Professional Documents
Culture Documents
STEGANOGRAPHY
STEGANOGRAPHY
Prepared By:
Rahul Chavan 11
Aditi Deolekar 12
Kimaya Dhanawade 13
Ankush Bhat 69
Submitted to:
(Department Of Humanities)
We have put in a lot of effort and dedicatedly worked towards completing this report. However,
this would not have been possible were it not for the constant motivation and encouragement that
we received from the teaching as well as non teaching faculty of our college. We would like to
express our heartfelt gratitude to our Principal Prof. Dr. Sandeep Joshi for providing a platform
for us students to showcase our skills and knowledge. We are thankful to The Department of
Computer Engineering and our Head Of Department Prof.Sharvari Govilkar for providing us
with the necessary resources and information. We extend our thanks to the Head Of Department
of Humanities Prof. Dr. Malavika Sharma and our Business Communication and Ethics teacher
Prof. Darshana Pachkawade for the constant supervision and guidance during the process of
report making. We would like to thank all the Lab Assistants and the Librarians for providing us
with the latest softwares and references required. We would also like to expand our deepest
gratitude to all those who have directly and indirectly guided us in completing this project.
I
Summary
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are more
complex than others and all of them have respective strong and weak points. Different
applications have different requirements of the steganography technique used.For example, some
applications may require absolute invisibility of the secret information, while others require a
larger secret messages to be hidden. This message hides message within the image. For a more
secure approach, the project it allows user to use the bits for replacement instead of LSB
replacement from the image. Sender select the cover image with the secret text or the text file
and hide it in the image with the bit replacement choice, it helps to generate the code. The stego
image is sent to the destination with the help of private or public communication network. On the
other side i.e. receiver. Receiver download the stego image and using the software retrieve the
secret text hidden in the stego image.
II
Table Of Contents
Acknowledgement I
Summary II
1. Introduction 1
2. Literature Review 3
3. Methodology 5
4. Process 6
5. Aspects of Steganography 7
6. Algorithms 11
8. Applications 17
References III
Appendix IV
Index V
Chapter 01
Introduction
Steganography is a Greek word which means concealed Writing. The word steganos means
covered and graphical means writing. Thus it is not only an art of hiding data but also hiding the
fact of transmission of secret data.
The art and science of hiding information by embedding messages within other, seemingly
harmless messages. Steganography works by replacing bits of useless or unused data in regular
computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of
different, invisible information. Steganography techniques can be applied to images, a video file
or an audio file. Typically, however, steganography is written in characters including hash
marking, but its usage within images is also common. At any rate, steganography protects from
pirating copyrighted materials as well as aiding in unauthorized viewing.
1
History
The first recorded uses steganography can be traced back to 440 BC when herodotus mentions
two examples in his histories. Histiaeus sent a message to his vassal, by shaving the head of his
most trusted servant, marking the message on his scalp and sent him back as he regrow his hair.
Additionally, wax tablets were in common use then as reusable writing surfaces. Hence forth
according to changing lifestyles and new techniques meaning and methods of steganography
changed over the time.During World War 2, many agents used so called microdots. A whole
document was reduced to the size of a dot. Steganography also includes all kinds of invisible
inks.
With the development of technology, possibilities of data hiding information in digital pictures.
All pixels in digital pictures are coded using a specified amount of bits and usually it's
impossible to notice the changing of least important bits.sans definite proof, that the terrorists
who plotted and deployed the 9/11 mission in New York City utilized steganography. This is
what primarily brought the science of stenography front and center. Data can be stolen and
encrypted through a file transfer or, more often than not, through email. And as with what has
been suspected for 9/11, steganography can be used for secret communications that deal with
terrorist plots.
2
Chapter 02
Literature Review
Parmar Ajit Kumar Maganbhai1 , Prof. Krishna Chouhan published a paper named ‘A Study and
Literature Review on Image Steganography’ studied for improving the steganalysis performance
and also analyzing the hiding capacities of the existing research work. The steganalysis
performance of state-of-the-art detectors is near-perfect against current steganographic schemes.
