Professional Documents
Culture Documents
Steganography: Submitted By: Nawlendu Bhushan
Steganography: Submitted By: Nawlendu Bhushan
Steganography
Steganography is the art of hiding information in ways that prevent the detection of the hidden information.
The word derives from Greek stego and graphia, and literally means covered writing While cryptography scrambles messages so that they cannot be understood, Steganography hides messages so that they cannot be seen.
Hiding a secret message within a cover-medium in such a way that others can not discern the presence of the hidden message . Quite often, Steganography is hidden in pictures .
Modern Techniques
Based on the carrier file used the modern day steganography is divided into following classes: Text Steganography Image Steganography Audio Steganography Video Steganography
Terminology
Carrier or Cover File - An original message or a file in which hidden information will be stored inside of it. Stego - Medium: The medium in which the information is hidden. Embedded or Payload The information which is to be hidden or concealed. Steganalysis The process of detecting hidden information inside a file.
Steganography Procedure
A Steganography System
Message File Cover File Message File
Steganography Tool
Steganography Tool
Hiding messages
Extracting messages
Text Steganography
Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.
-A message sent by a German spy in World War II.
Text Steganography
Another possible way of storing a secret inside a text is using a publicly available cover source, a book or a newspaper, and using a code which consists for example of a combination of a page number, a line number and a character number. It can be easily detected by looking for patterns in texts, odd use of language and unusual amount of white spaces.
Image Steganography
For different image formats different Steganography algorithms exist. Compression plays a very important role in choosing which steganographic algorithm to use. Lossy compression techniques result in smaller image file sizes, but it increases the possibility that the embedded message may be partly lost due to the fact that excess image data will be removed.
Image Steganography
Transform Domain
Image Domain
JPEG
LSB in BMP
LSB in GIF
LSB Algorithm
Messages are encoded in the least significant bit of every byte in an image. By doing so, the value of each pixel is changed slightly, but not enough to make significant visual changes to the image, even when compared to the original. Example: Inserting the word bomb using LSB techniques: b = 01100010 o = 01101111 m = 01101101 b = 01100010
Image bits:
01011010 01011010 10110110 10110111 10100100 00101011 10101101 11111011 01011001 01011000 10101011 10010111 00101011 11011011 11011010 10101010 10101111 10101110 10010100 10010101 01010100 01010101 11101010 11101011 10101011 10101001 10101000 01001000 01001001 11010100 10100111 01010101 01010100 10110000 01000111 01010110 01010111 10101010 01000011 01000010 11111000 11111001 01011011 11010101 01010100
Image Steganography
JPEG Images
RGB YUV
lossy
lossless
Compressed image RGB= red, green and blue color of a pixel Y=luminance, U,V= chrominance (color)
Using the principles of LSB insertion the message can be embedded into the least significant bits of the coefficients before applying the Huffman encoding. By embedding the information at this stage, in the transform domain, it is extremely difficult to detect, since it is not in the visual domain.
GIF images
GIF image cannot have a bit depth greater than 8, thus the maximum number of colours that a GIF can store is 256. GIF images are indexed images where the colours used in the image are stored in a palette, sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time.
GIF Images
LSB algorithm can be applied on GIF images although extra care should be taken. If adjacent palette entries are similar there are little or no visible changes to image but in case of dissimilarity it is evident. GIF images are vulnerable to visual attacks as palette processing leaves a definite marks on the image. LSB in GIF is a very efficient algorithm to use when embedding a reasonable amount of data in a grayscale image.
BMP Images
In embedding a message in GIF images there exists a trade off between size of the data and invisibility. A BMP image can store a large sized message but there is a larger probability of detection. A disadvantage in BMP regarding LSB is the suspicion arise due to transmission of large size BMP image because it is not used anymore. LSB in BMP is most suitable for applications where the focus is on the amount of information to be transmitted and not on the secrecy of that information.
Comparison
Applications
Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. Steganography can be used for digital watermarking, where a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified. It has some ill usages also. It is believed that in 9/11 incident Al-Qaida used video steganography to send messages to its militants.
References
Petitcolas, FAP; Anderson RJ; Kuhn MG (1999).
"Information Hiding: A survey" (pdf). Proceedings of the IEEE (special issue) 87 (7): 106278. doi:10.1109/5.771065 Petitcolas, Fabian A.P.; Katzenbeisser, Stefan (2000). Information Hiding Techniques for Steganography and Digital Watermarking. ISBN 1-58053-035-4. Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001). Information hiding: steganography and watermarking: attacks and countermeasures. ISBN 978-0-79237204-2.
!!THANKS!!