Monday, October 30, 2017

Critique of A Review Article



Every day throughout history they have found technology changes as fast as you can buy the latest hardware or software.  Information security is actually quite younger than computers, as it was not needed immediately after their creation.  As the technology continues to rapidly evolve and develop so quickly, it is becoming difficult to keep up with the required internet security changes.  Originally, cryptography was used on a regular basis for encryption between users when messaging one another.  Although cryptography has now become inadequate over time.  This security vulnerability within cryptography of requiring a secret key allows a hacker the ability to decipher it easily.  Once the risks were found in cryptography due to the rapid growth in technology and the average humans understanding, steganography was developed in its place.  When utilizing steganography for communication it would embed the message within a cover medium, such as an image.
As the author discusses the techniques of image steganography, there is an introduction, comparison, background, reason, history, classification, benefits, drawbacks, just to name a few.  Throughout this article Chugh achieves displaying the resources to the readers, through the many strengths and weaknesses that will be dissected and explained.  Dissected information may include material, such as the data and sources provided, grammar, structure, authors argument, ideas, and support; as this article will be examined, evaluated, and reviewed entirely.  As image steganography studies and techniques are reviewed by Chugh, to provide a full review and explanation of the image steganography techniques available today.  When reading the article, it is obvious that he clearly utilized multiple sources such as studies, surveys, and journals.  Luckily, he was able to quote these resources well throughout his own article to strengthen the ideas of image steganography.
Providing the readers with background information on steganography such as the history of the word, originating from Greek meaning “covered or protected”, and rapid growth history.  As Chugh argues his point regarding history, “Due to the prohibition and restriction imposed by the government on cryptographic systems, steganographic technologies are a very important part of the future […]. (Chugh, 2013)”, this makes internet security growth very difficult to keep up with..  Chugh then recommends the argument towards the interest in image steganography when, “Publishing and broadcasting industries have become interested in techniques for hiding encrypted […]” (Chugh, 2013).  Steganography in general has actually been around a lot longer than you would have imagined dating back to 1499, as information hiding was extremely messy but useful for many reasons.  Chugh mentions many known historical figures who used some sort of information hiding (steganography) to send hidden message to another person.  Although, in the technological world today, there are many more ways to utilize steganography than there were in the 1800’s.  There are a total of four steganography categories, text, images, audio/video, and protocol; Chugh lists these out as a numerical list it allows the reader to see these clearly.  A small section mentions the process of steganalysis which is cracking the steganographic process, also known as hacking.
 As we move further along, Cugh’s strengthens his argument by discussing image steganography in further detail.  There are many diagrams to assist the readers understanding with the information given.  Image Steganography can be utilized by hiding information such as data in text, images, audio files, and in protocols.  The concept well known in the technical world of “What You See Is What You Get” applies in Image Steganography as well.  There are only two steps in the steganography system and it is completed.
Image steganography can be checked for effectiveness by comparing the stego image with the cover image.  To determine the effectiveness, the following are some factors that can be checked, robustness, imperceptibility, payload capacity, PSNR, MSE, SNR, NCC, and BER.  As shown in Cugh’s article in Figure 4, the two most popular schemes used for image steganography are spatial domain and transform domain.  Cugh continues to strengthen his article by providing more information on image steganography and different techniques.  Such as the Least Significant Bit Method, Masking and Filtering, Parity Checker Method, Gray Level Modification, Pixel value Differencing technique, Algorithms and Transformations, and each has their own advantages and drawbacks provided.  Similar there are benefits and drawbacks of steganography also, it would be beneficial to utilize cryptography with steganography.
Cugh provides readers with a current list of applications that utilize image steganography to give them an idea as to what we could do if it was progressed any further in the future.  Image steganography only hides the message, it does not actually encrypt the message, we would need to utilize cryptography with steganography to gain that ability.  Copyright Protection, which is used to ensure everyone knows that the steganography “item” is owned.  Feature Tagging, is similar to tagging on Facebook except it would be embedded, so it would contain the user or name of person and possibly their location.  Digital Watermarking is the ability to embed a digital watermark inside of an image in order for someone to verify the full authenticity.  The worst application yet, use by terrorists, steganography is and can be used at an extremely large scale by terrorist to hide messages secretly to spread terrorism across the country. (Chugh, 2013)
References
Chugh, G. (2013). Image Steganography Techniques: A Review Article. Acta Technica Corviniensis - Bulletin Of Engineering, 6(3), 97-104.

No comments:

Post a Comment

Binary Conversions

The conversion of numbers is common in mathematics and has been used for many generations.   During the creation of computers number co...