Free Essay

Information Hiding - Steganography

In:

Submitted By bobola234
Words 1519
Pages 7
Information Hiding – Steganography
Steganography Types and Techniques

Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages.

Keywords-component; steganography; information hiding; security; confidentiality; techniques.

INTRODUCTION

Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source.

METHODOLOGY

The Methodology used for this paper is based on the knowledge derived through online resources such as online publications, journals and research papers.

ORIGIN OF STEGANOGRAPHY

As information hiding techniques is receiving enormous attention lately, it was also used way back in Greece. Herodotus, a Greek historian said Histiaeus, the famous Greek tyrant used unexpected method in sending a message to his son-in-law while he was in the prison. Histiaeus shaved a slave’s head and inscribe a message on his scalp. As soon as hair grew back on the slave’s head, Histiaeus then sent him off to his son-in-law. The content of the message tattooed on the slave is not only hidden, its existence is also kept secret. Herodotus also talked about a soldier called Demeratus, who secretly needed to inform Sparta about Xerxes intentions to invade Greece. During those periods, wax-covered tablet was used as the writing medium. The message will be written directly on the wax and it will be sent to the recipient. Demeratus scraped the wax away from the wax-covered tablet, then inscribed the message on the wood beneath the wax. He then covered the wood back with wax to make it look like a blank wax-covered tablet and send to Sparta. Even if an attacker hijacked the wax-covered tablet, it will be useless because they will see it as a blank tablet. Another method of steganography used back then was the use of invisible inks. Ancient Romans uses available substances such as urine, milk and juices as invisible inks to write between lines. Once heated, the substance will darken, thereby becoming readable. Chemically produced sympathetic inks were later developed to be used as invisible inks. During World War II, invisible inks were used to convey hidden messages between lines of letters that may appear innocent when intercepted. Invisible inks are still in use mostly as anti-counterfeit practice. For example, some ink becomes legible when placed under ultraviolet light. An example is the word "VOID" printed on official documents like checks that appear when placed under ultraviolet lights like photocopying.

TYPES OF STEGANOGRAPHY

In steganography, information is mostly hidden in digital media. Media files are perfect for information hiding because of their large sizes. The techniques used in digital steganography will also be discussed in this paper. Discussed below are the types of digital steganography.

1 Audio Steganography

Audio steganography entails hiding messages or information in audio files. This method involves hiding data in MP3, WAV and AU audio files.

2 Text Steganography

Text Steganography entails hiding information inside the text files. When Text steganography is used, the hidden data is placed behind every nth letter of every words in the original text message. Text steganography proved to be one of the most difficult type of steganography due to the absence of redundancy in a text compared to audio or image. Text steganography however has an advantage which is its smaller memory usage.

3 Video Steganography

Since video files consists of images and sounds, video steganography uses both the techniques of images and sounds. Video steganography however has an essential advantage over other types, which is large quantity of data can be hidden inside the video because it contains active streams of images and sounds. Any distortions can hardly be noticed by humans due to the continuous flow of information. Video formats supported by video steganography include but not limited to Mp4, MPEG, AVI.

4 Image Steganography

In image steganography, messages or information is hidden inside a particular image. The least significant bit (LSB) of some bytes or all of the bytes of the image is tweaked to bit of the hidden message. Image steganography is widely used in digital steganography because there are lots of bit present representation of an image digitally.

[pic]
Figure 1: This is an example of how messages can be hidden in an image file. The above image contains the message “This is my Cryptography Term Paper” and can be decrypted at http://mozaiq.org/decrypt using “concordia” as the password.

5 Network or Protocol Steganography

Network or Protocol Steganography involves hiding messages or information inside the network protocols. Example of network protocols that can serve as the carrier of the information includes Transmission Control Protocol(TCP), Internet Protocol (IP), Internet Control Message Protocol (ICMP) AND User Datagram Protocol (UDP). Information can be embedded in the header of TCP segment or IP packet in some optional fields.

STEGANOGRAPHY TECHNIQUES

A good Steganography technique protects hidden data against loss due to scaling, modification, compression, interception, removal or modification etc. and also ensure the hidden information remains untouchable and recoverable. Below are the techniques used in steganography. A. Spatial Domain Technique
In this technique, the hidden information is placed directly in the pixels. Some pixel values of the carrier image are altered when hiding information. This technique can further be divided into the following categories: • Least Significant Bit (LSB) • Pixel Value Differencing (PVD) • Edges Based Embedding method (EBE) • Random Pixel Embedding method (RPE)

B. Spread Spectrum Technique
In Spread Spectrum Technique, the hidden information is distributed over a wide frequency bandwidth. The proportion of the signal to noise must be small to make it difficult or impossible to discover the existence of the hidden information. When this technique is used, it is difficult to remove the hidden information completely without absolutely destroying the original original file. This technique is mostly used in military communications because of its robustness.

