0% found this document useful (0 votes)
20 views19 pages

E-Commerce and Cyberlaw Assignment

The document discusses digital watermarking and steganography, focusing on their applications in protecting intellectual property and financial information. It outlines the techniques used to embed data in various media types, the lifecycle phases of digital watermarking, and the classification of watermarks based on robustness and perceptibility. Additionally, it highlights the differences between steganography and cryptography, emphasizing their roles in secure data transmission and copyright protection.

Uploaded by

Itachi Uchiha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views19 pages

E-Commerce and Cyberlaw Assignment

The document discusses digital watermarking and steganography, focusing on their applications in protecting intellectual property and financial information. It outlines the techniques used to embed data in various media types, the lifecycle phases of digital watermarking, and the classification of watermarks based on robustness and perceptibility. Additionally, it highlights the differences between steganography and cryptography, emphasizing their roles in secure data transmission and copyright protection.

Uploaded by

Itachi Uchiha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

0

INDEX

S.NO TITLE PAGE NO


1 ABSTRACT 1
2 INTRODUCTION 2
3 DIGITAL WATERMARK 2-3
4 HISTORY 3
5 APPLICATION 3-4
6 DIGITAL WATERMARKING LIFESTYLE PHASES 4-5
7 CLASSIFICATION 5-6
8 STEGANOGRAPHY 6-7
9 DIFFERENT TYPES OF STEGANOGRAPHY 7-9
10 STEGANOGRAPHY VS CRYPTOGRAPHY 9-10
11 HOW IT IS DIFFERENT FROM OBFUSCATION? 11
12 STEGANOGRAPHY TECHNIQUES 11-12
13 STEGANOGRAPHY TOOLS 12
14 ADVANTAGES 12-13
15 VARIOUS ASPECTS OF STEGANOGRAPHY 13-15
16 STEGANOGRAPHY IN ONLINE PAYMENT SYSTEM 15
17 COUNTERMEASURES 15-16
18 CONCLUSION 16
19 SUGGESTION 17
20 REFERENCE 18
1

ABSTRACT:

Steganographic techniques are used to embed financial information or authentication information within
an image, audio, or video file using a quantization table and/or other filter. The file is then transmitted over an
insecure network, such as a GSM cell phone network, and a server extracts the information from the image,
audio, or video using the same quantization table and/or filter. Multiple sets of information, such as telephone
numbers and/or payment account numbers, are extracted from the same image by those entities possessing the
appropriate keys. The filters and tables used to embed financial information can be updated periodically or
according to events. A video of images, some with embedded information, some with ‘dummy’ data, can be
used to hide information over insecure networks for payment transactions.

Also In this paper, we focus on important role of digital watermark in electronic commerce applications.
Results show that watermarks for video and audio data have to be invisible and robust, and watermarks for text
data has to be invisible and fragile, while watermark for image has to be either visible and fragile, or invisible
and robust for electronic commerce applications. The watermark is used to protect intellectual property in
electronic governance and electronic commerce applications. This facilitates electronic commerce application
developers to select adequate digital watermarking techniques for their development.
2

DIGITAL WATERMARKING AND STEGANOGRAPHY

Introduction:

Digital Watermarking is use of a kind of marker covertly embedded in a digital media such as audio,
video or image which enables us to know the source or owner of the copyright. This technique is used for
tracing copyright infringement in social media and knowing the genuineness of the notes in the banking
system. The information needs be embedded in the media. The signal which is embedded is the host signal
and the information is called digital watermark. The process has 3 main parts: Embed – In this part, the
digital signal is embedded with the digital watermark. Attack – The moment when the transmitted media is
changed, it becomes a threat and is called an attack to the watermarking system. Protection – The detection
of the watermark from the noisy signal which might have altered media (JPEG compression, rotation,
cropping, and adding noise) is called Protection. On the other hand, Steganography is the technique of hiding
secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is
then extracted at its destination. The use of steganography can be combined with encryption as an extra step for
hiding or protecting data. The word steganography is derived from the Greek
words steganos (meaning hidden or covered) and the Greek root graph (meaning to write).Steganography can
be used to conceal almost any type of digital content, including text, image, video or audio content; the data to
be hidden can be hidden inside almost any other type of digital content. The content to be concealed through
steganography -- called hidden text -- is often encrypted before being incorporated into the innocuous-
seeming cover text file or data stream. If not encrypted, the hidden text is commonly processed in some way in
order to increase the difficulty of detecting the secret content.

