Mdewodezmde=

Page 1

International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064

Review of Role of Digital Video in Information Security Dinesh Goyal 1, Pratima Jha2 1

Vice-Principal, Suresh Gyan Vihar University, Vice Chairman, CSI, Jaipur, India 2

Suresh Gyan Vihar University, M. Tech (Student), Jaipur, India

Abstract: One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography? Keywords: Steganography. Cryptography, security, gif image, video

1. Introduction The desire to send a message as safely and as securely as possible has been the point of discussion since time immemorial. Information is the wealth of any organization. This makes security-issues top priority to an organization dealing with confidential data. Whatever is the method we choose for the security purpose, the burning concern is the degree of security. Steganography is the art of covered or hidden writing. The purpose of Steganography is covert communication to hide a message from a third party. [4]

is no knowledge of the existence of the message. With cryptography, comparison is made between portions of the plaintext and portions of the cipher text. In Steganography, comparisons may be made between the cover-media, the stego-media, and possible portions of the message. The end result in cryptography is the cipher text, while the end result in Steganography is the stego-media. The message in Steganography may or may not be encrypted. If it is encrypted, then a cryptanalysis technique is applied to extract the message. 2.2 Combination of Steganography and Cryptography

Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. Steganography in the modern day sense of the word usually refers to information or a file that has been concealed inside a digital Picture, Video or Audio file. What Steganography essentially does is exploit human perception; human senses are not trained to look for files that have information hidden inside of them. Generally, in Steganography, the actual information is not maintained in its original format and thereby it is converted into an alternative equivalent multimedia file like image, video or audio which in turn is being hidden within another object. This apparent message is sent through the network to the recipient, where the actual message is separated from it.

Those who seek the ultimate in private communication can combine encryption and Steganography. Encrypted data is more difficult to differentiate from naturally occurring phenomena than plain text is in the carrier medium. There are several tools by which we can encrypt data before hiding it in the chosen medium. In some situations, sending an encrypted message will across suspicion while an invisible message will not do so. Both methods can be combined to produce better protection of the message. In case, when the Steganography fails and the message can be detected, it is still of no use as it is encrypted using cryptography techniques.

3. Types of Steganography Methodology We have four types of Steganography methodology these are showing in this figure

2. Steganography and Cryptography 2.1 Comparison of Steganography and Cryptography Steganography and cryptography are closely related. Cryptography scrambles messages so it can’t be understood. Steganography on the other hand, hide the message so there

But in this paper we will discuss about video Steganography.

Volume 2 Issue 8, August 2013 www.ijsr.net

106


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.