A novel, robust and secure hiding schemes that can resist steganalytic detection must be
implemented. Hiding schemes are characterized by three complementary requirements- security
against steganalysis, robustness beside distortions in the transmission channel, and capacity in
terms of the embedded method. This work would be able to be extended for different formats of
images. This work may be extended using other transforms methods also. R
In the year of 2013 Soni, A.; Jain, J.; Roshan, R., The Fractional Fourier transform (FrFT),
Investigated on as a generalization of the classical Fourier transform, introduced years ago in
mathematics literature.
In 2012 Hemalatha, S, Acharya, U.D. and Renuka presented integer Wavelet Transform (IWT) is
used to hide the key thus it is very secure and robust because no one can realize the hidden
information and it cannot be lost due to noise or any signal processing operations. Result shows
very good Peak Signal to Noise Ratio, which is a measure of security.
Marvel et al. It is proposed that (Spread Spectrum Image Steganography) SSIS is a blind scheme
where the original image is not needed to extract the hidden information unless the receiver
possesses the secret key to extract the secret message, otherwise it is virtually undetectable.Thus
making this technique reliable and secure.
Jessica Fridrich et al. This paper proposes a highly accurate steganalysis technique which can
3
even estimate the length of secret message embedded in LSB method. In this method, the test
image is divided into groups of n consecutive or disjoint pixels. This method exploits the
modified pixel values to determine the content of secret message. A discriminating function is
applied on the group of pixels. This discriminating function determines the regularity or
smoothness of pixels. Then a permutation function called flipping is applied on the pixel groups.
By using discriminating function and flipping, Pixels groups are classified into three categories,
i.e Regular groups, Singular groups and Unused Groups. For a given mask, fraction of Regular
groups Rm and fraction of singular groups Sm are calculated. Presence of noise in the image
causes Rm to be greater than Sm.
R. Chandramouli and N. Memon, gives an analysis of various methods of LSB techniques for
image steganography.
Andrew D. Ker Detecting LSB matching steganography is quite difficult compared to the LSB
replacement steganography. In this paper Histogram characteristic function (HCF) is used for the
detection of steganography in color images, but it cannot be used for gray scale images.
4
Chapter 03
Methodology
Referring through various research papers we came across methods to encrypt sensitive
information. One of the methods was Steganography. Steganography is an ancient art but
performed in various techniques for data encryption and decryption. With change in technology
from year to year, form of Steganography changed. Hence, there are various research papers
available related to different mechanisms of Steganography. Several researches have been done
for detecting the hidden bits in digital images as well as different techniques were identified for
information hiding in images, text, audio, video to secure point to point communication. In
research we got to know that, various algorithms are proposed to perform Steganography.
Collectively, the information of project is acquired. This report is made from combining all the
information, analytical data we got from the research papers we studied.
5
Chapter 04
Process
There are different methods for implementation of Steganography. But the basic process is to
encode a message then transfer it from one place to another and decode it further from the
receiver's end. Various methods of encoding data gives us different types of steganography. LSB
is a traditional method of Steganography. Recently, the authors proposed a technique using
integer wavelet transform (IWT) along with graceful graph to offer a secure and random image
steganography with high imperceptibility.
The text file is taken as input and separated in stream of bytes. Now, each bit of these bytes is
encoded in the LSB of each next pixel. And, finally we get the final image that contains the
encoded message and it is saved, at the specified path given by user, in PNG format usingImage
IO write method. This completes the encoding process.
Hiding information inside images is a popular technique nowadays. An image with a secret
message inside can easily be spread over the World Wide Web or in newsgroups. The use of
steganography in newsgroups has been researched by German steganographic expert
NielsProvos, who created a scanning cluster which detects the presence of hidden messages
inside images that were posted on the net. However, after checking one million images, no
hidden messages were found, so the practical use of steganography still seems to be limited.
Image Steganography is the technique of hiding the data within the image in such a way that
9
prevents the unintended user from the detection of the hidden messages or data. To hide a
message inside an image without changing its visible properties, the cover source can be altered
in noisy areas with many color variations, so less attention will be drawn to the modifications.
