SlideShare a Scribd company logo
1
INTRODUCTION:
The objective of steganography is to hide a secret message within a cover-media in such
a way that others cannot discern the presence of the hidden message. Technically in simple
words “steganography means hiding one piece of data within another”.
Within the field of Computer Forensics, investigators should be aware that steganography can be
an effective means that enables concealed data to be transferred inside of seemingly innocuous
carrier files. Knowing what software applications are commonly available and how they work
gives forensic investigators a greater probability of detecting, recovering, and eventually denying
access to the data that mischievous individuals and programs are openly concealing. Generally
speaking, steganography brings science to the art of hiding information. The purpose of
steganography is to convey a message inside of a conduit of misrepresentation such that the
existence of the message is both hidden and difficult to recover when discovered. The word
steganography comes from two roots in the Greek language, “Stegos” meaning hidden covered
or roof, and “Graphia” simply meaning writing.
Modern steganography uses the opportunity of hiding information into digital multimedia
files and also at the network packet level.
Hiding information into a media requires following elements:
1) The cover media(C) that will hold the hidden data
2) The secret message (M), may be plain text, cipher text or any type of data
3) The stego function (Fe) and its inverse (Fe-1)
4) An optional stego-key (K) or password may be used to hide and unhide the Message.
The stego function operates over cover media and the message (to be hidden) along with
a stego-key (optionally) to produce a stego media (S). The schematic of steganographic operation
is shown below.
Figure 1: Steganographic operation
2
Steganography and Cryptography are great partners in spite of functional difference. It is
common practice to use cryptography with steganography.
1. ANCIENT TECHNIQUES OF STEGANOGRAPHY:
Hiding messages by masking their existence is nothing new. Classical examples include a
Roman general that shaved the head of a slave tattooing a message on his scalp. When the
slave’s hair grew back, the General dispatched the slave to deliver the hidden message to its
intended recipient.
Ancient Greeks covered tablets with wax and used them to write on. The tablets were
composed of wooden slabs. A layer of melted wax was poured over the wood and allowed to
harden as it dried. Hidden messages could be carved into the wood prior to covering the slab.
When the melted wax was poured over the slab, the now concealed message was later revealed
by the recipient when they re-melted the wax and poured it from the tablet.
Pliny the elder proved how the milk of thithymallus plant dried to transparency when
applied to paper but darkened to brown when subsequently heated.
From the 1st century through World War II invisible inks were often used to conceal
hidden messages. At first, the inks were organic substances that oxidized when heated. The heat
reaction revealed the hidden message. As time passed, compounds and substances were chosen
based on desirable chemical reactions. When the recipient mixed the compounds used to write
the invisible message with a reactive agent, the resulting chemical reaction revealed the hidden
data. Today, some commonly used compounds are visible when placed under an ultraviolet light
With any type of hidden communication, the security of the message often lies in the
secrecy of its existence and/or the secrecy of how to decode it. Cryptography often uses only a
worst case approach assuming only one of these two conditions holds.
During World War II, Velvalee Dickinson, a spy for Japan in New York City, sent
information to accommodation addresses in neutral South America. She was a dealer in dolls,
and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders,
while the concealed "plaintext" was itself encoded and gave information about ship movements,
etc. Her case became somewhat famous and she became known as the Doll Woman
3
2. MODERN TECHNIQUES OF STEGANOGRAPHY:
Focusing the discussion on steganographic techniques used in digital media, traditional
methods are employed to modify the data that defines the carrier or cover file. Modifications are
made to achieve a desired pattern. The pattern used to modify the carrier defines a bit sequence
that contains the hidden message or data. The basic principle of steganography ensures that
modifications to the data in the cover file must have insignificant or no impact to the final
presentation. Insignificant or no impact on final presentation means changes so minor in nature
that the casual observer cannot tell that a hidden message is even present.
Every digital file is composed of a sequence of binary digits (0 or 1). It is also a relatively
simple task to modify the content of a file by changing a single bit in the sequence.
Accomplishing the modification without changing the presentation or the final form of the file is
altogether a different task. For example, the binary value of the decimal number 13 consists of 4
bits (1101), changing one bit in the sequence changes the decimal value of the number it
represents and ultimately changes the meaning of the value, (i.e. 1100 is the decimal equivalent
of the number 12 not 13). The common modern technique of steganography exploits the property
of the media itself to convey a message.
