Open Access Open Access  Restricted Access Subscription or Fee Access

Secured File Management System using Stegnography

N. Suresh Singh, Dr.G. Suganthi, A.R. Sajeev Ambi, M. Sreelal

Abstract


The purpose of stegnography is to hide messages or files inside other harmless file in way that does not allow any enemy to detect that there is a second secret message or file is present. Now Stegnography is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Stegnography in images has truly come of age with the invention of fast, powerful computers. The most popular technique in image Stegnography is Least Significant Bit Insertion. There are a large number of steganographic methods that most of us are familiar with especially if you watch a lot of spy movies, ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding information.

Keywords


Least Significant Bit Insertion (LSBI), Encryption, Cover_ Medium, Hidden_Data, Stego_Key, Stego_Medium.

Full Text:

PDF

References


A Java Stegnography Tool,Kathryn Hempstalk March 24, 2005,Supervisor: Eibe Frank.

Neil F. Johnson,Sushil Jajodia George Mason University, February 1998 27

Stegnography FAQ, Aelphaeis Mangarae [Zone-H.Org] March 18th 2006, Copyright Zone-H.Org 2006

cs171, Introduction to Programming, Final Project: Stegnography Application.

T. Aura, “Invisible Communication,” EET 1995, technical report, Helsinki Univ. of Technology, Finland, Nov. 1995

A. Brown, S-Tools for Windows, 1994, ftp://idea.sec. dsi.unimi.it/pub/security/crypt/code/s-tools3.zip.

C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” Proc. IEEE Eighth Ann. Computer ,Security Applications Conf., IEEE Press, Piscataway, N.J., 1992, pp. 153-159.

W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., Vol. 35, Nos. 3 and 4, 1996, pp. 313-336.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.