What Is Image Steganography Computer Science Essay: Essays

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

UKESSAYS (/)
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)

 REFERENCE THIS
Search 
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
(https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing

(https://twitter.com/intent
Service 

What Is Image
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing

Steganography 
computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-

Computer Science Marking & Proofreading


science-essay.php)

Essay 16 Pages All Services 

Published: 23, March 2015


ORDER A CUSTOM
Image Steganography, which is then the art
ESSAY
and science of sending a hidden message
WRITTEN BY AN EXPERT,
under a cover image, thereby it not been 100% ORIGINAL &
aware by another other person aside the PLAGIARISM FREE. (/ORDER
people involved. Hiding secret messages in /?PRODUCT=2)
digital images has been said to be the most
widely used Steganography format in today's
ASK A QUESTION
digital world (Bret, 2002). Kurak and McHugh
FREE
are credited with earliest methods of digital
CUSTOM 300 WORD
Steganography, the method the proposed
PROFESSIONAL ANSWER
resembles embedding into the four (4) least (/ASK/)
signi cant bits (LSBs). They examined image
downgrading and contamination which is
About UK Essays 
known now as image-based Steganography.

Hiding of information can be done in many Fair use policy 


ways in an image. Razis and Taujuddin (2010)
Referencing tools 
backs this by saying that for information to
be hidden, straight message insertion may All free resources 
encode every bit of information in the image
or instead it embeds the message in a "noisy"
area that draws less attention, those areas
where there is a great deal of natural colour
variation.

1 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

(/services/essay-writing-service.php)
UK ESSAYS (/)
In this document I created di erent
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
stego-image formats, hiding text under an
image and hiding image under an image
 REFERENCE THIS
(using di erent format like hiding GIF image 
under JPEG etc.).
Share this 
I used (https://www.facebook.com/sharer/sharer.php?u=https:
di erent algorithms
to hide these di erent images, thereby
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
suggesting which of this algorithm is the best
(https://plus.google.com/share?url=https://www.ukessays.com
one to be used and which image format is
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
best to use in Steganography. Lastly I did a  (https://twitter.com/intent
Service 
Steganalysis of each of this stego-image,
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
using RS analysis and sample pair analysis. Assignment Writing
computer-science-essay.php&via=ukessays)  (https://m.reddit.com/submit?url=https:
Service 

1.1.2 Project Aim


//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading
science-essay.php)

To evaluate and investigate the existing 16 Pages All Services 


algorithms of image steganography.

Implementing di erent image steganography


ORDER A CUSTOM
methods on images to show the one that is
the best. ESSAY
WRITTEN BY AN EXPERT,
Comparing selected tools used in image 100% ORIGINAL &
steganography. PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)

2.0 Literature Review


To have a better and bigger picture of image
ASK A QUESTION
Steganography I chose to rstly talk about FREE
CUSTOM 300 WORD
steganography itself in general; from its
PROFESSIONAL ANSWER
history and origin down to its de nition,
(/ASK/)
types and application as stated by various
authors.
About UK Essays 
Furthermore, for anyone (even a layman) to
have a clear picture of the project I wrote on Fair use policy 
images so that when discussing how the
Referencing tools 
algorithms and tools work it won't be
confusing. The reverse of Steganography
All free resources 
which is Steganalysis was not left out too.

2.1 Brief History of


Steganography

2 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

According to Bret (2002) "The earliest


UK ESSAYS (/)
recordings of Steganography were by the
2
 Fair Use Policy (/contact/fair-use-policy.php)
 Noti cations  Live chat  Sign in (/myaccount/)
Greek historian Herodotus in his chronicles
known as "Histories" and date back to around
 REFERENCE THIS
440 BC. Similarly Erin (2003) stated in his 
report that steganography
Share this  is by no means a
(https://www.facebook.com/sharer/sharer.php?u=https:
modern day practice.
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 

science-essay.php)(https://plus.google.com/share?url=https://www.ukessays.com
Herodotus recorded two stories of
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Steganographic techniques during this time Dissertation Writing
in Greece (Bret 2002). The rst stated that (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
King Darius of Susa shaved the head of one
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
of his prisoners and wrote a secret message
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
on his scalp. When the prisoner's hair grew

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
back, he was sent to the Kings son in law Marking & Proofreading 
science-essay.php)
Aristogoras in Miletus undetected". He
16 Pages All Services 
further gave another story that "from
Herodotus, which claims that a soldier named
Demeratus needed to send a message to ORDER A CUSTOM
Sparta that Xerxes intended to invade
ESSAY
Greece. Back then, the writing medium was WRITTEN BY AN EXPERT,
text written on wax-covered tablets. 100% ORIGINAL &
Demeratus removed the wax from the tablet, PLAGIARISM FREE. (/ORDER
wrote the secret message on the underlying /?PRODUCT=2)

wood, recovered the tablet with wax to make


it appear as a blank tablet and nally sent the ASK A QUESTION
document without being detected. Romans
FREE
used invisible inks, which were based on CUSTOM 300 WORD
natural substances such as fruit juices and PROFESSIONAL ANSWER
milk. This was accomplished by heating the (/ASK/)
hidden text, thus revealing its contents.
Invisible inks have become much more
About UK Essays 
advanced and are still in limited use today.
During the 15th and 16th centuries, many Fair use policy 
writers including Johannes Trithemius (author
of Steganographia) and Gaspari Schotti Referencing tools 

(author or Steganographica) wrote on


All free resources 
Steganagraphic techniques such as coding
techniques for text, invisible inks, and
incorporating hidden messages in music".

2.2 Introduction to
3 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Steganography
UK ESSAYS (/)
2
 Fair UseSteganography is about hiding the
Policy (/contact/fair-use-policy.php) existence
Noti cations  Live chat  Sign in (/myaccount/)
of messages (Ross n.d). While Morkel, Elo
and Olivier (2005) said Steganography "is the  REFERENCE THIS

art and science of invisible communication".
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
They went further to say that this is achieved
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
through hiding information in information Essay Writing Service 
science-essay.php)  (https://plus.google.com/share?url=https://www.ukessays.com
leading to the existence of communication.
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
They added that Steganography is derived
 (https://twitter.com/intent
Service 
from greek words "stegos" meaning "cover"
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
and "gra a" meaning "writing". Also Das et al
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
computer-science-essay.php&via=ukessays) 
(n.d) in their article said Steganography is Service
(https://m.reddit.com/submit?url=https: 

hiding information that is classi ed in any


//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
media. science-essay.php)

16 Pages All Services 


(/order/)
Agreeing with the above de nitions I came up
with my own de nition: Steganography is the
ORDER A CUSTOM
art and science of communicating where by
ESSAY
message (secret) is been sent between two
WRITTEN BY AN EXPERT,
parties using any medium (such as image, 100% ORIGINAL &
audio or video) without a third party been PLAGIARISM FREE. (/ORDER
aware of existence of any communication /?PRODUCT=2)
(secret). This communication can be done
through the following appropriate media
ASK A QUESTION
carriers video, image or audio les (Abbas et
FREE
al 2009).
CUSTOM 300 WORD
Abbas Cheddad et al (2009) in there paper PROFESSIONAL ANSWER
spoke about the digital transformation of (/ASK/)

steganography which was brought about by


computer power, information and coding About UK Essays 
theory, the internet and with the
development of digital signal processing Fair use policy 
(DSP). This has led to an atmosphere of
Referencing tools 
corporate awareness in the digital world and
has generated di erent interesting All free resources 
applications, thereby guaranteeing its
continuous evolution. For all this to be
achieved and its continuous evolution Niels
and Peter (2003) said the process of hiding
information begins by identifying the

