The project report is focused on image steganography, also the various security problems; overall overview of cryptography, steganography and digital watermarking approaches.
Furthermore, the project includes in-depth debate of various steganography algorithms such as Least …show more content…
Background
One of the most significant factors of information technology and communication since the rise of Internet is the security of data. Internet security has gained an importance because of the increasing number of Internet users.
Cryptography and steganography are two approaches used to secure information. Cryptography was a technique created to secure the privacy of communication and in order to keep the contents of a message secret a number of various approaches were developed to encrypt and decrypt data.
Regrettably, in some situation it might be not enough to keep the contents of a message secret, it might be vital to keep the presence of the message secret. The approach applied to implement this, is known as steganography.
Steganography is known as the science of hiding data. The word “Steganography” is a Greek word, which means, “Covered or hidden writing”. The major purpose of it is to conceal the very existence of the secret message in the cover medium. The two approaches are counter parts in digital security. The distinct advantage of steganography over cryptography is that messages do not engage interest to themselves, to messengers, or to recipients. There are several applications that included this type of approach because of its importance. The first purpose of the project is to investigate and analyze steganography and how it is implemented. The implementation and evaluation will be analyzed on some common steganography methods. BMP images will be …show more content…
The two methods steganography and cryptography can be used together. Thus it is recommended to use encryption in conjunction with steganography.
3. Motivation
This research motivation came after I have studied a Computer Forensics Investigations course at Unitec Institute of Technology. The lecturer provided some useful resources to read and gain more knowledge about steganography and other topics, which made me keener to learn more about steganography and how it is implemented.
4. Goal
The purpose of Steganography is to maintain secret communication between two parties. The first goal of the project is to secure and covert information and to know if there is any threat coming from the outside. The second goal is to avoid drawing suspicion to the existence of a hidden