International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024
www.irjet.net
p-ISSN: 2395-0072
DIGITAL DATA CONCEALMENT USING ADVANCED STEGANOGRAPHY Mr. Hemanth C 1, Mr. Rudrayya S2, Mr. Srinidhi S3, Ms. Varshini K Y 4, Ms. Sahana D P5 1 Assistant Professor, Dept. of Computer Science and Engineering, Maharaja Institute of Technology,
Thandavapura, Karnataka, India
2-5Students, Dept of Computer Science and Engineering, Maharaja Institute of Technology, country
Thandavapura, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------identifying and intercepting hidden messages within digital Abstract - Steganography, an ancient art form, has evolved
carriers. Additionally, the proliferation of digital media platforms and communication channels exacerbates the potential impact of steganography on sensitive data and critical infrastructure.
into a modern technique for covert communication. It involves concealing a message within an innocuous carrier, like a picture, sound, or video to evade detection. Unlike cryptography, which encrypts a message, steganography conceals the message's actual existence Utilizing imperceptible alterations in the carrier, steganography embeds bits of information, imperceivable to the human eye or ear, yet retrievable by intended recipients using specialized tools. This clandestine method finds applications in various fields, including cybersecurity, digital watermarking, and espionage. With the exponential growth of digital media and communication channels, steganography poses both a threat and a defense mechanism in the realm of information security. Its continuous development challenges researchers and practitioners to create robust detection techniques while also advancing the sophistication of concealment methods, shaping the ongoing cat-and-mouse game of covert communication.
1.2 OBJECTIVE The objectives of steganography encompass several key aims. Firstly, it serves as a means of covert communication innocuous carriers like images or audio files. This includes applications such as digital watermarking to safeguard intellectual property or embedding digital signatures for authentication. Additionally, steganography aims to enhance security by adding an extra layer of complexity to data transmission and storage, making it more challenging for adversaries to identify and intercept hidden data. Moreover, steganography plays a role in anti-forensics by concealing traces of illicit activities within digital content, and in counter-forensics by aiding investigators in uncovering hidden information withindigital evidence.
Key Words: Steganography, covert communication, concealment, carrier, cryptography, digital media, imperceptible alterations, cybersecurity.
1.3 SCOPE
1.INTRODUCTION
The extent of steganography is extensive, encompassing various domains like cybersecurity, digital forensics, and privacy protection. Its applications range from covert communication and data hiding to anti-forensics and copyright protection. With the proliferation of digital media and communication channels, steganography continues to evolve, presenting new challenges and opportunities.
Advanced steganography represents the cutting edge of covert communication techniques, leveraging sophisticated methods to embed and extract information from digital carriers with unprecedented stealth and resilience. In contrast to traditionalsteganography, which primarily focuses on concealing data within static images, audio, video text, advanced steganography explores innovative approaches acrossa diverse range of multimedia formats, including audio, video. Moreover, advanced steganography techniques often incorporate encryption mechanisms to enhance security of the hidden data, ensuring that even if the carrier is intercepted, the concealed information remains protected from unauthorized access.
2. LITERATURE SURVEY [A] Sabah Abdulazeez Jebur, Abbas Khalifa Nawar,Lubna Emad Kadhim, Mothefer Majeed JaheferImanAl-Kadhum College, Baghdad, The highest way to protect data from intruder and unauthorized persons has developed into a major issue. This matter led to the development of many techniques for data security, such as Steganography, Cryptography, and Water marking to disguise data.
1.1 PROBLEM DEFINITION In the realm of cybersecurity, steganography poses a significant challenge as a covert communication technique, presenting both a threat to information safety additionally a challenge for detection and mitigation efforts. Despite advancements in detectionmethods, the continuous evolution of steganographic techniques complicates the task of
© 2024, IRJET
|
Impact Factor value: 8.226
[B] : Jayakanth Kunhoth1 Nandhini Subramanian1 Somaya Al-Maadeed1 Ahmed Bouridane2 Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity aswell.structure make them the more desirable
|
ISO 9001:2008 Certified Journal
|
Page 417