4 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

redundant bits of a steganographic system,


UK ESSAYS (/)
these identi ed bits should not a ect the
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
cover mediums integrity after modi cation.
The redundant bits are being replaced with
 REFERENCE THIS
data from the hidden message, 
steganographic 
systems(https://www.facebook.com/sharer/sharer.php?u=https:
Share this always leave traces
that are detectable on the cover mediums
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
but the goal of modern Steganography is to
(https://plus.google.com/share?url=https://www.ukessays.com
avoid it. The trace brings about distortion, the
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
process of nding this distortion is known as  (https://twitter.com/intent
Service 
statistical Steganalysis.
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
Jonathan et al (2004) said that Steganography
computer-science-essay.php&via=ukessays)
techniques must satisfy the following:
 Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
The embedded hidden information must be science-essay.php)

correct it should never be altered. The 16 Pages All Services 


information should never be added, loss or
changed after it has been hidden, if any of
these occurs the aim of the process would be ORDER A CUSTOM
defeated. ESSAY
WRITTEN BY AN EXPERT,
The human eye should not notice any change 100% ORIGINAL &
to the stego object that will be suspicious. If PLAGIARISM FREE. (/ORDER
the change is obvious, an attacker (third /?PRODUCT=2)
party) may suspect that there is hidden
information which will lead to an attempt to
ASK A QUESTION
extract or destroy it.
FREE
And lastly, our assumption should always be CUSTOM 300 WORD
that the attacker is aware of the hidden PROFESSIONAL ANSWER
information in the stego object. (/ASK/)

2.2.1 Types of About UK Essays 

Steganography Fair use policy 

Jonathan et al (2004) in their paper said


Referencing tools 
steganography can be divided into two types,
Robust and Fragile. Umamaheswari, All free resources 
Sivasubramanian and Pandiarajan (2010) also
agreed in their paper that Steganography can
be split into two types (Fragile and Robust).

ROBUST: The aim of robust marking is that

5 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

after embedding information in a le it


UK ESSAYS (/)
should be hard for it to be destroyed
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
(Jonathan et al 2004). In the true sense no
mark cannot be destroyed, if the amount of
 REFERENCE THIS
changes in a system to remove a mark makes 
a le useless that
Share 
thissystem is said to be robust
(https://www.facebook.com/sharer/sharer.php?u=https:
(Jonathan et al 2004). It is wise to hide the
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
mark in the part of(https://plus.google.com/share?url=https://www.ukessays.com
the le where it should
not be hard to know when it is removed.
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
Robust marking is of two main types:  (https://twitter.com/intent
Service 
ngerprinting and watermarking
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
Fingerprinting: This is when a speci c
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
(unique) identi er is hidden for the who is the

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
original owner of the le, he is then free to Marking & Proofreading 
science-essay.php)
use it. The owner of the copyright will be able
16 Pages All Services 
to use the ngerprint to identify any
customer that violates any license agreement
by distributing a copy of the le. ORDER A CUSTOM
Watermarks: This does not identify the ESSAY
customer but the person that owns the le. WRITTEN BY AN EXPERT,
100% ORIGINAL &
While ngerprints is basically use in
PLAGIARISM FREE. (/ORDER
identifying anybody that violates license
/?PRODUCT=2)
agreement, watermarks in the other hand
helps in prosecuting people with illegal copy.
Fingerprinting is the perfect thing to use but ASK A QUESTION
because CDs, DVDs are produced in mass it is FREE
not viable to have di erent ngerprint on CUSTOM 300 WORD
each disk (Jonathan et al 2004). PROFESSIONAL ANSWER
(/ASK/)
For watermarks to be secured, they have to
be hidden this stops it from being detected
About UK Essays 
and removed they are to be subtle
watermarks. Though not always should Fair use policy 
watermarks be hidden because visible
watermarks are also used and the normally Referencing tools 
take the form of a visual pattern overlaid on
All free resources 
an image. Also, there is similarities between
the use of watermarks that are visible to the
use of watermarks in non-digital formats
(such as the watermark on British money).

Fragile: Unlike robust steganography, the

6 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

information embedded in a le is destroyed


UK ESSAYS (/)
when the le is modi ed (Jonathan et al
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
2004). Fragile Steganography entails
embedding information into a le, it is
 REFERENCE THIS
destroyed when there is any modi cation 
(Umamaheswari, 
Share thisSivasubramanian and
(https://www.facebook.com/sharer/sharer.php?u=https:
Pandiarajan (2010). Files embed using this
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
method can be easily removed, so therefore
(https://plus.google.com/share?url=https://www.ukessays.com
this method is not appropriate when used for
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
recording the copyright holder of the le.  (https://twitter.com/intent
Service 
Notwithstanding this is important in
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
situations where prove is needed that a le Assignment Writing
computer-science-essay.php&via=ukessays)
has not been tampered with, such as using Service
(https://m.reddit.com/submit?url=https:
a

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
le as evidence in a court of law, since any Marking & Proofreading 
science-essay.php)
tampering would have removed the
watermark (Jonathan et al 2004). This 16 Pages All Services 
technique can easily be implemented
compared to the robust technique.
ORDER A CUSTOM
2.2.2 Applications of ESSAY
WRITTEN BY AN EXPERT,
Steganography 100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
(/services/example-essays/) /?PRODUCT=2)
Steganography has been employed in
numerous applications that are useful e.g.
control of copyright, enhancing robustness of ASK A QUESTION
image search engines and smart Ids (identity FREE

card) where your details are embedded in CUSTOM 300 WORD


PROFESSIONAL ANSWER
your photograph, video-audio
(/ASK/)
synchronization, checksum embedding,
TCP/IP packets (embedding a unique ID in an
image to analyse particular users network About UK Essays 

tra c) and circulation of secret data by a


Fair use policy 
company.
Referencing tools 
2.3 Images
All free resources 
A computer sees an image as a collection of
numbers that constitute di erent light
intensities in di erent areas of the image
(Morkel et al 2005). The numbers
represented forms a grid and each individual

7 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

point is referred to as pixels. In support of


UK ESSAYS (/)
this de nition Zoran, Michael and Sushil
2
 Fair Use Policy (/contact/fair-use-policy.php)
 Noti cations  Live chat  Sign in (/myaccount/)
(2004) in their paper de ned an image as a
two-dimensional array of image points or
 REFERENCE THIS
pixels. 
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
Most of the images available on the Internet
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
comprise of map rectangular pixels of the Essay Writing Service 
represented as bits, each
science-essay.php)
image which are
(https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
colour and pixel (displayed horizontally row Dissertation Writing
by row) are located (Morkel et al 2005). Each 
(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
of this pixel has a number of bits which is
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
known as bit depth, this is the bits number in
computer-science-essay.php&via=ukessays)
a colour scheme. In a colour scheme the
 Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
smallest bit depth is eight (8), this implies that Marking & Proofreading 
science-essay.php)
the colour of every pixel has 8 bits to describe
16 Pages All Services 
it. Morkel et al (2005) went further to say that
every monochrome and greyscale image are
able to display 256 various colours or shades ORDER A CUSTOM
of grey because for each pixel the use eight
ESSAY
(8) bits. Also, for digital images that are WRITTEN BY AN EXPERT,
coloured they are stored typically in 100% ORIGINAL &
twenty-four (24) bits they use the RGB colour PLAGIARISM FREE. (/ORDER
model which is also known as true colour. /?PRODUCT=2)

With the aid of the primary colours: red,


green and blue all the variations in colour of ASK A QUESTION
the pixels for a twenty-four (24) bit image are
FREE
derived. So therefore, a given pixel can have CUSTOM 300 WORD
256 di erent quantities of red, green and PROFESSIONAL ANSWER
blue which will sum up to over sixteen million (/ASK/)
combinations this then leads to have over
sixteen million colours. The size of an image
About UK Essays 
always depends on the amount of colours it
has, this implies that the more colour an Fair use policy 
image has the larger the size of the le.
Referencing tools 

2.3.1 Image All free resources 

Compression
Wei W. (n.d) says that the compression of
image is an application of data compression
that encodes an original image with few bits.

