Steganography And Steganalysis: Detection Of Information In Social Networks

Read Complete Research Material



[Steganography and Steganalysis: Detection of Information in Social Networks]

By

ABSTRACT

On the in Internet today, there are numerous websites offering places to store and share images (photos, drawings, cliparts, etc.). Online Social Networks (OSN) and Online Photo Services (OPS) usually offer this type of service making it possible to upload and manage the images they publish. Users can publish their own images as well as add descriptions and tags. By adjusting the personal privacy settings, the images become visible only to authorized users, with it then being possible to add any comments. Generally, OSN/OPS manipulate the published images by resizing, upgrading metadata, compressing, embedding watermarking, and making it difficult to use wellknown steganographic techniques on them.

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. There are many different carriers for steganography but the most popular is digital images. Recently, there it has been rumoured that terrorist cells are using steganography to hide their secret plans, and subsequently it is becoming increasingly important to detect the images that contain steganography such that we can reduce foul-play. This counter-technique is known as steganalysis. In contrast to the magnitude of papers that analyse either steganography or steganalysis techniques, this paper provides in-depth descriptions of both. It also offers a chance to put the theory into practice by way of a piece of software designed to maximise learning in the fields.

In this paper two new steganographic schemes that mainly take advantage of the published images and survive the OSN/OPS processing before their publication, are proposed and analyzed. Finally, a notification system which uses tags to manage the sent/received information on the secret channel is proposed. This allows for the deletion of the received information as well as a bandwidth increase of the secret channel.

Table of Contents

ABSTRACTII

CHAPTER 1: INTRODUCTION1

STEGANOGRAPHY AND STEGANLYSIS1

CHAPTER 2: LITERATURE REVIEW3

Information Hiding6

CHAPTER 3: METHODOLOGY9

Steganography in the File Name9

CHAPTER 4: RESULTS11

CHAPTER 5: CONCLUSION15

BIBLIOGRAPHY16

CHAPTER 1: INTRODUCTION

Steganography and Steganlysis

Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention.

Steganlysis is process to detect of presence of steganography. In this article we have tried to elucidate the different approaches towards implementation of steganography using 'multimedia' file (text, static image, audio and video) and Network IP datagram as cover. In recent years, digital watermarking has emerged as an increasingly active research area. Information can be hidden into images, videos, and audios imperceptibly to human beings. It provides vast opportunities for covert communications. Consequently, methods to detect covert communications are called for. This task is especially urgent for law enforcement to deter the distribution of children pornography images/videos hidden inside normal images/videos, and for ...
Related Ads
  • Steganography
    www.researchomatic.com...

    Steganography , Steganography Essay wri ...

  • Steganography
    www.researchomatic.com...

    During the past years, he became aware of informatio ...

  • Problems In Steganography...
    www.researchomatic.com...

    Problems In Steganography , Watermarking And H ...