Please enable JavaScript.
Coggle requires JavaScript to display documents.
INFORMATION HIDING TECHNIQUES - Coggle Diagram
INFORMATION HIDING TECHNIQUES
Steganography
definition
A practice of concealing a message within another message or a physical object . In computing, a computer file, message, image, or video is concealed within another file, message, image or video.
types of steganography
steganography in text / documents
Hiding information inside the
text files
steganography in images
Hiding the data by taking the cover
object as the image
steganography in audios
The secret message is embedded into an
audio signal which alters the binary sequence
of the corresponding audio file.
steganography int TCP / IP packet
Embedding information within network control
protocols used in data transmission
Steganography in video
Hide data into digital video format
purpose
a method of transmitting news and information without being restricted or fearing that the messages may be intercepted and traced back to us.
The purpose of steganography is convert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication.
Examples
Playing a video at a faster frame rate to unveil a hidden message.
Inserting a message in the red, green, or blue channel of an RGB image.
Playing an audio track backward to reveal a hidden message.
Encrypting a message or image within a photo through the addition of noise or sound.
Hiding information with the file header or metadata.
Cryptography
PURPOSE
Encryption prevents unauthorized party from discovering the contents of a communication. It keeps the communication secure
VISIBILITY
Always visible.
DEFINITION
The art and science of secret writing. A technique to convert the secret message into other than human readable form. Example method is transforming ordinary plain language into unintelligible text, and vice versa, is known as cryptography.
SECURITY
Relies on the confidentiality of key. Once it has been discovered no one can easily get the secret data.
SECRET MESSAGE
It is unreadable, understandable, opaque and data is scrambled.
SYMMETRIC KEY
stream cipher and block cipher
ASYMMETRIC KEY
RSA , DSA, ECC
Watermarking
Type of Watermarking
Invisible Watermarking
This watermarking can't be seen by the eyes
Invisible watermark is embedded into the data in such a way that the changes made to pixel values are noticeable
Invisible watermark is used as evidence of ownership and to detect tampered images
Visible Watermarking
Visible watermarking is the process of embedding data into a multimedia object (video/image) such that the embedded watermark is perceptible to a human observer
Invisible watermarks generally use image files because they use a lot of pixel data, so changing a pixel here and there does not degrade the picture
Dual Watermarking
a combination of a visible watermark and an invisible watermark
The practice of embedding data (watermark) into a multimedia object (video/image) in such a way that the embedded watermark is visible to a human observer is known as visible watermarking.
a sort of steganography in which information is hidden in a medium in order to verify ownership, integrity, or provide more information.
Definition
Watermarking is to hide a message in some audio or video data to obtain a new data,but if the data is visible it can't not be remove or replace