Free Essay

Steganography

In:

Submitted By kavanag
Words 8940
Pages 36
Steganography

Hide and Seek: An Introduction to Steganography
Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques.
N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called statistical steganalysis. This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis. Other surveys focus on the general usage of information hiding and watermarking or else provide an overview of detection algorithms.2,3 Here, we present recent research and discuss the practical application of detection algorithms and the

S

mechanisms for getting around them.

The basics of embedding
Three different aspects in information-hiding systems contend with each other: capacity, security, and robustness.4 Capacity refers to the amount of information that can be hidden in the cover medium, security to an eavesdropper’s inability to detect hidden information, and robustness to the amount of modification the stego medium can withstand before an adversary can destroy hidden information. Information hiding generally relates to both watermarking and steganography. A watermarking system’s primary goal is to achieve a high level of robustness—that is, it should be impossible to remove a watermark without degrading the data object’s quality. Steganography, on the other hand, strives for high security and capacity, which often entails that the hidden information is fragile. Even trivial modifications to the stego medium can destroy it. A classical steganographic system’s security relies on the encoding system’s secrecy. An example of this type of system is a Roman general who shaved a slave’s head and tattooed a message on it. After the hair grew back, the slave was sent to deliver the now-hidden message.5 Although such a system might work for a time, once it is known, it is simple enough to shave the heads of all the people passing by to check for hidden messages—ultimately, such a steganographic system fails. Modern steganography attempts to be detectable only if secret information is known—namely, a secret
■ IEEE SECURITY & PRIVACY

32

PUBLISHED BY THE IEEE COMPUTER SOCIETY



1540-7993/03/$17.00 © 2003 IEEE

Steganography

key.2 This is similar to Kerckhoffs’ Shared secret key Principle in cryptography, which holds that a cryptographic system’s Stego image Redundant data Cover Image security should rely solely on the key Redundant data material.6 For steganography to reidentification main undetected, the unmodified cover medium must be kept secret, because if it is exposed, a comparison A hidden message between the cover and stego media containing content immediately reveals the changes. Data selection to be communicated and replacement Information theory allows us to without an eavesdropper be even more specific on what it knowing means for a system to be perfectly that communication secure. Christian Cachin proposed is happening. an information-theoretic model for Hidden message steganography that considers the security of steganographic systems against passive eavesdroppers.7 In Figure 1. Modern steganographic communication. The encoding step of a steganographic system identifies redundant bits and then replaces a subset of them this model, you assume that the adwith data from a secret message. versary has complete knowledge of the encoding system but does not know the secret key. His or her task is to devise a model for the probability distribution PC of formats for images. Moreover, steganographic systems all possible cover media and PS of all possible stego for the JPEG format seem more interesting because the media. The adversary can then use detection theory to systems operate in a transform space and are not affected decide between hypothesis C (that a message contains by visual attacks.8 (Visual attacks mean that you can see no hidden information) and hypothesis S (that a mes- steganographic messages on the low bit planes of an sage carries hidden content). A system is perfectly se- image because they overwrite visual structures; this usucure if no decision rule exists that can perform better ally happens in BMP images.) Neil F. Johnson and than random guessing. Sushil Jajodia, for example, showed that steganographic Essentially, steganographic communication senders systems for palette-based images leave easily detected and receivers agree on a steganographic system and a distortions.9 shared secret key that determines how a message is enLet’s look at some representative steganographic syscoded in the cover medium. To send a hidden mes- tems and see how their encoding algorithms change an sage, for example, Alice creates a new image with a image in a detectable way. We’ll compare the different digital camera. Alice supplies the steganographic sys- systems and contrast their relative effectiveness. tem with her shared secret and her message. The steganographic system uses the shared secret to deter- Discrete cosine transform mine how the hidden message should be encoded in For each color component, the JPEG image format uses the redundant bits. The result is a stego image that a discrete cosine transform (DCT) to transform successive Alice sends to Bob. When Bob receives the image, he 8 × 8 pixel blocks of the image into 64 DCT coefficients uses the shared secret and the agreed on stegano- each. The DCT coefficients F(u, v) of an 8 × 8 block of graphic system to retrieve the hidden message. Figure image pixels f(x, y) are given by 1 shows an overview of the encoding step; as men 7 7 tioned earlier, statistical analysis can reveal the pres1 8–12 F(u, v ) = C (u )C (v ) f (x , y ) ∗ ence of hidden content. 4 x = 0 y = 0 

∑∑

Hide and seek
Although steganography is applicable to all data objects that contain redundancy, in this article, we consider JPEG images only (although the techniques and methods for steganography and steganalysis that we present here apply to other data formats as well). People often transmit digital pictures over email and other Internet communication, and JPEG is one of the most common cos (2x + 1)uπ (2y + 1)vπ  cos  16 16 ,

where C(x) = 1/ 2 when x equal 0 and C(x) = 1 otherwise. Afterwards, the following operation quantizes the coefficients: http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

33

Steganography

the hidden message. The modification of a single DCT coefficient affects all 64 image pixels. In some image formats (such as GIF), an image’s visual structure exists to some degree in all the image’s bit layers. Steganographic systems that modify least-significant bits of these image formats are often susceptible to visual attacks.8 This is not true for JPEGs. The modifications are in the frequency domain instead of the spatial domain, so there are no visual attacks against the JPEG image format. Figure 2 shows two images with a resolution of 640 × 480 in 24-bit color. The uncompressed original image is almost 1.2 Mbytes (the two JPEG images shown are about 0.3 Mbytes). Figure 2a is unmodified; Figure 2b contains the first chapter of Lewis Carroll’s The Hunting of the Snark. After compression, the chapter is about 15 Kbytes. The human eye cannot detect which image holds steganographic content.