C. Statistical Technique
In statistical technique, hidden information is attached to the original file (i.e. the carrier) by altering several properties of the carrier. The carrier file is divided into blocks and the message to be hidden is attached to each block in bits.

D. Transform Domain Technique
In Transform Domain Technique, the hidden message is attached in the frequency domain of the original file. Transform domain technique is a more complex way of hiding information in an image. Diverse algorithms and transformations are applied on the image file to hide the information in it. This technique is further classified into the following: • Discrete Fourier Transformation (DFT) • Discrete Cosine Transformation (DCT) • Discrete Wavelet Transformation (DWT)

E. Distortion Technique
In Distortion Technique, the hidden message is stored by distorting the signal. A series of modification is administered to the original file by the encoder. On the receiving end, the encoder calculates the differences between the original file and the distorted file to detect the series of modifications therefore recover the hidden message.

CONCLUSION

Stenography has been around for years and still has a very important place in the future of information hiding. Steganography is not a replacement for cryptography. Although steganography and cryptography defers with regards to their functions, using the techniques of steganography together with cryptography to secure information creates multiple layers of security. This can be achieved by encrypting the hidden message before its embedded in the original file (carrier).

ACKNOWLEDGEMENT

I acknowledged Prof. Ron Ruhl for introducing the concept of steganography to me and also for his percipient lectures on the course as a whole. These geared up my interest in steganography.

REFERENCES

[1] Kour, Jasleen., “Steganography Techniques – A Review Paper”, Comp. Sc., R.B.I.E.B.T., Rep., May 2014.

[2] Mozaiq [Online], https://www.mozaiq.com/encrypt (Accessed: 20 October 2015)

[3] Fadhil, Salman., “A Proposed Method of Information Hiding Based on Hybrid Cryptography and Steganography “, IJAIEM, Volume 2, Issue 4, April 2013

[4] Sagar, Pawar., “Review On Steganography For Hiding Data”, Comp. Sc. And Eng., SGBAU., Rep.IJCSMC,Vol.3, April 2004.

[5] Sabu, Thampi., “Information Hiding Techniques: A Tutorial Review”, Comp. Sc And Eng., LBSCE., Rep.2004.

[6] Gary, Kessler., “Steganography: Hiding Data Within Data”, [Online], http://www.garykessler.net/library/steganography.html (Acessed: 28 October 2015)

[7] PetaPixel [Online], http://petapixel.com/2015/08/07/a-look-at-photo-steganography-the-hiding-of-secrets-inside-digital-images/ (Accessed: 28 October 2015)

Similar Documents

Free Essay

Watermark

...International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010 Invisible Digital Watermarking Through Encryption Samir Kumar Bandyopadhyay Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata – 700009, India Tuhin Utsab Paul Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India Avishek Raychoudhury Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India ABSTRACT Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view. keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of...

Words: 2120 - Pages: 9

Premium Essay

Modularization

...Modularization, Commodization Modularity Definition: Modularity is a very general set of principles for managing complexity. By breaking up acomplex system into discrete pieces—which can then communicate with one another onlythrough standardized interfaces within a standardized architecture (Langlois, 2000) * Modularity is based on a systems theory view of organizations and their processes. It seeks to investigate how a system’s components are ‘coupled’ together and how tight these bonds are. * Modularity is important today because of the increased complexity of modern technology. * The driving normative basis for the investigation is that increased modularity enables the parts of a system to be separated and combined with much greater flexibility, and that such flexibility is desirable. * What is new is the application of the idea of modularity not only to technological design but also to organizational design. * A complex modern society might be made more productive through a modular design of social and economic institutions. * In a world of change, modularity is generally worth the costs. The goal is to find the modularization that minimizes interdependencies and most cleanly decomposes the system. * Innovation that takes place through change in the modules we can call modular innovation. * Handling complex systems become easier if break them up into sub-systems. * Complex product or process composed of smaller sub-systems that can be...

Words: 2177 - Pages: 9

Premium Essay

Programming Development Week 3

...will be present in the program as part of its implementation. Identified Objects For the Animal Shelter system there are many things that could become an object if this program is developed using an Object-oriented Programming Language. Among the most important we have User, which would identify a user inside the system with its role and some other attributes. Person, which would have all information related to a person and would be related to User. In the system a User is own by a Person. Then we would have Animal and Vaccine too, with all related information applicable. We could have other objects such as Adoption Form, Cage (the cage where the animal stays in) and Treatment but in any case, the object-oriented approach will help achieve the desired levels of encapsulation and data hiding. “The term encapsulation means to package data members and methods into a single programming unit (in our case, a class or an object created of that class) with a well-defined external boundary, or interface. Encapsulation is most often achieved through data hiding, which is the process of hiding all the facts, or secrets, of a class that do not contribute directly to others’ ability to use it” (Bohl & Rynn, 2008). Array structure selection The array structure selected is for one of the steps of creating or adding a new animal into the system, in the past week’s assignment we stated that at this step the user will be prompt to input all...