The following media are the candidate for digitally embedding message: -
·Plaintext
·Still imagery
·Audio and Video
·IP datagram.
2.1 PLAINTEXT STEGANOGRAPHY
In this technique the message is hidden within a plain text file using different schemes
like use of selected characters, extra white spaces of the cover text etc.
2.1.1 USE OF SELECTED CHARACTERS OF COVER TEXT:
Sender sends a series of integer number (Key) to the recipient with a prior agreement that
the secret message is hidden within the respective position of subsequent words of the cover text.
For example the series is ‘1, 1, 2, 3, 4, 2, 4,’ and the cover text is “A team of five men joined
today”. So the hidden message is “Atfvoa”. A “0” in the number series will indicate a blank
4
space in the recovered message. The word in the received cover text will be skipped if the
number of characters in that word is less than the respective number in the series (Key) which
shall also be skipped during the process of message unhide.
2.1.2 USE OF EXTRA WHITE SPACE CHARACTERS OF COVER TEXT:
A number of extra blank spaces are inserted between consecutive words of cover text.
This numbers are mapped to a hidden message through an index of a lookup table. For example
extra three spaces between adjacent words indicate the number “3” which subsequently indicates
a specific text of a look-up table which is available to the both communicating parties as a prior
agreement.
2.2 STILL IMAGERY STEGANOGRAPHY:
The most widely used technique today is hiding of secret messages into a digital image.
This steganography technique exploits the weakness of the human visual system (HVS). HVS
cannot detect the variation in luminance of color vectors at higher frequency side of the visual
spectrum. A picture can be represented by a collection of color pixels. The individual pixels can
be represented by their optical characteristics like 'brightness', 'chroma' etc. Each of these
characteristics can be digitally expressed in terms of 1s and 0s.
Noting that by using 7 bits to represent 5 volts of amplitude, we create a relatively small
division between values (0.04V). By modifying the least significant bit (LSB) of any datum we
can only change its reproduced value by the same amount (0.04V). This imperceptible change
means that intentional modifications to the LSB of every sample may go unnoticed and allow
data to be embedded into the bit sequence. Using sequential data points to carry our message, we
can inject a 25,000 bit message into the LSB for every second of data we have recorded. When
viewing the waveform after modification, the difference in voltage at any given datum is
imperceptible to the naked eye.
For example: a 24-bit bitmap will have 8 bits, representing each of the three color values
(red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values
of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely
to be undetectable by the human eye. Hence, if the terminal recipient of the data is nothing but
human visual system (HVS) then the Least Significant Bit (LSB) can be used for something else
5
other than color information. This technique can be directly applied on digital image in bitmap
format as well as for the compressed image format like JPEG. In JPEG format, each pixel of the
image is digitally coded using discrete cosine transformation (DCT). The LSB of encoded DCT
components can be used as the carriers of the hidden message.
The details of above techniques are explained below:
In some documents binary information can be stored by shifting the placement of letters
slightly to represent a binary value. Although usually accomplished with a pictorial
representation of the letter or the entire document, it is possible to embed the information in a
Microsoft Office Word document such as this. Consider embedding the binary value of the
ASCII letter “T” - 01010100 into the word “Singular.” We can inject the binary string by varying
the spacing between the letters to indicate a zero or a one. For comparison, a fixed or naturally
spaced version of the word is displayed below the encoded version.
Grey lines have been added to more easily identify the characters that have been shifted
to represent a binary value of one. In the example below, all non-shifted (i.e. normally spaced
and not touching the reference line) characters are assumed to represent a zero.
Note that the “i", “g”, and the “l” are touching grey lines thus indicating a high state or
the binary value one for that position. When pieced back together the values are as follows S-0,
i-1, n- 0, g-1, u-0, l-1, a-0, r-0 or 01010100. Other methods of encoding files include a stepped
character approach (where the message is conveyed with embedded characters separated by a
fixed number or constant step) and the addition or subtraction of white space and/or carriage
returns at the end of every line. The stepped character method is more difficult to accomplish
because producing indistinguishable carrier messages that mask the hidden content may require
unnatural or awkward language.