Sequential
Derek Upham’s JSteg was the first publicly available steganographic system for JPEG images. Its embedding algorithm sequentially replaces the least-significant bit of DCT coefficients with the message’s data (see Figure 3).13 The algorithm does not require a shared secret; as a result, anyone who knows the steganographic system can retrieve the message hidden by JSteg. Andreas Westfeld and Andreas Pfitzmann noticed that steganographic systems that change least-significant bits sequentially cause distortions detectable by steganalysis.8 They observed that for a given image, the embedding of high-entropy data (often due to encryption) changed the histogram of color frequencies in a predictable way. In the simple case, the embedding step changes the least-significant bit of colors in an image. The colors are addressed by their indices i in the color table; we refer to their respective frequencies before and after embedding as ni and ni*. Given uniformly distributed message bits, if n2i > n2i+1, then pixels with color 2i are changed more frequently to color 2i + 1 than pixels with color 2i + 1 are changed to color 2i. As a result, the following relation is likely to hold:

Figure 2. Embedded information in a JPEG. (a) The unmodified original picture; (b) the picture with the first chapter of The Hunting of the Snark embedded in it.

Input: message, cover image Output: stego image while data left to embed do get next DCT coefficient from cover image if DCT ≠ 0 and DCT ≠ 1 then get next LSB from message replace DCT LSB with message LSB end if insert DCT into stego image end while
Figure 3. The JSteg algorithm. As it runs, the algorithm sequentially replaces the least-significant bit of discrete cosine transform (DCT) coefficients with message data. It does not require a shared secret.

|n2i – n2i+1| ≥ |n2i* – n2i+1*|.
In other words, embedding uniformly distributed message bits reduces the frequency difference between adjacent colors. The same is true in the JPEG data format. Instead of measuring color frequencies, we observe differences in the DCT coefficients’ frequency. Figure 4 displays the histogram before and after a hidden message is embedded in a JPEG image. We see a reduction in the frequency difference between coefficient –1 and its adjacent DCT coefficient –2. We can see a similar reduction in frequency difference between coefficients 2 and 3.

 F(u, v )  F Q (u, v ) =  , Q(u, v )  where Q(u,v) is a 64-element quantization table. We can use the least-significant bits of the quantized DCT coefficients as redundant bits in which to embed
34
IEEE SECURITY & PRIVACY ■ MAY/JUNE 2003

Steganography

Westfeld and Pfitzmann used a χ2-test to determine whether the observed frequency distribution yi in an image matches a distribution yi* that shows distortion from embedding hidden data. Although we do not know the cover image, we know that the sum of adjacent DCT coefficients remains invariant, which lets us compute the expected distribution yi* from the stego image. Letting ni be the DCT histogram, we compute the arithmetic mean

Coefficient frequency

15,000 Original image 10,000 5,000 0 -25 -20 -15 -10 -5 0 5 DCT coefficients 10 15 20 25

(a)
15,000

Coefficient frequency

y∗ = i

n 2i + n 2i +1 2

Modified image 10,000 5,000 0 -25 -20 -15 -10 -5 0 5 DCT coefficients 10 15 20 25

to determine the expected distribution and compare it against the observed distribution

yi = n2i.
The χ2 value for the difference between the distributions is given as ν +1

(b)

χ2 =

∑ i =1

(y

i

− yi



y i∗

),

Figure 4. Frequency histograms. Sequential changes to the (a) original and (b) modified image’s least-sequential bit of discrete cosine transform coefficients tend to equalize the frequency of adjacent DCT coefficients in the histograms.

where ν are the degrees of freedom—that is, one less than the number of different categories in the histogram. It might be necessary to sum adjacent values from the expected distribution and the observed distribution to ensure that each category has enough counts. Combining two adjacent categories reduces the degrees of freedom by one. The probability p that the two distributions are equal is given by the complement of the cumulative distribution function,

100
Probability of embedding (%)

msg/dcsf0002.jpg

80 60 40 20 0 0

10

20

30 40 50 60 70 Analyzed position in image (%)

80

90

100

p = 1−

∫0

χ2 t



− 2)/ 2 − t / 2

e

2

ν /2

,

Γ (ν / 2)

Figure 5. A high probability of embedding indicates that the image contains steganographic content. With JSteg, it is also possible to determine the hidden message’s length.

where Γ is the Euler Gamma function. The probability of embedding is determined by calculating p for a sample from the DCT coefficients. The samples start at the beginning of the image; for each measurement the sample size is increased. Figure 5 shows the probability of embedding for a stego image created by JSteg. The high probability at the beginning of the image reveals the presence of a hidden message; the point at which the probability drops indicates the end of the message.

Pseudo random
OutGuess 0.1 (created by one of us, Niels Provos) is a steganographic system that improves the encoding step by using a pseudo-random number generator to select

DCT coefficients at random. The least-significant bit of a selected DCT coefficient is replaced with encrypted message data (see Figure 6). The χ2-test for JSteg does not detect data that is randomly distributed across the redundant data and, for that reason, it cannot find steganographic content hidden by OutGuess 0.1. However, it is possible to extend the χ2test to be more sensitive to local distortions in an image. Two identical distributions produce about the same χ2 values in any part of the distribution. Instead of increasing the sample size and applying the test at a constant position, we use a constant sample size but slide the position where the samples are taken over the image’s entire range. http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

35

Steganography

Input: message, shared secret, cover image Output: stego image initialize PRNG with shared secret while data left to embed do get pseudo-random DCT coefficient from cover image if DCT ≠ 0 and DCT ≠ 1 then get next LSB from message replace DCT LSB with message LSB end if insert DCT into stego image end while
Figure 6. The OutGuess 0.1 algorithm. As it runs, the algorithm replaces the least-significant bit of pseudo-randomly selected discrete cosine transform (DCT) coefficients with message data.

metic mean of coefficients and their adjacent ones, we take the arithmetic mean of two unrelated coefficients,

y∗ = i

n 2 i −1 + n 2 i . 2

1.0 FP = 1% FP = 0.2% FP < 0.1%

0.8 Detection rate

0.6

0.4

0.2

0

0

0.05

0.1 0.15 Change rate

0.2

0.25

Figure 7. The extended χ2-test detects pseudo-randomly embedded messages in JPEG images. The detection rate depends on the hidden message’s size and can be improved by applying a heuristic that eliminates coefficients likely to lead to false negatives. The graph shows the detection rates for three different false-positive rates. The change rate refers to the fraction of discrete cosine transform (DCT) coefficients available for embedding a hidden message that have been modified.