8 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Furthermore, the objective of this is to reduce


UK ESSAYS (/)
image redundancy and to save or transmit
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
data in a way that is e cient. Fig 1.0 shows a
block diagram of the general image storage
 REFERENCE THIS
system. The aim of this system is to make 
sure that the storage
Share this quantity is been
(https://www.facebook.com/sharer/sharer.php?u=https:
reduced as much as possible and also the
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
image that is decoded and displayed on the
(https://plus.google.com/share?url=https://www.ukessays.com
monitor should be very much similar to the
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
original image.  (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
C:\Users\owner\Documents\project
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
\Capture.JPG
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https: 

Fig 2.0 General Image Storage System (Wei


//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
n.d ) science-essay.php)

16 Pages All Services 


The compression of image can be divided
into two types lossy (irreversible) and lossless
(reversible). Lossy image implies that the new
ORDER A CUSTOM
image formed is not guaranteed to exactly as
ESSAY
the original image due to the fact that certain
WRITTEN BY AN EXPERT,
elements of the image have been reduced 100% ORIGINAL &
when the image is been reduced, while for PLAGIARISM FREE. (/ORDER
lossless image the new imagine is no /?PRODUCT=2)
di erent from the original image (The Royal
College of Radiologist 2008). JPEG (Joint
ASK A QUESTION
Photographic Experts Group) format les are
FREE
example of lossy compression, its
CUSTOM 300 WORD
compression is very high but the original
PROFESSIONAL ANSWER
image integrity is not been maintained. This (/ASK/)
has a negative impact on any hidden data in
the image, this is basically due to lossy
About UK Essays 
compression algorithm, this may "lose"
image data unnecessarily providing Fair use policy 
approximation which is close to digital image
of high quality but the duplicate is not exact. Referencing tools 
This concept led to the name "lossy"
All free resources 
compression. Lossy compression o ers high
rates in compression, this makes it to be
frequently used on true colour images.

But for lossless compression the image's


original data is maintained exactly, therefore

9 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

this is preferred when original image must


UK ESSAYS (/)
remain intact. This makes it to me favoured
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
more by Steganographic techniques. The
disadvantage of lossless compression is that
 REFERENCE THIS
it does not o er high rate of compression as 
lossy compression. 
Share this Examples of lossless
(https://www.facebook.com/sharer/sharer.php?u=https:
compression formats include: Compuserve's
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
GIF (Graphiccs Interchange Format) and
(https://plus.google.com/share?url=https://www.ukessays.com
Microsoft's BMP (Bitmap format).
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
 (https://twitter.com/intent
Service 
2.4 Methods in Image
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
Steganography 
computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
There are numerous methods used in image Marking & Proofreading 
science-essay.php)
steganography each of this method can be
applied and they have di erent degree of 16 Pages All Services 
success, discussed below are they methods:

ORDER A CUSTOM
2.4.1 Least Signi cant Bit ESSAY
Hiding (LSB) Method: WRITTEN BY AN EXPERT,
100% ORIGINAL &
Jonathan et al (2004) said that this method is
PLAGIARISM FREE. (/ORDER
an e ective way of hiding information in an /?PRODUCT=2)
image even for the fact that it is easy to
implement. This method works by using the
bits that are least signi cant of in each pixel ASK A QUESTION
in one image to hide the most signi cant of FREE

another. The following steps need to be CUSTOM 300 WORD


PROFESSIONAL ANSWER
taken for a JPEG image:-
(/ASK/)
1. First load up both the host image and the
image you need to hide.
About UK Essays 
2. Next chose the number of bits you wish to
Fair use policy 
hide the secret image in. The more bits used
in the host image, the more it deteriorates.
Referencing tools 
Increasing the number of bits used though
obviously has a bene cial reaction on the All free resources 
secret image increasing its clarity.

3. Now you have to create a new image by


combining the pixels from both images. If you
decide for example, to use 4 bits to hide the

10 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

secret image, there will be four bits left for


UK ESSAYS (/)
the host image. (PGM - one byte per pixel,
2
 Fair Use Policy (/contact/fair-use-policy.php) Noti cations  Live chat  Sign in (/myaccount/)
JPEG - one byte each for red, green,blue and
one byte for alpha channel in some image
 REFERENCE THIS
types) 
Share this
Host Pixel: 10110001  (https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Secret Pixel: 00111111 Essay Writing Service 
science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
New Image Pixel: 10110011 Dissertation Writing

4. To get the original image back you just



(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
need to know how many bits were used to
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
store the secret image. You then scan(https://m.reddit.com/submit?url=https:
computer-science-essay.php&via=ukessays)  Service 
through the host image, pick out the least
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
signi cant bits according the number used science-essay.php)
and then use them to create a new image 16 Pages All Services 
with one change - the bits extracted now
become the most signi cant bits.
ORDER A CUSTOM
Host Pixel: 10110011
ESSAY
Bits used: 4 WRITTEN BY AN EXPERT,
100% ORIGINAL &
New Image: 00110000
PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)
2.4.2 Direct Cosine
Transformation (DCT) ASK A QUESTION
Method FREE
CUSTOM 300 WORD
Direct Cosine Transformation can also be PROFESSIONAL ANSWER
used to hide data. Jonathan et al (2010) (/ASK/)
mentioned in their paper that this is one of
the main components in JPEG compression
About UK Essays 
technique. They also gave the steps in which
it works as follows: Fair use policy 

1. First the image is split up into 8 x 8


Referencing tools 
squares.

2. Next each of these squares is transformed All free resources 

via a DCT, which outputs a multi-dimensional


array of 63 coe cients.

3. A quantizer rounds each of these


coe cients, which essentially is the

11 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

compression stage as this is where data is


UK ESSAYS (/)
lost.
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
4. Small unimportant coe cients are
rounded to 0 while larger ones lose some of  REFERENCE THIS
their precision. 
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
5. At this stage you should have an array of
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service
streamlined coe (https://plus.google.com/share?url=https://www.ukessays.com
cients, which are further 
science-essay.php) 
compressed via a Hu man encoding scheme
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
or similar. 
(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
6. Decompression is done via an inverse DCT.
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
By mere looking at the value of the image
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https: 
pixel one can't be aware that something is
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
missing, this makes hiding by DCT useful. You science-essay.php)
can distribute the data you hide evenly over 16 Pages All Services 
the whole image in a way that it makes it
hard to destroy. One technique hides data in
the quantizer stage (Jonathan et al 2004). If ORDER A CUSTOM
there is any need to encode the bit value 0 ESSAY
inside any speci c 8x8 square of pixels, this WRITTEN BY AN EXPERT,
can be achieved by making sure that all 100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
coe cients are even, example by tweaking
/?PRODUCT=2)
them. When the coe cients are been
tweaked the bit value one (1) can be stored
so that they are odd. This then makes it ASK A QUESTION
capable to be di cult in detecting when data FREE
is stored in a large image compared to Least CUSTOM 300 WORD
Signi cant Bit (LSB) method. This method is PROFESSIONAL ANSWER
very simple it is capable of keeping (/ASK/)

distortions down, but its disadvantage is its


vulnerability to noise. About UK Essays 

2.4.3 Discrete Wavelet Fair use policy 

Transformation Referencing tools 

According to Reddy and Raja (n.d) "wavelet All free resources 


transform is used to convert a spatial domain
into frequency domain". It separates clearly
The use of wavelet in image stenographic
model lies in the fact that the wavelet
transform clearly separates the high