2.2.1 MODIFICATION OF LSB OF A COVER IMAGE IN 'BITMAP' FORMAT:
In this method binary equivalent of the message (to be hidden) is distributed among the
LSBs of each pixel. For example we will try to hide the character ‘A’ into an 8-bit color image.
We are taking eight consecutive pixels from top left corner of the image.
The equivalent binary bit pattern of those pixels may be like this: -
00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111
6
Then each bit of binary equivalence of letter 'A' i.e. 01100101 are copied serially (from the left
hand side) to the LSB's of equivalent binary pattern of pixels, resulting the bit pattern will
become like this: -
00100110 11101001 11001001 00100110 11001000 11101001 11001000 00100111
The only problem with this technique is that it is very vulnerable to attacks such as image
compression and formatting.
2.2.2 APPLYING LSB TECHNIQUE DURING DISCRETE COSINE
TRANSFORMATION (DCT) ON COVER IMAGE:
The following steps are followed in this case: -
1. The Image is broken into data units each of them consists of 8 x 8 block of pixels.
2. Working from top-left to bottom-right of the cover image, DCT is applied to each pixel of
each data unit.
3. After applying DCT, one DCT Coefficient is generated for each pixel in data unit.
4. Each DCT coefficient is then quantized against a reference quantization table.
5. The LSB of binary equivalent the quantized DCT coefficient can be replaced by a bit from
secret message.
6. Encoding is then applied to each modified quantized DCT coefficient to produce compressed
Stego Image.
Figure 2: Example of still imagery steganography. Left hand side image is the original
cover image, whereas right hand side does embedding a text file into the cover image make
the stego image.
7
2.3 AUDIO STEGANOGRAPHY:
In audio steganography, secret message is embedded into digitized audio signal which
result slight altering of binary sequence of the corresponding audio file. There are several
methods are available for audio steganography. Some of them are as follows: -
2.3.1 LSB CODING:
Sampling technique followed by Quantization converts analog audio signal to digital
binary sequence.
Figure 3: Sampling of the Sine Wave followed by Quantization process.
The LSB bits of the audio signal are then replaced with the secret binary message.
For example if we want to hide the letter ‘A’ (binary equivalent 01100101) to an digitized audio
file where each sample is represented with 16 bits, then LSB of 8 consecutive samples (each of
16 bit size) is replaced with each bit of binary equivalent of the letter ‘A’.
Sampled Audio Stream
(16 bit)
‘A’ in binary
Audio stream with encoded
message
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1010 0111 1111 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Table 1: sending secret binary message in audio stream
8
2.3.2 PHASE CODING:
Human Auditory System (HAS) can’t recognize the phase change in audio signal as easy
it can recognize noise in the signal. The phase coding method exploits this fact. This technique
encodes the secret message bits as phase shifts in the phase spectrum of a digital signal,
achieving an inaudible encoding in terms of signal-to- noise ratio.
2.3.3 ECHO HIDING:
In this method the secret message is embedded into cover audio signal as an echo. Three
parameters of the echo of the cover signal namely amplitude, decay rate and offset from original
signal are varied to represent encoded secret binary message. They are set below to the threshold
of Human Auditory System (HAS) so that echo can’t be easily resolved. Video files are
generally consists of images and sounds, so most of the relevant techniques for hiding data into
images and audio are also applicable to video media. In the case of Video steganography sender
sends the secret message to the recipient using a video sequence as cover media.
2.4 VIDEO STEGANOGRAPHY:
Optional secret key ‘K’ can also be used during embedding the secret message to the
cover media to produce ‘stego-video’. After that the stego-video is communicated over public
channel to the receiver. At the receiving end, receiver uses the secret key along with the
extracting algorithm to extract the secret message from the stego-object.
The original cover video consists of frames represented by Ck(m,n) where 1 < k < N.
