Secure Data Transmission Using Steganography Essay

2175 words - 9 pages

Introduction :
Day-by-day web get mindful to individuals, confronting more tests regarding information stockpiling and transmission on the grounds that number of clients in the system builds significantly along these lines. In the advanced world, information is more essential of workstation interchanges and heart of worldwide economy. To guarantee the security of information, the idea of concealing has pulled in individuals to present an imaginative and innovative answers for secure information from falling into wrong hands. The dissemination of advanced media confronting an issue from numerous years as the information are struck and controlled by unapproved individual. The web is a ...view middle of the document...

steganography, which is otherwise called "stego," is the act of concealing a message in an alternate medium. For example, a message could be stowed away in a picture document, where the consideration of a message—scattered all around the picture is unrealistic to be recognized by somebody seeing the picture. In steganography, a message could be covered up in a picture, a sound record, a feature cut, or other human-read medium where the consideration of the message will prepare slight varieties that may not be recognizable. Messages can additionally be stowed away in a record's slack space and different spots where others may not look.
An exemplary case of content based steganography is a composed message that was sent to a con- demined detainee, a Sir John, a Royalist throughout a common war in England. The message to the detainee seemed, by all accounts, to be a meandering letter, yet the third letter after every punctuation imprint structured a mystery message, which gave the detainee a profitable piece of information that allowed him to escape through a concealed entryway in a request to God house of prayer that probably held one and only passageway and passageway. In stego, a message might be scrambled. On the off chance that the technique used to conceal a message could be ran across, then the substance of the message will be traded off.
Steganography Vs. Cryptography ?
often, Steganography and Cryptography are confounded in light of the fact that both are comparable in the way that they two are utilized to ensure essential and mystery data. The distinction between the two is that Steganography bargains secluded from everything data so it creates the impression that no data is stowed away whatsoever. On the off chance that an individual or persons sees the message that the data is covered up within he or she won't comprehend or don't have no clue that there is any concealed data, thusly the individual won't endeavor to decode the data. Cryptography scrambles protest so it can't be caught on. By Steganography the message it can't be seen in light of the fact that it covers up. A message in figure content, may stir suspicion from the beneficiary for example, while an "imperceptible" message made with Steganographic strategies won't.
steganography could be utilized as a part of a lot of information configurations in the advanced universe of today. The most prominent information organizations utilized are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav. Steganographic instruments that utilize these information arranges principally in view of their prominence on the Internet. These configurations are likewise well known as a result of the relative straightforwardness by which excess information could be uprooted from them and displaced with a concealed message.
Data concealing Vs. Watermarking?
The unlucky deficiency of a dynamic enemy is the key contrast between data concealing and watermarking. There is a dynamic foe that might...

Find Another Essay On secure data transmission using steganography

Development of Control and Confidentiality for Database Management Systems

933 words - 4 pages exploiting the genuine authorizations of the invoking process. Sophisticated Trojan horses may leak information by means of covert channels, enabling unauthorized access to data. A covert channel is a component or feature of the system that is misused to encode or represent information for illegal transmission, without breaching the stated access control policy. A large variety of components or features can be misused to create covert channels

Cryptography Essay

779 words - 3 pages only the intended recipients and authors are able to access the data. The process of reversing the encryption process is called decryption. The definition of cryptography therefore can be said to be the science of using calculations and complex mathematics to encrypt and decrypt data. The use of this technology is handy in the storage of data and when transmitting data across networks which are not secure. There is a difference between

"The Code Book" by Simon Singh

825 words - 3 pages The book starts by explaining steganography and cryptography. Steganography is the process of hiding a message, while cryptography is the process of hiding its meaning. Examples of both are given with information on how the codes are used, and how they were broken. The main example is Mary Queen of Scot's code, the weakness of which led to her execution.Later, the book moves onto stronger forms of encryption such as the Vigenere square and

Security, Storage and Transmission of Electronic Digital Images

2439 words - 10 pages mechanisms can be seen. Fig 1.1 Insecure channel Encryption would be the preferred technique for shielding the transmitted data (Hossam El-din et ing, 2006). Sender’s Plain text Cipher text Receiver’s converted converted Message to cipher back to plain message text using text using the Key same key Fig 1.2 Encryption There are numerous encryption systems to encrypt along with

