All about Steganography and detection of Stegano Images
by Rakesh Kumar Publish: Jan 30, 2018Advice & How ToGeneral Nonfiction
Stegano images are created by technique of “Steganography”, i.e. hiding a text or picture message inside carrier image file by means of some Steganography tools such as “Securengine Pro”. The LSB’s of the carrier image are used to hide the bits of hidden message (may be encrypted). The Stegano Images are created by performing proper Steganography techniques looks same as the original carrier image. Though there are minor differences, they are illegible to human eye. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but the digital images are most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of Steganographic techniques, some are more complex than others and all of them have respective strong and weak points. We have designed an algorithm for detection of Stegano images by identifying distortion in Stegano images as compared to original image by generating their waveform by using MATLAB and C++.
BIOGRAPHY Born on 14th March 1990 to Mr. Manoj Kumar and Mrs. Anita Sharma at Ranchi. Dr. Rakesh Kumar completed his schooling from Cambrian Public School, Kanke Road, Ranchi in 2007 only, but he was not in a position to continue his higher studies due to his family’s poor financial condition. That is the reason why, he decided to start freelancing and software development in the month of December 2009 just to start his family financially. He had a strong zeal to be a Software Engineer. Then after around 2 years, he took admission in B. Tech (Computer Science Engineering) at Cambridge Institute of Technology, Tatisilwai, Ranchi. He indulged himself in Computer Science Researches there at CIT. From August 2011 – till date, he has completed 15+ successful independent researches in the field of Programming Language Design, Information Security, Cryptography, Steganography, Variable Password, Digital Image Processing, Artificial Intelligence etc. He completed his B. Tech in the year 2015. He handled many research projects of M. Tech, PhD Scholars and Foreign Clients.
Advertising Disclosure: Please note that many links to retailers are affiliate links, which yields a commission for us. allauthor.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon sites.