‘N’ is the total number of frame and m,n are the row and column indices of the pixels,
respectively. The binary secret message denoted by Mk(m, n) is embedded into the cover video
media by modulating it into a signal. Mk(m, n) is defined over the same domain as the host
Ck(m, n).The stego-video signal is represented by the equation
Sk(m, n) = Ck(m, n)+ak (m, n) Mk(m, n) , k = 1, 2, 3 . . .N
where ak (m, n) is a scaling factor. For simplicity ak(m, n) can be considered to be constant over
all the pixels and frames. So the equation becomes:
Sk(m, n) = Ck(m, n)+a(m, n) Mk(m, n) , k = 1, 2, 3 . . .N
9
2.5 IP DATAGRAM STEGANOGRAPHY:
This is another approach of steganography, which employs hiding data in the network
datagram level in a TCP/IP based network like Internet. Network Covert Channel is the synonym
of network steganography. Overall goal of this approach to make the stego datagram is
undetectable by Network watchers like sniffer, Intrusion Detection System (IDS) etc. In this
approach information to be hide is placed in the IP header of a TCP/IP datagram. Some of the
fields of IP header and TCP header in an IPv4 network are chosen for data hiding.
First we will demonstrate how ‘Flags’ and ‘Identification’ field of Ipv4 header can
be exploited by this methodology.
Figure 4: IPv4 header
2.5.1 CHANNEL COMMUNICATION USING ‘FLAGS’ FIELD:
The size of Flag field is 3 bit. There are 3 flags denoted by each bit. First bit is reserved.
Second and third one denoted by DF (Don’t fragment) and MF (More Fragment) respectively.
An un-fragmented datagram has all zero fragmentation information (i.e. MF = 0 and 13-bit
Fragment Offset = 0) which gives rise to a redundancy condition, i.e. DF (Do not Fragment) can
carry either ‘0’ or ‘1’ subject to the knowledge of the maximum size of the datagram.
Now if sender and recipient both have a prior knowledge of Maximum Transfer Unit
(MTU) of their network then they can covertly communicate with each other using DF flag bit of
IP header. Datagram length should be less than path MTU otherwise packet will be fragmented
and this method will not work. The following table shows the how the sender communicates 1
and 0 to the recipient by using DF flag bit.
10
Datagram 3-bit Flag field 13-bit fragment offset Remarks
1 010 00…00
Datagram 1 covertly
communicating ‘1’
2 000 00…00
Datagram 2 covertly
communicating ‘0’
Table 2: sending secret message in flag field of datagram
This is an example of covert communication since there is no way to the network
monitoring devices like IDS or sniffer to detect the communication because cover datagram is a
normal datagram. As the payload is untouched, there is no way an IDS or any other content
filtering device could recognize this activity. In major constraint of this approach is both parties
should have prior knowledge of path MTU and datagram from sender should not be fragmented
further in the way.
2.5.2 CHANNEL COMMUNICATION USING ‘IDENTIFICATION’ FIELD:
The ‘16-bit identification field’ in IPv4 header is used to identify the fragmented packed
of an IP datagram. If there is no fragmentation of datagram, then this Identification field can be
used to embed sender specified information.
3. STEGANALYSIS:
Steganalysis is the process of identifying steganography by inspecting various parameter of a
stego media. The primary step of this process is to identify a suspected stego media. After that
steganalysis process determines whether that media contains hidden message or not and then try
to recover the message from it.
Steganalysis is the art and science behind the detection of the use of steganography by a
third party. The basic function of steganalysis is to first detect or estimate the probability that
hidden information is present in any given file. The detection and estimation is based only on the
data presented in its observable form (i.e. nothing is known about the file prior to investigation).
Because simply detecting the presence of hidden data may not be sufficient, steganalysis also
covers the functions of extracting the message, disabling and/or destroying the hidden message
so that it cannot be extracted, and finally, altering the hidden message such that misinformation
can be sent to the intended recipient instead of the original message.
11
In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly
contains the hidden message because the message is scrambled. But in the case of steganalysis
this may not be true. The suspected media may or may not be with hidden message. The
steganalysis process starts with a set of suspected information streams. Then the set is reduced
with the help of advance statistical methods.
A good method to find hidden messages inside pictures is by using an hexadecimal editor
and read the image header first bytes, for example a GIF image seen by an hexadecimal editor
will always read “47 49 46 38″, it means “GIF” in ASCII code, if a GIF image has been used to
hide a message within it when viewed with an hex editor the first identifying bytes will be
different from the standard ones.
There are automated tools to detect steganography, one such tool is Stegdetect, capable of
detecting messages in jpeg images, after a hidden message has been found a brute force attack
can be launched, with dictionary words attempting to guess the password and expose the data.