Internet Protocol Security (IPSec) for Backbones

1245 words - 5 pages Abstract : Internet Protocol version 6(Pv6) is the advanced version of the IPv4 protocol and both of these protocols are part of TCP/IP suite.TCP/IP is the only protocol for transmission of data over the internet As the internet is not secure place for transmission of secure and confidential information (packets) So to protect this information over the non secure channels(internet ) the IPSec was introduced .IPSec is the worldly know standard

Investigators: Digital Evidence

1410 words - 6 pages types of symmetric and asymmetric encryption types and cracking them takes a very long time. There is also the use of steganography which hides messages inside of jpeg images. They are very hard to detect and almost impossible to recover. The only ways to notice steganography is by statistical data analysis and noticing changes in carrier files (Comp TIA Security +, 2009). Whatever tools are used must be properly tagged, actions logged and all

Computer Forensics and Criminal Justice

745 words - 3 pages , NY. Addison, WesleyKrebs, B. (2006). Rise of computer crime. Retrieved on June 12, 2007 from site:, G (2001) "Steganography: Hiding Data within Data" Retrieved on June 21, 2007 from site:, K. (2003) "Steganography Revealed" Retrieved on June 21, 2007 from site:, B (2001

Types of Networks

1351 words - 6 pages different routing protocols or by different transport layer mechanism we will apply different methods which provide security to wired network and in ns2 there are so many methods through which we will give secure data transmission by different types of traffic and their parameters. 2.2 Wireless Network Network is described as a network of devices which communicates by using wireless technologies. Network Wireless communication is used as a term for

Transmission Media

1883 words - 8 pages Thinnet Cable (10Base2): Thinnet coaxial cable is connected using special connectors and requires to be terminated at each end using a 50ohm resistor. 10Base2 stands for:  Data transmission rate of 10Mbps, example: 10  Uses baseband transmission, example: Base  Used in Ethernet networks it has a maximum cable length of 185 metres, example: the 2 for approximately 200 metres Thinnet cables use a connector known as a BNC connector to make the

Separable reversible data hiding

1853 words - 8 pages perfectly recovered by exploiting the spatialcorrelation in natural image. 1.Image Encryption:- Encryption can be defined in simple manner as ‘ conversion of intellectual data ( valuable data or asset related information ) and other content into non-intellectual format for secure transmission and avoiding exposure of your Significant data to the public. Here when we encrypt image , original image get converted into blur image which is combination of


597 words - 3 pages technical difficulties associated with the hardware and infrastructure in switching from slower speed to faster speed of data transmission. Scaling bandwidth without changing method of operation, optimizing the modulation techniques, provision for future expansion, backward compatibility are the few problems that has to be addressed in achieving high-speed capacity using current infrastructure. Transmission of optical data at a speed beyond 10 Gb/s presents multiple signal degradation problems including chromatic dispersion, polarization-mode dispersion, attenuation.

Similar Essays

Secure Data Transmission Using Steganography Essay

2297 words - 10 pages techniques is expanded. Step by step the data concealing strategies are expanding with more complex methodology. Pictures, features, content and so on are utilized within correspondence of mystery messages in advanced media. steganography and cryptography are distinctive sorts of strategies utilization to send secure information transmission. Steganography is the craftsmanship and art of concealing information into distinctive bearer records, for

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

585 words - 3 pages multicast routing protocol according to distance from source to destination in a network. Security is a more sensitive issue in MANETs than any other networks due to lack of infrastructure and the broadcast nature of the network. While MANETs can be quickly set up as needed, so they also need secure data transfer over the network. We provide encryption and decryption algorithm using Rijndael (AES) block cipher. It helps the message to secure while data transfer using multicast routing protocol.

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

946 words - 4 pages or root node will transmit packets or data to number of receivers’ node in the network. The source node first time broadcast the message and second time it unicast the packet to destination. Before transmitting packets to all receiver nodes the source node first identifies the multicast group nodes in that network. So we introduce techniques to identify the neighbor nodes for multicast group using distance of each node. 2.1 Identification of

Steganography Essay

2305 words - 9 pages internet may arouse suspicion. LSB steganography can be implemented in javaChaffing and WinnowingChaffing and winnowing is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with inedible fibrous chaff. The chaff and grain are then separated by winnowing, and the chaff