Image Steganography and Global Terrorism
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 2
Abstract
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using Matlab Simulation Environmen
Authors and Affiliations
Kaustubh Choudhary
Analysis of Rayleigh Quotient in Extrapolation Method to Accelerate the Computation Speed of PageRank
The development of techniques for computing PageRank efficiently for Web-scale graphs is very important since computing a PageRank vector of Web graphs containing a billion nodes can take several days. Previous m...
A Generalized Study on Encryption Techniques for Location Based Services
Abstract: Location-based service (LBS) is the concept that denotes applications integrating geographic location (i.e., spatial coordinates) with the general notion of services. Examples of such applications include...
Iris recognition by using blood vessel segmentation
Abstract: Among the various biometrics technologies, iris recognition is the most reliable and accurate biometric identification system available. In this paper a novel framework for recognizing and identifying iris is b...
M-Wallet Security using Cued Click Points
Abstract: The main goal of this paper is to provide higher level of security by using graphical password authentication scheme. Text passwords are easily broken by various intruders and may hack all confidential in...
A Comparative Study of Contrast Enhancement using Image Fusion
Abstract: Image enhancement is used to improve the visual quality of an image. In this paper a different approach on image fusion has been described for image enhancement. The two main algorithms involved in this...