Using the extended test, we can detect pseudo-randomly distributed hidden data. Given a constant sample size, we take samples at the beginning of the image and increase the sample position by 1 percent for every χ2 calculation. We then take the sum of the probability of embedding for all samples. If the sum is greater than the detection threshold, the test indicates that an image contains a hidden message. To find an appropriate sample size, we select an expected distribution for the extended χ2-test that should cause a negative test result. Instead of calculating the arith36
IEEE SECURITY & PRIVACY ■ MAY/JUNE 2003

A binary search on the sample size helps find a value for which the extended χ2-test does not show a correlation to the expected distribution derived from unrelated coefficients. Figure 7 shows an analysis of the extended χ2-test for different false-positive rates. Its detection rate depends on the hidden data’s size and the number of DCT coefficients in an image. We characterize their respective relation by using the change rate—the fraction of DCT coefficients available for embedding a hidden message that have been modified. With a false-positive rate of less than 0.1 percent, the extended χ2-test starts detecting embedded content for change rates greater than 5 percent. We improve the detection rate by using a heuristic that eliminates coefficients likely to lead to false negatives. Due to the heuristic, the detection rate for embedded content with a change rate of 5 percent is greater than 40 percent for a 1 percent false-positive rate. One of us (Niels Provos) showed that applying correcting transforms to the embedding step could defeat steganalysis based on the χ2-test.12 He observed that not all the redundant bits were used when embedding a hidden message. If the statistical tests used to examine an image for steganographic content are known, it is possible to use the remaining redundant bits to correct statistical deviations that the embedding step created. In this case, preserving the DCT frequency histogram prevents steganalysis via the χ2-test. Siwei Lyu and Hany Farid suggested a different approach based on discrimination of two classes: stego image and non-stego image.10,11 Statistics collected from images in a training set determine a function that discriminates between the two classes. The discrimination function determines the class of a new image that is not part of the training set. The set of statistics used by the discrimination function is called the feature vector. Lyu and his colleague used a support vector machine (SVM) to create a nonlinear discrimination function. Here, we present a less sophisticated but easier to understand method for determining a linear discrimination function,

Λ( X ) =

∑ b ix i , = i 1

k

of the measured image statistics X = (x1, x2, …, xk)T that, for appropriately chosen bi, discriminates between the

Steganography

Table 1. Detection rate PD for a nonlinear support vector machine.11
SYSTEM MESSAGE IMAGE SIZE PD IN PERCENT (PF 1.0 ) 99.0 99.3 99.1 86.0 95.6 82.2 54.7 21.4 (PF 0.0 ) 98.5 99.0 98.7 74.5 89.5 63.7 32.1 7.2

JSteg JSteg JSteg JSteg OutGuess OutGuess OutGuess OutGuess

256 × 256 128 × 128 64 × 64 32 × 32 256 × 256 128 × 128 64 × 64 32 × 32

two classes. For a new image X, the discriminant function Λ lets us decide between two hypotheses: the hypothesis H0 that the new image contains no steganographic content and the hypothesis H1 that the new image contains a hidden message. For the binary hypothesis problem, detection theory provides us with the Neyman-Pearson criterion, which shows that the likelihood ratio test

Λ( X ) =

px H1( X H1 ) H1 > px H 0 ( X H 0 ) H
< 0

η

maximizes the detection rate PD for a fixed false-negative rate PF,14 where px|H1 (X|H1) and px|H0(X|H0) denote the joint probability functions for (x1, x2, …, xk) under H1 and H0, respectively. The constant η is the detection threshold. To choose the weights bi, we assume that the set xi of non-stego images and the set yi of stego images are independently and normally distributed. This assumption lets us calculate the probability functions px|H1(X|H1) and px|H0(X|H0), which we use to derive the weights bi. Determining the discrimination functions is straightforward, but finding a good feature vector is difficult. Farid created a feature vector with a wavelet-like decomposition that builds higher-order statistical models of natural images.10 He derived the statistics by applying separable low- and high-pass filters along the image axes generating vertical, horizontal, and diagonal subbands, which are denoted Vi(x,y), Hi(x,y) and Di(x,y), respectively, for different scales i = 1, …, n. The first set of statistics for the feature vector is given by the mean, variance, skewness, and kurtosis of the subband coefficients at each orientation and at scales i = 1, …, n – 1. The second set of statistics is based on the errors in an optimal linear predictor of coefficient magnitude. For each subband and scale, the error’s distribution is characterized by its mean, variance, skewness, and kurtosis resulting in a

total size of 24(n – 1) for the feature vector. Lyu and Farid’s training set consists of 1,800 nonstego images and a random subset of 1,800 stego images that contain images as hidden content. Using four different scales, a program (or a researcher) calculates a 72length feature vector for each image in the training set. Table 1 shows their achieved detection rate using a nonlinear SVM for false-positive rates 0.0 percent and 1.0 percent and different message sizes. The discrimination function works well only if the training set captures the image space’s useful characteristics. For different types of images—for example, nature scenes and indoor photographs—the detection rate could decrease when using a single training set. Improving the training set by selecting images that match the type of image we’re analyzing might be possible. The probability models for clutter in natural images that Ulf Grenander and Anuj Srivastava15 first proposed let us select similar images from the training set automatically. We can improve the detection quality rate by using a feature vector based on different statistics. Instead of using a wavelet-like decomposition, we look at the distribution of squared differences,

H ik =

∑ j =0 ( Fi ( j + 1, k) − Fi ( j , k)) 6 F ( j , k) 1+ ∑ j =0 i
6

2

V ik =

∑ j = 0 (Fi(k, j + 1) − Fi(k, j )) 6 1 + ∑ Fi (k, j ) j=0
6

2

,

where i enumerates the number of blocks in the image, and k enumerates the rows or columns in a single block. For each distribution, we calculate the mean and its first three central moments, resulting in 64 measurements for http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

37

Steganography

1.0

1.0

0.8

0.8

Detection rate

0.6 Diffsq (CR=0.20) Diffsq (CR=0.15) Diffsq (CR=0.10) Diffsq (CR=0.05) Wavelet (CR=0.20) Wavelet (CR=0.15) Wavelet (CR=0.10) Wavelet (CR=0.05)

Detection rate

0.6 Diffsq (CR=0.50) Diffsq (CR=0.25) Diffsq (CR=0.15) Wavelet (CR=0.50) Wavelet (CR=0.25) Wavelet (CR=0.15)

0.4

0.4

0.2

0.2

0.0

0.0

0.2

0.4 0.6 False-positive rate

0.8

1.0

0.0

0.0

0.2

0.4 0.6 False-positive rate

0.8

1.0

(a)

