UPM Institutional Repository

Steganography For Embedding Data In Digital Image


Citation

Sowan, Salah Ibrahem (2003) Steganography For Embedding Data In Digital Image. Masters thesis, Universiti Putra Malaysia.

Abstract

The growth of the World Wide Web (WWW) has enabled the personal computer to be used as a general communications tool. As in the case of other forms of communication there is a wish for security and privacy. With literally millions of images moving on the Internet each year, it is safe to say that digital image Steganography is of real concern to many in the IT security field. Digital images could be used for a number of different types of security fear. In the business world, the sending of a harmless looking bitmap file could actually hide the latest company secrets. Steganography (literally, covered writing) is concealing of a secret message within another seemingly innocuous message, or carrier. Digital carriers include email, audio, and images. Steganography, like cryptography, is a means of providing secrecy. Steganography does so by hiding the very existence of the communication, while cryptography does so by scrambling a message so it cannot be understood. A cryptography message can be intercepted by an eavesdropper, but the eavesdropper may not even know the existence of a steganographic message. This thesis discusses the issues regarding Steganography and its application to multimedia security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. In the fundamental part, we identify a few key elements of Steganography through a layered structure. Data hiding is concerned to be as a communication problem where the embedded data is the signal to be transmitted. The tradeoff for two major categories of embedding data using spatial domain and frequency domain will be discussed. In addition, we have found that unevenly distributed embedding capacity brings difficulty in data hiding. We propose a complete solution to this problem, addressing considerations for choosing constant or variable embedding rate and enhancing the performance for each case. In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.


Download File

[img] PDF
FK_2003_25_A.pdf

Download (1MB)

Additional Metadata

Item Type: Thesis (Masters)
Subject: Cryptography - Equipment and Supplies
Call Number: FK 2003 25
Chairman Supervisor: Abdul Rahman Ramli, PhD
Divisions: Faculty of Engineering
Depositing User: Mohd Nezeri Mohamad
Date Deposited: 15 Jul 2011 03:09
Last Modified: 15 Jul 2011 03:09
URI: http://psasir.upm.edu.my/id/eprint/12166
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item