Please enable JavaScript.
Coggle requires JavaScript to display documents.
Digital Steganography in Computer Forensics(COMPUTER FORENSIC 1) - Coggle…
Digital Steganography in Computer Forensics(COMPUTER FORENSIC 1)
Introduction
Computer forensics is a part of digital forensics science.
involved in the discovery of latent or
hidden data within computer systems.
Examined it to save, identify, retrieve, and analyze data
for investigations into cybercrime
It depends on the extraction of evidence from the computer.
STEGANOGRAPHY TYPES
Message and carrier are the two fundamental components
in steganography
The message is the embedded data
the carrier is the object that uses the word
it requires to be more secure, especially on computer networks
The variety of multimedia formats can include an image,
audio, video, and text.
Taking the cover object as an image to conceal the information
IMAGE STEGANOGRAPHY
Images are the most common cover objects used for
steganography
An image is a collection of numbers that constitute different light intensities in different areas of the picture.
Images consist of pixels that may describe a representation
form of a grid and individual points
these pixels are visualized row horizontally by row to form an image
Each pixel uses 8 bits, which is called a bit depth.
Audio Steganography Techniques
concealing information progress rely on two
steps.
selecting the redundant bits in the sound file.
include confidential data by replacing these extra
bits with the message bits.
Phase Encoding
Spread Spectrum
Echo Data Hiding
LSB Coding and Parity Coding that were discussed in image
steganography.
Phase Encoding Technique
Sound phase components
are not sensitive to the human ear as clutter.
Phase coding is dependable
This complex with a low data transfer
rate method depends on choosing the phase ingredients
The subsequent parts stage is then adjusted.
This adjusting purpose is to maintain the relative
phase between the segments
This complex with a low data transfer
rate method depends on choosing the phase ingredients
VIDEO STEGANOGRAPHY
This is a technique in which digital video format is used to hide data
A video file that collects different image frames
is used as the carrier to cover the data
three types of differential values: lower limits, higher limits,
and widths
CONCLUSION
Steganography is used to hide confidential data in cover
media
types of cover source can be used such
as image, audio, video and text
main objective of this
paper is to identify various techniques that are reliable
have the capability improvement with a minimal loss in stego
file quality