Highly compressed data like .rar, .mp3 or .jpeg files make it more difficult to hide data
inside because they have less “spare” bits available, if you want to make it tough for someone to
find your hidden data use an uncompressed carrier file, like .bmp for images and .wav for sound.
3.1 STEGANALYSIS TECHNIQUES:
The properties of electronic media are being changed after hiding any object into that.
This can result in the form of degradation in terms of quality or unusual characteristics of the
media: Steganalysis techniques based on unusual pattern in the media or Visual Detection of the
same. In the case of Visual detection steganalysis technique a set of stego images are compared
with original cover images and note the visible difference. Signature of the hidden message can
be derived by comparing numerous images. Cropping or padding of image also is a visual clue of
hidden message because some stego tool is cropping or padding blank spaces to fit the stego
image into fixed size. Difference in file size between cover image and stego images, increase or
decrease of unique colors in stego images can also be used in the Visual Detection steganalysis
technique.
12
3.2 STEGANOGRAPHY ATTACKS:
Steganographic attacks consist of detecting, extracting and destroying hidden object of the stego
media. Steganography attack is followed by steganalysis. There are several types of attacks
based on the information available for analysis. Some of them are as follows: -
Known carrier attack: The original cover media and stego media both are available for
analysis.
Steganography only attack: In this type of attacks, only stego media is available for analysis.
Known message attack: The hidden message is known in this case.
Known steganography attack: The cover media, stego media as well as the steganography tool
or algorithm, are known.
4. ADVANTAGES OF STEGANALYSIS:
 It does not attract attention: Encrypting a message gives away that there is something of
value and this will attract unwanted attention.
 Packet sniffing barrier: Encrypted email messages start with a line identifying them as an
encrypted message, making it easy for a packet sniffer on an ISP to flag encrypted emails
by just scanning for the word PGP or GnuPG, this can not be used against steganography.
 Makes Internet surveillance difficult: If someone’s Internet activities are being monitored
visiting Flickr and uploading personal family photos with hidden messages will not
trigger any alarm but sending encrypted messages and visiting a political discussion
forum will.
 Difficult to prove it exists: In some countries like the United Kingdom you can be
required by the police to provide the password to your encrypted files, refusing to do so
carries a prison sentence, if the data has been hidden inside a photograph the police
would first have to show beyond reasonable doubt that there is definitely something
hidden inside the file.
Advantages of Steganography over Cryptography:
The advantage of steganography over cryptography alone is that messages do not attract
attention to themselves. Plainly visible encrypted messages no matter how unbreakable will
13
arouse suspicion, and may in themselves be incriminating in countries where encryption is
illegal. Therefore, whereas cryptography protects the contents of a message, steganography can
be said to protect both messages and communicating parties.
5. DISADVANTAGES OF STEGANALYSIS:
 The main problem with this is that either you or the person you're sending the "secret"
message to need to be able to find the message. And if you can find it, then the bad guys
you want to keep the message a secret from can find it, too.
 There are many limitations to this particular algorithm/ implementation. It relies on every
single bit of information in the image being preserved. If, at any stage, the image is
converted to a lossy format for storage (such as JPEG file), the subtle color information is
lost.
 Even simple rounding/changes, smoothing, color palette optimizations, contrast
adjustments; totally blows away all the hidden information, and you only get garbage
noise when decoding.
 If there is a bit flipping caused by any degradation in the image, video or datagram, then
the hidden message even when retrieved will contain incomplete information.
 Threat to national security when used by the wrong hands.
6. APPLICATIONS OF STEGANOGRAPHY:
 Modern day printers: Steganography is used by some modern printers,
including HP and Xerox brand color laser printers. Tiny yellow dots are added to each
page. The dots are barely visible and contain encoded printer serial numbers, as well as
date and time stamps.
 Use by terrorists: if some of them want to send a data into the other part of the country
even with all the IDS, then they have to secretly send the data using steganography.
 Military applications: when someone wants to send a message to a base camp, probably
one which attracts less attention, then steganography can be of use.
 Foreign intelligence services; espionage against sensitive but poorly defended data in
government and industry systems; subversion by insiders, including vendors and
14
contractors; criminal activity, primarily involving fraud and theft of financial or identity
information, by hackers and organized crime groups.
 Alleged use by intelligent services: In 2010, the Federal Bureau of Investigation revealed
that the Russian foreign intelligence service uses customized steganography software for
embedding encrypted text messages inside image files for certain communications with
"illegal agents" (agents under non-diplomatic cover) stationed abroad.
7. CONCLUSION:
In this paper, different techniques are discussed for embedding data in text, image, audio/video
signals and IP datagram as cover media. All the proposed methods have some limitations. The
stego multimedia produced by mentioned methods for multimedia steganography are more or
less vulnerable to attack like media formatting, compression etc. In this respect, IP datagram
steganography technique is not susceptible to that type of attacks. Steganalysis is the technique
to detect steganography or defeat steganography. The research to device strong steganographic
and steganalysis technique is a continuous process.
Computer forensic professionals need to be aware of the difficulties in identifying the use
of steganography in any investigation. As with many digital age technologies, steganography
techniques are becoming increasingly more sophisticated and difficult to reliably detect. Once
use is detected or discovered, obtaining the ability to recover the embedded content is becoming
difficult as well. Acquiring knowledge of current steganographic techniques, along with their
associated data types, can provide a critical advantage to an investigator by adding valuable tools
to their forensic toolkit.
Finally, due to the relatively simple techniques capable of denying the exploitation of a
covert steganographic channel, companies may wish to take precautionary measures. By
enacting measures discussed in this paper, they can ensure their proprietary and trade secret
information is not being shoplifted inside of the daily podcast, shared in family photos, or
distributed via the latest YouTube video.
15
8. REFERENCES:
 Steganography from Wikipedia:
http://en.wikipedia.org/wiki/Steganography
 An Overview of Steganography, James Madison University Infosec Techreport,
Department of Computer Science:
http://ce.sharif.edu/courses/Steganography.pdf
 Watermarking techniques:
Digital Image Processing by Gonzalez and woods, 3rd edition.
 Steganography and Steganalysis, Tata institute of technology paper.
www.tifr.res.in/Soumyendu_Steganography_Steganalysis

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
rabinaneumon
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
IJRES Journal
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
research30
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
IJNSA Journal
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Em24873876
Em24873876Em24873876
Em24873876
IJERA Editor
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 
Cryptography
CryptographyCryptography
Cryptography
research30
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
IJNSA Journal
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
Techglyphs
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
01337277
0133727701337277
01337277
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Em24873876
Em24873876Em24873876
Em24873876
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Cryptography
CryptographyCryptography
Cryptography
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 
114 120
114 120114 120
114 120
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 

Similar to Steganography

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
ssuserff72e4
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
IJERA Editor
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Dy35710714
Dy35710714Dy35710714
Dy35710714
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccPrabhu Prabhu
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
IJRES Journal
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
Mohammed Kharma
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
ER Publication.org
 

Similar to Steganography (20)

informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Dy35710714
Dy35710714Dy35710714
Dy35710714
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
Presentation1
Presentation1Presentation1
Presentation1
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
 
Ijetr011937
Ijetr011937Ijetr011937
Ijetr011937
 
Steganography
SteganographySteganography
Steganography
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Steganography

  • 1. 1 INTRODUCTION: The objective of steganography is to hide a secret message within a cover-media in such a way that others cannot discern the presence of the hidden message. Technically in simple words “steganography means hiding one piece of data within another”. Within the field of Computer Forensics, investigators should be aware that steganography can be an effective means that enables concealed data to be transferred inside of seemingly innocuous carrier files. Knowing what software applications are commonly available and how they work gives forensic investigators a greater probability of detecting, recovering, and eventually denying access to the data that mischievous individuals and programs are openly concealing. Generally speaking, steganography brings science to the art of hiding information. The purpose of steganography is to convey a message inside of a conduit of misrepresentation such that the existence of the message is both hidden