of the technique is also evaluated in the presence of salt and pepper noise attack on the cover images.


Author(s):  
Ahmed Toman Thahab

In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence.  In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods.


2018 ◽  
Vol 18 (1) ◽  
pp. 69-80 ◽  
Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain ◽  
E. Suresh Babu

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.


2019 ◽  
Vol 8 (2) ◽  
pp. 6535-6537

In this era, internet has become a widespread entity all over the world. Sharing and communicating images, video contributes an essential role in this scientific era. In the meanwhile, secure transition of data has indeed become a major issue. Steganography is one of technology that contributes a vital role in protecting the secret data against an unauthorized access. In this type, secret data can be concealed into a cover file that includes audio, video, text and also image. In this paper, we propose different types of steganography methods for secure transfer of data in a confidential manner. The paper also explores stenographical techniques in terms of text, image and audio. The proposed work compares and discusses the stenographical methods in spatial domain, frequency domain derived under the image technique


2021 ◽  
Author(s):  
STEFANO BERTACCHI ◽  
Chiara Cantù ◽  
Danilo Porro ◽  
Paola Branduardi

Abstract BackgroundPetrochemical synthetic dominates several markets, and carotenoids are not an exception. Since their applications in the food, feed and cosmetic sectors, carotenoids of natural origin are increasingly requested, but the production needs to be sustainable also in terms of initial feedstock. For these reasons we deployed the carotenogenic yeast Rhodosporidium toruloides to obtain such compounds from Camelina sativa meal, an underrated lignocellulosic biomass. As the process starts from hydrolyzed biomass, we separately optimized enzymatic and biomass loadings, to reduce the overall process costs. ResultsThe best conditions (9% w/v biomass, 0.56% w/wbiomass enzymes) were tested in different settings, in which fermentation was separate or co-current with the hydrolysis, showing similar carotenoids productions. The process was implemented in stirred-tank bioreactors, obtaining 3.6 ± 0.69 mg/L of carotenoids, and showing to be robust towards changes in different parameters. ConclusionsThese data pave the way to evaluate a possible industrialization of this bioprocess, considering the opportunity to optimize the use of different amounts of biomass and enzyme loading. In addition, the test in bioreactor is an additional step to further develop the proposed process.


Author(s):  
Suphiya P. Inamdar ◽  
Suhas B. Bhagate

A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. The proposed of system using steganography using reversible texture synthesis. Texture synthesis uses the concept of patch which represents an image block of source texture where its size is user specified. A texture synthesis process resamples a smaller texture image, and provides a new image with arbitrary size and shape. Instead of using an existing cover image to hide messages, the algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows extracting the secret messages and source texture from a stego synthetic texture. The approach offers some advantages. First, the scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this scheme provides functionality, which allows recovery of the source texture. And third, there will be no image distortion since size of new texture image is user specified.


Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


Sign in / Sign up

Export Citation Format

Share Document