Hi, I am looking for someone to write an article on digital crime investigation and features of steganography and steganalytical techniques Paper must be at least 2250 words. Please, no plagiarized work! In steganography, important information is firstly hidden in host data such as text, digital video, audio, or image, and then secretly transmitted to the intended receiver. On the other hand, Steganalysis refers to the art and science of detecting the existence of or where steganography has been used. This paper critically reviews both Steganography and Steganalysis, and analyses the different techniques and approaches used to implement steganography using digital text, video, image, or audio. various techniques of Steganalysis are also discussed. This paper also introduces some recent algorithms and shows how they have developed, and how currently used techniques are related to Computer Vision and Image Processing.
Usually, Steganography-the art and science of secret communication-is confused with cryptography. they are related in many aspects including information hiding and communication security, but cryptography and steganography not the same. The main aim of steganography is to hide a secret message in a cover-media, in a way that the presence of the hidden message cannot be easily discerned by those without correct access rights. simply put, steganography refers to hiding one piece of information within another piece of information. As opposed to steganography, the presence of a cryptographic message can easily be discerned through causal observation, since messages are usually scrambled to hide it. Thus, the biggest advantage of steganography is the fact that secret messages transmitted this way are literally non-observable. The downside of this is that steganography requires the use of a big magnitude of overhead just to hide a very small amount of information. However, in order to make a steganography system more secure and productive, encryption and compression techniques can always be applied. In fact, many current steganography applications utilize these systems to come up with a robust system. an important necessity given that a discovered or discerned steganography system is no longer useful (Bhattacharyya et al. 2011). .