12 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

frequency and low frequency information on


UK ESSAYS (/)
a pixel by pixel basis. Discrete Wavelet
2
 Fair Use Policy (/contact/fair-use-policy.php) Noti cations  Live chat  Sign in (/myaccount/)
Transform (DWT) is preferred over Discrete
Cosine Transforms (DCT) because image in
 REFERENCE THIS
low frequency at various levels can o er 
corresponding
Share this 
resolution needed. A one
(https://www.facebook.com/sharer/sharer.php?u=https:
dimensional DWT is a repeated lter bank
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
algorithm, and the(https://plus.google.com/share?url=https://www.ukessays.com
input is convolved with
high pass lter and a low pass lter. The
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
result of latter convolution is smoothed  (https://twitter.com/intent
Service 
version of the input, while the high frequency
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
part is captured by the rst convolution. The Assignment Writing
computer-science-essay.php&via=ukessays)  Service
reconstruction involves a convolution(https://m.reddit.com/submit?url=https:
with

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
the synthesis lter and the results of this Marking & Proofreading 
science-essay.php)
convolution are added. In two dimensional
transform, rst apply one step of the one 16 Pages All Services 
dimensional transform to all rows and then
repeat to all columns. This decomposition
results into four classes or band coe cients.
ORDER A CUSTOM
The Haar Wavelet Transform is the simplest ESSAY
of all wavelet transform. In this the low WRITTEN BY AN EXPERT,
100% ORIGINAL &
frequency wavelet coe cient are generated
PLAGIARISM FREE. (/ORDER
by averaging the two pixel values and high /?PRODUCT=2)
frequency coe cients are generated by
taking half of the di erence of the same two
pixels. The four bands obtained are ASK A QUESTION
approximate band (LL), Vertical Band (LH), FREE

Horizontal band (HL), and diagonal detail CUSTOM 300 WORD


PROFESSIONAL ANSWER
band (HH). The approximation band consists
(/ASK/)
of low frequency wavelet coe cients, which
contain signi cant part of the spatial domain
image. The other bands also called as detail About UK Essays 

bands consists of high frequency coe cients,


Fair use policy 
which contain the edge details of the spatial
domain image. Referencing tools 

Research into human perception indicates


All free resources 
that the retina of the eye splits an image into
several frequency channels, each spanning a
bandwidth of approximately one octave. The
single in these channels is processed
independently. Similarly in a multilevel

13 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

decomposition, the image is separated into


UK ESSAYS (/)
bands of approximately equal bandwidth on
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
a logarithmic scale. It is therefore expected
that use of the DWT will allow independent
 REFERENCE THIS
processing of the resulting components 
without signi
Sharecant 
this perceptible interaction
(https://www.facebook.com/sharer/sharer.php?u=https:
between them, and hence makes the process
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
imperceptibility marking more e ective. For
(https://plus.google.com/share?url=https://www.ukessays.com
this reason the wavelet decompositions is
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
commonly used for the fusion of images.  (https://twitter.com/intent
Service 
Fusion technique include the simple method
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
of pixel averaging to more complicated Assignment Writing
computer-science-essay.php&via=ukessays)  Service
methods such as principal component(https://m.reddit.com/submit?url=https:

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
analysis and wavelet transform fusion. Marking & Proofreading 
science-essay.php)
Several approaches to image fusion can be
distinguished; depending on whether the 16 Pages All Services 
image is fused in the spatial domain or any
other domains, and their transform fused.
Image fusion is a process that produces a
ORDER A CUSTOM
single image from a set of input images. The ESSAY
fused image contains more complete WRITTEN BY AN EXPERT,
100% ORIGINAL &
information, than any individual input. Since
PLAGIARISM FREE. (/ORDER
this is a sensor-compresses information /?PRODUCT=2)
problem, it follows that wavelets, classically
useful for human visual processing, data
compression and reconstruction are useful ASK A QUESTION
for such merging. Other important FREE

applications of the fusion of images include CUSTOM 300 WORD


PROFESSIONAL ANSWER
medical imaging, microscopic imaging,
(/ASK/)
remote sensing, computer vision and
robotics.
About UK Essays 

2.4.4 Masking and Fair use policy 


Filtering Referencing tools 
The technique of masking and ltering are
mostly used on 24 bit and grey scale images All free resources 
(Samir et al 2008). They are sometimes used
as watermarks because the embed
information in the same way as watermarks
do on actual paper. Masking an image

14 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

requires changing the luminance of the


UK ESSAYS (/)
masked area. The chance of detection can be
2
 Fair Use Policy (/contact/fair-use-policy.php) Noti cations  Live chat  Sign in (/myaccount/)
reduced if the luminance change issmall.
Compared to LSB (Least Signi cant Bit)
 REFERENCE THIS
insertion masking is more robust in respect 
to cropping, some
Share 
this image processing and
(https://www.facebook.com/sharer/sharer.php?u=https:
compression. This technique embeds
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
information in areas that are signi cant so
(https://plus.google.com/share?url=https://www.ukessays.com
that the hidden message is more essential to
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
the cover image than just embedding it in the  (https://twitter.com/intent
Service 
noise level. With lossy JPEG (Joint
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Photographic Expert Graphics) image it is Assignment Writing
computer-science-essay.php&via=ukessays)  Service
more suitable than LSB (Least Bit Signi(https://m.reddit.com/submit?url=https:
cant)

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
2.5 Algorithms use in science-essay.php)

16 Pages
Steganography All Services 

Umamaheswari, Sivasubramanian and


Pandiarajan (2010), identi ed ve algorithms
ORDER A CUSTOM
that are currently implemented by ESSAY
Steganography each of them use Least WRITTEN BY AN EXPERT,
100% ORIGINAL &
Signi cant Bit (LSB) while some of them lter
PLAGIARISM FREE. (/ORDER
the image rst. These are blind hide, hide /?PRODUCT=2)
seek, lter rst, battle steg and dynamic
battle steg and lter rst. Furthermore, Juan
J.R, Jesús M.M (n.d) in their paper identi ed ASK A QUESTION
another Steganography algorithm known as FREE

Selected Least Signi cant Bits (SLSB) CUSTOM 300 WORD


PROFESSIONAL ANSWER
algorithm.
(/ASK/)

2.5.1 BlindHide About UK Essays 


This algorithm is the way to embed
information in an image, it said to blindly hide Fair use policy 
due to the fact that it starts at the images top
Referencing tools 
left corner then working its way right across
the image (down in scan lines) for each pixel All free resources 
(Umamaheswari, Sivasubramanian and
Pandiarajan 2010). This then leads it to
changing the Least Signi cant Bits (LSB) of
the pixel to match the message. To extract
the hidden message the Least Signi cant Bits