Digital watermark:

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video
or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the
process of hiding digital information in a carrier signal; the hidden information should, but does not need to,
contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of
the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright
infringements and for banknote authentication.

Like traditional physical watermarks, digital watermarks are often only perceptible under certain
conditions, e.g. after using some algorithm. If a digital watermark distorts the carrier signal in a way that it
becomes easily perceivable, it may be considered less effective depending on its purpose. Traditional
3

watermarks may be applied to visible media (like images or video), whereas in digital watermarking, the signal
may be audio, pictures, video, texts or 3D models. A signal may carry several different watermarks at the same
time. Unlike metadata that is added to the carrier signal, a digital watermark does not change the size of the
carrier signal.

The needed properties of a digital watermark depend on the use case in which it is applied. For marking
media files with copyright information, a digital watermark has to be rather robust against modifications that
can be applied to the carrier signal. Instead, if integrity has to be ensured, a fragile watermark would be applied.

Both steganography and digital watermarking employ steganographic techniques to embed data covertly in
noisy signals. While steganography aims for imperceptibility to human senses, digital watermarking tries to
control the robustness as top priority.

Since a digital copy of data is the same as the original, digital watermarking is a passive protection tool. It
just marks data, but does not degrade it or control access to the data.

One application of digital watermarking is source tracking. A watermark is embedded into a digital signal
at each point of distribution. If a copy of the work is found later, then the watermark may be retrieved from the
copy and the source of the distribution is known. This technique reportedly has been used to detect the source
of illegally copied movies.

History:

The term "Digital Watermark" was coined by Andrew Tirkel and Charles Osborne in December 1992. The
first successful embedding and extraction of a steganographic spread spectrum watermark was demonstrated in
1993 by Andrew Tirkel, Gerard Rankin, Ron Van Schyndel, Charles Osborne, and others1.

Watermarks are identification marks produced during the paper making process. The first watermarks
appeared in Italy during the 13th century, but their use rapidly spread across Europe. They were used as a
means to identify the paper maker or the trade guild that manufactured the paper. The marks often were created
by a wire sewn onto the paper mold. Watermarks continue to be used today as manufacturer's marks and to
prevent forgery.

Application:

1
A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673
4

Digital watermarking may be used for a wide range of applications, such as:

 Copyright protection
 Source tracking (different recipients get differently watermarked content)
 Broadcast monitoring (television news often contains watermarked video from international agencies)
 Video authentication
 Software crippling on screencasting and video editing software programs, to encourage users to purchase
the full version to remove it.
 ID card security
 Fraud and Tamper detection.
Content management on social networks

Digital watermarking life-cycle phases:

General digital watermark life-cycle phases with embedding, attacking and detection and retrieval functions

The information to be embedded in a signal is called a digital watermark, although in some contexts the
phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal
where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into
three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data
to be embedded, and produces a watermarked signal.

Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this
person makes a modification, this is called an attack. While the modification may not be malicious, the term
attack arises from copyright protection application, where third parties may attempt to remove the digital
watermark through modification. There are many possible modifications, for example, lossy compression of the
data (in which resolution is diminished), cropping an image or video, or intentionally adding noise.
5

Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to
extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is
present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be
able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking,
the extraction algorithm should fail if any change is made to the signal.

Classification:

A digital watermark is called robust with respect to transformations if the embedded information may be
detected reliably from the marked signal, even if degraded by any number of transformations. Typical image
degradations are JPEG compression, rotation, cropping, additive noise, and quantization. For video content,
temporal modifications and MPEG compression often are added to this list. A digital watermark is
called imperceptible if the watermarked content is perceptually equivalent to the original, unwatermarked
content. In general, it is easy to create either robust watermarks or imperceptible watermarks, but the creation
of both robust and imperceptible watermarks has proven to be quite challenging. Robust imperceptible
watermarks have been proposed as a tool for the protection of digital content, for example as an embedded no-
copy-allowed flag in professional video content.

Digital watermarking techniques may be classified in several ways:

1. Robustness:

A digital watermark is called "fragile" if it fails to be detectable after the slightest modification. Fragile
watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that
clearly are noticeable, commonly are not referred to as watermarks, but as generalized barcodes.

