Image Steganography and Global Terrorism

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 2

Abstract

 This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using Matlab Simulation Environmen

Authors and Affiliations

Kaustubh Choudhary

Keywords

Related Articles

A survey on Fully Homomorphic Encryption

Abstract:Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data...

 THD Reduction in Multilevel Inverters Using Real-Time Algorithm

 Multilevel inverters have been widely applied industries. A family of optimal puisewidth modulation (PWM) methods for multilevel inverters, such as step modulation, can generate output voltage with less harmonic...

 Issues and Challenges in Distributed Sensor Networks- A Review

 Abstract:Distributed Sensor networks (DSN) is an emerging technology and have great potential to beemployed in critical situations like battlefields and commercial applications such as process management,health car...

 Graphical Password Strength in Cloud Computing

Abstract: In a Network we have various issues to work with our services & data (maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resour...

 Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Abstract: The escalation of internet has increased the usage of multimedia contents for wide range of functions. The easy access of the digital contents paves way to manipulate, edit and duplicate the contents using av...

Download PDF file
  • EP ID EP114918
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Kaustubh Choudhary (2012).  Image Steganography and Global Terrorism. IOSR Journals (IOSR Journal of Computer Engineering), 1(2), 34-48. https://europub.co.uk/articles/-A-114918