Problems In Steganography, Watermarking And Hybrid Information Security Models: Crypto-Steg & Steg-Crypto Systems

Read Complete Research Material

Problems in Steganography, Watermarking and Hybrid Information Security Models: Crypto-Steg & Steg-Crypto Systems

By

ACKNOWLEDGEMENT

I would like to take this chance for thanking my research facilitator, friends and family for the support they provided me and their belief in me, as well as the guidance that they provided me, without which I would have never been able to do this research.

DECLARATION

I, (Your name), would like to declare that all contents included in this proposal stand for my individual work without any aid, and this proposal has not been submitted for any examination at academic as well as professional level, previously. It is also representing my very own views and not essentially those that are associated with university.

Signed __________________ Date _________________

CONTENTS

ACKNOWLEDGEMENT2

DECLARATION3

CHAPTER 1: INTRODUCTION5

Rational for the study5

Background7

Thesis Statement7

Aims and objectives8

Research Questions8

CHAPTER 2: METHODOLOGY9

Rationale for chosen design9

Search Strategy9

Study selection criteria11

How the quality of the evidence will be assessed and reviewed12

Data Extraction strategy12

Consideration of Rigour12

Consideration of Ethics13

Data Analysis13

References14

Appendices15

Gantt chart (February 2012 - June 2013)15

Proposed budget and resources16

CHAPTER 1: INTRODUCTION

Rational for the study

Information Security is one of the critical issues in the field of computer science due to mounting level of security violations in digital networks. Many information security systems have been developed to protect the piracy of the information for instance Steganography, digital watermarking, and other hybrid information security models which includes Crypto-Steg & Steg-Crypto Systems. Steganography is the discipline of hiding messages within apparently innocuous cover data such as audio, video, images, etc. Watermarking is the application of steganography to exercise control above the cover data itself, for instance implanting copyright labels in a copyrighted image, or embedding signals to map out a replica of any song that is dispensed over file-sharing networks. In both cases the aim is protecting the concealed information at the same time as avoiding getting discovery of such security measure. A hacker hits the steganographic algorithm by deforming the cover data so as to remove any concealed information or make them barely discernible. The hacker also endeavors to identify the secreted communication data. In applications such as secret communication, any proof at that entire steganographic message is going on represents a malfunction of the information security system. In digital watermarking systems the requirement for camouflage is comparatively less strict, but any data about a watermark's arrangement can be employed by the foe to process an attack. A more advance means of information systems are based on Hybrid information security systems that are Crypto-Steg System and Steg-Crypto System. These systems have many advanced features as compared to digital steganography and watermarking but they are also not flawless. This purpose of this research is to carry out research to present range of problems with each security information system in details.

Definitions of key terms

Steganography

Steganography is the discipline of hiding messages within apparently innocuous cover data such as audio, video, images, etc. Digital steganography refers to modifying a digital object (cover) to encode and conceal a sequence of bits of a message to facilitate covert communication.

Watermarking

Watermarking is the application of steganography to exercise control ...
Related Ads