Multidisciplinary Approach to Modern Digital Steganography - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 15)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799871606, 9781799871620

Author(s):  
Abhishek Rajeshkumar Mehta ◽  
Trupti Pravinsinh Rathod

Internet of things (IoT) is a typical thing (object) in this day and age, which fills in as a component of our standard life exercises. In spite of the fact that it benefits the private region in a few different ways, different difficulties, for example information classification and protection, are made. Web of things (IoT) is all over the place and utilized in a lot more advantageous functionality. It is utilized in our homes, clinics, fire counteraction, and announcing and controlling of ecological changes. Information security is an urgent prerequisite for IoT since the number of late advances in various spaces is expanding step by step. Different endeavors have been set to sate the client's expectations for greater security and protection.


Author(s):  
Binay Kumar Pandey ◽  
Deepak Mane ◽  
Vinay Kumar Kumar Nassa ◽  
Digvijay Pandey ◽  
Shawni Dutta ◽  
...  

This work's primary goal is to secure the transmission of text hidden within the cover image using steganography over a public network of computers. Steganography is a powerful tool for concealing information within a cover image so that the concealed message remains undetectable. As a result, steganography refers to concealed writing. The secure transmission of information over a public network communication channel using steganography occurs in two stages, the first on the sender side and the second on the receiver side. In the first phase, steganography is normally applied to conceal the encrypted information within the image as a cover. The encrypted data is implanted inside the cover image using an improved least significant bit steganography method. The secret key obtained by the embedding algorithm is shared with the message retrieval algorithm on the receiver side to retrieve the message. Finally, the embedded text message is identified using a hybrid convolution regression adaptive integrated neural network (CRAINN) approach.


Author(s):  
Kylyn Fernandes ◽  
Ankit Rishi Gupta ◽  
Pratik Panchal ◽  
Ramchandra Mangrulkar

Steganography is the art of hiding messages or files in a way that prevents the detection of the existence of these hidden messages. It encompasses several techniques, including physical methods like invisible ink on paper and digital techniques like hiding text on multimedia files like images and music files. In the modern digital era, steganography has become a useful tool to evade detection and perusal of secret messages. With the advent of social media, it is very easy to encode a message or file onto an image and upload it online for the intended recipients to access, decode, and read or use. In this case of digital steganography of messages or files onto images, an important factor to consider is the effect of image compression on the hidden message. Since most social media and other online image posting websites run some sort of compression, cropping, and other image transformations on the uploaded images, understanding these techniques and their effect on the hidden text can help one choose the most suitable steganography technique to use for a particular use case.


Author(s):  
Mahip M. Bartere ◽  
Sneha Bohra ◽  
Prashant Adakane ◽  
B. Santhosh Kumar

Data security is one of the most important aspects in today's scenario. Whenever we send our data from source to destination, data protection is one of the prime components. With the help of data hiding and data extraction techniques, we are able to provide the solution of different types of problems whenever we transfer our data. Steganography is a process where we can hide our data and maintain the quality of the image. At the same time, we think about data alteration. With the help of stegtanalysis method, we reverse engineer and extract the original data. In this chapter, data hiding and data extraction techniques are explained in the combination of machine learning architecture. The combination of steganography and steganalysis along with machine learning is used to identify protected data using different techniques.


Author(s):  
Vladimir N. Kustov ◽  
Alexey G. Krasnov ◽  
Ekaterina S. Silanteva

This chapter's primary goal is to provide a comprehensive approach to the development of new highly undetectable stegosystems that greatly complicate their steganalysis. The authors propose several implementations of highly undetectable stegosystems, the so-called HUGO systems, using an integrated approach to their synthesis. This approach most fully considers the features of transmitting hidden messages over highly noisy communication channels. At the stage of embedding hidden messages, the authors suggest actively using their discrete transformations. The authors also propose increasing the secrecy of secret messages by converting them to a form that resembles natural noise. The authors use a discrete chaotic decomposition of the Arnold cat map (ACM) to do this. The authors also suggest using highly efficient noise-tolerant encoding and multi-threshold decoding to combat interference in the communication channel and an embedding algorithm. The authors also describe two original stegosystems ±HUGO and ⨁HUGO and test results confirming their effectiveness.


Author(s):  
Samir Kumar Bandyopadhyay ◽  
Vishal Goyal ◽  
Shawni Dutta ◽  
Sabyasachi Pramanik ◽  
Hafiz Husnain Raza Sherazi

In this digital era, most of the daily works of users are captured in digital forms like image, audio, video, or even text. These may contain sensitive, confidential, or private information as well. To keep these, there are different techniques exercised over the years like chest, coffer, repository, treasury, etc. Sometimes such ways of hiding information attract unintended users. Therefore, steganography has been applied to digital objects in a new form called digital steganography. This chapter enforces identifying methods in digital steganography. The basic model of any type of digital steganography is composed of three types of objects: cover object, text to be hidden, and stego object. Depending on the type of cover object, different types of digital steganography methods have been defined. Only data hiding in text is discussed.


Author(s):  
Digvijay Pandey ◽  
Vinay Kumar Nassa ◽  
Ayushi Jhamb ◽  
Dashrath Mahto ◽  
Binay Kumar Pandey ◽  
...  

Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.


Author(s):  
Atrayee Majumder Ray ◽  
Anindita Sarkar ◽  
Ahmed J. Obaid ◽  
Saravanan Pandiaraj

Internet of things (IoT) is one of those emerging technologies, which are going to rule the world in the next few decades. Due to the advancement of low-cost computing systems and mobile technologies, these physical things are now capable of sharing and collecting data with minimal human interference. However, these devices are exposed to various security threats regarding privacy and data confidentiality as they are openly accessible to all in the network. Moreover, many IoT devices have low processing power and weak security level which could be the main targets for hackers. Lightweight cryptographic schemes are used to meet the security needs in IoT environment. Steganography is used as another security tool for IoT devices. This chapter is an attempt to analyze the various steganography techniques used to strengthen the security needs of IoT devices as per their applications. IoT security schemes using different steganography models and algorithms are outlined here with their relative advantages and disadvantages.


Author(s):  
Sana Parveen K ◽  
Renjith V. Ravi ◽  
Basma Abd El-Rahiem ◽  
Mangesh M. Ghonge

Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties. As data is unknown, it is challenging to attract the attention of any third parties. Therefore, steganography becomes the best and most secure method for data transmission. Digital images are the most common cover media or carriers in steganographic processes, where the secret payload is embedded into images. Several techniques are coming under image steganography, and there includes a different method to ensure the secrecy of messages. This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.


Author(s):  
Kannadhasan S. ◽  
R. Nagarajan

The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication. The exponential development of the internet and the internet of things (IoT) applies to the next step of the information transition, which entails billions of integrated smart devices and sensors to enable the speedy sharing of information and data under soft real-time restrictions. Significant improvements in data sharing also sparked the digital information movement. This transmission of data can include private, reliable, and often private communication.


Sign in / Sign up

Export Citation Format

Share Document