Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020 •
Steganography is a methodology which is used to hide the secret data in the form of embedded messages, simply it is covered by the other messages. The word Steganography is derived from two ancient Greek word names "Stegano"(which means hiding or covering) and "graph"(meaning to write). Steganography is very different from cryptography. Cryptography is a technique which is used to create or generate the code which keeps information very secure. In simple comparisons, cryptography is the one that cannot be decrypted without the proper knowledge of encrypted data key whereas, steganography is the one which can be easily used to encrypt or decrypt the data.
Steganography comes from the Greek and literally mean, "Covered or secret writing". Although related to cryptography, they are not the same. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. Steganography is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. The goal of Steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present. The only missing information for the "enemy" is the short easily exchangeable random number sequence, the secret key, without the secret key, the "enemy" should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place. In the field of steganography, some terminology has developed, The adjectives Cover, Embedded And stego were defined at the Information Hiding Workshop held in Cambridge, England. The term``term``cover'' is used to describe the original, innocent message, data, audio, still, video and so on. When referring to audio signal Steganography, the cover signal is sometimes called thè`host'' signal. The following formula provides a very generic description of the pieces of the steganographic process: cover_medium + hidden_data + stego_key = stego_me.
Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Image based Steganography in Cryptography implementing different Encryption-Decryption AlgorithmSteganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.
International Journal for Research in Applied Science and Engineering Technology
Digital Image Steganography2020 •
Steganography has been derived from the Greek word Steganous (covered, concealed or protected) and Graphie (writing) which means “covered writing”. It is the process of hiding a secret message with an ordinary message. Which when viewed by someone else will be able to see only the ordinary message they will fail to identify that it contains a hidden or encrypted message. The hidden message can be extracted once it reaches its destination. Steganography is now gaining popularity among the masses because of ease in use and abundant tools available. In this paper, the emphasis is given on the basic technique used to implement Steganography and also how to extract the data and check whether the file received by the reader carries some hidden message. Paper also depicts various tools available for the same.
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information has become an important issue. In order to transfer data securely to the destination without unwanted disclosure or damage, nature inspired hide and seek tricks such as, cryptography and Steganography are heavily in use. Just like the Chameleon and many other bio-species those change their body color and hide themselves in the background in order to protect them from external attacks, Cryptography and Steganography are techniques those are used to encrypt and hide the secret data inside other media to ensure data security. This paper discusses the concept of a simple spatial domain LSB Steganography that encrypts the secrets using Fibonacci-Lucas transformation before hiding for better security.
PloS one
Intracardiac anatomical relationships and potential for streaming in double inlet left ventricles2017 •
2017 •
Boletín de la Asociación de Geógrafos Españoles
El paradgima de la red: bases para una nueva interpretación del territorio y de los procesos escalares de la urbanización2012 •
Arthroscopy: The Journal of Arthroscopic & Related Surgery
Primary Repair with Healing Stimulation Technique for Partial Tears of the Anterior Cruciate Ligament (SS-14)2007 •
IEEE Transactions on Circuits and Systems II: Express Briefs
A Study on the Use of Performance Counters to Estimate Power in Microprocessors2013 •
The American journal of tropical medicine and hygiene
Engagement of the Community, Traditional Leaders, and Public Health System in the Design and Implementation of a Large Community-Based, Cluster-Randomized Trial of Umbilical Cord Care in Zambia2015 •
2015 •
2000 •
American Journal of Medical Genetics Part A
Chediak-Higashi syndrome with early developmental delay resulting from paternal heterodisomy of chromosome 12010 •
2007 •
2021 •
Beilstein Journal of Nanotechnology
DNA origami deposition on native and passivated molybdenum disulfide substrates2014 •
Proceedings of 37th International Cosmic Ray Conference — PoS(ICRC2021)
First results from the AugerPrime Radio Detector2021 •
Built Heritage in post-Disaster Scenarios: Improving Resilience and Awareness Towards Preservation, Risk Mitigation and Governance Strategies
Team driven documentation of civil structuresInternational Journal of Energy Engineering
Gas Pipeline Network Design for Koya City: Case Study2015 •