Digital Steganography Security

Digital Steganography Security

Parkavi R. (Thiagarajar College of Engineering, India), Anitha S. (Thiagarajar College of Engineering, India) and Gayathri R. (Thiagarajar College of Engineering, India)
Copyright: © 2020 |Pages: 30
DOI: 10.4018/978-1-7998-1558-7.ch009
OnDemand PDF Download:
No Current Special Offers


Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information exchange between two parties. It has been propelled to the forefront of the current security techniques. The main objective of the technique is to provide an imperceptible way of transferring secret messages to the recipient. Another issue to be noted is that the term steganography completely differs from cryptography. The above-stated analysis is used in digital forensics. There are many steganography software tools available for ordinary computer users.
Chapter Preview

History Of Steganography

The word Steganography comes from the words “Steganos” means cover or secret and “graphy” means writing. The veiling of one form of data within another form of data is called Steganography. Many incidents are revealing that Steganography is not a new technique for this world. The first incident was, Ancient Greek Ruler Histaeus used to shave the head of his slave, tattooing in the scalp and wait for hair to grow. Then send the slave to recipients to convey the hidden message. The recipient would have shaved the slave's head to see the message. In the second incident, Demestrus wrote a message to his friend in the wooden carve of the wax tablet that seemed to be simple. In the third incident, During the American & British Revolutionary, they use invisible ink to exchange information. In the fourth incident, during World War 2, Germans used microdots. Later, Null ciphers were used i.e. unencrypted message send within the real readable format. For example, Police report emergencies in downtown ending near Tuesday by taking the first letter on each word on the given sentence, it gives the result “PRESIDENT”. This is called null cipher. As the years have grown, Steganographic techniques also grow and emerge as the strongest technique to secure the data. (Siper, Farley, R & Lombardo, 2005)

Key Terms in this Chapter

Cryptanalysis: The process of decrypting the message without using the private key.

AEs: A symmetric key algorithm in which the same key is used for encrypting and decrypting the message.

Microdot: Microdot is a text or image that is reduced in size to prevent the detection by illicit recipients.

Steganalysis: The process of detecting the hidden message using steganography.

Word Shift Coding: This technique is to hide the information in text document by shifting the word slightly.

HCSSD: High capacity and security steganography using discrete wavelet transform.

Line Shift Coding: Line shift coding is the process of changing a document by shifting the location of text in vertical direction.

Complete Chapter List

Search this Book: