Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

STEGANOGRAPHY

A
Seminar Report
On

“STEGANOGRAPHY”

Submitted in Partial Fulfillment of the

requirements for the award of the degree of

BACHELOR OF TECHNOLOGY

In
INFORMATION TECHNOLOGY
(2020)
Submitted By:

Akshita Srivastava (1612213010)

B.TECH (IT-81)

Under the Guidance Of

Mr. Amit Pandey

DEPARTMENT OF INFORMATION TECHNOLOGY

SHRI RAMSWAROOP MEMORIAL GROUP OF PROFESSIONAL

COLLEGES, LUCKNOW.

Affiliated to

Dr. APJ ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW.

ITPage
DEPARTMENT,
|1 SRMGPC, LUCKNOW.
STEGANOGRAPHY

TABLE OF CONTENTS

1. Introduction
.1 What is Steganography?
.2 Secret Communication Methods
.3 Evolution of Steganography

. Types of Steganography

. Steganography Techniques and Methods


.1 Steganography Techniques
.2 Steganography Methods

. Steganography Vs Other Technologies

. Implementation of Steganography

. Dissecting Steganography
.1 Amount of data stored inside a picture
.2 Steps for hiding an image using Steganography

.1 Advantages
.2 Limitations

.1 Applications
.2 Future Scope

. Conclusion

0. References
ITPage
DEPARTMENT,
|2 SRMGPC, LUCKNOW.
STEGANOGRAPHY

ABSTRACT

Steganography (a rough Greek translation of the term Steganography is secret writing) has
been used in various forms for 2500 years. Steganography is the art and science of hiding
information by embedding messages within other, seemingly harmless messages. It has found
use in variously in military, diplomatic, personal and intellectual property applications. Briefly
stated, steganography is the term applied to any number of processes that will hide a message
within an object, where the hidden message will not be apparent to an observer. This paper will
explore steganography from its earliest instances through potential future application.

This paper introduces steganography by explaining what it is, providing a brief history with
illustrations of some methods for implementing steganography. Though the forms are many,
the focus of the software evaluation in this paper is on the use of images in steganography. We
have even discussed various secret communication methods used, its comparison with
Cryptography and Digital Watermarking.

Finally, future projections on this perfect file encryption technique are made, along with few
explanations using our own software and programs.

ITPage
DEPARTMENT,
|3 SRMGPC, LUCKNOW.
STEGANOGRAPHY

ACKNOWLEDGEMENT

I thank almighty for guiding me throughout the seminar. I would like to thank all those who
have contributed to the completion of the seminar and helped me with valuable suggestions for
improvement.
I am extremely grateful to Prof. Ajay Kumar Srivastava, HOD, Department of Information
Technology for providing me with best facilities and atmosphere for the creative work
guidance and encouragement. I would like to thank my coordinator, Mr. Amit Pandey,
Department of Information Technology, for all help and support extended to me. I thank all
Staff members of our college and friends for extending their cooperation during my seminar.
Above all I would like to thank my parents without whose blessings ,I would not have been
able to accomplish my goal.

Akshita Srivastava
1612213010

ITPage
DEPARTMENT,
|4 SRMGPC, LUCKNOW.
STEGANOGRAPHY

DECLARATION

I hereby declare that the work, which is being presented in the Seminar, entitled
“Steganography” is partial fulfillment for the award of Degree of “Bachelor of Technology”
in Department of Information Technology , and submitted to the Department of Information
Technology, Shri Ramswaroop Memorial Group of Professional Colleges, Lucknow.

Akshita Srivastava
1612213010
Information Technology

ITPage
DEPARTMENT,
|5 SRMGPC, LUCKNOW.
STEGANOGRAPHY

CHAPTER 1
INTRODUCTION
Johannes Trithemius (1462-1516) was a German Abbot. His writing, “Steganographia: hoe est
ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa” is ostensibly a
work describing methods to communicate with spirits. A rough translation of the Latin title is:
“Steganography: the art through which writing is hidden requiring recovery by the minds of
men.” Although people have hidden secrets in plain sight—now called steganography—
throughout the ages, the recent growth in computational power and technology has propelled it
to the forefront of today’s security techniques.

1.1. WHAT IS STEGANOGRAPHY:

The word steganography literally means covered writing as derived from Greek.
Steganography is the art of concealing the existence of information within seemingly
innocuous carriers. In broad sense, term Steganography is used for hiding message within an
image.

The art and science of hiding information by embedding messages within other, seemingly
harmless messages. Steganography works by replacing bits of useless or unused in regular
computer (such as graphics, sound, text, or even floppy disks) with bits of different, invisible
information. This hidden information can be plain text, cipher text or even images.

Steganography dates back to ancient Greece, where common practices consisted of etching
messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's
head, letting his hair grow back, then shaving it again when he arrived at his contact point.

ITPage
DEPARTMENT,
|6 SRMGPC, LUCKNOW.
STEGANOGRAPHY

Steganography is the art and science of communicating in a way which hides the existence of
the communication. In contrast to cryptography, where the "enemy" is allowed to detect,
intercept and modify messages without being able to violate certain security premises
guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other
"harmless" messages in a way that does not allow any "enemy" to even detect that there is a
second secret message present. Steganography is in the (especially military) literature also
referred to as transmission security or short TRANSEC.

This basic design principle of steganographic systems, i.e. replacing high entropy noise with a
high entropy secret transmission, is quite obvious. There have a number of simple software
tools been published for e.g. hiding files in the least significant bits of digital images or for
transforming PGP messages into files resembling pure random byte sequences.

1.1.2 SECRET COMUNICATION METHODS:

The secret communications methods are invisible dots, microdots, character arrangement
(other than cryptographic methods of permutation and substitution), digital signatures, covert
channels and spread-spectrum signals.

It’s also notoriously known that there are different ways of hiding writing between the lines of
an ordinary letter. The text or picture that you drew would only appear if you colored over the
written area with a special marker. In this case a chemical reaction would take place once the
two substances touched thus revealing the hidden message.

The common form of invisible writing is through the use of invisible inks whose sources are

ITPage
DEPARTMENT,
|7 SRMGPC, LUCKNOW.
STEGANOGRAPHY

milk, vinegar, fruit juices and urine. These darken when heated and they are easy to decode.

With improvements in technology, many sophisticated inks were developed which react with
various chemicals. Some messages had to be ‘developed’ much as photographs are developed
with a number of chemicals in processing labs.
The Germans developed microdot technology during World War II which was referred to as
‘the enemy’s masterpiece of espionage’. Microdots are photographs, the size of a printed
period having the clarity of standard-sized type-written pages. In the USSR all international
mailings were screened in attempt to detect any hostile activities. 

.3 EVOLUTION OF STEGANOGRAPHY

.3.1 CODE BREAKERS : David Kahn's The Code breakers and Bruce Norman’s
Secret Warfare: The Battle of Codes and Ciphers recounts numerous tales of
steganography.

.3.2 INVISIBLE INK : An innocent letter may contain a very different message
writen between the lines with invisible ink. Common sources for invisible inks are
milk, vinegar, fruit juices and urine. All of these darken when heated. Later on,
more sophisticated inks were developed which react to various chemicals.

.3.3 MICRODOTS: The Germans developed microdot technology. Microdots are


photographs the size of a printed period having the clarity of standard-sized
typewritten pages. The first microdots were discovered masquerading as a period
on a typed envelope carried by a German agent in 1941.
The message was not hidden, nor encrypted. It was just so small as to not draw
attention to itself (for a while). Besides being so small, microdots permitted the

transmission of large amounts of data including drawings and photographs .

ITPage
DEPARTMENT,
|8 SRMGPC, LUCKNOW.
STEGANOGRAPHY

CHAPTER 2
TYPES OF STEGANOGRAPHY

Steganography can be split into two types, these are Fragile and Robust. The following section
describes the definition of these two different types of steganography.

.1 Fragile – Fragile steganography involves embedding information into a file which is


destroyed if the file is modified. This method is unsuitable for recording the copyright
holder of the file since it can be so easily removed, but is useful in situations where it is
important to prove that the file has not been tampered with, such as using a file as evidence
in a court of law, since any tampering would have removed the watermark. Fragile
steganography techniques tend to be easier to implement than robust methods.

.2 Robust – Robust marking aims to embed information into a file which cannot easily be
destroyed. Although no mark is truly indestructible, a system can be considered robust if
the amount of changes required to remove the mark would render the file useless. There are
two main types of robust marking: Fingerprinting and Water marking.

ITPage
DEPARTMENT,
|9 SRMGPC, LUCKNOW.
STEGANOGRAPHY

Text Techniques
Hiding information is to conceal it in what seems to be inconspicuous text. It is more difficult
when it comes to electronic versions of text. Copies are identical and it is impossible to tell if it
is an original or a copied version. To embed information inside a document we can simply
alter some of its characteristics. These can be either the text formatting or characteristics of the
characters. The key to this problem is that we alter the document in a way that it is simply not
visible to the human eye yet it is possible to decode it by computer. Figure shows the general
principle in embedding hidden information inside a document.

Marked
Documents

Codebook

Again, there is an encoder and to decode it, there will be a decoder. The codebook is a set of
rules that tells the encoder which parts of the document it needs to change. It is also worth
ITPage
DEPARTMENT,
| 10 SRMGPC, LUCKNOW.
STEGANOGRAPHY

pointing out that the marked documents can be either identical or different. By different, we
mean that the same watermark is marked on the document but different characteristics of each
of the documents are changed.

Image Techniques
 LSB – Least Significant Bit Hiding (Image Hiding) –This method is probably the
easiest way of hiding information in an image and yet it is surprisingly effective. It works by
using the least significant bits of each pixel in one image to hide the most significant bits of
another.

(i) First load up both the host image and the image you need to hide.
(ii) Next chose the number of bits you wish to hide the secret image in. The more bits used in
the host image, the more it deteriorates. Increasing the number of bits used though obviously
has a beneficial reaction on the secret image increasing its clarity.
(iii) Now you have to create a new image by combining the pixels from both images. If you
decide for example, to use 4 bits to hide the secret image, there will be four bits left
for the host image.
Host Pixel: 10110001
Secret Pixel: 00111111
New Image Pixel: 10110011
(iv) To get the original image back you just need to know how many bits were used to restore
the secret image. You then scan through the host image, pick out the least significant bits
ITPage
DEPARTMENT,
| 11 SRMGPC, LUCKNOW.
STEGANOGRAPHY

according the number used and then use them to create a new image with one change - the bits
extracted now become the most significant bits.
Host Pixel: 10110011
Bits used: 4
New Image: 00110000

Audio Techniques
 Spread Spectrum — spread spectrum systems encode data as a binary sequence which
sounds like noise but which can be recognised by a receiver with the correct key.
 MIDI — MIDI files are good places to hide information due to the revival this format has
had with the surge of mobile phones, which play MIDI ring tones.
 MP3 — The MP3 format is probably the most widespread compression format currently
used for music files. Due to this, it also happens to be very good for hiding information in. The
more inconspicuous the format, the more easily the hidden data may be overlooked.

 Video — For video, a combination of sound and image techniques can be used. This is due
to the fact that video generally has separate inner files for the video (consisting of many
images) and the sound. So techniques can be applied in both areas to hide data. Due to the

ITPage
DEPARTMENT,
| 12 SRMGPC, LUCKNOW.
STEGANOGRAPHY

size of video files, the scope for adding lots of data is much greater and therefore the
chances of hidden data being detected is quite

CHAPTER 3
STEGANOGRAPHY TECHNIQUES AND METHODS

Steganography is the art and science of communicating in a way which hides the the
existence of the secret message communication. It aims to hide information /covered
writing. Information to be protected is hidden in another data known as cover or
carrier. Data containing hidden message are called as Steganos or Stegos. Steganos
look like cover data and it is difficult to differentiate between them. Steganography
based communication over easily accessible platforms to prevent leakage of
information.

.1 Kerck Off Principle:


In cryptography, this principle states that "the security of the system has to be based
on the assumption that the enemy has full knowledge of the design and
implementation details of the steganographic system". The only missing information
for the enemy is a short, easily exchangeable random number sequence, the secret
key.

.2 STEGANOGRAPHY METHODS;
According to modification in covers, the methods can be categorized as
❖ Substitution
ITPage
DEPARTMENT,
| 13 SRMGPC, LUCKNOW.
STEGANOGRAPHY

❖ Transform domain
❖ Spread spectrum
❖ Statistical
❖ Distortion
❖ Cover generation

.2.1 Substitution Method:


It is commonly used simple method in which we can put information bits in LSB
sequentially at fixed place, randomly at fixed place or randomly at random places in
cover pixels. The message to be protected passes through scanning, coding,
encryption process to form an embedded message.

Scanning, coding, encryption steps make the information unintelligible so that one
cannot extract plain message.
Embedding make the message invisible so that one cannot detect it. Reshaping
spreads the message so that embedded message can be detected from distorted
steganos by authorized receivers.
Cover processing makes detection of embedded message more difficult since the
distortion is either due to noise addition or due to message embedding .
This would increases the robustness and security. Many attacks on such
steganographic systems are suggested. Some attacks that can be applied are given
below:
❖ Stego-Only Attack
❖ Message-Stego Attack
❖ Cover-Stego Attack
❖ Message-Cover-Stego Attack

.2.2 Visual Perception:


For any steganography based secure system, the perception of steganos should be as
cover image itself so that one cannot differentiate them and detect the existence of
embedded message.

ITPage
DEPARTMENT,
| 14 SRMGPC, LUCKNOW.
STEGANOGRAPHY

.2.3 Distortion Analysis:


Distortion analysis of stego images is carried out by studying distortion / similarity
messages statistically. There are many methods for measuring distortion that can be
used for distortion analysis. Distortion between two different images is measured by
considering Mean Square Error (MSE), Mean Absolute Error (MAE) or Histogram
Similarity (HS).

.2.4 Depth Vs Distortion Analysis:


Distortion occurred in different steganos is required by varying the depth of hiding for
embedding information in cover image. The relation between depth of hiding used and
distortion occurred in the stego images is shown in Fig. that depth of hiding within
some LSB region is most suitable for message embedding as the distortion is very
small in this region. As the depth of hiding increases beyond preferable region, the
distortion becomes noticeable and unsuitable for message hiding.

DEPTH OF HIDING (D) ►

ITPage
DEPARTMENT,
| 15 SRMGPC, LUCKNOW.
STEGANOGRAPHY

CHAPTER 4
STEGANOGRAPHY Vs OTHER TECHNOLOGIES

.1 STEGANOGRAPHY vs. CRYPTOGRAPHY:

Hides your
Cryptography
sensitive data
(i) Message is not hidden.   into innocent
files, so nobody
(ii) Enemy can intercept the message.
can find them.
(iii) Enemy can decrypt the message.

Several strong encryption


Steganography
algorithms (AES -
Rijndael,Blowfish, Twofish,
(i) Message is hidden.
GOST, Cast128, RC4, etc.).
(ii) Enemy must discover the medium.

File encryption is based on encryption algorithms - a process capable of translating


ITPage
DEPARTMENT,
| 16 SRMGPC, LUCKNOW.
STEGANOGRAPHY

data into a secret code. In Cryptography, encrypted message is sent. If it is


intercepted, the interceptor knows that the text is an encrypted message. In
Steganography, the fact that the message is being sent is unknown. So, the interceptor
may not know the object contains a message. Steganography is not intended to replace
Cryptography but supplement it, Cryptography + Steganography = Secured
Steganography.

.2 STEGANOGRAPHY vs. DIGITAL WATERMARK:

Digital watermarks are employed in an attempt to provide proof of ownership and


identify illicit copying and distribution of multimedia information. The role of digital
watermarking as a means of aiding in copyright and ownership issues. Alternatives to
digital watermarking techniques are explored as countermeasures to distortion attacks
against carrier. Despite, Steganography may have nothing to do with the cover which
is the object of communication.

CHAPTER 5
IMPLEMENTATION OF STEGANOGRAPHY

There are ways to hide information in an image, audio and even text files. Moreover,
if that message is in addition encoded then it has one more supplemental level of
protection. Computer steganography is based on two principles. The first one is that
the files that contain digitized images or sound can be altered to a certain extend
without loosing their functionality unlike other types of data that have to be exact in
order to function properly, an example of that would be a computer program.

Allows the secure transfer of passwords


  between two computers using an encrypted
internet line.

ITPage
DEPARTMENT,
| 17 SRMGPC, LUCKNOW.
STEGANOGRAPHY

An Application Locker to password protects any application installed on


your computer.
 

