Figure 1 - uploaded by Etebong Isong
Content may be subject to copyright.
Types of Steganography 2.2 Steganography in image Digital images are the most widely used cover objects for steganography. Due to the availability of various file formats for various applications the algorithm used for these formats differs accordingly. An image is collection of bytes (known as pixels for images) containing different light intensities in different areas of the image. When dealing with digital images for use with Steganography, 8-bit and 24-bit per pixel image files are typical. Both have advantages and disadvantages 8-bit images are a great format to use because of their relatively small size. The drawback is that only 256 possible colors can be used which can be a potential problem during encoding. Usually a gray scale color palette is used when dealing with 8-bit images such as (.GIF) because its gradual change in color would be harder to detect after the image has been encoded with the secret message. 24-bit images offer much more flexibility when used for Steganography. The large numbers of colors (over 16 million) that can be used go well beyond the Human Visual System (HVS), which makes it very hard to detect once a secret message, has been encoded (ukessays, 2015). Large amount of data can be encoded in to 24-bit images as it is compared to 8-bit images.

Types of Steganography 2.2 Steganography in image Digital images are the most widely used cover objects for steganography. Due to the availability of various file formats for various applications the algorithm used for these formats differs accordingly. An image is collection of bytes (known as pixels for images) containing different light intensities in different areas of the image. When dealing with digital images for use with Steganography, 8-bit and 24-bit per pixel image files are typical. Both have advantages and disadvantages 8-bit images are a great format to use because of their relatively small size. The drawback is that only 256 possible colors can be used which can be a potential problem during encoding. Usually a gray scale color palette is used when dealing with 8-bit images such as (.GIF) because its gradual change in color would be harder to detect after the image has been encoded with the secret message. 24-bit images offer much more flexibility when used for Steganography. The large numbers of colors (over 16 million) that can be used go well beyond the Human Visual System (HVS), which makes it very hard to detect once a secret message, has been encoded (ukessays, 2015). Large amount of data can be encoded in to 24-bit images as it is compared to 8-bit images.

Context in source publication

Context 1
... a false password is entered, such user will not be granted access to use the system. After authentication the interface will enable the embedding and extracting buttons for the administrator and only the extracting button for the user as shown below: Figure 10: System Login Screen after authentication for both Admin (Sender) and User (Receiver) ...

Similar publications

Article
Full-text available
This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article...
Book
Full-text available
O processo de ensino-aprendizagem nas disciplinas no CEGSIC 2012-2014 é lastreado pela realização de exercícios de estudo de caso, aderentes ao modelo de realização de pesquisa de estudo de caso com validade científica, desenvolvido por Robert Yin. A pesquisa desenvolvida ao final do curso, bem como sua correspondente monografia, também são baseada...
Article
Full-text available
The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve...

Citations

Chapter
Steganography’s capability to transmit data secretly has made it more popular in recent decades. Steganography secretly transmits information via a cover media such as a text file, picture file, audio file, or video file. As a result of its potential for concealing a more significant quantity of sensitive data, video steganography is gaining popularity. Compression methods and video deduplication are provided in this study as they pertain to the use of video in clandestine communication. When conducting surveys, both processed and raw footage are taken into account. Moreover, we discuss whether such an encryption method is even possible. This study covers state of the art in covert video embedding and encryption methods. Numerous compression techniques are discussed here, and data is also more securely stored in motion vectors in dynamic scenes.KeywordsSteganographyCryptographyLossyLossless compressionHuffman codeLeast significant bitRivest–shamir–adleman