Destruction of Steganography
نویسنده
چکیده
This paper looks at the use of techniques to prevent the communication of steganographic data by filtering. These filters are broken into two categories; Overwriting and Dissolving. Overwriting can be defined as being the effective implementation of a Steganographic message over the original message. Dissolving can be defined as being modifications to the picture in order to prevent the decoding of the image. Both methods do little damage to the cover image, while destroying the hidden data and, ideally, making it unrecoverable. This paper also reviews exactly which type of steganography this works for, and how that steganography is hidden.
منابع مشابه
مروری بر روش های نهاننگاری در JPEG و بررسی امنیت آن ها
Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملA High Capacity Email Steganography Scheme using Dictionary
The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...
متن کاملLSB Based Audio Steganography Using Pattern Matching
Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کامل