15 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

(LSB) starting from the top left are read o ,


UK ESSAYS (/)
this method is not very secure. It is also very
2
 Fair Use Policy (/contact/fair-use-policy.php) Noti cations  Live chat  Sign in (/myaccount/)
smart, because it's easy know whathas been
changed due to the fact that the space the
 REFERENCE THIS
message is supposed to ll is not lled up, it's 
only the upper 
part that(https://www.facebook.com/sharer/sharer.php?u=https:
Share this is degraded leaving
the bottom of the image untouched. This
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
makes it easy to know that what has been
(https://plus.google.com/share?url=https://www.ukessays.com
changed.
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
 (https://twitter.com/intent
Service 
2.5.2 HideSeek
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
In this algorithm the message is distributed
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https: 
across the message (Umamaheswari,
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
Sivasubramanian and Pandiarajan 2010). The science-essay.php)
name was gotten from a Steganography tool16 Pages
All Services 
used in Windows 95 that uses the same
technique. It generates a random seed using
a password, this seed is then used to select ORDER A CUSTOM
the rst position it's going to hide in. The ESSAY
random generating of position is continued WRITTEN BY AN EXPERT,
until the entire message has been 100% ORIGINAL &
embedded. This algorithm is slightly smarter PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)
than BlindHide because in order to break the
algorithm you need to try combining all the
pixels, you can only avoid doing that if you ASK A QUESTION
know the password. This still doesn't make it FREE
the best method because it doesn't look at CUSTOM 300 WORD
the pixels it is hiding in. It doesn't leave the PROFESSIONAL ANSWER
image in a good condition. Noise is (/ASK/)

introduced and this is randomly placed which


often causes the stego image to look About UK Essays 
speckled (Kathryn 2006).
Fair use policy 

2.5.3 FilterFirst Referencing tools 


Umamaheswari, Sivasubramanian and
All free resources 
Pandiarajan (2010) stated using one of the
lters that are inbuilt, it lters the image then
embeds rst the highest lter values. It is
basically an intricate version of BlindHide as it
does not need a password to extract the

16 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

message. Adding to this Kathryn (2006) said


UK ESSAYS (/)
this algorithm uses a technique known as an
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
edge detecting lter, just like the Laplace
formula, this nds the places on the image
 REFERENCE THIS
where there are some pixels which are least 
like their neighbours.
Share this  The lter rst's
(https://www.facebook.com/sharer/sharer.php?u=https:
paramount values is where it hides. The Least
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
Signi cant Bits (LSB) is left unchanged, while
(https://plus.google.com/share?url=https://www.ukessays.com
the most signi cant bits are lter.
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
The fact that the pixels are been changed,  (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
care has to be taken when ltering the
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
picture so that information that might change
computer-science-essay.php&via=ukessays)
doesn't need to be used (Umamaheswari,
 Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Sivasubramanian and Pandiarajan 2010). If Marking & Proofreading 
science-essay.php)
we do the contrary then it will be di cult or
16 Pages All Services 
impossible for the message to be extracted.
Hiding in those places that are least makes it
less detectable on an image. ORDER A CUSTOM
ESSAY
2.5.5 Dynamic BattleSteg WRITTEN BY AN EXPERT,

and FilterFirst 100% ORIGINAL &


PLAGIARISM FREE. (/ORDER
The two algorithms work in a similar pattern /?PRODUCT=2)

as BattleSteg and FilterFirst, though hiding


the process is faster and less memory ASK A QUESTION
intensive because they use dynamic
FREE
programming (Umamaheswari, CUSTOM 300 WORD
Sivasubramanian and Pandiarajan 2010). The PROFESSIONAL ANSWER
order in which the pixel is been kept in the (/ASK/)
dynamic array is not the same, this makes it
incompatible with the original algorithms.
About UK Essays 

2.6 Steganalysis Fair use policy 

Soumyendu et al (n.d) de ned Steganalysis Referencing tools 


as the process of identifying Steganography
by inspecting various parameter of a stego All free resources 

media, the main thing for this process is


identifying the suspected stego media. Anu,
Rekha and Praveen (2011) gave their own
de nition of Steganalysis as the science of

17 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

attacking Steganography in a war that never


UK ESSAYS (/)
ends. To test the strength of his/her own
2
 Fair Use Policy (/contact/fair-use-policy.php)
 Noti cations  Live chat  Sign in (/myaccount/)
algorithm a Steganographer can create
Steganalysis. Also Steganalysis is said to be
 REFERENCE THIS
the identi cation and destruction of 
embedded message
Share this 
(Swagota and Monisha,
(https://www.facebook.com/sharer/sharer.php?u=https:
2010).
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 

science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
According to Zoran, Michael and Sushil (2004)
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
the aim of digital Steganalysis is to detect Dissertation Writing
image les with information hidden in them (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
and with the possibility of the information
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
been extracted. When the stego media is
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
identi ed Steganalysis process decides if it

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
contains hidden message(s) or not, if it does it Marking & Proofreading 
science-essay.php)
then tries to retrieve the message from it
16 Pages All Services 
(Soumyendu et al n.d). Furthermore, the aim
of Steganalysis is to recognise any streams of
information that seems to be suspicious and ORDER A CUSTOM
determine if they have hidden message or
ESSAY
not embedded in them and if there is means WRITTEN BY AN EXPERT,
retrieve the information that is hidden (Vijay 100% ORIGINAL &
and Vishal 2012). PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)
Vijay and Vishal (2012) in their paper also
outline the following challenges faced by
Steganalysis: ASK A QUESTION
FREE
1. The suspect information stream, such as a
CUSTOM 300 WORD
signal or a le, may or may not have any data
PROFESSIONAL ANSWER
embedded into them. (/ASK/)

2. The embedded data, if any, may have been


encrypted before being inserted into the About UK Essays 
signal or le.
Fair use policy 
3. Some of the suspect signal or le may have
noise or irrelevant data encoded into them Referencing tools 
(which can make analysis very time
consuming). All free resources 

4. Unless it is possible to fully recover,


decrypt and inspect the hidden data, often
one has only a suspect information stream
and cannot be sure that it is being used for

18 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

transporting secret information


UK ESSAYS (/)
 Fair UseInPolicy
addition they went further to discuss the
2
(/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
types of attacks that stego-images can su er.
Attacks and analysis on embedded  REFERENCE THIS
information may take di erent forms, this 
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
include: extracting (retrieving), detecting,
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
disabling, modifying or destroying of Essay Writing Service 
science-essay.php)  (https://plus.google.com/share?url=https://www.ukessays.com
embedded information. An approach in
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
attack depends on what information is the Dissertation Writing
Steganalyst (the person who is attempting to  (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
detect steganography-based information
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
streams or les) has available. The attacks
computer-science-essay.php&via=ukessays) 
possible on a stego-image or media can be
Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
any of the following: Marking & Proofreading 
science-essay.php)

1. Steganography-only attack: The only 16 Pages All Services 


medium available for analysis is the
Steganography medium.
ORDER A CUSTOM
2. Known-carrier attack: The carrier that is,
ESSAY
the original cover and steganography media
WRITTEN BY AN EXPERT,
are both available for analysis. 100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
3. Known-message attack: The embedded
/?PRODUCT=2)
message is known.

4. Chosen-steganography attack: The


steganography medium and tool (or
ASK A QUESTION
algorithm) is both known. FREE
CUSTOM 300 WORD
5. Chosen-message attack: A known message PROFESSIONAL ANSWER
and steganography tool (or algorithms) is (/ASK/)
used to create steganography media for
future analysis and comparison. The goal in About UK Essays 
this attack is to determine corresponding
patterns in the steganography medium that Fair use policy 
may point to the use of speci c
Referencing tools 
steganography tools or algorithms.