A digital watermark is called semi-fragile if it resists benign transformations, but fails detection after
malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations.

A digital watermark is called robust if it resists a designated class of transformations. Robust watermarks
may be used in copy protection applications to carry copy and no access control information 2

2. Perceptibility:

2
Olanrewaju, R.F. Development of Intelligent Digital Watermarking via Safe Region. Ph.D. Thesis, Kulliyyah of Engineering, International Islamic
University Malaysia, Selangor, Malaysia, 2011.
6

A digital watermark is called imperceptible if the original cover signal and the marked signal are
perceptually indistinguishable.

A digital watermark is called perceptible if its presence in the marked signal is noticeable (e.g. digital on-
screen graphics like a network logo, content bug, codes, opaque images). On videos and images, some are made
transparent/translucent for convenience for consumers due to the fact that they block portion of the view;
therefore degrading it.

This should not be confused with perceptual, that is, watermarking which uses the limitations of human
perception to be imperceptible.

3. Capacity:

The length of the embedded message determines two different main classes of digital watermarking
schemes:

 The message is conceptually zero-bit long and the system is designed in order to detect the presence or the
absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to
as zero-bit or presence watermarking schemes.
 The message is an n-bit-long stream with or and is modulated in the watermark. These kinds of schemes
usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes 3.

4. Embedding method:

A digital watermarking method is referred to as spread-spectrum if the marked signal is obtained by an


additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low
information capacity due to host interference.

A digital watermarking method is said to be of quantization type if the marked signal is obtained by
quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to
rejection of host interference.

A digital watermarking method is referred to as amplitude modulation if the marked signal is embedded
by additive modification which is similar to spread spectrum method, but is particularly embedded in the spatial
domain.

3
Zhang, F.; Zhang, H. Digital Watermarking Capacity and Reliability. In Proceedings of the IEEE International Conference on e-Commerce Technology, San Diego,
CA, USA, 9 July 2004; pp. 295–298.
7

Steganography:

A steganography technique involves hiding sensitive information within an ordinary, non-secret file or
message, so that it will not be detected. The sensitive information will then be extracted from the ordinary file
or message at its destination, thus avoiding detection. Steganography is an additional step that can be used in
conjunction with encryption in order to conceal or protect data.

Steganography is a means of concealing secret information within (or even on top of) an otherwise
mundane, non-secret document or other media to avoid detection. It comes from the Greek words steganos,
which means “covered” or “hidden,” and graph, which means “to write.” Hence, “hidden writing.”You can use
steganography to hide text, video, images, or even audio data. It’s a helpful bit of knowledge, limited only by
the type of medium and the author’s imagination.Although the technique is centuries old, it’s still useful enough
to make us justifiably pose the question, “What is steganography in cyber security?” But before we explore its
uses in today’s cyber security field, let’s get more acquainted with the overall concept by looking at some
steganography examples, then wrap things up with a fun little exercise.

Different Types of Steganography:


8

1. Text Steganography − There is steganography in text files, which entails secretly storing information. In this
method, the hidden data is encoded into the letter of each word.

2. Image Steganography − The second type of steganography is image steganography, which entails concealing
data by using an image of a different object as a cover. Pixel intensities are the key to data concealment in
image steganography4.

Since the computer description of an image contains multiple bits, images are frequently used as a cover source
in digital steganography.

The various terms used to describe image steganography include:

 Cover-Image - Unique picture that can conceal data.

 Message - Real data that you can mask within pictures. The message may be in the form of standard text or
an image.

 Stego-Image − A stego image is an image with a hidden message.

 Stego-Key - Messages can be embedded in cover images and stego-images with the help of a key, or the
messages can be derived from the photos themselves.

3. Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against
unauthorized reproduction. Watermarking is a technique that encrypts one piece of data (the message) within
another (the "carrier"). Its typical uses involve media playback, primarily audio clips 5.

4. Video Steganography − Video steganography is a method of secretly embedding data or other files within a
video file on a computer. Video (a collection of still images) can function as the "carrier" in this scheme.
4
GOU, HONGMEI, ASHWIN SWAMINATHAN, AND MIN WU. "NOISE FEATURES

FOR IMAGE TAMPERING DETECTION AND STEGANALYSIS." 2007 IEEE

INTERNATIONAL CONFERENCE ON IMAGE PROCESSING. VOL. 6. IEEE, 2007.