If one step is missed or overlooked you cannot continue the process. The other
principle deals with the human inability to distinguish negligible changes in image
color or sound quality, which is especially easy to make use of in objects that contain
redundant information, be it 16-bit sound, 8-bit or even better 24-bit image. This just
meaning that it is very hard to distinguish minor changes in images with the human
eye. Speaking of images, changing the value of the least significant bit of the pixel
color Won’t result in any perceivable change of that color. One of the best and most
widely spread steganographic products for Windows95/98/NT is S-Tools.

Features five innocent carriers for hiding: JPEG, PNG, BMP,


HTML and WAV.

Background, Evaluation method and Software evaluation which include S-Tools and
Hide and Seek v4.1 are the software packages which were reviewed with respect to
Steganographic manipulation of images. A very useful feature is the status line that
displays the largest message size that can be stored in the carrier file. All the software
uses the LSB method to both images and audio files. Steganography allows you to
hide information in five innocent looking files types: JPEG, PNG, BMP, HTML and
WAV.
Null ciphers (unencrypted messages) were also used. The real message is
"camouflaged" in an innocent sounding message. Due to the "sound" of many open
coded messages, the suspect communications were detected by mail filters. However
"innocent" messages were allowed to flow through. An example of a message
containing such a null cipher is German Spy in World War II:
ITPage
DEPARTMENT,
| 18 SRMGPC, LUCKNOW.
STEGANOGRAPHY

“Apparently neutral's protest is thoroughly discounted


And ignored. Isman hard hit. Blockade issue affects
Pretext for embargo on by products, ejecting suets and
Vegetable oils. ”
Taking the second letter in each word the following message emerges:
Pershing sails from NY June 1.

CHAPTER 6
DISSECTING STEGANOGRAPHY

Steganography is a term used for hiding messages within an image. Any color pixel is
made of a combination of red –green-blue mode(RGB) wherein each RGB component
consist of 8 bits. If letters in ASCII are to be represented within the color pixels, the
rightmost digit, called the least significant bit (LSB), can be altered. Any variation in
the value of this bit leads to very minimal variation in color. If we have to hide the
word ‘digit’ in the image, we take the LSB of every color and hide each bit of the
word in its RGB combination. To insert the letter ‘D’ we modify three color pixels
with three bits in each color pixel, we utilize 14 color pixels to hide the entire word
with only 1 bit in the 14th pixel.
00000000.

ITPage
DEPARTMENT,
| 19 SRMGPC, LUCKNOW.
STEGANOGRAPHY

10101010 ASCII CHARACTER CODE


01010100 01010100 10101010
D-01000100
01010100 01010100 I-01101001
G-01100111
I-01101001
LSB
T-01110100
MSB

.1 AMOUNT OF DATA STORED INSIDE A PICTURE

Suppose we have a 24-bit image 1024 x 768 (this is a common resolution for satellite
images, electronic astral photographs and other high resolution graphics). This may
produce a file over 2 megabytes in size (1024x768x24/8 = 2,359,296 bits). All color
variations are derived from three primary colors, Red, Green and Blue.
Each primary color is represented by 1 byte (8 bits). 24-bit images use 3 bytes per
pixel. If information is stored in the least significant bit (LSB) of each byte, 3 bits can
be a stored in each pixel. The "container" image will look identical to the human eye,
even if viewing the picture side by side with the original.

.2 STEPS FOR HIDING AN IMAGE USING STEGANOGRAPHY

1.Start s-tool and window explorer using the later as drag and drop interface for the
ITPage
DEPARTMENT,
| 20 SRMGPC, LUCKNOW.
STEGANOGRAPHY

software.
2.Drag and drop the image to be used as the carrier file from the explorer onto the
actions window in s-tool.
3.Drag and drop the data file on the carrier file.
4.Give pass phrase and encryption algorithm when prompted. Pass these to receiver
too.
5.The hidden file is ready. Receiver has to click on the “reveal” button to extract the
data.
Steganography simply takes one piece of information and hides it within another.
Computer files (images, sounds recordings, even disks) contain unused or
insignificant areas of data. Steganography takes advantage of these areas, replacing
them with information (encrypted mail, for instance).
The files can then be exchanged without anyone knowing what really lies inside of
them. An image of the space shuttle landing might contain a private letter to a friend.
A recording of a short sentence might contain your company's plans for a secret new
product. Steganography can also be used to place a hidden "trademark" in images,
music, and software, a technique referred to as watermarking.