(b)

Figure 8. Different feature vectors based on wavelet-like decomposition and on squared differences. (a) The receiver operating characteristic (ROC) for OutGuess detection and (b) the ROC for F5 detection.

a single image. Figure 8 compares the linear discrimination functions derived from the two feature vectors. Figure 8a shows receiver-operating characteristics (ROC) for OutGuess messages and their corresponding change rates; Figure 8b shows the ROCs for F5 messages (described in more detail later). For OutGuess, the feature vectors show comparable detection performance. However, for F5, the squared differences feature vector outperforms the wavelet feature vector. Using a discrimination function does not help us determine a hidden message’s length. Jessica Fridrich and her colleagues made a steganalytic attack on OutGuess that can determine a hidden message’s length.16 OutGuess preserves the first-order statistics of the DCT coefficients, so Fridrich and her group devised a steganalytic method independent of the DCT histogram. They used discontinuities along the boundaries of 8 × 8 pixel blocks as a macroscopic quantity that increases with the hidden message’s length. The discontinues are measured by the blockiness formula
 M −1    8  N

where gij are pixel values in an M × N grayscale image. Experimental evidence shows that the blockiness B increases monotonically with the number of flipped least-sequential bits in the DCT coefficients. Its first derivative decreases with the hidden message’s length, meaning that the blockiness function’s slope is maximal for the cover image and decreases for an image that already contains a message. Using the blockiness measure, the algorithm to detect OutGuess proceeds as follows: 1. Determine the blockiness BS(0) of the decompressed stego image. 2. Using OutGuess, embed a maximal length message and calculate the resulting stego image’s blockiness BS(1). 3. Crop the stego image by four pixels to reconstruct an image similar to the cover image. Compress the resulting image using the same JPEG quantization matrix as the stego image and calculate the blockiness B(0). 4. Using OutGuess, embed a maximal length message into the cropped image and calculate the resulting blockiness B(1). 5. Using OutGuess, embed a maximal length message into the stego image from the previous step and compute the resulting blockiness B1(1). 6. The slope S0 = B(1) – B(0) corresponds to the original cover image, and S1 = B1(1) – (1) is the slope for an image with an embedded, maximal length message. The stego image’s slope S = BS(1) – BS(0) is between the two slopes S0 and S1. The hidden message’s length is then determined as

B=

∑ ∑ g8i, j − g8i +1, j i =1 j =1

+

∑∑ i =1

 N −1   M  8  j =1

g i,8 j − g i,8 j +1 ,

38

IEEE SECURITY & PRIVACY



MAY/JUNE 2003

Steganography

p=

S0 − S , S 0 − S1

where p = 0 corresponds to the cover image and p = 1 to an image with the maximal embedded message length. To counter randomness in the OutGuess embedding algorithm, we repeat the detection algorithm 10 times. The average of the p-values is taken as the final message length. Fridrich and her group tested their algorithm on 70 images of which 24 contained hidden messages. Their analysis showed an error in the estimated message length of –0.48 percent ± 6 percent. This approach has two advantages over class discrimination: it does not require a training set and it determines the length of hidden messages.

Subtraction
Steganalysis successfully detects steganographic systems that replace the least-significant bits of DCT coefficients. Let’s turn now to Andreas Westfeld’s steganographic system, F5.17 Instead of replacing the least-significant bit of a DCT coefficient with message data, F5 decrements its absolute value in a process called matrix encoding. As a result, there is no coupling of any fixed pair of DCT coefficients, meaning the χ2-test cannot detect F5. Matrix encoding computes an appropriate (1, (2k – 1), k) Hamming code by calculating the message block size k from the message length and the number of nonzero nonDC coefficients. The Hamming code (1, 2k– 1, k) encodes a k-bit message word m into an n-bit code word a with n = 2k – 1. It can recover from a single bit error in the code word.18 F5 uses the decoding function f(a) = ⊕ni=1 ai ⋅ i and the Hamming distance d. With matrix encoding, embedding any k-bit message into any n-bit code word changing it at most by one bit. In other words, we can find a suitable code word a′ for every code word a and every message word m so that m = f(a′) and d(a, a′) ≤ 1. Given a code word a and message word m, we calculate the difference s = m ⊕ f(a) and get the new code word as a if s = 0 a' =  (a1, a2 ,..., ¬a s ,..., an otherwise Figure 9 shows the F5 embedding algorithm. First, the DCT coefficients are permuted by a keyed pseudo-random number generator (PRNG), then arranged into groups of n while skipping zero and DC coefficients. The message is split into k-bit blocks. For every message block m, we get an n-bit code word a by concatenating the leastsignificant bit of the current coefficients’ absolute value. If

Input: message, shared secret, cover image Output: stego image initialize PRNG with shared secret permutate DCT coefficients with PRNG determine k from image capacity calculate code word length n ← 2k – 1 while data left to embed do get next k-bit message block repeat G ← {n non-zero AC coefficients} s ← k-bit hash f of LSB in G s ← s ⊕ k-bit message block if s ≠ 0 then decrement absolute value of DCT coefficient Gs insert Gs into stego image end if until s = 0 or Gs ≠ 0 insert DCT coefficients from G into stego image end while
Figure 9. The F5 algorithm. F5 uses subtraction and matrix encoding to embed data into the discrete cosine transform (DCT) coefficients.

the message block m and the decoding f(a) are the same, the message block can be embedded without any changes; otherwise, we use s = m ⊕ f(a) to determine which coefficient needs to change (its absolute value is decremented by one). If the coefficient becomes zero, shrinkage happens, and it is discarded from the coefficient group. The group is filled with the next nonzero coefficient and the process repeats until the message can be embedded. For smaller messages, matrix encoding lets F5 reduce the number of changes to the image—for example, for k = 3, every change embeds 3.43 message bits while the total code size more than doubles. Because F5 decrements DCT coefficients, the sum of adjacent coefficients is no longer invariant, and the χ2 test cannot detect F5embedded messages. However, Fridrich and her group presented a steganalytic method that does detect images with F5 content.19 They estimated the cover-image histogram from the stego image and compared statistics from the estimated histogram against the actual histogram. As a result, they found it possible to get a modification rate β that indicates if F5 modified an image. Fridrich and her colleagues’ steganalysis determined how F5’s embedding step changes the cover image’s AC coefficients. Let huv(d) := |{F(u,v)| d = |F(u,v)|, u + v ≠ 0}| be the total number of AC DCT coefficients in the cover image with frequency (u,v) whose absolute value equals http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

39

Steganography

1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Double-compression elimination Single compression

0

0.1

0.2

0.3

0.4 0.5 0.6 0.7 False-positive rate

0.8

0.9

1.0

Figure 10. Receiver-operating characteristics (ROCs) of the F5 detection algorithm. The detection rate is analyzed when using double compression elimination and against single compressed images.

known and must be estimated from the stego image. We do this by decompressing the stego image into the spatial domain. The resulting image is then cropped by four pixels on each side to move the errors at the block boundaries. We recompress the cropped image using the same quantization tables as the stego image, getting the estimates for the cover image histogram from the recompressed image. Because many images are stored already in the JPEG format, embedding information with F5 leads to double compression, which could confuse this detection algorithm. Fridrich and her group proposed a method for eliminating the effects of double compression by estimating the quality factor used to compress the cover image. Unfortunately, they based their evaluation of the detection algorithm on only 20 images. To get a better understanding of its accuracy, we present an evaluation of the algorithm based on our own implementation. Figure 10 shows the ROC for a test set of 500 nonstego and 500 stego images. In the first test, both types of images are double-compressed due to F5. The only difference is that the stego images contain a steganographic message. Notice that the false-positive rate is fairly high compared to the detection rate. The second test uses the original JPEG images without double compression as reference.

Detection rate

Statistics-aware embedding
d. Huv(d) is the corresponding function for the stego image. If F5 changes n AC coefficients, the change rate β is n/P, where P is the total number of AC coefficients. As F5 changes coefficients pseudo randomly, we expect the histogram values for the stego image to be Huv(d) < (1 – β)huv(d) + β huv(d + 1), for d > 0 Huv(0) < huv(0) + β huv(1), for d = 0. So far, we have presented embedding algorithms that overwrite image data without directly considering the distortions that the embedding caused. Let’s look at a framework for an embedding algorithm that uses global image statistics to influence how coefficients should be changed. To embed a single bit, we can either increment or decrement a DCT coefficient’s value. This lets us change a DCT coefficient’s least-significant bit in two different ways. Additionally, we create groups of DCT coefficients and use the parity1 of their least-significant bits as message bits to further increase the number of ways to embed a single bit. For every DCT block, we search the space of all possible changes to find a configuration that minimizes the change to image statistics. Currently, we search for solutions that maintain the blockiness, the block variance, and the coefficient histogram. We are still in the progress of evaluating this approach’s effectiveness. However, in contrast to previously presented steganographic systems, the changes our algorithm introduces depend on image properties and take statistics directly into consideration.

Fridrich and her group used this estimate to calculate the expected change rate β from the cover image histogram. They found the best correspondence when using d = 0 and d = 1 because these coefficient values change the most during the embedding step. This leads to the approximation huv (1) H uv (1) − huv (1)

βuv ≈

+ H uv (1) − huv (1) huv (2) − huv (1) . 2 2 huv (1) + huv (2) − huv (1)

[

[

[

][

] ]

]

Comparison
Detecting sequential changes in the least-significant bits of DCT coefficients (as seen in JSteg) is easy. A simple χ2test helps us determine a hidden message’s presence and size. Detecting other systems is more difficult, but all the

The final value of β is calculated as the average of βuv for the frequencies (u,v) ∈ {(1,2),(2,1),(2,2)}. The histogram values for the cover image are un40
IEEE SECURITY & PRIVACY ■ MAY/JUNE 2003

Steganography

systems presented here predictably 1.0 change the cover medium’s statistical properties. 0.8 Image size 640 x 480 Steganographic systems use differ0.6 Image size 320 x 240 ent methods to reduce changes to the High quality 640 x 480 cover medium. OutGuess, for exam0.4 ple, carefully selects a special seed for 0.2 its PRNG; F5 uses matrix encoding. We can also compress the hidden 0 0 500 1,000 1,500 2,000 2,500 message before embedding it, but Message size (in bytes) (a) even though this reduces the number of changes to the cover medium, the 1.0 steganographic systems’ statistical disImage size 640 x 480 0.8 Image size 320 x 240 tortions remain unchanged. For detection algorithms that can determine 0.6 the hidden message’s length, the de0.4 tection threshold increases only slightly. 0.2 We discussed two different classes 0 of detection algorithms: one based on 0 100 200 300 400 500 (b) Message size (in bytes) inherent statistical properties and the other on class discrimination. Detection algorithms based on inherent statistical Figure 11. Using Stegdetect over the Internet. (a) JPHide and (b) JSteg produce different detection results for different test images and message sizes. properties have the advantage that they do not need to find a representative training set; moreover, they often let us estimate an embedded message’s length. However, each tion and compression before JSteg embeds the data. steganographic system requires its own detection algo- JSteg-Shell uses the RC4 stream cipher for encryption rithm. Class discrimination, on the other hand, is univer- (but the RC4 key space is restricted to 40 bits). sal—even though it doesn’t provide an estimate of the hidJPHide is a steganographic system Allan Latham first den message’s length, and creating a representative training developed that uses Blowfish as a PRNG.24,25 Version set is often difficult. A feature vector can help detect sev- 0.5 (there’s also a version 0.3) supports additional comeral steganographic systems, once we get a good training pression of the hidden message, so it uses slightly different set. It remains to be seen if new steganographic systems headers to store embedding information. Before the concan circumvent detection using class discrimination. tent is embedded, the content is Blowfish-encrypted with a user-supplied pass phrase.