6. Known-steganography attack: The carrier All free resources 


and steganography medium, as well as the
steganography tool or algorithm, are known.

2.6.1 Classi cation of

19 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Steganalysis
UK ESSAYS (/)
2
 Fair UseSteganalysis can be classi ed into 
Policy (/contact/fair-use-policy.php) theNoti cations  Live chat  Sign in (/myaccount/)
following: Statistical and Signature
Steganalysis. This is divided on whether the  REFERENCE THIS

embedded message is detected using the
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
Statistics of the image or the Signature of the
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Steganography technique used (Arooj and Essay Writing Service 
science-essay.php)  (https://plus.google.com/share?url=https://www.ukessays.com
Mir 2010). Arooj and Mir (2010) went further
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
to divide each of this technique into universal
 (https://twitter.com/intent
Service 
and speci c approaches.
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing

1. Signature Steganalysis

computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
According to Arooj and Mir (2010) in their Marking & Proofreading 
science-essay.php)
paper also agree that degradation or unusual
16 Pages All Services 
characteristics are been introduced when
properties of any electronic media is alter
during embedding of any secret message. ORDER A CUSTOM
This then bring about the existence of
ESSAY
signatures that announces the existence of a WRITTEN BY AN EXPERT,
secret message. The secret message can be 100% ORIGINAL &
detecting by nding they patterns PLAGIARISM FREE. (/ORDER
(signatures) which are obvious of a /?PRODUCT=2)

Steganography tool. In the early stage of


Steganalysis the possibility of embedded ASK A QUESTION
message where revealed by using signatures
FREE
speci c to speci c Steganography tool. The CUSTOM 300 WORD
method basically looks at the pallete tables in PROFESSIONAL ANSWER
GIF images and inconsistences caused by (/ASK/)
common Steganography tools. Arooj and Mir
(2010) question the reliability of this method
About UK Essays 
even though they are simple, gives results
that are promising when message is hidden. Fair use policy 
This method is sub divided into: speci c and
universal signature Steganalysis. Referencing tools 

All free resources


2. Statistical Steganalysis

Arooj and Mir (2010) question the reliability of


this method even though they are simple,
gives results that are promising when

20 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

message is hidden. Furthermore, to develop


UK ESSAYS (/)
this type of technique you need to analyse
2
 Fair Use Policy (/contact/fair-use-policy.php) Noti cations  Live chat  Sign in (/myaccount/)
the embedding operation and alsodetermine
some image statistics that are changed as a
 REFERENCE THIS
result of the process of embedding. For one 
to be ableShare
to design 
this such technique you need
(https://www.facebook.com/sharer/sharer.php?u=https:
a very good knowledge of embedding
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
process. It works best and gives accurate
(https://plus.google.com/share?url=https://www.ukessays.com
result when used for a speci c
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
Steganography technique, same as what is  (https://twitter.com/intent
Service 
applied in this project.
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing

3.0 Model of the system


computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-

Marking & Proofreading 


The working principle of the main system or science-essay.php)
software I used in this thesis is shown below 16 Pages
All Services 
( g 3.0)

Hidden data
ORDER A CUSTOM
Steganography tool ESSAY
Stego-image WRITTEN BY AN EXPERT,
100% ORIGINAL &
Steganalysis tool PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)
Ordinary or plain image

Decode image
ASK A QUESTION
Analysis result FREE

Original image CUSTOM 300 WORD


PROFESSIONAL ANSWER
(/ASK/)
Fig. 3.0 The ow of the
system About UK Essays 
Basically what happens here is that a plain
Fair use policy 
image that does not contain any hidden data
is been embedded with a secret data (this can Referencing tools 
be either image or text) using a
Steganography studio, after embedding the All free resources 
data the image now becomes a stego-image.
For you to know that this image has a hidden
data you do a Steganalysis using a tool
comparing the RS analysis or sample pair

21 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

data of the original image and the stego-


UK ESSAYS (/)
image. You will notice a change in the RGB
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
percentage of the image with higher RGB
from the original image is normal the now
 REFERENCE THIS
with hidden data. For the purpose of this 
work I went intothis
Share 
detail in(https://www.facebook.com/sharer/sharer.php?u=https:
seeing which image
format is the best in hiding data, I got the
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
result (appendix B(https://plus.google.com/share?url=https://www.ukessays.com
contains the result I got for
my analysis) for my analysis using an
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
analyser.  (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
Though I laid my hand on numerous tools to
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
produce stego-images most of them didn't
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
meet the criteria for tools I wanted to use.

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
These criteria set should meet up the Marking & Proofreading 
science-essay.php)
following:
16 Pages All Services 
Create stego-image both image under image
and text under image.
ORDER A CUSTOM
Should be able to decode a stego-image.
ESSAY
Should have speci c LSB algorithms you can WRITTEN BY AN EXPERT,
use for stego-image creation. 100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
If possible Steganalysis images, this is not a /?PRODUCT=2)
compulsory criteria.

From my experience with di erent ASK A QUESTION


Steganography tools most were very FREE
ine ective to my standard due to the fact CUSTOM 300 WORD
that the can only create stego-image without PROFESSIONAL ANSWER
been able to perform the other set criteria. (/ASK/)

3.1 Steganography About UK Essays 

Studio Fair use policy 


This is the tool I mainly used for both
Referencing tools 
Steganography and Steganalysis because it
fully all the criteria for a tool I was looking for,
All free resources 
unforturnately I couldn't get any other tool
that could perform the same function so that
the result will be compared. This tool can
encode a message in an image and then
decode it, to retrieve the embedded

22 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

message. Unlike the other tools that can only


UK ESSAYS (/)
encode, some could only encode text in
2
 Fair Use Policy (/contact/fair-use-policy.php)
 Noti cations  Live chat  Sign in (/myaccount/)
images and couldn't perform the task of
hiding an image under an image. Below is a
 REFERENCE THIS
screenshot of the tool GUI (Graphical User 
Interface).Share this 
(https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
C:\Users\owner\Documents\project Essay Writing Service 
\Capture2.JPG 
science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
Fig. 3.1 (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
4.0 Implementation
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
This chapter is the report of the practical

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
aspect of the work. It is divided basically into Marking & Proofreading 
science-essay.php)
two (2): creating stego-images and
16 Pages All Services 
Steganalysis of the stego-image les.

4.1 Creating Stego- ORDER A CUSTOM


images ESSAY
WRITTEN BY AN EXPERT,
Steganography cannot be achieved without 100% ORIGINAL &
creating a stego-image (image with PLAGIARISM FREE. (/ORDER
embedded message), this lead me to creating /?PRODUCT=2)

sixty-six (66) stego-images. Forty seven (47)


out of this images was created using ASK A QUESTION
Steganography Studio while the other ten
FREE
(10) was created using OpenStego. I tried CUSTOM 300 WORD
creating diversi ed formats of images in PROFESSIONAL ANSWER
di erent ways; meaning I created colour (/ASK/)
images with text in them, image in an image
and lastly black and white images with text in
About UK Essays 
them. Furthermore, I didn't just stop at that I
went further in using di erent image formats Fair use policy 
to embed information (create stego-images).
Below is a comprehensive breakdown of the Referencing tools 

stego-images format in the table below:


All free resources 

Text embedded in image


Algorithm

23 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Image
UK ESSAYSformat
(/)
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
Number
 REFERENCE THIS
BattleSteg 

BMP, JPEG, PNG


Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
6 Essay Writing Service 
science-essay.php) 
(https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
BlindHide Dissertation Writing

