Implementation of Steganography Using BMP File
Abstract
Today Image Processing is hot topic in Computer Graphics world. Image processing is used in many applicationslike Face Detection, Edge Detection and many more. Stegenography is one of the topics in Image Processing. It is used for many Applications like data transfer on network, sending password or pin number to the client. But efficient implementation of Steganography is important because it affects on data’s security which transfers on the network. If Steganography is not implemented efficiently then it will affect on security, time complexity and space complexity of the application. I have chosen bmp file for this implementation. This Paper is explaining about many implementation techniques of Steganography and what are the effects of those techniques.
Keywords
Full Text:
PDFReferences
http://en.wikipedia.org/wiki/Steganography
http://www. ics. uplb. edu. ph/node/129
http://www. shantirao.com/vsteg. html
http://www. springerlink.com/content/uw193f1dt9qry2yy/fullText. pdf
http://www. securityfocus.com/infocus/1684
http://gpgpu.org/
http://en.wikipedia.org/wiki/Printer_steganography
http://en.wikipedia.org/wiki/Digital_watermark
http://en.wikipedia.org/wiki/Digital_image
http://en.wikipedia.org/wiki/September_11, _2001_attack
http://en.wikipedia.org/wiki/CipherText-only_attack
http://en.wikipedia.org/wiki/Mimic_function
http://local. wasp. uwa. edu. au/~pbourke/dataformats/bmp/
http://en.wikipedia.org/wiki/Francis_Bacon
http://en.wikipedia.org/wiki/Bacon%27s_cipher
http://en.wikipedia.org/wiki/Morse_code
http://www. sarc-wv.com/safdb. aspx
"DIBs and Their Uses". Microsoft Help and Support. 2005-02-11. http://support. microsoft.com/kb/q81498/
http://en.wikipedia.org/wiki/Topics_in_Cryptography
http://en.wikipedia.org/wiki/Data_Encryption_Standard
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
David Kahn, The Codebreakers, 1967, ISBN 0-684-83130-9.
http://en.wikipedia.org/wiki/Diffie-Hellman
Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22,Nov. 1976, pp: 644–654
http://www.computer. org/portal/web/csdl/doi/10. 1109/CSSE. 2008.578
http://www. nvidia.com/object/product_tesla_c1060_us. html
http://en.wikipedia.org/wiki/Metadata
http://en.wikipedia.org/wiki/Blogosphere
http://en.wikipedia.org/wiki/Doll
http://en.wikipedia.org/wiki/The_finger
An Overview of Steganography for the Computer Forensics Examiner. 2004 FBI Introductory Review Article. By Gary C. Kessler.
Cryptography and Steganography. 2002 presentation of an overview of steganography, by Elonka Dunin, with discussion of whether Al Qaeda might have used steganography to plan the September 11, 2001 attacks.
Analyzing steganography applications. Practical examples on how some steganography software works, and how many of them are crackable.
Kawaguchi, E; Eason RO (2001). "Principle and applications of BPCSSteganography (Original paper on BPCS Steganography)" (PDF). http://www. datahide.com/BPCSe/Articles/Ref-6. SPIE98. pdf. Retrieved 2008-09-02.
Information Hiding: Steganography & Digital Watermarking. Papers and information about steganography and steganalysis research from 1995 to the present. Includes Steganography Software Wiki list. Dr. Neil F. Johnson.
Detecting Steganographic Content on the Internet. 2001 paper by Niels Provos and Peter Honeyman, Center for Information Technology Integration, University of Michigan.
Polytechnic Institute of NYU - Information Systems and Internet Security Lab Research Group. Example of ongoing research on Steganography with links to scientific papers in PDF format.
Postliteracy. org Transmedia art project that uses steganography as recursive communication.
Rights Protection for Natural Language Text. Links to several articles on Steganography.
Network Steganography Project. Articles on network steganography(Wireless LANs and VoIP). By Krzysztof Szczypiorski and Wojciech Mazurczyk.
Steganography, Steganalysis, and Cryptanalysis. BlackHat and DefCon presentations by Michael T. Raggo, alias SpyHunter.
Invitation to BPCS-Steganography. Introduction to a very large capacity steganography.
Covert Channels in the TCP/IP Suite—1996 paper by Craig Rowland detailing the hiding of data in TCP/IP packets.
Julian Smart, Stefan Csomor, and Kevin Hock (2006). Cross-Platform GUI Programming with Wxwidgets. Prentice Hall. ISBN 0131473816.http://books.google.com/booksid=CyMsvtgnq0QC&pg=PA265&dq=bitmap+pixma p+gui&as_brr=3&ei=4SjwRrTpHYSipgL63NS3BA&sig=4_ev_RXs8tXCVONCaiJEnFLtI0.
"DIBs and Their Uses". Microsoft Help and Support. 2005-02-11.http://support. microsoft.com/kb/q81498/.
"JPEG and PNG Extensions for Specific Bitmap Functions and Structures". http://msdn. microsoft.com/en-us/library/dd145023(VS. 85).aspx.
"GFF Format Summary: OS/2 Bitmap". http://netghost. narod.ru/gff/graphics/summary/os2bmp. htm.
"List of bitmap file types". Search File-Extensions. org. http://www.file-extensions. org/filetype/extensions/name/Bitmap+image/.
Becket, B (1988). Introduction to Cryptology. Blackwell Scientific Publications. ISBN 0-632-01836-4. OCLC 16832704. Excellent coverage of many classical ciphers and cryptography concepts and of the "modern" DES and RSA systems.
Cryptography and Mathematics by Bernhard Esslinger, 200 pages, part of the free open-source package CrypTool, PDF download.
In Code: A Mathematical Journey by Sarah Flannery (with David Flannery). Popular account of Sarah's award-winning project on publickey cryptography, co-written with her father. [52] Oded Goldreich, Foundations of Cryptography, in two volumes,Cambridge University Press, 2001 and 2004.
Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell. .
Alvin's Secret Code by Clifford B. Hicks (children's novel that introduces some basic cryptography and cryptanalysis).
Ibrahim A. Al-Kadi, "The Origins of Cryptology: the Arab Contributions, " Cryptologia, vol. 16, no. 2 (April 1992), pp. 97–126.
Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone CRC Press, (PDF download available), somewhat more mathematical than Schneier's Applied Cryptography.
Andreas Pfitzmann: Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems
Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.
Cryptonomicon by Neal Stephenson (novel, WW2 Enigma cryptanalysis figures into the story, though not always realistically).
Johann-Christoph Woltag, 'Coded Communications (Encryption)' in Rüdiger Wolfrum (Ed) Max Planck Encyclopedia of Public International Law (Oxford University Press 2009). *"Max Planck Encyclopedia of Public International Law". http://www. mpepil.com. , giving an overview of international law issues regarding cryptography.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.