5
WU, JUNQI, ET AL. "AUDIO STEGANOGRAPHY BASED ON ITERATIVE ADVERSARIAL

ATTACKS AGAINST CONVOLUTIONAL NEURAL NETWORKS." IEEE TRANSACTIONS ON

INFORMATION FORENSICS AND SECURITY 15 (2020): 2282-2294.


9

Discrete cosine transform (DCT) is commonly used to insert values that can be used to hide the data in each
image in the video, which is undetectable to the naked eye. Video steganography typically employs the
following file formats: H.264, MP4, MPEG, and AVI.

5. Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP,
UDP, ICMP, IP, etc., as a cover object. Steganography can be used in the case of covert channels, which occur
in the OSI layer network model.

Steganography Examples Include:

 Writing with invisible ink

 Embedding text in a picture (like an artist hiding their initials in a painting they’ve done)

 Backward masking a message in an audio file (remember those stories of evil messages recorded backward
on rock and roll records?)

 Concealing information in either metadata or within a file header

 Hiding an image in a video, viewable only if the video is played at a particular frame rate

 Embedding a secret message in either the green, blue, or red channels of an RRB image

Steganography can be used both for constructive and destructive purposes. For example, education and business
institutions, intelligence agencies, the military, and certified ethical hackers use steganography to embed
confidential messages and information in plain sight.

On the other hand, criminal hackers use steganography to corrupt data files or hide malware in otherwise
innocent documents. For example, attackers can use BASH and PowerShell scripts to launch automated attacks,
embedding scripts in Word and Excel documents. When a poor, unsuspecting user clocks one of those
documents open, they activate the secret, hidden script, and chaos ensues. This process is a favored ransomware
delivery method.

Steganography has a huge advantage over standard cryptographic methods. When someone uses cryptography,
they’re passively calling attention to the fact that there’s secret information present in the medium in question.
10

Thus, the very presence of encrypted data tells intruders, “Aha! Here’s some secret information!”
Steganography, however, hides the sensitive information in an otherwise innocuous document. Therefore,
would-be hackers have no idea that there is anything secret and enticing in the first place.

Steganography vs. Cryptography:

It's fair to say that steganography and cryptography aim to shield messages and data from prying eyes at
their most fundamental level. However, they employ an alternative means of security.

Information is converted into unintelligible ciphertext in cryptography. Someone intercepting this


message could tell immediately that encryption was used. In contrast, steganography hides a message without
altering its original format.

Factors Steganography Cryptography

It's a method to conceal the fact that


Explanation communication is taking place It's a method for making information unintelligible

Aim Maintain communication security Enable data protection

Optional, but increases security


Key when utilized Necessary prerequisite
11

Data
Visibility No Yes

Once hidden information is


decoded, the data can be used by You can recover the original message from the
Failure anyone ciphertext if you can access the decryption key

Data Does not modify the data's general


Structure structure Modifies the overall data structure

How Steganography Differs From Obfuscation?

Obfuscation, like steganography, is defined as hiding information, but the big difference is that the former
method deliberately makes the message hard to interpret, read, or decode. That makes sense since to obfuscate
means to render something unclear, unintelligible, or obscure.

Cyber-security professionals employ obfuscation to protect sensitive information such as programming


codes. The process makes it difficult for hackers to read the codes in the first place, which in turn prevents them
from exploiting the data.

Steganography Techniques Explained:

Now that we have a better grasp on what steganography is, what forms it comes in, and who uses it, let’s
take a closer look at a sample of the available techniques.

 Secure Cover Selection:


12

Secure Cover Selection involves finding the correct block image to carry malware. Then, hackers
compare their chosen image medium with the malware blocks. If an image block matches the malware, the
hackers fit it into the carrier image, creating an identical image infected with the malware. This image
subsequently passes quickly through threat detection methods.

 Least Significant Bit:

That phrase almost sounds like a put-down, doesn’t it? However, in this case, it refers to pixels.
Grayscale image pixels are broken into eight bits, and the last bit, the eighth one, is called the Least Significant
Bit. Hackers use this bit to embed malicious code because the overall pixel value will be reduced by only one,
and the human eye can’t detect the difference in the image. So, no one is even aware that anything is amiss, and
that the image is carrying something dangerous within6.