The most common methods to make these alterations involve the usage of the least-significant
bit or LSB, masking, filtering and transformations on the cover image. These techniques can be
used with varying degrees of success on different types of image files. The project deals with
learning about the various types of steganography available. Image steganography is performed
for images and the concerning data is also decrypted to retrieve the message image. Since this
can be done in several ways, image steganography is studied and one of the methods is used to
demonstrate it. Image steganography refers to hiding information ie text, images or audio files in
another image or video files. The current project aims to use .steganography for an image with
another image using spatial domain technique. This hidden information can be retrieved only
through proper decoding technique. This encryption and decryption of the images is done using
java codes.
10
Chapter 06
Algorithms
There are two different methods for image steganography:
1. Spatial methods
2. Transform methods
In spatial method, the most common method used is LSB substitution method.
Now if we wish to embed the following 9 bits of compressed secret information: 010010011.
If we insert these 9 bits over the LSB of the 9 bytes above, we get the following sequence of bits
(where bits in red color have been modified):
01101010 11110011 00110110
01101000 11110001 00110100
01100000 11101111 00110101
Note that we have successfully hidden 9 bits but at a cost of only modifying 5, or roughly 50% of
the LSB bits.
11
LSB insertion is the easiest way to embed secret data in an image. By replacing the LSB of each
sampling bit with a binary information, LSB insertion permits for a huge amount of secret
information to be embedded. During hiding and unhiding procedure, the content of the secret
information should not be modified.
13
The compressed context of the above example is as follows:
After applying lossless LZ compression, the size of the original context is reduced from 79 bytes
to 59 bytes.
14
Chapter 07
Experimental Works and Results
Comparing cover image with stego image needs an image quality measure. Commonly used
measures are MSE, PSNR, Correlation and Histogram.
7.1 MSE
In statistics, MSE is quantifying the difference between values implied by an estimator and the
true values of the quantity being estimated. MSE measures the average of the squares of the
"errors." The MSE between cover file and stego file is calculated.
7.2 PSNR
PSNR scales the MSE according to the image range. The PSNR between cover image and stego
image is given. A higher PSNR indicates that the quality of the stego image is similar to the
cover image.
7.3 Correlation
Correlation, a best known method, not only evaluates the degree of closeness between two
functions but also determines the extent to which the cover image and the stego image are close
to each other even after embedding data. The MSE, PSNR and Correlation values for various
image file formats are shown in the Table. The results show that MSE, PSNR and correlation are
in comparison with already existing results. The MSE obtained for different file formats varies
from 2.6 to 4.0 and PSNR varies from 42.15 to 49.42 dB and 99.98% of correlation is obtained
with the proposed technique.
15
7.4 Histogram
An image histogram is a bar chart that shows the distribution of intensities in an image
16
Chapter 08
Application
Following are some applications of Steganography :
● Confidential Communication and Secret Data Storing
● Protection of Data Alteration.
● Access Control System for Digital Content Distribution
● Database Systems
● Digital Watermarking
9.1 Advantages
● The main advantages of this system is Security that it provides security to your messages
without knowing to third party.
● Number of bits have been replaced according to user or sender, therefore third party cannot
guess password.
● In steganography anyone cant jump on suspect by looking images.
● It is Reliable. Easy to use.Easy Maintenance. Normal network user can't guess image.
● System have been secured by password authentication.
9.2 Disadvantages
● Images can have attacks like diluting, nosing, contrast changes and so on.
● Number bits of pixel should be replaced by equal bits of message.If someone is
eavesdropping then there is probability of message get unfold.
● If more than two people having same steganography software then hidden massage can
acquire.
● This software has been implemented by java, which is open source, therefore code is
readable so anyone with bad mentality can make software perform inverse operation.
● Only unintended user may know the actual working of software.
● Intruder may penetrate suspecting images to get hidden data.
17
Chapter 09
Conclusion and Future Scope
It is observed that through LSB Substitution Steganographic method, the results obtained in data
hiding are pretty impressive as it utilizes the simple fact that an image could be broken up to
individual bit-planes each consisting of different levels of information. It is to be noted that as
discussed earlier, this method is only effective for bitmap images as these involve lossless
compression techniques. But this process can also be extended to be used for color images
where, bit plane slicing is to be done individually for the top four bit-planes for each of R. G, B
of the message image.It is also important to discuss that though steganography was once
undetected, with the various methods currently used, it is not only casy to detect the presence but
also retrieving them is easier. For instance, without having to use a software or complex tools for
detection, simple methods to observe if an image file has been manipulated are:
1. Size of the image: A Steganographic image has a huge storage size when compared to a
regular image of the same dimensions. Le if the original image storage size would be few KBs,
the Steganographic image could be several MBs in size. This again varies with the resolution and
type of image used.