and difficult to recover when discovered. The word steganography comes from two roots in the Greek language, “Stegos” meaning hidden covered or roof, and “Graphia” simply meaning writing. Modern steganography uses the opportunity of hiding information into digital multimedia files and also at the network packet level. Hiding information into a media requires following elements: 1) The cover media(C) that will hold the hidden data 2) The secret message (M), may be plain text, cipher text or any type of data 3) The stego function (Fe) and its inverse (Fe-1) 4) An optional stego-key (K) or password may be used to hide and unhide the Message. The stego function operates over cover media and the message (to be hidden) along with a stego-key (optionally) to produce a stego media (S). The schematic of steganographic operation is shown below. Figure 1: Steganographic operation
  • 2. 2 Steganography and Cryptography are great partners in spite of functional difference. It is common practice to use cryptography with steganography. 1. ANCIENT TECHNIQUES OF STEGANOGRAPHY: Hiding messages by masking their existence is nothing new. Classical examples include a Roman general that shaved the head of a slave tattooing a message on his scalp. When the slave’s hair grew back, the General dispatched the slave to deliver the hidden message to its intended recipient. Ancient Greeks covered tablets with wax and used them to write on. The tablets were composed of wooden slabs. A layer of melted wax was poured over the wood and allowed to harden as it dried. Hidden messages could be carved into the wood prior to covering the slab. When the melted wax was poured over the slab, the now concealed message was later revealed by the recipient when they re-melted the wax and poured it from the tablet. Pliny the elder proved how the milk of thithymallus plant dried to transparency when applied to paper but darkened to brown when subsequently heated. From the 1st century through World War II invisible inks were often used to conceal hidden messages. At first, the inks were organic substances that oxidized when heated. The heat reaction revealed the hidden message. As time passed, compounds and substances were chosen based on desirable chemical reactions. When the recipient mixed the compounds used to write the invisible message with a reactive agent, the resulting chemical reaction revealed the hidden data. Today, some commonly used compounds are visible when placed under an ultraviolet light With any type of hidden communication, the security of the message often lies in the secrecy of its existence and/or the secrecy of how to decode it. Cryptography often uses only a worst case approach assuming only one of these two conditions holds. During World War II, Velvalee Dickinson, a spy for Japan in New York City, sent information to accommodation addresses in neutral South America. She was a dealer in dolls, and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders, while the concealed "plaintext" was itself encoded and gave information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman
  • 3. 3 2. MODERN TECHNIQUES OF STEGANOGRAPHY: Focusing the discussion on steganographic techniques used in digital media, traditional methods are employed to modify the data that defines the carrier or cover file. Modifications are made to achieve a desired pattern. The pattern used to modify the carrier defines a bit sequence that contains the hidden message or data. The basic principle of steganography ensures that modifications to the data in the cover file must have insignificant or no impact to the final presentation. Insignificant or no impact on final presentation means changes so minor in nature that the casual observer cannot tell that a hidden message is even present. Every digital file is composed of a sequence of binary digits (0 or 1). It is also a relatively simple task to modify the content of a file by changing a single bit in the sequence. Accomplishing the modification without changing the presentation or the final form of the file is altogether a different task. For example, the binary value of the decimal number 13 consists of 4 bits (1101), changing one bit in the sequence changes the decimal value of the number it represents and ultimately changes the meaning of the value, (i.e. 1100 is the decimal equivalent of the number 12 not 13). The common modern technique of steganography exploits the property of the media itself to convey a message. The following media are the candidate for digitally embedding message: - ·Plaintext ·Still imagery ·Audio and Video ·IP datagram. 2.1 PLAINTEXT STEGANOGRAPHY In this technique the message is hidden within a plain text file using different schemes like use of selected characters, extra white spaces of the cover text etc. 2.1.1 USE OF SELECTED CHARACTERS OF COVER TEXT: Sender sends a series of integer number (Key) to the recipient with a prior agreement that the secret message is hidden within the respective position of subsequent words of the cover text. For example the series is ‘1, 1, 2, 3, 4, 2, 4,’ and the cover text is “A team of five men joined today”. So the hidden message is “Atfvoa”. A “0” in the number series will indicate a blank
