Abstract

Steganography, a subset of data hiding techniques, seeks to conceal sensitive information within any form of digital media. The goal of a steganographyplan at the sender's end is to incorporate a secret message into an innocent-looking image or any other file format known as a cover object. Meanwhileat the receiver’s side its goal is to extract the hidden information or message. Steganalysis, on the other hand, is the inverse process of steganographyand attempts to detect steganography. The role and development of steganalysis has increased when steganography was used for vulnerable activitieslike the embedding of harmful content. Moreover, the development of effective steganographic methods has made it very difficult to decipher them. Thispaper discusses in depth about the various existing steganalysis techniques and suggests improvements that can be brought about to prevent the abuseof steganography. It includes implementation of an encryption and decryption algorithm which evades usage of a secret key in the process. An interfacethat facilitates the same has also been developed and discussed in detail. It also discusses the further scope and challenges in both steganography andsteganalysis.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.