2. Noise in image: A Steganographic image has noise when compared to a regular image. This is
the reason why initially little noise is added to the cover image, so that the Steganographic image
doesn't appear very noisy when compared to the original cover image.
Future Scope
Steganography, though is still a fairly new idea. There are constant advancements in the
computer field, suggesting advancements in the field of steganography as well. It is likely that
18
there will soon be more efficient and more advanced techniques for Steganalysis. A hopeful
advancement is the improved sensitivity to small messages. Knowing how difficult it is to detect
the presence of a fairly large text file within an image, imagine how difficult it is to detect even
one or two sentences embedded in an image! It is like finding a microscopic needle in the
haystack. What is scary is that such a small file of only one or two sentences may be all that is
needed to commence a terrorist attack. In the future, it is hoped that the technique of Steganalysis
will advance such that it will become much easier to detect even small messages within an
image.
In this work it explores only a small part of the science of steganography. As a new discipline,
there is a great deal more research and development to do. The following section describe areas
for research which were offshoots of. or tangential to our main objectives.
1. Detecting Steganography in Image Files: Can steganography be detected in images files? This
is a difficult question. It may be possible to detect a simple Steganographic technique by simple
analyzing the low order bits of the image bytes If the Steganographic algorithm is more complex,
however, and spreads the embedded data over the image is random way or encrypts the data
before embedding, it may be nearly impossible to detect
2. Steganography on the World Wide Web: The world wide web(www) makes extensive use of
inline images. There are literally millions of images on various web pages worldwide. It may be
possible to develop an application to serve as a web browser to retrieve data embedded in web
page images. This stego-web could operate on top of the existing WWW and be a means of
covertly disseminating information.
3. Steganography in printed media:If the data is embedded in an image, the image printed, then
scanned and stored in a file can the embedded data be recovered? This would require a special
form of steganography to which could allow for inaccuracies in the printing and scanning
equipment.
19
References
Abhijeet Khire, “Steganography” , “Optics studies” final report.
Madhusudan Joshi, Chandra Shakhar, Kehar Singh, “Image encryption using chaos and radial
Hilbert transform”, ICOP - International Conference on Optics and Photonics, November 2009.
Narendra Singh, Alok Sinha, “Optical image encryption using fractional fourier transform and
chaos”, Optics and Lasers in Engineering”, Vol. 46 Issue 2, pp 117 – 123, February 2008.
Soni, A.; Jain, J.; Roshan, R., "Image steganography using discrete fractional Fourier transform,"
Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on , vol., no.,
pp.97,100, 1-2 March 2013.
Thenmozhi, S.; Chandrasekaran, M., "Novel approach for image steganography based on integer
wavelet transform," Computational Intelligence & Computing Research (ICCIC), 2012 IEEE
International Conference on , vol., no., pp.1,5, 18-20 Dec. 2012.
III
Appendix
● carrier: The file or signal use to hide and transmit the payload. (see cover)
● channel: The input into the steganography system, such as an image.
● cover: The media object in which the hidden message (payload) will be transmitted.
"Cover" refers to this piece of media before it is embedded with secret data. Such images
are specifically called "cover images" and texts are specifically called "covertexts"
● double-steging: A specific steganography-jamming technique that involves applying
steganography to a media object thought to be a stego-object with the intention of
destroying the originally embedded message.
● plaintext: An unembedded, unencoded message.
● payload: The message to be transmitted.
● stego-object: The media object after the hidden message has been embedded within it.
Called "stego text" when embedded in text and "stego image" when embedded in an
image.
● steganography-jamming: A general steganalysis tactic whereby the steganalysis seeks to
destroy the hidden message without actually uncovering it.
IV
Index
C Cryptography : 3,4
D Digital : 2, 3 ,19, 20
Decoder : 5, 7, 9
W Watermarking : 4,8