The technological progress of computer science and the Internet changed the way we lived in the 20th century and will continue to mold our way of life this century. However, this progress is not without risk. “Progress always involve risk., you can’t steal second base and keep your foot on first”. Fredrick Wilcox observed .The law enforcement community is well aware of this, as the computer criminal seems to be one step ahead of investigation in term of technical sophisticator. The technology celled Steganography is the art of passing information in a manner that the very existence of message unknown. Steganography closely resembles encryption in the fact that it requires the receiver to know the secret, which is called the secret key. In order for steganography to remain secure the initial unmodified cover image must also be kept secret. It would be easy to detect hidden data in an image if one was to have the original image side by side with the steganography cover image. Steganographic utilities now a day, hide information inside images, as this is relatively easy to implement. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated .In this paper I embed the cipher form of message (i.e. obtained by applying RSA algorithm ) into the digital image by modifying the two least significant bit (LSB) of the pixels of digital image. Multimedia-data hiding techniques have developed a strong basis for steganography .The main motivation behind this is largely due to fear of encryption services getting outlawed. This paper intends to give an overview of image steganography including its uses and various techniques.
|Keywords:||Multimedia, Secret Database, Steganography|
Student, MIMIT(Malout), Abohar, Punjab, India
There are currently no reviews of this product.Write a Review