StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Use of the Optimization Steganography System - Essay Example

Cite this document
Summary
The essay "Use of the Optimization Steganography System" focuses on the critical analysis of steganography as a remedy to the issue. Enabling the detection of genetic algorithms will aid in solving the problem concerning digital multimedia archiving…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Use of the Optimization Steganography System
Read Text Preview

Extract of sample "Use of the Optimization Steganography System"

USING AN OPTIMIZATION STEGANOGRAPHY SYSTEM TO ARCHIVE DIGITAL MULTIMEDIA Insert After digital artifacts turned out to be an important facet of daily life, the need to preserve metadata in digital media has grown remarkably. The procedure of converting the metadata to digital archives, nevertheless, is limited by various challenges. The most significant challenge concerns the method sued to embed high payload capacity data into the digital multimedia while retaining the quality of the image. This paper will examine steganography as a remedy to the issue. Enabling the detection of genetic algorithm to boost the PSNR (peak signal–to-noise ratio) value by the high capacity information, will aid in solving the issue concerning digital multimedia archiving. Various data sizes are embedded onto the images and PSNR is also recorded for every image evaluated. Keywords—Steganography; LSB; Genetic Algorithm; Block mapping, message segmentation Introduction The current media and communication domain is subjugated by digital multimedia artifacts. In essence, digital content usage has turned out to be a reality to most individuals. Nevertheless, with the exception of its daily usage, digital media play a significant role in research and academics. Media facilitated the access to essential resources, training of essential skills and efficient time management. However, the information processing tasks which are performed by such media, still need to develop significantly. Through embedding; intended to connect two data types and improve the metadata capacity, steganography might come handy in resolving this issue. In the given research, the author seeks to undertake an analysis of digital multimedia and its effects on numerous aspects of human life, through the inclusion of spatial domain of steganography. As specified, the analysis will be undertaken through the least significant bit subscription scheme (LSB). The selection of research methodology was preset by the high levels of simplicity, remarkably huge hiding capacity, and the essence that it relies on such particulars of human eye as the insensitivity of low bit images. When stereo-image has not to be choked by the SDDS system, there is need to have messages embedded at a specific spot; thus offering maintenance to the statistical aspects on the cover page. Examining the spatial domain embedding technique, which limits the selection of a given position as a result of the message distribution regularity, it is clear that the process of embedding a message in a specific location would be faced by a number of challenges including: defining the changes in the spatial project. With the subject project, the mapping technique would be utilized so as to split the cover image under scrutiny into various major segments, and thus undertake an analysis, because this technique would assist in placing every single bit of the message in its place. This operation will underwrite to definition of the most rational frequency domain location thus driving the amount of static aspect interferences on the given spatial domain slot to minimum which may be realized by using the Genetic Algorithm (GA) (Dasguptaa, Mondalb & Duttac 2013). As a result, the objective of this paper would be researching the use of GA gauge in concealing metadata. This paper also reviews the various techniques of steganography. The third section of the paper illustrates how GA may be used for data hiding. The fourth section will examine the matric technique, while the fifth section will present an analysis of the offered algorithm. Lastly, the last section would present the result of the analysis and the recommendations. The paper is going to make use of Block substitution rather than the bit based substitution due to the substandard properties of the Bit based substitution. Review of steganography techniques Conventionally, steganography is defined as the ability of hiding explicit data in conventional messages in order to make it hard for user to understand the implications. Some of these techniques have been extensively used that they have been adopted widely, making them frequently used formats. Principally, steganography techniques are categorized into two major groups: the Spatial design approaches and Transform domain methods (Dasguptaa, Mondalb & Duttac 2013). The Transform approach supposes that images must be changed before the message is embedded into it. Working on this, approach, one should mention that it enables the hiding of the image’s message in the important segments of the image. This is the reason behind the need to differentiate between low, middle, and high frequency of the image when working with the transform approach. The essence that the rates of signal energy are specifically high in the lower frequencies elucidates on the reason why the image’s visibility is of high quality. Evaluating by these specifics, it is rational to presume that planting confidential or secret information in higher frequencies would serve to prevent the distortion of the image. Moreover, transformation domain approaches score highly as compared to other techniques since Transform Domain does not rely on the image’s format because the message is embedded into the image. This implies that Transform Domain approaches can withstand a lossless and a lossy compression (Dasguptaa, Mondalb & Duttac 2013). As opposed to the Transform Domain approaches, the Spatial Design approaches involve the embedding of essential message into pixels. It provides such techniques of embedding messages into the image in the form of LSB plane direct manipulation and cover image replacement with the bits to be hidden(Dasguptaa, Mondalb & Duttac 2013). However, the stated method is easy to identify (Chan & Chan, 2004). In its place, LSB matching centered on embedding the message into cover image has been proposed recently. As a result of the matching process which it involves, high rates of similarity rates and, thus, low detectability is implemented (Dasguptaa, Mondalb & Duttac 2013). This study is not the first occurrence of GA usage as a way of addressing the LSB matters. The GA has also been utilized in various studies so as to mask the data in the rightmost k LSBs of the host image (Dasguptaa, Mondalb & Duttac 2013), method proposed by Mielikainen being among the most current updates of the subject technique. GA Approach The genetic algorithm (GA) is a search and optimization approach founded on the doctrines of natural selection and genetics and. It enables population involving may people to evolve under itemized selection rubrics to a state which makes the most of the “fitness” while minimizing the cost function. The technique was advanced by John Holland in 1975. The algorithm begins with no knowledge if the right solution and relies completely on responses from the surrounding environment, evolution operators: crossover, reproduction and mutation, to attain the right solution. In beginning at various independent positions and searching in a parallel dimension, the algorithm circumvents local minima and congregates to sub optimal elucidations. This has facilitated the realization that GAs are capable of finding high performance expanses in complex domains without suffering the difficulties concomitant to high dimensionality; which , might occur with ascent decent methods or techniques that depend on derived information . References Dasguptaa, K., Mondalb, J. K. & Duttac, P. 2013, Optimized Video Steganography using Genetic Algorithm (GA), Procedia Technology, Vol.10, pp. 131–137 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Steganography Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Steganography Essay Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/information-technology/1639215-steganography
(Steganography Essay Example | Topics and Well Written Essays - 1000 Words - 1)
Steganography Essay Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/information-technology/1639215-steganography.
“Steganography Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/information-technology/1639215-steganography.
  • Cited: 0 times