 Palette-Based Technique:

Like the Least Significant Bit technique, the Palette-Based Technique also relies on images. Hackers
embed their message in palette-based images such as GIF files, making it difficult for cybersecurity threat
hunters or ethical hackers to detect the attack.

Steganography Tools:

Various tools or software that support steganography are now readily accessible. Though most hide
information, some provide additional security by encrypting it beforehand. You can find the following free
steganography resources online:

 Steghide: Steghide is a free tool that uses steganography to conceal information in other files, such as media
or text.

6
Devi, R. Ramya, and D. Pugazhenthi. "Ideal sampling rate to reduce

distortion in audio steganography." Procedia Computer Science 85

(2016): 418-424.
13

 Stegosuite: It is a Java-based, free steganography tool. Stegosuite makes it simple to obfuscate data in
pictures for covert purposes.

 OpenPuff: It is a high-quality steganographic tool that allows you to conceal data in other media types like
images, videos, and Flash animations.

 Xiao Steganography: To conceal information in BMP images or WAV files, use the free Xiao
Steganography tool.

 SSuite Picsel: The free portable program SSuite Picsel is yet another option for hiding text within an image
file; however, it uses a somewhat different method than other programs.

These are only a few of the steganography tools available. However, these instruments will help you achieve
your goals.

Advantages of Steganography:

Steganography is a method that makes it easy to conceal a message within another to keep it secret. The
result is that the hidden message remains hidden. A steganography approach can benefit images, videos, and
audio files. Further advantages include:

 Unlike other methods, steganography has the added benefit of hiding communications so well that they
receive no attention. However, in countries where encryption is illegal, sending an encrypted message that
you can easily decipher will raise suspicion and may be risky.

 Steganography is a form of encryption that protects the information within a message and the connections
between sender and receiver.

 The three essential elements of steganography—security, capacity, and robustness—make it worthwhile to


covert information transfer via text files and develop covert communication channels.

 You can store an encrypted copy of a file containing sensitive information on the server without fear of
unauthorized parties gaining access to the data.

 Government and law enforcement agencies can communicate secretly with the help of steganography
corporations.
14

Using steganography to deliver attacks:

These days, attacks are typically automated using PowerShell or BASH scripts. And so are hackers. Excel
and Word documents with macros enabled have been a common vector for attacks. The hidden script is
triggered when the target opens the malicious Word or Excel file.

The attacker can access the system without the victim being duped into installing Steghide. The intruder is
using a steganographic program to take advantage of widespread Windows tools like Excel and PowerShell.
Once the victim reads the document, it becomes easier for the hacker to attack the system.

VARIOUS ASPECTS OF STEGANPGRAPHY:

Artificial Intelligence and Steganography:

Hackers are also using artificial intelligence (AI). Steganography is just one of the many methods that
artificial intelligence is increasingly employing to conceal its activities. AI implementations have tweaked even
steganographic techniques to make attacks harder to detect.

Detecting Steganography:

In their line of work, security analysts look for indicators of standard attack and penetration testing
strategies (TTPs). The common signatures used by steganographic software have been uncovered over time.
Because of this, antivirus software, for example, can easily spot the common behaviors of steganographic
programs.

As a result, penetration testers and attackers constantly adjust their methods to stay undetected. Likewise,
security researchers continuously look for new signatures and attack tactics, while cybercriminals continually
adapt their tools and approaches.

Real-World Attacks That Used Steganography:

In 2020, businesses in the United Kingdom, Germany, Italy, and Japan were hit by a campaign using
steganographic documents.
15

Hackers could avoid detection by using a steganographic image uploaded on a good platform, like
Imgur, to infect an Excel document. Mimikatz, a malware that steals Windows passwords, was downloaded via
a secret script included in the picture.

Mitigating Steganography-Based Attacks:

Steganography is simple to implement during a cyber attack. However, it's much harder to prevent since
the people who pose a threat are getting more resourceful and ingenious, which makes developing
countermeasures more difficult.

Code disguised in images and other sorts of obfuscations are more likely to be discovered dynamically by
a behavioral engine. Therefore businesses should use modern endpoint protection solutions that extend beyond
static checks, elemental signatures, and other old-fashioned components.