CHAPTER 7

.1 ADVANTAGES:

Attempting to detect the use of steganography is called Steganalysis (the task of


detecting and possibly disabling steganographic information) and can be either
passive, where the presence of the hidden data is detected, or active, where an attempt
is made to retrieve the hidden data it is not infallible. But it considerably increases
the work of any experienced code-breaker, who must identify first the right carrier,
extract the sensitive data from it, and only after that (if he gets this far) – the hard
work of breaking the code. Today, less painful but more cryptic methods could be
used to hide information in publicly available web site images. The image is visibly

ITPage
DEPARTMENT,
| 21 SRMGPC, LUCKNOW.
STEGANOGRAPHY

indiscernible even to a trained eye.

.2 LIMITATIONS:

There are limitations on the use of steganography due to the size of the medium being
used to hide the data. In order for steganography to be useful the message should be
hidden without any major changes to the object it is being embedded in. This leaves
limited room to embed a message without noticeably changing the original object.
This is most obvious in compressed files where many of the obvious candidates for
embedding data are lost. Detecting hidden data remains an active area of research.
How do you protect against malicious Steganography?
Unfortunately, all of the methods mentioned above can also be used to hide illicit,
unauthorized or unwanted activity. What can be done to prevent or detect issues with
steganography? Other uses for steganography range from the trivial to the abhorrent,
including Criminal communications, Fraud, Hacking, Electronic payments, Gambling,
pornography, Harassment, Intellectual property offenses, Viruses, Pedophilia.

CHAPTER 8

.1 APPLICATIONS:
Steganography can be used anytime you want to hide data. There are many reasons to
hide data but they all boil down to the desire to prevent unauthorized persons from
becoming aware of the existence of a message. With these new techniques, a hidden
message is indistinguishable from white noise. Even if the message is suspected, there
is no proof of its existence. In the business world steganography can be used to hide a
secret chemical formula or plans for a new invention.
The simplest and oldest are used in map making, where cartographers sometimes add
a tiny fictional street to their maps, allowing them to prosecute copycats. A similar
ITPage
DEPARTMENT,
| 22 SRMGPC, LUCKNOW.
STEGANOGRAPHY

trick is to add fictional names to mailing lists as a check against unauthorized


resellers. Most of the newer applications use steganography like a watermark, to
protect a copyright on information. Photo collections, sold on CD, often have hidden
messages in the photos which allow detection of unauthorized use. The same
technique applied to DVDs is even more effective, since the industry builds DVD
recorders to detect and disallow copying of protected DVDs.

.2 FUTURE SCOPE:
In today’s world, we often listen a popular term “Hacking”. Hacking is nothing but an
unauthorized access of data which can be collected at the time of data transmission.
With respect to steganography this problem is often taken as Steganalysis.
Steganalysis is a process in which a steganalyzer cracks the cover object to get the
hidden data. So, whatever be the technique will be developed in future, degree of
security related with that has to be kept in mind. It is hoped that Dual Steganography,
Steganography along with Cryptography may be some of the future solution for this
above mentioned problem.

CHAPTER 9
CONCLUSION

Steganography is a dynamic tool with a long history and the capability to adapt to new
levels of technology. It has its own place in computer data security. By the amount of
free and commercial tools available today, one can deduce that the use of
steganography is growing. Steganography is just another tool for someone to use to
hide data, and I believe it will be used more often in the future, whether for covert
communication or personal data concealment. Security professionals will surely need
to be aware of its existence as its use becomes more prevalent. Hiding a message with
steganography methods reduces the chance of a message being detected. In and of
itself, steganography is not a good solution to secrecy, but neither is simple

ITPage
DEPARTMENT,
| 23 SRMGPC, LUCKNOW.
STEGANOGRAPHY

substitution and short block permutation for encryption. But if these methods are
combined, you have much stronger encryption routines. Like any tool, steganography
is neither inherently good nor evil, it is the manner in which it is used which will
determine whether it is a
benefit or a detriment to our society.

CHAPTER 10
REFERENCE

0.1 http://www.jjtc.com
0.2 http://www.stegoarchive.com
0.3 http://www.forensics.nl/steganography
0.4 Wikipedia

ITPage
DEPARTMENT,
| 24 SRMGPC, LUCKNOW.

You might also like