CHECK THESE SAMPLES OF Use of the Optimization Steganography System

The Art and Science of Steganography

Background As noted the earliest use of the term steganography was implemented by Johannes Trithemius.... This research ''the Art and Science of steganography'' examines the art and science of steganography.... The research establishes that while the term steganography dates to 16th century, the process of concealing messages has been in practice since at least Greek antiquity.... World War II is demonstrated as marking a period of significant development for steganography as all major powers implemented these techniques....
11 Pages (2750 words) Research Paper

Search Engine Optimization

As such, some of these strategies are approved, while others remain unapproved due to the use of inappropriate words used in optimization, or a breach inn search engine user policy, on the side of website administrators.... This includes careful use of words that get numerous hits from search engines such that the words used are not meant to bloat documents or articles in the website.... Author's Name Date Search Engine optimization In search engine optimization, there are a number of strategies that are applied to ensure that a website is visible to search engines and that once internet users send a query to the search engine, information returned is relevant....
3 Pages (750 words) Research Paper

E-Business Systems and Marketing - Reebok

Now the use of internet covers real-time computer conferencing, audio broadcasting, video broadcasting, real time telephony and of course real-time business.... This can be achieved by search engine optimization, pay per clicks, or advertisements that draw people to the company's site....
12 Pages (3000 words) Essay

Steganography: how it is used for counter/anti-forensics

One does this by embedding the true message within a seemingly innocuous communication, such as audio, image, video, email, text, empty sections of disks, or executable files (Armistead, 2011 and Janczewski, hare (2009) explains that steganography works by replacing bits of unused or useless data in regular computer files such as HTML, graphics, text, and sound, with bits of different, invisible information.... Ec-Council (2009) also explains that unlike encryption whereby there is evidence that communication has taken place, steganography conceals the fact that a message is even being sent....
7 Pages (1750 words) Research Paper

Week 6 class discussions

Watermarking communication usually takes place in a one-to-many communication system while steganography communication takes place in a point-to-point communication.... The benefits of ADS outweigh the risks as files can be hidden on an NTFS hard disk in a way that is difficult to detect as long as there are proper security features to handle them and system administrators are aware of the streams.... If Microsoft discontinues support of ADS in future versions of its operating system, the forensic industry would suffer a big blow as it would not be able to find most of the copies of some work for its forensic investigations....
2 Pages (500 words) Assignment

Production system optimization

In this production system project, the aim is to produce calculations that will maximize the efficiency and the productivity of the assembly lines (Gregory & Kuzmich, 2004).... It can be improved by either increasing the cycle times at every LV Door or by reducing the number of workstations at every LV Door for all LV Doors available in the system.... For example, we can increase the cycle times in every LV Door while Production system Optimization Production system Optimization In this production system project, the aim is to produce calculations that will maximize the efficiency and the productivity of the assembly lines (Gregory & Kuzmich, 2004)....
2 Pages (500 words) Coursework

Digital Crime Investigation and Features of Steganography and Steganalytical Techniques

However, in order to make a steganography system more secure and productive, encryption and compression techniques can always be applied.... In fact, many current steganography applications utilize these systems to come up with a robust system; an important necessity given that a discovered or discerned steganography system is no longer useful (Bhattacharyya et al.... Nevertheless, the use of such open communication has greater susceptibility to security threats resulting in unapproved information access....
9 Pages (2250 words) Coursework

Query Optimisation in Wireless Sensor Networks Database

This review "Query optimisation in wireless sensor networks database" is about the query optimisation is a procedure through which numerous plans for the execution of the query aimed at meeting the requirements of a query are assessed and the plan of the query that is most suitable selected for the execution....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us