Steganography detection on the Internet

Detection rate

Detection rate

Detection framework
Stegdetect is an automated utility that can analyze JPEG images that have content hidden with JSteg, JPHide, and OutGuess 0.13b. Stegdetect’s output lists the steganographic systems it finds in each image or writes “negative” if it couldn’t detect any. We calibrated Stegdetect’s detection sensitivity against a set of 500 non-stego images (of different sizes) and stego images (from different steganographic systems). On a 1,200-MHz Pentium III processor, Stegdetect can keep up with a Web crawler on a 10 MBit/s network. Stegdetect’s false-negative rate depends on the steganographic system and the embedded message’s size. The smaller the message, the harder it is to detect by statistical means. Stegdetect is very reliable in finding images that have content embedded with JSteg. For JPHide, detection depends also on the size and the compression quality of the JPEG images. Furthermore, JPHide 0.5 reduces http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

How can we use these steganalytic methods in a realworld setting—for example, to assess claims that steganographic content is regularly posted to the Internet?20–22 To find out if such claims are true, we created a steganography detection framework23 that gets JPEG images off the Internet and uses steganalysis to identify subsets of the images likely to contain steganographic content.

Steganographic systems in use
To test our framework on the Internet, we started by searching the Web and Usenet for three popular steganographic systems that can hide information in JPEG images: JSteg (and JSteg-Shell), JPHide, and OutGuess. All these systems use some form of least-significant bit embedding and are detectable with statistical analysis. JSteg-Shell is a Windows user interface to JSteg first developed by John Korejwa. It supports content encryp-

41

Steganography

Table 2. Percentages of (false) positives for analyzed images.
TEST JSteg JPHide OutGuess EBAY 0.003 1 0.1 USENET 0.007 2.1 0.14

that a high percentage of false positives had a significant effect on such a system’s efficiency.27 The situation is very similar for Stegdetect. We can calculate the true-positive rate—the probability that an image detected by Stegdetect really has steganographic content—as follows P(S ) ⋅ P( D S ) P( D ) P(S ) ⋅ P( D S ) P(S ) ⋅ P( D S ) + P(¬S ) ⋅ P( D ¬S ) ,

P(S D ) = the hidden message size by employing compression. Figure 11 shows the results of detecting JPHide and JSteg. For JSteg, we cannot detect messages smaller than 50 bytes. The false-negative rate in such cases is almost 100 percent. However, once the message size is larger than 150 bytes, our false-negative rate is less than 10 percent. For JPHide, the detection rate is independent of the message size, and the false-negative rate is at least 20 percent in all cases. Although the false-negative rate for OutGuess is around 60 percent, a high false-negative rate is preferable to a high false-positive rate, as we explain later. =

Finding images
To exercise our ability to test for steganographic content automatically, we needed images that might contain hidden messages. We picked images from eBay auctions (due to various news reports)20,21 and discussion groups in the Usenet archive for analysis.26 To get images from eBay auctions, a Web crawler that could find JPEG images was the obvious choice. Unfortunately, there were no open-source, image-capable Web crawlers available when we started our research. To get around this problem, we developed Crawl, a simple, efficient Web crawler that makes a local copy of any JPEG images it encounters on a Web page. Crawl performs a depth-first search and has two key features: • Images and Web pages can be matched against regular expressions; a match can be used to include or exclude Web pages in the search. • Minimum and maximum image size can be specified, which lets us exclude images that are too small to contain hidden messages. We restricted our search to images larger than 20 Kbytes but smaller than 400. We downloaded more than two million images linked to eBay auctions. To automate detection, Crawl uses stdout to report successfully retrieved images to Stegdetect. After processing the two million images with Stegdetect, we found that over 1 percent of all images seemed to contain hidden content. JPHide was detected most often (see Table 2). We augmented our study by analyzing an additional one million images from a Usenet archive. Most of these are likely to be false-positives. Stefan Axelsson applied the base-rate fallacy to intrusion detection systems and showed
42
IEEE SECURITY & PRIVACY ■ MAY/JUNE 2003

where P(S) is the probability of steganographic content in images, and P(¬ S) is its complement. P(D|S) is the probability that we’ll detect an image that has steganographic content, and P(D|¬ S) is the false-positive rate. Conversely, P(¬ D|S) = 1 – P(D|S) is the false-negative rate. To improve the true-positive rate, we must increase the numerator or decrease the denominator. For a given detection system, increasing the detection rate is not possible without increasing the false-positive rate and vice versa. We assume that P(S)—the probability that an image contains steganographic content—is extremely low compared to P(¬ S), the probability that an image contains no hidden message. As a result, the false-positive rate P(D|¬ S) is the dominating term in the equation; reducing it is thus the best way to increase the true-positive rate. Given these assumptions, the false-positive rate also dominates the computational costs to verifying hidden content. For a detection system to be practical, keeping the false-positive rate as low as possible is important.

Verifying hidden content
The statistical tests we used to find steganographic content in images indicate nothing more than a likelihood that content is embedded. Because of that, Stegdetect cannot guarantee a hidden message’s existence. To verify that the detected images have hidden content, Stegbreak must launch a dictionary attack against the JPEG files. JSteg-Shell, JPHide, or Outguess all hide content based on a user-supplied password, so an attacker can try to guess the password by taking a large dictionary and trying to use every single word in it to retrieve the hidden message. In addition to message data, the three systems also embed header information, so attackers can verify a guessed password using header information such as message length. For a dictionary attack28 to work, the steganographic system’s user must select a weak password (one from a small subset of the full password space). Ultimate success, though, depends on the dictionary’s quality. For the eBay images, we used a dictionary with roughly 850,000 words from several languages. For the Usenet images, we improved the dictionary by including

Steganography

Table 3. Stegbreak performance on a 1,200-MHz Pentium III.
SYSTEM ONE IMAGE (WORDS/SECOND) 4,500 18,000 36,000 FIFTY IMAGES (WORDS/SECOND) 8,700 34,000 47,000

JPHide OutGuess 0.13b JSteg

four-digit PIN numbers and short pass phrases. We created these short pass phrases by taking three- to five-letter words from a list of the 2,000 most common English words and concatenating them. The resulting dictionary contains 1.8 million words. We measured Stegbreak’s performance on a 1,200MHz Pentium III by running a dictionary attack against one image and then against a set of 50 images (see Table 3). The speed improvement for 50 images is due to key schedule caching. For JPHide, we checked about 8,700 words per second; a test run with 300 images and a dictionary of roughly 577,000 words took 10 days to check for both versions of JPHide. Blowfish is designed to make key schedule computation expensive, which slowed down Stegbreak. When checking for JPHide 0.5, the Blowfish key schedule must be recomputed for almost every image. Stegbreak was faster for OutGuess—about 34,000 words per second. However, due to limited header information, a large dictionary can produce many candidate passwords. For JSteg-Shell, Stegbreak checked about 47,000 words per second, which was fast enough to run a dictionary attack on a single computer. JStegShell restricts the key space to 40 bits, but if passwords consist of only 7-bit characters, the effective key space is reduced to 35 bits. We could search that key space in about eight days.

