Blog for Learning

| lesson material | material summary | questions and answers | definitions | types and examples | other information | materi pelajaran | ringkasan materi | pertanyaan dan jawaban | definisi | jenis-jenis dan contoh-contoh | informasi lainnya |

Powered by Blogger.


What is Steganography? : Definition, Principles, Criteria, Aspects, Types

What is Steganography? : Definition, Principles, Criteria, Aspects, Types

For the discussion this time we will review Steganography which in this case includes such principles, criteria, aspects and types, so in order to better understand, refer to the full review below.

Definition of Steganography
Definition of "steganography" steganography is the technique or art of hiding a secret message "hiding message" or secret writing "covered writing" so that the presence of a message is not detected by anyone except the sender and recipient of the message. Steganography comes from Greek, namely steganos "hidden / hiding" and graphy "writing", so that the complete meaning of the writing is hidden.

Principles or Ways to Work Steganography
To insert data that you want to hide requires two elements. The first element is container media such as images, sounds, videos and so on that look not suspicious to keep secret messages. The second element is the message that you want to hide, namely the container media in the form of an image called a cover-object and the message inserted image is called stego-object.
In general, there are two processes in steganography, namely the embedding process to insert messages into the cover-object and the decoding process for message extraction from stego-object. Both of these processes may require a secret key called a stego-key so that only the rightful party can do message insertion and extraction.

Criteria and Aspects in Steganography
Concealing confidential data into digital media changes the quality of the media, the criteria that must be considered in hiding data include:

  • Fidelity, the quality of container images has not changed much, after the addition of confidential data, the results of steganography images still look well. Observers do not know that in the image there is confidential data.
  • Robustness, the hidden data must be resistant to manipulation carried out on container images "such as" changing contrast, sharpening, placement, adding noise, enlarging images, cutting "cropping", encryption and so on "if the image processing operations are carried out the data hidden not broken.
  • Recovery, hidden data must be able to disclose "recovery" because the purpose of steganography is hiding data so that at any time confidential data in the image of the container must be retrieved for further use.
A steganography has three aspects that can determine the success or failure of a steganography in doing its work "Ermadi et al, 2004", namely:

  • Capacity "capacity" refers to the amount of information that can be hidden in a cover medium. Security is the observer's inability to detect hidden messages and resilience is the amount of modification of the stego medium that can survive before the enemy destroys the hidden secret message.
  • Security "security", security of the classic steganography system embodies the confidentiality of its encoding system. Information theory allows us to be more specific to what is meant by a system that is truly safe.
  • "Robustness", resistance refers to cross-sectional image data "such as changing contrast, sharpening, rotation, magnification of images, cuts and so on". If the image is carried out by image processing operations, then the hidden data is not damaged.

Types of Steganography Techniques
Based on the steganography technique used there are seven types of steganography techniques, namely as follows "Ariyus, 2009 ″:

  • Injection, is a technique to embed secret messages directly into a media. One problem with this technique is that the size of the injected media becomes larger than its normal size so that it is easily detected. This technique is often also called embedding.
  • Substitution, normal data is replaced with confidential data. Usually the results of this technique do not change the size of the original data too much, but depends on the media files and data that will be hidden. Substitution techniques can reduce the median quality that is boarded.
  • Tramsformation Domain, this technique is very effective. Basically, domain transforms hide data on transformspace.
  • SpreadSpectrum, is a transmission technique using pseudo-noise code, which is independent of information data as a waveform modulator to spread signal energy in a "bandwidth" communication path that is greater than the information communication path signal. By the receiver, the signal is collected again using synchronized pseudo-noise code replicas.
  • Statistical Method, this technique is also called the 1-bit steganographic scheme, the scheme implements one bit of information in the media ride and changes the statistics even if only 1 bity. Statistical changes are indicated by indication 1 and if there are no regulations it looks indication 0. This system works based on the ability of the recipient to distinguish between information that has been modified and what has not.
  • Distortion, this method creates changes to objects that are carried by secret data.
  • Cover Generation, this method is more unique than other methods because the cover object is chosen to hide the message.
Thus the discussion about What is Steganography? : Definition, Principles, Criteria, Aspects, Types hopefully with these reviews can add insight and knowledge of all of you ... thank you very much for your visit.

Source : 
0 Komentar untuk "What is Steganography? : Definition, Principles, Criteria, Aspects, Types"

Silahkan berkomentar sesuai artikel

Template By Kunci Dunia
Back To Top