Ecosystem Services
Ecosystem Services
net/publication/371379024
CITATIONS READS
0 229
2 authors:
All content following this page was uploaded by Deepali A. Godse on 09 June 2023.
Keywords: Information security is a very useful term when it comes to the transmission of
Information Hiding secret data or information between two objects or devices. Generally,
cryptography is used for hiding information and sending messages in textual form.
Audio Steganography
There are many techniques and algorithms that have come into the picture when
Image Steganography
it comes to hiding information. One of the most famous and widely used
Video Steganography techniques is steganography. Steganography is basically a method used for hiding
DNA Steganography secret information or data which are in the form of texts, digital images, audio or
Network Steganography voice representatives, and video files. LSB Steganography is one of the most
simplest and efficient methods of Steganography. LSB ensures that there is no
significant change in the input image and the stego-image, which makes it almost
impossible for hackers to determine the difference between the original data and
output data with a secret message. One of the frequently used encryption or
cryptographic technique is Advanced Encryption Standard (AES). AES
encryption is a method that converts plain text into cipher text. AES algorithm is
much more efficient than the DES algorithm, which is why we will be making use
* Corresponding Author.
Email address: [email protected]
https://doi.org/10.5281/zenodo.7943637
Received in revised form 22 April 2023; Accepted 03 May 2023
Available online 17 May 2023
2212-0416/© 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND
license (http://creativecommons.org/licenses/by- nc-nd/4.0/).
281
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487
of AES encryption. This method does not allow third party to access original
information or to convert it in its original format.
INTRODUCTION STEGANOGRAPHY
Data hiding in Information Security means the hiding Steganography is a method of hiding information
of any kind of information into a cover media so that inside a cover image, text, audio, or video. [5]
no unintended observer or person will be aware that Steganography is divided into six types: Text
there is any hidden message. One of the most famous steganography, Image steganography, Video
and widely used methods of hiding data is steganography, Audio steganography, DNA
Steganography. Steganography has Greece originated steganography and Network steganography.
words, ‘Stego’- covering and ‘Graphia’- writing, and
A. Text Steganography [5][11]: Text
combination of both means ‘overed writing’ which
steganography terms the use of text
resembles to hiding information. The simplest way to
documents or files as the cover for secret
implement this process is by inserting the confidential
data; this process may involve things like
data bits in the LSB positions of the original image.
changing the format of existing text,
Steganography is a method that hides plain text in
generating random character sequences or
digital media. In this process, the hacker or unintended
using context-free grammars to generate
observer will not be able to detect cipher text convert
readable texts, changing words within a text
from original text because it has been concealed in
[5]. Numerous techniques used to hide the
another media. The trespasser or observer cannot
information in the text are: Format Based
suspect if there is any confidential data that is existing.
Method, Random & Statistical Generation,
For better security of the data over the network, the
and Linguistic Method.
steganography technique comes into the picture.
B. Image Steganography [5][11]: In this type
Cryptography is also a type of encryption , the process
of steganography, secret data is hidden in the
by which symmetric key is used to convert plain text
image as a cover object. Images are used in
into cipher text. The main function performed by
this process as a cover source due to the
cryptography is that the plaintext can be known and
number of pixel bits in the images’ digital
will be converted into the cipher text, which is visible
representation[5]. Common methods
but we cannot be read or understood by the human.
include: Insertion using Least Significant Bit
During transmitting secret information between two
, Masking and Filtering, also Encrypt and
networks Information Security is an important factor.
Scatter.
C. Audio Steganography [12][16][11]: Hiding
the secret text or message inside the audio is
audio steganography. The technique is used
to secure transmission of secret information
and cover the existence of secret message. It
also provides confidential channel for secret
message that is been encrypted. Hiding of
secret data in digital sound is more complex
process. Different techniques used for audio
Fig, 1: Classification of security systems
282
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487
283
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487
284
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487
binary form, divide it and find the standing for Data Encryption Standard is an
decimal number. The first half algorithm performing ncryption of data with
appear for the row and second half lower volume. In DES we encrypt and
box matrix and then we substitute cipher, key used here are of 64 bits.
285
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487
286
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487
287
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487
288