A Study of Steganography Approach for Securing Data in a Confidential Communication Using Encryption

A Study of Steganography Approach for Securing Data in a Confidential Communication Using Encryption

A. V. Senthil Kumar, Rahul Ramaswamy G., Ismail Bin Musirin, Indrarini Dyah Irawati, Abdelmalek Amine, Seddik Bri
DOI: 10.4018/978-1-6684-6581-3.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A steganography approach is a beneficial approach for hiding and encrypting messages in text, audio, video, and image formats. After the original text file is first encrypted, this encrypted file is embedded with an image file, and that image will be transferred to the recipient. The motive of this method is easy communication and transferring of files to end users safely. The intruder is the only one who can view the unhidden message which is in text, audio, video, or image format. Thus, the message is encrypted successfully. Although there are many advantages for the steganography, which also has some limitations, these issues are mainly aimed in this paper. In this chapter, the challenges of steganography are rectified with the help of securing techniques. Finally, in the results section, findings in image size and the complexity of image quality at the sender side and receiver side in one-bit, two-bit, three-bit, and four-bit steganography images are stated. Thus, steganography methods are taking progressive steps to transform this capability into higher contributions.
Chapter Preview
Top

Introduction

Steganography is the approach of hiding mystery records inside an ordinary document or message on the way to keep away from detection; the name of the game records is then extracted at its destination. The utilization of steganography may be mixed with encryption as an additional step for hiding or protective information. Steganography can be used to cover almost any form of digital content material, which includes textual content material, image, video, or audio content material; the information to be hidden can be hidden indoors almost each different form of digital content material. The content material to be hidden via steganography, known as hidden textual content, is regularly encrypted earlier than being integrated into the innocuous-seeming covers textual content document or records stream. If now no longer encrypted, the hidden textual content is typically processed in a few manners on the way to growth the issue of detecting the name of the game content material (Gunavathy & Meena, 2019).

In the previous days, the conversation became achieved head to head. But now the time has moved the technology develop wider and plenty of extra trends had been achieved. In vintage times, humans used to share the information with the useful resource of talking to each other, and with the useful resource of the usage of painting pictures, later it changed to letters and books. That became the time of gaining knowledge of new languages, human beings found out to jot down and study the paper materials. Then it have become a decade of letters and envelopes, human beings to begin with made use of pigeons to provide the letters to the predicted recipient. After that globe became on every other tempo to use postal addresses to ship the letters. It became the approach for an extended time (Qu et al., 2019).

Examples for steganography:

Steganography is practiced with the useful resource of the use of those wishing to convey an anonymous message or code. While there can be numerous valid makes use of for steganography, malware builders have furthermore been determined to apply steganography too difficult to apprehend the transmission of malicious code. Forms of steganography were used for hundreds of years and encompass nearly any approach for hiding a mystery message in an in any other case innocent container (Shi et al., 2019).

For example, the use of invisible ink to cover mystery messages in any other case inoffensive messages; hiding files recorded on microdot which may be as small as 1 millimeter in diameter on or interior valid-seeming correspondence; or even with the aid of using the use of multiplayer gaming environments to percentage information (H. Shi et al., 2019).

Complete Chapter List

Search this Book:
Reset