blog




  • Essay / Secure Data Transmission Using Steganography - 2018

    Introduction: Nowadays, the Internet is used by people from different walks of life, who face more challenges in terms of data storage and transmission , which in turn increases the number of users on the network. therefore considerably. In the advanced world, information is more essential to the exchange of jobs and the heart of the global economy. To ensure information security, the idea of ​​concealment has prompted individuals to come up with imaginative and innovative responses so that secure information does not fall into the wrong hands. Advanced media broadcasting faces a years-old problem as information is minted and controlled by unapproved individuals. The Web is a correspondence strategy as a method of appropriation of data by the masses. With the spread of the web across the globe, the hiding of secret messages through distinct techniques has become widespread. Little by little, data hiding strategies are developing with more complex methodology. Images, features, content, etc. are used in mysterious message matching in advanced media. Steganography and cryptography are distinct types of strategies used to send secure transmission of information. Steganography is the skill and art of hiding information in distinctive documents, for example, images, features, sound, content, etc. In cryptography, there are many degrees to uncover a mysterious message we send from a stranger (attacker). Anyway, in steganography, discovering a mysterious message is not that simple. This way, only the sender and the recipient realize that the message exists. This does not attract unwanted consideration. The mysterious message the sender exchanged...... middle of paper ...... works cited Peter , Gregory. CISSP Guide to Security Essentials. (accessed May 1, 2014).2. Jack Lacy, Schuyler R. Quackenbush, Amy Reibman, James H. Snyder, "Intellectual Property Protection Systems and Digital Watermarking", 2nd Information Hiding Workshop, 1998. (accessed May 1, 2014).3. Ross Anderson, Roger Needham, Adi Shamir, "The Steganographic File System", 2nd Information Hiding Workshop, 1998. (accessed May 1, 2014).4. Atul Kahate, “Cryptography and Network Security”, third edition (accessed May 1, 2014)5. Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998. (accessed May 1, 2014).6. “webopedia”. http://www.webopedia.com/TERM/S/steganography.html (accessed May 1, 2014).7. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf (accessed May 1, 2014)