BMP, JPEG, PNG



(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
6
computer-science-essay.php&via=ukessays)
Dynamic BattleSteg
 Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
science-essay.php)
BMP, JPEG, PNG
16 Pages All Services 
6

Dynamic FilterFirst
ORDER A CUSTOM
- ESSAY
WRITTEN BY AN EXPERT,

-
100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)
FilterFirst

BMP, JPEG, PNG


ASK A QUESTION
6
FREE
HideSeek CUSTOM 300 WORD
PROFESSIONAL ANSWER
BMP, JPEG, PNG (/ASK/)

6
About UK Essays 
Total number of stego- Fair use policy
images

Referencing tools 

30 All free resources 

Image embedded in
image

24 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Algorithm
UK ESSAYS (/)
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
Image format
 REFERENCE THIS

Number
Share this  (https://www.facebook.com/sharer/sharer.php?u=https:

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
BattleSteg
Essay Writing Service 

science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
GIF in JPEG, JPEG in BMP, GIF in BMP, JPEG in
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
JPEG, GIF in PNG and JPEG in PNG
(https://twitter.com/intent
Service 
6
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
BlindHide
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https: 

GIF in JPEG, JPEG in BMP, GIF in BMP, JPEG in


//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
JPEG, GIF in PNG and JPEG in PNG science-essay.php)

16 Pages All Services 


6

Dynamic BattleSteg
ORDER A CUSTOM
GIF in JPEG, JPEG in BMP, GIF in BMP, JPEG in
JPEG, GIF in PNG and JPEG in PNG ESSAY
WRITTEN BY AN EXPERT,
6 100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
Dynamic FilterFirst /?PRODUCT=2)
GIF in JPEG, JPEG in BMP, GIF in BMP, JPEG in
JPEG, GIF in PNG and JPEG in PNG ASK A QUESTION
3 FREE
CUSTOM 300 WORD
FilterFirst
PROFESSIONAL ANSWER
GIF in JPEG, JPEG in BMP, GIF in BMP, JPEG in (/ASK/)

JPEG, GIF in PNG and JPEG in PNG

6 About UK Essays 

HideSeek Fair use policy 

GIF in JPEG and JPEG in BMP, GIF in BMP, JPEG Referencing tools 
in JPEG, GIF in PNG and JPEG in PNG
All free resources 
6

Total number of stego-


images

25 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

33ESSAYS (/)
UK
2
 Fair UseThe following
Policy are examples of the di
(/contact/fair-use-policy.php) erentcations
 Noti  Live chat  Sign in (/myaccount/)
cover images with their stego-image side by
side:  REFERENCE THIS

Share this  (https://www.facebook.com/sharer/sharer.php?u=https:
BMP (Bitmap) image (gray scale cover image
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Fig 3.1) and a stego-image (Fig 3.2) with a text
Essay Writing Service 
science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
le inserted in it, with the human naked eye
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
no alteration can be noticed to the image but Dissertation Writing
when statistical analysis is performed the 
(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
presence of an embedded information can be
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
checked (see appendix B for the statistical
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
analysis for the image below). The algorithm

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
used to embed the information is BattleSteg. Marking & Proofreading 
science-essay.php)
C:\Users\owner\Documents\project 16 Pages All Services 
\pix\using tools\covers\black and
white\BMP.bmp C:\Users\owner\Documents
\project\pix\using tools\steganography ORDER A CUSTOM
studio\with password\bw text\battleSteg ESSAY
\bmp.png WRITTEN BY AN EXPERT,
100% ORIGINAL &

Fig 4.1 Cover image Fig PLAGIARISM FREE. (/ORDER


/?PRODUCT=2)
4.2 Stego-image after a
text le is inserted ASK A QUESTION
JPEG (Joint Photographic Expert Graphics) FREE

image (colour or 24 bit image Fig 3.2) which is CUSTOM 300 WORD
PROFESSIONAL ANSWER
the cover image and a same format of image
(/ASK/)
which is the stego-image (Fig 3.4) with a text
le embedded inside it, still like the previous
example we can't notice any change with our About UK Essays 

Human Visual System (HVS) but only from


Fair use policy 
statistical analysis (see appendix B for the
statistical analysis for the example below). Referencing tools 
The algorithm I used to embed the text le is
FilterFirst. All free resources 

C:\Users\owner\Documents\project
\pix\using tools\steganography studio\with
password\image text\ lterFirst\jpeg.pngC:
\Users\owner\Documents\project\pix\using

26 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

tools\covers\colour\JPEG.jpg
UK ESSAYS (/)
2
Fig 4.3 Cover image Fig
 Fair Use Policy (/contact/fair-use-policy.php)
Noti cations  Live chat  Sign in (/myaccount/)

4.4 Stego-image after a  REFERENCE THIS

text Share
le isthis inserted

 (https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
PNG (Portable Network Graphics) image Essay Writing Service 
image Fig 3.6) which is the
science-essay.php)
(colour or 24 bit
(https://plus.google.com/share?url=https://www.ukessays.com
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
cover image has a GIF (Graphical Interchange Dissertation Writing
Format) image embedded (Fig 3.5) in it to (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
create a stego-image (Fig 3.7). With our naked
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
eyes we won't be able to notice any change
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
or alteration in the picture, statistical analysis

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
(see appendix B for result) is also only the Marking & Proofreading
science-essay.php)

viable option.
16 Pages All Services 
C:\Users\owner\Documents\project
\pix\using tools\embed\GIF.gif
ORDER A CUSTOM
Fig 4.5 Embedded le ESSAY
WRITTEN BY AN EXPERT,
C:\Users\owner\Documents\project 100% ORIGINAL &
\pix\using tools\covers\colour\PNG.png PLAGIARISM FREE. (/ORDER
C:\Users\owner\Documents\project /?PRODUCT=2)

\pix\using tools\steganography studio\with


password\image image\hideSeek\png gif.png ASK A QUESTION
FREE
Fig 4.6 Cover image Fig CUSTOM 300 WORD

4.7 Stego-image with an PROFESSIONAL ANSWER


(/ASK/)
image inside
About UK Essays
4.2Steganalysis of the

stego-image les Fair use policy 

The next stage of the work after creating the Referencing tools 

stego-images was to do Steganalysis to


All free resources 
compare the result to the original image. I
used RS analysis and Sample pairs analysis
using Steganography Studio as the tool
(software) to analysis the images. After
analysis the sixty-six (66) images created, I

27 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

found out that the following image formats


UK ESSAYS (/)
have the same results: GIF in BMP, GIF in
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
JPEG and GIF in PNG also the following image
formats too have same result: JPEG in BMP,
 REFERENCE THIS
JPEG in JPEG and JPEG in PNG. So therefore 
when recording
Share this 
the results (see appendix B) I
(https://www.facebook.com/sharer/sharer.php?u=https:
picked just two formats (JPEG in BMP and GIF
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
in JPEG) since they(https://plus.google.com/share?url=https://www.ukessays.com
have same result there
won't be of any use recording all results. The
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
total number of stego-images I analysed are  (https://twitter.com/intent
Service 
forty-one (41).
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing

5.0 Summary Conclusion


computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-

and Recommendation Marking & Proofreading


science-essay.php)

