Open Access Open Access  Restricted Access Subscription Access

Steganography Model Techniques, Taxonomy with Deniable Methodology and Data Concealing in Image using Steganography


Affiliations
1 Student, Department of Computer Science and Engineering, Vivekananda Institute of Technology, Jaipur, India
2 Independent Researcher, Jaipur, Rajasthan, India
 

   Subscribe/Renew Journal


The radical enhancements in the technology and internet has led information to be shared in just single click. As a result, it really became important to worry about the intellectual property protection on the internet. Steganography and cryptography could be very much useful in achieving the secure transfer of the information. Steganography is a practice that prevent unauthorized user from accessing and reading the secret data. It is a scientific art of covering the information so that it remains undetected to everyone except the intended receiver. In this technique, carrier plays an important role and must be selected in such a way that it does not leave behind any trace of the hidden message. There is always a threat that any person can detect the hidden object and could reveal the secret, but there is also a concept of deniable strategy in steganography which in such cases reveals the secondary data instead of primary one and keep that secure. The paper is meant to introduce with the introductory concept of steganography, classification of steganography centered on various file formats support (images, videos, protocols, text, etc.), deniable steganography which is providing additional layer of security and analysis of the noticeable changes created in stego-object as compared to original carrier.

Keywords

Cryptography, Deniable steganography, Image steganography analysis, Steganography, Steganography model.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 203

PDF Views: 102




  • Steganography Model Techniques, Taxonomy with Deniable Methodology and Data Concealing in Image using Steganography

Abstract Views: 203  |  PDF Views: 102

Authors

Abhay Verma
Student, Department of Computer Science and Engineering, Vivekananda Institute of Technology, Jaipur, India
Vinay Verma
Independent Researcher, Jaipur, Rajasthan, India

Abstract


The radical enhancements in the technology and internet has led information to be shared in just single click. As a result, it really became important to worry about the intellectual property protection on the internet. Steganography and cryptography could be very much useful in achieving the secure transfer of the information. Steganography is a practice that prevent unauthorized user from accessing and reading the secret data. It is a scientific art of covering the information so that it remains undetected to everyone except the intended receiver. In this technique, carrier plays an important role and must be selected in such a way that it does not leave behind any trace of the hidden message. There is always a threat that any person can detect the hidden object and could reveal the secret, but there is also a concept of deniable strategy in steganography which in such cases reveals the secondary data instead of primary one and keep that secure. The paper is meant to introduce with the introductory concept of steganography, classification of steganography centered on various file formats support (images, videos, protocols, text, etc.), deniable steganography which is providing additional layer of security and analysis of the noticeable changes created in stego-object as compared to original carrier.

Keywords


Cryptography, Deniable steganography, Image steganography analysis, Steganography, Steganography model.