Center for Information Technology Integration. The combined performance required for analyzing JPHide was about 200,000 words per second, 16 times faster than a 1,200-MHz Pentium III. The slowest client contributed 471 words per second to the job; the fastest, 12,504 words per second. For the Usenet images, we increased the cluster’s size to 230 nodes. Peak performance was 870,000 keys per second, the equivalent of 72 1,200MHz Pentium III machines. For the more than two million images Crawl downloaded from eBay auctions, Stegdetect indicated that about 17,000 seemed to have steganographic content. We observed a similar detection rate for the one million images that we obtained from the Usenet archives. To verify correct behavior of participating clients, we inserted tracer images into every Stegbreak job. As expected, the dictionary attack found the correct passwords for these images.

rom our eBay and Usenet research, we so far have not found a single hidden message. We offer four explanations for our inability to find steganographic content on the Internet:

F


Distributed dictionary attack
Stegbreak is too slow to run a dictionary attack against JPHide on a single computer. Because a dictionary attack is inherently parallel, distributing it to many workstations is possible. To distribute Stegbreak jobs and data sets, we developed Disconcert, a distributed computing framework for loosely coupled workstations. There are two natural ways to parallelize a dictionary attack: each node is assigned its own set of images or each node is assigned its own part of the dictionary. With more words existing than images, the latter approach permits finer segmentation of the work. To run the dictionary attack, Disconcert hands out work units to workstations in the form of an index into the dictionary. After a node completes a work unit, it receives a new index to work on. To analyze the eBay images, Stegbreak ran on about 60 nodes at the University of Michigan, 10 of them at the

All steganographic system users carefully choose passwords that are not susceptible to dictionary attacks. • Maybe images from sources we did not analyze carry steganographic content. • Nobody uses steganographic systems that we could find. • All messages are too small for our analysis to detect. All these explanations are valid to some degree. Yet, even if the majority of passwords used to hide content were strong, we would expect to find weak passwords: one study found nearly 25 percent of all passwords were vulnerable to dictionary attack.29 Similarly, even if many of the steganographic systems used to hide messages were undetectable by our methods, we would expect to find messages hidden with the popular and accessible systems for JPEG images that are big enough to be detected. That leaves two remaining explanations: either we are looking in the wrong place or there is no widespread use of steganography on the Internet. We are currently researching new algorithms to hide information and also improve steganalysis. http://computer.org/security/ ■ IEEE SECURITY & PRIVACY

43

Steganography

Acknowledgments
We thank Patrick McDaniel, Bruce Fields, Olga Kornievskaia, José Nazario, and Thérése Pasquesi for careful reviews, Hany Farid and Jessica Fridrich for helpful comments and suggestions, Mark Giuffrida and David Andersen for computing resources, and The Internet Archive for access to their USENET archives.

References
1. R.J. Anderson and F.A.P. Petitcolas, “On the Limits of Steganography,” J. Selected Areas in Comm., vol. 16, no. 4, 1998, pp. 474–481. 2. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078. 3. J. Fridrich and M. Goljan, “Practical Steganalysis—State of the Art,” Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, SPIE Press, 2002, pp. 1–13. 4. B. Chen and G.W. Wornell, “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Trans. Information Theory, vol. 47, no. 4, 2001, pp. 1423–1443. 5. N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” Computer, vol. 31, no. 2, 1998, pp. 26–34. 6. A. Kerckhoffs, “La Cryptographie Militaire (Military Cryptography),” J. Sciences Militaires (J. Military Science, in French), Feb. 1883. 7. C. Cachin, An Information-Theoretic Model for Steganography, Cryptology ePrint Archive, Report 2000/028, 2002, www.zurich.ibm.com/˜cca/papers/stego.pdf. 8. A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61–76. 9. N.F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganographic Software,” Proc. 2nd Int’l Workshop in Information Hiding, Springer-Verlag, 1998, pp. 273–289. 10. H. Farid, “Detecting Hidden Messages Using HigherOrder Statistical Models,” Proc. Int’l Conf. Image Processing, IEEE Press, 2002. 11. S. Lyu and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” Proc. 5th Int’l Workshop on Information Hiding, SpringerVerlag, 2002. 12. N. Provos, “Defending Against Statistical Steganalysis,” Proc. 10th Usenix Security Symp., Usenix Assoc., 2001, pp. 323–335. 13. T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms,” Proc. 8th ACM Symp. Applied Computing, ACM Press, 2003. 14. H.L.V. Trees, Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory, Wiley Interscience, 2001. 44
IEEE SECURITY & PRIVACY ■ MAY/JUNE 2003