16 Pages All Services 


5.1 Summary
In this thesis I used di erent plain images
ORDER A CUSTOM
(both grayscale and coloured images) in
ESSAY
di erent formats (JPEG, BMP and PNG) to
WRITTEN BY AN EXPERT,
create numerous stego-images, my main 100% ORIGINAL &
essence of using di erent image formats to PLAGIARISM FREE. (/ORDER
do this is because I wanted to recommend /?PRODUCT=2)
the best image format that should be used in
embedding and to expose the ones that are
ASK A QUESTION
very vulnerable.
FREE
To enable me create the various stego- CUSTOM 300 WORD
images I used a Steganography tool (known PROFESSIONAL ANSWER
as Steganography Studio with some other (/ASK/)

tools which I found out to be less e ective) to


embedded the hidden data (text and images) About UK Essays 
in plain images. I heard di erent
combinations of stego-images such as text Fair use policy 
embedded in grayscale images (PNG, BMP,
Referencing tools 
JPEG), text embedded in coloured images
(BMP, JPEG, GIF) also I embedded images in All free resources 
images example JPEG (Joint Photographic
Expert Group) image embedded in BMP
(Bitmap) image, a GIF (Graphical Interchange
Format) image embedded in JPEG (Joint
Photographic Expert Group) image and a GIF

28 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

(Graphical Interchange Format) image


UK ESSAYS (/)
embedded in a BMP (Bitmap) image and also
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
a GIF (Graphical Interchange Format) image
embedded in PNG (Portable Network
 REFERENCE THIS
Graphics) image. I heard a common result for 
results forShare
JPEGthis 
embedded in BMP, PNG and
(https://www.facebook.com/sharer/sharer.php?u=https:
JPEG and also for GIF embedded in BMP, PNG
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
AND JPEG; I then picked only two formats
(https://plus.google.com/share?url=https://www.ukessays.com
(JPEG in BMP and GIF IN JPEG).
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
Furthermore, for any form of stego-image I  (https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
created; I used di erent algorithms
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
(BattleSteg, FilterFirst, HideSeek, BlindHide,
computer-science-essay.php&via=ukessays)  Service
(https://m.reddit.com/submit?url=https:
Dynamic BattleSteg, and Dynamic FilterFirst)

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
this helped me to know which algorithm is Marking & Proofreading 
science-essay.php)
best for Steganography. Finally I used a
16 Pages All Services 
Steganalysis tool (still Steganography Studio)
for detection of embedded le in an image, I
compared the result of a le that has no ORDER A CUSTOM
image embedded in it with the di erent the
ESSAY
result I got from the Steganalysis of the WRITTEN BY AN EXPERT,
di erent stego-images (see appendix B for 100% ORIGINAL &
the Steganalysis result). I got the result using PLAGIARISM FREE. (/ORDER
two detection techniques which are RS /?PRODUCT=2)

(Regular/Singular) analysis and Sample pair


analysis these are statistical Steganalysis ASK A QUESTION
which is seen to be more powerful than the
FREE
other type of Steganalysis (signature CUSTOM 300 WORD
Steganalysis). The comparison of the RGB PROFESSIONAL ANSWER
(red, green and blue colours) content in every (/ASK/)
image for both detection method was used to
know which algorithm is the best, the higher
About UK Essays 
the increment of the original image RGB
content the more likely embedded message Fair use policy 
can be retrieve or noticed. FilterFirst happen
to be the best algorithm I will recommend for Referencing tools 

Steganography because it produced little


All free resources 
increment in RGB (red, green and blue
colours) compared to that of the original
image and this was consistent for all the
di erent stego-image formats I used.

RS analysis is said to be one of the famous

29 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

Steganalysis technique, it has the ability to


UK ESSAYS (/)
the embedded message by analysing pixel
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
values statistically (Gupta R. and Jain A. n.d.).
To back this statement up, they went further
 REFERENCE THIS
to state in their paper that some RS 
Steganalysis work
Share 
this has been reported to be
(https://www.facebook.com/sharer/sharer.php?u=https:
more accurate technique to other
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
science-essay.php) 
conventional substitution steganography
(https://plus.google.com/share?url=https://www.ukessays.com
which is the type used for this work.
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Dissertation Writing
 (https://twitter.com/intent
Service 
5.2 Conclusion and
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
Recommendation 
computer-science-essay.php&via=ukessays) Service
(https://m.reddit.com/submit?url=https: 

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
From my ndings there is growing interest in Marking & Proofreading 
science-essay.php)
Steganography due to the fact that
communication over the internet has out 16 Pages All Services 
grown the way it used to be in the last
century. The fact that Steganography fully
supports hiding information under di erent
ORDER A CUSTOM
mediums (e.g. images) makes this an area of ESSAY
keen interest. Communication can easily be WRITTEN BY AN EXPERT,
100% ORIGINAL &
done between individuals without any
PLAGIARISM FREE. (/ORDER
eyebrow raised by who is not involved. /?PRODUCT=2)

In my work di erent stego-images were


created (in di erent formats) using numerous ASK A QUESTION
algorithms (BattleSteg, FilterFirst etc) these
FREE
were then statistically Steganalysed using RS CUSTOM 300 WORD
analysis and sample pairs, the results derived PROFESSIONAL ANSWER
was compared to the result from the original (/ASK/)
image that was analysed base on the same
technique used for the stego-images.
About UK Essays 

Fair use policy 

Referencing tools 

All free resources 

Request Removal
If you are the original writer of this essay and
no longer wish to have the essay published

30 of 31 7/29/2016 12:28 PM
What Is Image Steganography Computer Science Essay https://www.ukessays.com/essays/computer-science/what-is-image-stega...

on the UK Essays website then please click on


UK ESSAYS (/)
the link below to request removal:
2
 Fair Use Policy (/contact/fair-use-policy.php)  Noti cations  Live chat  Sign in (/myaccount/)
REQUEST THE REMOVAL OF THIS ESSAY  (/MODALS/CONTENT-ADS/REMOVAL.PHP?TYPE=ESSAY)
 REFERENCE THIS

Share this
More from UK Essays
 (https://www.facebook.com/sharer/sharer.php?u=https:
//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Essay Writing Service 
 Essay Writing
science-essay.php) (https://plus.google.com/share?url=https://www.ukessays.com
Computer Science
/essays/computer-science/what-is-image-steganography-computer-science-essay.php)
Service  Dissertation Writing

(https://twitter.com/intent
Service 
/tweet?text=What%20Is%20Image%20Steganography%20Computer%20Science%20Essay&
Essays 
url=https://www.ukessays.com/essays/computer-science/what-is-image-steganography-
Assignment Writing
computer-science-essay.php&via=ukessays)
More Computer Science Essays  Service
(https://m.reddit.com/submit?url=https:

//www.ukessays.com/essays/computer-science/what-is-image-steganography-computer-
Marking & Proofreading 
science-essay.php)
Examples of Our Work 
16 Pages All Services 
Computer Science Dissertation
Examples 
ORDER A CUSTOM
ESSAY
WRITTEN BY AN EXPERT,
100% ORIGINAL &
PLAGIARISM FREE. (/ORDER
/?PRODUCT=2)

Place Your Order Today


ASK A QUESTION
Take the next step and invest in your future
FREE
CUSTOM 300 WORD
PROFESSIONAL ANSWER
PLACE AN ORDER
(/ASK/)

(/order/?product=2) About UK Essays 


Copyright © 2003 - 2016 - UK Essays is a trading name of All Answers Ltd, a company registered in England and
Fair use policy
Wales. Company Registration No: 4964706. VAT Registration No: 842417633. Registered 
Data Controller No:
Z1821391. Registered o ce: Venture House, Cross Street, Arnold, Nottingham, Nottinghamshire, NG5 7PJ.
Referencing tools 

All free resources 

31 of 31 7/29/2016 12:28 PM

You might also like