In: Computer Science
What would be a good Topic for a Dissertation in Cyber Security in 2020
Create a 750-word document that includes the following:
An opening paragraph introducing the topic and the reasons why you chose the topic.
A summary of each of the articles you used that provide support for further research on the topic you chose. Include in the summary information on why the article supports further research. Each summary should be approximately 100 words in length.
A concluding paragraph that summarises the need for further research in your chosen topic.
Step(1)
Ok I go with a Steganography, i think it is Very Hot topics in the field Of Cyber Security and Lot's of Research Work are already going on But Still There are Lot's of thing to explore.
Step(2)
Introduction
In today's information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raise concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information.
Steganography combined with encryption will be a powerful and efficient tool that provides high level of security.
A review on steganography research and development throughout the year will be discussed in part 2 of this paper. The review will be focusing on Muslim world and narrowing it down to Middle East countries. The review includes past, current and future research on steganography and the possible future research on the latest algorithm and technologies in steganography.
Step(3)
Steganography History
The word Steganography comes from the Greek origin that means “concealed (covered) writing”. The word steganos means “covered or protected” and graphie means “writing”. Steganography thus not only emphasize on the art of hiding information but also the art and science of hiding the communication that take place. First applications of Steganography were documented by Herodotus, a Greek historian. Steganography can be traced back to ancient Greek centuries when the message is tattooed on the messengers shaved heads. The hair then grows to hide the message. Their head will be shaved when they reach the recipient of the message.Another steganography method that was used during those days is tablet wax. In order to hide the message, the tablet was erased by wax and text was etched on and then again covered it by wax and appeared blank upon inspections.
During the century, the methods of using invisible inks were extremely popular. During the World War II where people used ink for writing hidden messages, this was true . The mixture will turn darker and the written message becomes visible upon heating. After some time, the Germans introduced the microdot technique where microdots are considered as photographs as small as a printed period, but with a clear format of a typewritten page. They were included in a letter or an envelope, and because of their tiny sizes, they could be indiscernible. Microdots were also hidden in body parts including nostrils, ears, or under fingernails.The military and several governmental agencies are looking into steganography for their own secrettransmissions of information. They are also desirous of discerning secret information communicated by criminals, terrorists, and other aggressive forces. Following investigations into the Al‑ Qaeda attack, steganography was suspected to be made use of in their attack of the World Trade Centre.
Step(4)
Steganography Features And
Application
Steganography can be used in a lot of useful applications. For example copyright control of materials, to enhance the robustness of an image search engines and smart identity cards where the details of individuals are embedded in their photographs. Other applications include video-audio synchronization, TV broadcasting, TCP/IP packets where a unique ID is embedded in an image to analyse the network traffic of particular users. Medical Imaging Systems is one of the modern applications that use Steganography where a separation is recommended between patients‟ image data or DNA sequences and their captions for security or confidentiality reasons. Thus, embedding the patient‟s information in the image could be a security measure to help solving security issues .Digital technologies have swept the confidence in the integrity of visual imagery; a matter that motivated researchers to conduct research on digital document forensics. In 2009, Cheddad and his colleagues propose a steganographic scheme which protects scanned documents from forgery using self-embedding techniques. It also allows legal or forensics experts to access the original document though it is manipulated.
Step(5)
The Difference Between Cryptography and Steganography
Users on the internet have to send, share or receive
confidential data most of the time [26]. With the
increasing number of users and the increasing number of
unauthorized access of confidential data, information
security played an important role. Therefore, the main issue now is
to mitigate and to lessen the impact of the
chances of the information being detected during transmission.
Cryptography deals message encryption but the
communication is easily aroused suspicious but on the other hand,
steganography deals with secret message
hiding but the communication is invisible. This is the major
differences between cryptography and
steganography.
It is often thought that by encrypting the traffic, the
communications will be secured but this has not been adequate in
real live situation. In cryptography method, people become aware of
the existence of information by observing coded information,
although they are unable to comprehend the information.
Steganography hides the existence of the message so that intruders
can‟t detect the communication and thus provides a higher level of
security than cryptography. Both steganographic and cryptographic
systems provide secret communications but different in terms of
system breaking. If the intruder can read the message in
cryptographic then it is broken but steganographic is considered
broken once the intruders detect the existence of the secret
message. Steganography system is more fragile than
cryptography systems in terms of system
failure. This is because if the communication is detected even
without decoding the message, a steganographic
system is considered a failure.
Step(6)
Future Work
As steganography continue on its evolutionary path, the world of
information security looks forward in the
future research regarding the field of steganography as modern
encryption algorithms are broken. Some of the
future researches include:
1. Steganalysis that is defined as a process to crack the cover object in order to get the hidden information.
2. Combining the technology of cryptography with steganography to achieve a higher level of f security that even the intruder detects the hidden message, the message cannot be decoded.
3. Researchers continue to discover new platforms that could potentially use to hide information apart from the traditional platforms such as audio, video and images.
4. The concept of using DNA computing in the fields of
cryptography and steganography has been identified as a possible
technology for unbreakable algorithms.
Step(7)
Conclusion
As per conclusion, this paper discussed an overview of
Steganography, the features and applications, history and how it's
differs from cryptography. and also highlighted a review
of research and development of Steganography in world from the year
2010 to 2020. and also suggested a few for future research like
Steganalysis, technology combined, discover new platform and
possible unbreakable algorithms.