Employees should be aware of the risk of opening image files, as they may contain viruses. In addition,
the newest security patches should be installed whenever they become available, and firms should use web
filtering to ensure their employees can safely browse the web.

Steganography in online payment system:

SYSTEM ARCHITECTURE :In this system there will be two servers, bank server (admin) and merchant
server (product admin). Product admin will add the products and product related information in its database.
Admin i.e. bank server will add users and merchant servers. User specific data includes user name, user id,
transaction password and user password. While merchant server specific data includes server id, password and
URL in the Admin's database. Client will select the product and log in to respective site. Then verification
request is sent to merchant server. Merchant server will verify the user name, user id and along with that it will
add server id, server key and send it to the bank server for the verification. Bank server will verify the server id,
server key of merchant server. If it is ok then bank server will generate one OTP through steganography. If the
merchant server is fake then it will not generate OTP. After OTP generation it will form two shares using visual
cryptography. One will be sent to the client via email and other will be sent to the merchant server. Merchant
server will send the second share to the client. After having two shares, at client side these two shares are
combined and original OTP gets generate. In phase 1, bank server will communicate with merchant server by
16

sending share1 to the merchant server. In phase 2, bank server will communicate with client by sending share2
to the client. In third phase, there is communication between merchant server and client and original OTP gets
generated by combining share1 and share2 at client side. In fourth phase, if the generated OTP is valid then
required transaction will be carried out.

Countermeasures:

Countermeasures or detection techniques against covert steganography or watermarking requires the use
of the light spectrum, magnification lenses, chemical mixtures, search algorithms, and others are used to
determine if a file has been embedded with either these techniques. The use of the light spectrum, and chemical
mixtures can only be used for hard copy works of the media files in question. Magnification lenses can be used
on both hard copies and digital copies to magnify the image to a size where the watermarked or hidden message
can be found. Search algorithms can be done by hand, however it can be quite difficult and is usually done by
computers and is the most likely used form of detection. As there are companies creating software to protect
secret messages and embed watermarks into files, there are also companies creating software to remove and
detect encoded files.

In steganography, the detection of steganographic messages is called steganalysis where the algorithm
takes the original file and compares it to the file that is thought to have the secret message. However this only
works if a known clean copy of the original is available. In digital watermarking, the technique of watermark
detection, informed detection, is used to find invisible watermarks. Watermark detection can follow the same
principle algorithm that steganalysis goes through by obtaining the original work and comparing it with one that
is believed to have the invisible watermark. Another way of detecting invisible watermarks is by blind
detection, where the detecting algorithm is provided with limited information of the original work to find the
watermark. Thus as you can see, although steganography and watermarking are very effective, there are ways
for them to be removed or detected

Conclusion:

Digital watermarking gives authentication, identification, and integrity to digital signal, and helps the
owners can use their digital assets under protection. Whereas Steganography can be used to hide virtually any
type of digital content, including text, image, video, or audio content. That hidden data is then extracted at
its destination. Content concealed through steganography is sometimes encrypted before being hidden within
another file format.
17

Suggestion:

My suggestion about digital watermarking:Techniques are needed to prevent the copying, forgery and
unauthorized distribution of images and video. In the absence of above, playing images or video sequences on a
public network puts them at risk of theft and alteration. The need for watermarking emanates from the
following: A designer has created an image and wants to make it available on the network. When unauthorized
copies or forgeries of the image appear elsewhere on the network, the designer needs to prove his/her
ownership of the image. One also needs to determine if and by how much the image has been modified from the
original. This way a person can prove ownership by illustrating the difference between the forged image and the
original. For steganography, steganography technology has yet to improve the security of e-commerce. This
technique should be customized to fit the needs of each individual e-Commerce system. Furthermore, one can
choose an encryption technique to encrypt the data based on the execution time. Likewise Steganography
method should also be used for sending data securely via the internet. The main suggestion that I may wish to
suggest is, it must provide a very safe way of communicating data to the user by using a steganography method
to obscure information.
18

REFERENCE:

www.sciencedirect.com

www.differencebetween.net

www.academia.edu

www.techtarget.com

BOOK REFERRED:

CYBER LAW IN INDIA-Dr. Farooq Ahmad

You might also like