Image Steganography and Global Terrorism

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 2

Abstract

 This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims to generate interest among the scientific community about Image steganography so that experts from multiple disciplines may join hands for devising better steganalysis techniques against the global terrorism. In this paper a basic digital image is analyzed and based on this analysis an LSB based steganographic algorithm is designed. Using this algorithm a software is developed and its performance is compared with various other steganographic tools available on the internet. The result of this comparison explains us why steganography is so much preferred by terrorists. Various images and image related tables used in this paper are generated using Matlab Simulation Environmen

Authors and Affiliations

Kaustubh Choudhary

Keywords

Related Articles

Review of The Image Compression And Enhancement Techniques

Abstract: The image processing is used in order to enhance the image. The image processing will reduce the noise from within the image. The noise will reduce the clarity of the image. There could be many reasons by which...

 Neural Network for Solving Job-Shop Scheduling Problem

 Abstract: The job shop scheduling is a very important scheduling problem, which is NP-complete in the strongsense and with well-known benchmark instances of relatively small size, which attest the practical difficu...

 VLSI Implementation of High Speed & Low Power Multiplier in FPGA

 We known that different multipliers consume most of the power in DSP computations, FIR filters. Hence, it is very important factor for modern DSP systems to built low-power multipliers to minimize the power &nbsp...

 Improving Cloud Security Using Data Mining

 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes...

NLP for Automated Conceptual Data Modeling

Abstract:One of the procedures for obtaining the better understanding of the system by splitting the large system into smaller parts, this procedure is termed as analysis. Manually creating softwareartifacts and building...

Download PDF file
  • EP ID EP114918
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Kaustubh Choudhary (2012).  Image Steganography and Global Terrorism. IOSR Journals (IOSR Journal of Computer Engineering), 1(2), 34-48. https://europub.co.uk/articles/-A-114918