David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 161–168, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2217
Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw
Ambedkar Institute of Advanced Communication Technologies and Research,
Delhi, India
nsingh1973@gmail.com,
bhoopeshcse@yahoo.com,
rsrao08@yahoo.in
ABSTRACT
This paper presents study about how to hide the useful information and give the superficial
knowledge of Steganography, compare encryption, and cryptography. This paper describes the
present, past and future of Steganography. In this paper, we introduce Steganalysis for
computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime
and computer crime. With the help of Steganalysis, it detect the hide message which is transfer
in the network. Furthermore, we have described the security system classification.
KEYWORDS
Steganography, Steganalysis, Steganography History, Digital Image Forensics, Cryptography
1. INTRODUCTION
Information security is most challenging issues nowadays. Information or message is being
exchanged over various types of network. Communication channel is not secure due to the
presence of hacker who is waiting for a chance to gain access the confidential data then use this
technique to secure the information or messages is called Steganography. Steganography is a
process of concealing the massages in a cover without leaving a remarkable trace is known as
Steganography. To detect the hidden message in Steganography is Steganalysis. It is an art and
science of detecting messages hidden using Steganography. It is used to detect and to identify
suspected packages, determine whether they have a payload encoded into them, or not and, if
possible, recover that payload. Steganalysis is the technique for searching and finding the
occurrence of message which is hidden [11]. Steganalysis as destroying the information which is
kept secret it can be performed even if there is no idea of secret information. However forensic is
about searching the information. Sometime it is reasonable to do so. It is due to the reason
because sometime finding secret information is very tough and sometime not possible without
having knowledge of concept which was used for stegnography. Even if you discover the tool
which was used for stegnography finding the secret information is still very tough because most
technique employ the cryptographic technique to scramble the secret text. This scheme was
possible in classical Steganography system where the security depends on the secrecy of encoding