Words: 810 - Pages: 4

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Free Essay

Paper

...Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview ● ● ● ● ● ● What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography? Stegacovered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia” What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective  Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text / Webpages...

Words: 681 - Pages: 3

Premium Essay

Steganography Research Paper

...Adaptive steganography based enhanced cipher hiding technique for secure data transfer Sudipta Sahana, Asst. Professor, JIS College of Engineering, West Bengal, India, ss.jisce@gmail.com Goutami Dey, U.G. Student, JIS College of Engineering, West Bengal, India, goutamidey783@gmail.com Madhurhita Ganguly, U.G. Student, JIS College of Engineering, West Bengal, India, madhurhita.ganguly@gmail.com Priyankar Paul, U.G. Student, JIS College of Engineering, West Bengal, India, priyankar.3110@gmail.com Subhayan Paul, U.G. Student, JIS College of Engineering, West Bengal, India, subhayanp@gmail.com Abstract: There have been enormous number of attacks recorded...

Words: 965 - Pages: 4

Free Essay

Steganography

...Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information. A message is the information hidden and may be plaintext,...

Words: 3246 - Pages: 13

Premium Essay

Motion Vector

...Volume3Issue3- 2012 Hiding Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text, or a picture or in a video files. Steganography is Greek word has...

Words: 2564 - Pages: 11

Premium Essay

The Importance Of Digital Steganography

...finished over the online. With the increasing unauthorized access of secret data, information security is of great importance. Thus, a big issue now a day is to reduce the chances of information detection during transmission. Cryptography deals with encryption of message but its presence arouse uncertainty about the communication, on the other hand, Steganography hides the presence of message in such a way that no one can even think about the communication going on between two parties. Due to rapid advancement in both computer technologies and Internet, the security of information is regarded as one of the most valuable factors of Information...

Words: 4083 - Pages: 17

Free Essay

Is4670 Week 3 Lab

...Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file, or record based on the sensitivity or secrecy of the information. The four most common classification levels are top secret, secret, confidential, and restricted. 4. What are some challenges in capturing data with a RAID array? 5. What is a “smear” in forensic terms? A “smear” in forensic terms is a partial piece of information that could potentially important for digital...

Words: 635 - Pages: 3

Premium Essay

Steganography: Encryption And Steganography

...Sensitive information is usually hidden behind an innocent looking document usually an image thus making the document undetectable to human eye. Steganography has a number of nefarious applications; most notably hiding records of illegal activity, financial fraud, industrial espionage, and communication among members of criminal or terrorist organizations. This was the technique used by terrorists involved in 11 September 2001 demolition of World Trade Centre [12]. The misuse of the technology cannot be blamed on the technology itself but it totally depends upon the users of the technology. It is the inner conscious which covers the human being. If we follow our moral ethics and values and give respect to our culture we can prevent misuse of...

Words: 731 - Pages: 3

Free Essay

Cis 417 Assignment 4 Data-Hiding Techniques

...CIS 417 Assignment 4 Data-Hiding Techniques Buy Now From Below: http://www.homeworkarena.com/cis-417-assignment-4-data-hiding-techniques Assignment 4 Data-Hiding Techniques.. Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or...

Words: 297 - Pages: 2

Premium Essay

Security Issues and Principles Research Paper

...SECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stə nóggrəfi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or "covered," and graphie, or "writing". Synonymous to abstraction, the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular...

Words: 6118 - Pages: 25

Free Essay

Steganography

...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...

Words: 8940 - Pages: 36

Free Essay

Child Pornography on the Internet

...age of Information, the Internet has made all types of information readily available. Some of this information can be very useful, some can be malicious. Child pornography, also known as Paedophilia is one of these problems. Any one person can find child pornography on the internet with just a few clicks of the mouse using any search engine. Despite webmaster's and law enforcement officials' efforts to control child pornography and shut down illegal sites, new sites are posted using several ways to mask their identity. The Internet provides a new world for curious children. It offers entertainment, opportunities for education, information and communication. The Internet is a tool that opens a window of opportunities. As Internet use grows, so do the risks of children being exposed to inappropriate material, in particular, criminal activity by paedophiles and child pornographers. Many children first come in contact with the Internet at a very young age. Some children become victims of child pornography through close relatives who may have abused them. Some children become involved with chat services or newsgroup threads. It is usually through these sites that they meet child pornographers. Children may be asked to send explicit pictures of themselves taken either by a digital camera or scanned from a polaroid. The pornographer will then post the pictures on their web site, sometimes hiding them through...

Words: 1297 - Pages: 6