Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of Steganography Using BMP File

Amol H. Jaikar

Abstract


Today Image Processing is hot topic in Computer Graphics world. Image processing is used in many applicationslike Face Detection, Edge Detection and many more. Stegenography is one of the topics in Image Processing. It is used for many Applications like data transfer on network, sending password or pin number to the client. But efficient implementation of Steganography is important because it affects on data’s security which transfers on the network. If Steganography is not implemented efficiently then it will affect on security, time complexity and space complexity of the application. I have chosen bmp file for this implementation. This Paper is explaining about many implementation techniques of Steganography and what are the effects of those techniques.


Keywords


Computer Graphics, Image processing, Steganoghraphy, BMP file format, Cryptography, Security.

Full Text:

PDF

References


http://en.wikipedia.org/wiki/Steganography

http://www. ics. uplb. edu. ph/node/129

http://www. shantirao.com/vsteg. html

http://www. springerlink.com/content/uw193f1dt9qry2yy/fullText. pdf

http://www. securityfocus.com/infocus/1684

http://gpgpu.org/

http://en.wikipedia.org/wiki/Printer_steganography

http://en.wikipedia.org/wiki/Digital_watermark

http://en.wikipedia.org/wiki/Digital_image

http://en.wikipedia.org/wiki/September_11, _2001_attack

http://en.wikipedia.org/wiki/CipherText-only_attack

http://en.wikipedia.org/wiki/Mimic_function

http://local. wasp. uwa. edu. au/~pbourke/dataformats/bmp/

http://en.wikipedia.org/wiki/Francis_Bacon

http://en.wikipedia.org/wiki/Bacon%27s_cipher

http://en.wikipedia.org/wiki/Morse_code

http://www. sarc-wv.com/safdb. aspx

"DIBs and Their Uses". Microsoft Help and Support. 2005-02-11. http://support. microsoft.com/kb/q81498/

http://en.wikipedia.org/wiki/Topics_in_Cryptography

http://en.wikipedia.org/wiki/Data_Encryption_Standard

http://en.wikipedia.org/wiki/Advanced_Encryption_Standard

David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.

http://en.wikipedia.org/wiki/Diffie-Hellman

Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22,Nov. 1976, pp: 644–654

http://www.computer. org/portal/web/csdl/doi/10. 1109/CSSE. 2008.578

http://www. nvidia.com/object/product_tesla_c1060_us. html

http://en.wikipedia.org/wiki/Metadata

http://en.wikipedia.org/wiki/Blogosphere

http://en.wikipedia.org/wiki/Doll

http://en.wikipedia.org/wiki/The_finger

An Overview of Steganography for the Computer Forensics Examiner. 2004 FBI Introductory Review Article. By Gary C. Kessler.

Cryptography and Steganography. 2002 presentation of an overview of steganography, by Elonka Dunin, with discussion of whether Al Qaeda might have used steganography to plan the September 11, 2001 attacks.

Analyzing steganography applications. Practical examples on how some steganography software works, and how many of them are crackable.

Kawaguchi, E; Eason RO (2001). "Principle and applications of BPCSSteganography (Original paper on BPCS Steganography)" (PDF). http://www. datahide.com/BPCSe/Articles/Ref-6. SPIE98. pdf. Retrieved 2008-09-02.

Information Hiding: Steganography & Digital Watermarking. Papers and information about steganography and steganalysis research from 1995 to the present. Includes Steganography Software Wiki list. Dr. Neil F. Johnson.

Detecting Steganographic Content on the Internet. 2001 paper by Niels Provos and Peter Honeyman, Center for Information Technology Integration, University of Michigan.

Polytechnic Institute of NYU - Information Systems and Internet Security Lab Research Group. Example of ongoing research on Steganography with links to scientific papers in PDF format.

Postliteracy. org Transmedia art project that uses steganography as recursive communication.

Rights Protection for Natural Language Text. Links to several articles on Steganography.

Network Steganography Project. Articles on network steganography(Wireless LANs and VoIP). By Krzysztof Szczypiorski and Wojciech Mazurczyk.

Steganography, Steganalysis, and Cryptanalysis. BlackHat and DefCon presentations by Michael T. Raggo, alias SpyHunter.

Invitation to BPCS-Steganography. Introduction to a very large capacity steganography.

Covert Channels in the TCP/IP Suite—1996 paper by Craig Rowland detailing the hiding of data in TCP/IP packets.

Julian Smart, Stefan Csomor, and Kevin Hock (2006). Cross-Platform GUI Programming with Wxwidgets. Prentice Hall. ISBN 0131473816.http://books.google.com/booksid=CyMsvtgnq0QC&pg=PA265&dq=bitmap+pixma p+gui&as_brr=3&ei=4SjwRrTpHYSipgL63NS3BA&sig=4_ev_RXs8tXCVONCaiJEnFLtI0.

"DIBs and Their Uses". Microsoft Help and Support. 2005-02-11.http://support. microsoft.com/kb/q81498/.

"JPEG and PNG Extensions for Specific Bitmap Functions and Structures". http://msdn. microsoft.com/en-us/library/dd145023(VS. 85).aspx.

"GFF Format Summary: OS/2 Bitmap". http://netghost. narod.ru/gff/graphics/summary/os2bmp. htm.

"List of bitmap file types". Search File-Extensions. org. http://www.file-extensions. org/filetype/extensions/name/Bitmap+image/.

Becket, B (1988). Introduction to Cryptology. Blackwell Scientific Publications. ISBN 0-632-01836-4. OCLC 16832704. Excellent coverage of many classical ciphers and cryptography concepts and of the "modern" DES and RSA systems.

Cryptography and Mathematics by Bernhard Esslinger, 200 pages, part of the free open-source package CrypTool, PDF download.

In Code: A Mathematical Journey by Sarah Flannery (with David Flannery). Popular account of Sarah's award-winning project on publickey cryptography, co-written with her father. [52] Oded Goldreich, Foundations of Cryptography, in two volumes,Cambridge University Press, 2001 and 2004.

Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell. .

Alvin's Secret Code by Clifford B. Hicks (children's novel that introduces some basic cryptography and cryptanalysis).

Ibrahim A. Al-Kadi, "The Origins of Cryptology: the Arab Contributions, " Cryptologia, vol. 16, no. 2 (April 1992), pp. 97–126.

Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone CRC Press, (PDF download available), somewhat more mathematical than Schneier's Applied Cryptography.

Andreas Pfitzmann: Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems

Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.

Cryptonomicon by Neal Stephenson (novel, WW2 Enigma cryptanalysis figures into the story, though not always realistically).

Johann-Christoph Woltag, 'Coded Communications (Encryption)' in Rüdiger Wolfrum (Ed) Max Planck Encyclopedia of Public International Law (Oxford University Press 2009). *"Max Planck Encyclopedia of Public International Law". http://www. mpepil.com. , giving an overview of international law issues regarding cryptography.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.