Für neue Autoren:
kostenlos, einfach und schnell
Für bereits registrierte Autoren
Information within an Image File
Arzoo Sorout1, Tomar Kuldeep2, Neha Sawal3
1 Department Of Computer Science Engineering, NGF College Of Engineering And Technology, Palwal
2 Department Of Computer Science Engineering, NGF College Of Engineering And Technology, Palwal
3 Department Of Computer Science Engineering, NGF College Of Engineering And Technology, Palwal
As the modern world growing fast, the new technologies has been developed with fast rate and the techniques of sending and receiving and displaying the secret information especially in public society or society places has faced many problems or challenges and has received more attention toward these modes of communication. Therefore, different types or methods have been proposed so far for hiding secret information within different types of cover medium. In this paper, the information is hiding inside an image file which acts as cover medium for secret information. There are two ways or methods for this process i.e. Encryption and decryption. There are two algorithms have been proposed for embedding or extracting the secret or hidden information which used the Steganography technique which is again the most popular technique now a days for hiding information within different cover medium. In this paper, we are using image file as a cover medium.
Keywords: Steganography, Information hiding, Encryption Process, Decryption Process.
The communication of secret message or information is a major factor or problem in technology of information hat results in creating difficult challenges with the increasing rate of transaction of communication especially in public society. When we communicate with other person or party that are located on same secure network, these challenges become more manageable. In the situation where other parties with whom we communicate are spatially separate, then the secret information security cannot be trusted on advanced technologies of secure networks.
This paper provides the algorithm of Steganography for hiding information within an image file. In image Steganography, the secret message or information is hidden exactly inside images. Steganography basically hides the secret communication or secret information within an cover medium. In this paper, Image file is use as a cover medium to secret information.
An image is basically a picture hat has been first created or copied and then stored in electronic form . An image can also be described in ways or terms of raster graphics or vector graphics. When an image is stored or kept in raster form or graphics is sometimes called a bitmap .
There are two processes required for hiding information within an image file using Steganography. These processes are- Encryption process in which the secret messages is to be hidden inside an image file which acts as a cover medium for hidden information and by providing the encrypt module we get the stego image as a result. The other process is Decryption process in which from stego image we get secret message or information and image file as cover medium by using decrypt module .
The process of encryption is also termed as embedding process as secret message is to be hidden inside a cover medium like image file. And decryption process is also termed as extracting process as secret message is extracted from stego image.
Before Steganography, the techniques cryptography, watermarking, fingerprint, etc has been used for hiding information inside the cover medium. As cryptography hides the contents of message and in watermarking and fingerprint the hidden information may also be public knowledge and sometimes it may even be visible. But the Steganography the existence of message or information is crucial. The possible attacks in Steganography system results in adversary observing that there is a hidden information inside a file, while possible attacks in watermarking or fingerprint system would not even detectable but also remove it. So in everyway, Steganography system is better to use.
There are many embedding and extracting techniques which are used for hiding data in given object and for extracting data from object. All these techniques must satisfy a number of requirements so that the Steganography technique can be applied correctly.
Following are the requirements of Steganography technique that must satisfy:-
a) After the hidden information embedded inside stego object, the integrity of such information must be correct.
b) Whenever any person or any other party see the stego object, it must remain unchanged or almost unchanged.
c) At last but not least, we always assume that the intruders or attackers knows about the existence of secret information inside stego object.
A. Embedding and extracting secret information-
Figure 1 shown below shows the simple structure of Steganography system for encryption and decryption process. In this figure, the secret information is being embedded inside an image file or cover image to produce stego image. After the stego image produced it then be extracting by decoder module for getting back secret information.
The first step in embedding process to hide hide information is to pass the secret information and cover image into the encoder inside which several protocols or techniques will be implemented to embed secret information inside cover image.
illustration not visible in this excerpt
Figure 1: Steganography System
After the stego image being produced, then it will be sent to the recipient for decoding whose working is to decode the stego image to view the secret information. The decoding process is totally reverse to the encoding process.
B. Algorithm for embedding data inside an image file-
In the given algorithm, the secret information is being embedded inside an image file or cover image to produce stego image.
Forschungsarbeit, 5 Seiten
Doktorarbeit / Dissertation, 51 Seiten
Hausarbeit, 12 Seiten
Studienarbeit, 65 Seiten
Facharbeit (Schule), 36 Seiten
Bachelorarbeit, 42 Seiten
Studienarbeit, 30 Seiten
Hausarbeit (Hauptseminar), 26 Seiten
Wissenschaftlicher Aufsatz, 13 Seiten
Studienarbeit, 38 Seiten
Hausarbeit (Hauptseminar), 23 Seiten
Projektarbeit, 81 Seiten
Bachelorarbeit, 42 Seiten
Projektarbeit, 81 Seiten
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!