Other

What are the techniques used in steganography?

What are the techniques used in steganography?

Steganographic Technique

  • Intranets.
  • Digital Watermarking.
  • Voice over Internet Protocol.
  • Detection Algorithm.
  • Detection Method.
  • Watermarking Technique.
  • Trojans.

What is an example of steganography?

Steganography has been widely used for centuries. Some examples include: Hidden messages on a paper written in secret inks. Hidden messages distributed, according to a certain rule or key, as smaller parts (e.g. words or letters) among other words of a less suspicious cover text.

What is steganography explain any one method with example?

Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.

How is data hidden within noise for communication?

A data message is hidden within a cover signal (object) in the block called embeddor using a stego key, which is a secret set of parameters of a known hiding algorithm. The output of the embeddor is called stego signal (object).

Which is an example of a spread spectrum technique?

SSIS – Spread Spectrum Image Steganography We point out this technique as an example for spread spectrum data-hiding methods. Spread spectrum techniques are now widely used in military radio communications, due to their very high robustness to detection and extraction.

How big can a spread spectrum image be?

Experiments with 512×512 grey scale images (256 KB) could embed from 500 bytes to 5KB, depending on the cover. These experiments used a spread spectrum signal powerful enough to give almost total error-free retrieval, because the compression method adopted didn’t allow for any errors.

Why are spread spectrum techniques used in the military?

Spread spectrum techniques are now widely used in military radio communications, due to their very high robustness to detection and extraction. SSIS is a quite mature process, and its aim is to achieve low detectability, ease of extraction, high data rate and good robustness to removal.

Why is Siss a good tool for steganography?

Due to its fairly high capacity and low ease of detection and extraction, SISS is very good for steganography. Problems and possible solutions The basic tradeoff in using SSIS is between the error rate we can afford and the amount of informations we want to embed, that varies in turn the power of the added noise.