15. U. Grenander and A. Srivastave, “Probability Models for Clutter in Natural Images,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 23, no. 4, 2001. 16. J. Fridrich, M. Goljan, and D. Hogea, “Attacking the OutGuess,” Proc. ACM Workshop Multimedia and Security 2002, ACM Press, 2002. 17. A. Westfeld, “F5—A Steganographic Algorithm: High Capacity Despite Better Steganalysis,” Proc. 4th Int’l Workshop Information Hiding, Springer-Verlag, 2001, pp. 289–302. 18. J.H. van Lint, Introduction to Coding Theory, 2nd ed. Springer-Verlag, 1992. 19. J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm,” Proc. 5th Int’l Workshop Information Hiding, Springer-Verlag, 2002. 20. J. Kelley, “Terror Groups Hide Behind Web Encryption,” USA Today, Feb. 2001, www.usatoday.com/life/cyber/ tech/2001-02-05-binladen.htm. 21. D. McCullagh, “Secret Messages Come in .Wavs,” Wired News, Feb. 2001, www.wired.com/news/politics/ 0,1283,41861,00.html. 22. J. Kelley, “Militants Wire Web with Links to Jihad,” USA Today, July 2002, www.usatoday.com/news/world/ 2002/07/10/web-terror-cover.htm. 23. N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet,” Proc. 2002 Network and Distributed System Security Symp., Internet Soc., 2002. 24. B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proc., Springer-Verlag, 1993, pp. 191–204. 25. A. Latham, “Steganography: JPHIDE and JPSEEK,” 1999; http://linux01.gwdg.de/˜alatham/stego.html. 26. “The Internet Archive: Building an ‘Internet Library’,” 2001; www.archive.org. 27. S. Axelsson, “The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection,” Proc. 6th ACM Conf. Computer and Comm. Security, ACM Press, 1999, pp. 1–7. 28. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996. 29. D. Klein, “Foiling the Cracker: A Survey of, and Improvements to, Password Security,” Proc. 2nd Usenix Security Workshop, Usenix Assoc., 1990, pp. 5–14.
Niels Provos is an experimental computer scientist conducting research in steganography and in computer and network security. He is a PhD candidate at the University of Michigan and an active contributor to open-source projects. Contact him at provos@citi.umich.edu. Peter Honeyman is scientific director of the Center for Information Technology Integration and adjunct professor of electrical engineering and computer science at the University of Michigan. He is secretary of the Usenix Association, co-vice chair of IFIP WG 8.8, and a member of IFIP WG 6.1, AAAS, and EFF. Contact him at honey@citi.umich.edu.

Similar Documents

Free Essay

Steganography

...International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information...

Words: 3246 - Pages: 13

Free Essay

Information Hiding - Steganography

...Information Hiding – Steganography Steganography Types and Techniques Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the...

Words: 1519 - Pages: 7

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Premium Essay

Steganography: Encryption And Steganography

...usually an image thus making the document undetectable to human eye. Steganography has a number of nefarious applications; most notably hiding records of illegal activity, financial fraud, industrial espionage, and communication among members of criminal or terrorist organizations. This was the technique used by terrorists involved in 11 September 2001 demolition of World Trade Centre [12]. The misuse of the technology cannot be blamed on the technology itself but it totally depends upon the users of the technology. It is the inner conscious which covers the human being. If we follow our moral ethics and values and give respect to our culture we can prevent misuse of...

Words: 731 - Pages: 3

Free Essay

Is4670 Week 3 Lab

...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...

Words: 635 - Pages: 3

Premium Essay

Security Issues and Principles Research Paper

...SECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stə nóggrəfi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or "covered," and graphie, or "writing". Synonymous to abstraction, the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular...

Words: 6118 - Pages: 25

Free Essay

Watermark

...International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010 Invisible Digital Watermarking Through Encryption Samir Kumar Bandyopadhyay Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata – 700009, India Tuhin Utsab Paul Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India Avishek Raychoudhury Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India ABSTRACT Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view. keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of...

Words: 2120 - Pages: 9

Free Essay

Watermarking: Legalities of Digital Media

...Watermarking: Legalities of Digital Media Derrick Harper Course name and number Instructor name Outline I. Introduction II. History III. The Basics of Watermarking IV. Watermarking Applications V. A Simple Watermark: Patchwork VI. Current Work in Watermarking VII. Conclusion VIII. Works Cited Introduction It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief...

Words: 3166 - Pages: 13

Premium Essay

The Importance Of Digital Steganography

...big issue now a day is to reduce the chances of information detection during transmission. Cryptography deals with encryption of message but its presence arouse uncertainty about the communication, on the other hand, Steganography hides the presence of message in such a way that no one can even think about the communication going on between two parties. Due to rapid advancement in both computer technologies and Internet, the security of information is regarded as one of the most valuable factors of Information...

Words: 4083 - Pages: 17

Premium Essay

Steganography Research Paper

...Adaptive steganography based enhanced cipher hiding technique for secure data transfer Sudipta Sahana, Asst. Professor, JIS College of Engineering, West Bengal, India, ss.jisce@gmail.com Goutami Dey, U.G. Student, JIS College of Engineering, West Bengal, India, goutamidey783@gmail.com Madhurhita Ganguly, U.G. Student, JIS College of Engineering, West Bengal, India, madhurhita.ganguly@gmail.com Priyankar Paul, U.G. Student, JIS College of Engineering, West Bengal, India, priyankar.3110@gmail.com Subhayan Paul, U.G. Student, JIS College of Engineering, West Bengal, India, subhayanp@gmail.com Abstract: There have been enormous number of attacks recorded...

Words: 965 - Pages: 4

Free Essay

Paper

...Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview ● ● ● ● ● ● What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography? Stegacovered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia” What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective  Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text / Webpages...

Words: 681 - Pages: 3

Free Essay

Child Pornography on the Internet

...Internet use grows, so do the risks of children being exposed to inappropriate material, in particular, criminal activity by paedophiles and child pornographers. Many children first come in contact with the Internet at a very young age. Some children become victims of child pornography through close relatives who may have abused them. Some children become involved with chat services or newsgroup threads. It is usually through these sites that they meet child pornographers. Children may be asked to send explicit pictures of themselves taken either by a digital camera or scanned from a polaroid. The pornographer will then post the pictures on their web site, sometimes hiding them through encryption, steganography or password protecting them using a javascript or applet. Certain efforts have been made to control child pornography through legislation. In 1977 the Sexual Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18, Section 2251-2253) The law prohibits the use of a minor in the making of pornography, the transport...

Words: 1297 - Pages: 6

Premium Essay

Motion Vector

...Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text, or a picture or in a video files. Steganography is Greek word has the meaning of , “Stegano”...

Words: 2564 - Pages: 11

Premium Essay

Cis 60

...individual’s time on a website. * Store data about a user during his or her navigation of a website, even over a number of visits. When a cookie is used like this, it can be used as a shopping cart application on the website. Cookies are stored on the user's hard drive. The directory is different for each platform. RQ2: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. Further,...

Words: 665 - Pages: 3

Free Essay

Cis 417 Assignment 4 Data-Hiding Techniques

...Assignment 4 Data-Hiding Techniques Buy Now From Below: http://www.homeworkarena.com/cis-417-assignment-4-data-hiding-techniques Assignment 4 Data-Hiding Techniques.. Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific...

Words: 297 - Pages: 2