  • 4. 4 space in the recovered message. The word in the received cover text will be skipped if the number of characters in that word is less than the respective number in the series (Key) which shall also be skipped during the process of message unhide. 2.1.2 USE OF EXTRA WHITE SPACE CHARACTERS OF COVER TEXT: A number of extra blank spaces are inserted between consecutive words of cover text. This numbers are mapped to a hidden message through an index of a lookup table. For example extra three spaces between adjacent words indicate the number “3” which subsequently indicates a specific text of a look-up table which is available to the both communicating parties as a prior agreement. 2.2 STILL IMAGERY STEGANOGRAPHY: The most widely used technique today is hiding of secret messages into a digital image. This steganography technique exploits the weakness of the human visual system (HVS). HVS cannot detect the variation in luminance of color vectors at higher frequency side of the visual spectrum. A picture can be represented by a collection of color pixels. The individual pixels can be represented by their optical characteristics like 'brightness', 'chroma' etc. Each of these characteristics can be digitally expressed in terms of 1s and 0s. Noting that by using 7 bits to represent 5 volts of amplitude, we create a relatively small division between values (0.04V). By modifying the least significant bit (LSB) of any datum we can only change its reproduced value by the same amount (0.04V). This imperceptible change means that intentional modifications to the LSB of every sample may go unnoticed and allow data to be embedded into the bit sequence. Using sequential data points to carry our message, we can inject a 25,000 bit message into the LSB for every second of data we have recorded. When viewing the waveform after modification, the difference in voltage at any given datum is imperceptible to the naked eye. For example: a 24-bit bitmap will have 8 bits, representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Hence, if the terminal recipient of the data is nothing but human visual system (HVS) then the Least Significant Bit (LSB) can be used for something else
  • 5. 5 other than color information. This technique can be directly applied on digital image in bitmap format as well as for the compressed image format like JPEG. In JPEG format, each pixel of the image is digitally coded using discrete cosine transformation (DCT). The LSB of encoded DCT components can be used as the carriers of the hidden message. The details of above techniques are explained below: In some documents binary information can be stored by shifting the placement of letters slightly to represent a binary value. Although usually accomplished with a pictorial representation of the letter or the entire document, it is possible to embed the information in a Microsoft Office Word document such as this. Consider embedding the binary value of the ASCII letter “T” - 01010100 into the word “Singular.” We can inject the binary string by varying the spacing between the letters to indicate a zero or a one. For comparison, a fixed or naturally spaced version of the word is displayed below the encoded version. Grey lines have been added to more easily identify the characters that have been shifted to represent a binary value of one. In the example below, all non-shifted (i.e. normally spaced and not touching the reference line) characters are assumed to represent a zero. Note that the “i", “g”, and the “l” are touching grey lines thus indicating a high state or the binary value one for that position. When pieced back together the values are as follows S-0, i-1, n- 0, g-1, u-0, l-1, a-0, r-0 or 01010100. Other methods of encoding files include a stepped character approach (where the message is conveyed with embedded characters separated by a fixed number or constant step) and the addition or subtraction of white space and/or carriage returns at the end of every line. The stepped character method is more difficult to accomplish because producing indistinguishable carrier messages that mask the hidden content may require unnatural or awkward language. 2.2.1 MODIFICATION OF LSB OF A COVER IMAGE IN 'BITMAP' FORMAT: In this method binary equivalent of the message (to be hidden) is distributed among the LSBs of each pixel. For example we will try to hide the character ‘A’ into an 8-bit color image. We are taking eight consecutive pixels from top left corner of the image. The equivalent binary bit pattern of those pixels may be like this: - 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111
  • 6. 6 Then each bit of binary equivalence of letter 'A' i.e. 01100101 are copied serially (from the left hand side) to the LSB's of equivalent binary pattern of pixels, resulting the bit pattern will become like this: - 00100110 11101001 11001001 00100110 11001000 11101001 11001000 00100111 The only problem with this technique is that it is very vulnerable to attacks such as image compression and formatting. 2.2.2 APPLYING LSB TECHNIQUE DURING DISCRETE COSINE TRANSFORMATION (DCT) ON COVER IMAGE: The following steps are followed in this case: - 1. The Image is broken into data units each of them consists of 8 x 8 block of pixels. 2. Working from top-left to bottom-right of the cover image, DCT is applied to each pixel of each data unit. 3. After applying DCT, one DCT Coefficient is generated for each pixel in data unit. 4. Each DCT coefficient is then quantized against a reference quantization table. 5. The LSB of binary equivalent the quantized DCT coefficient can be replaced by a bit from secret message. 6. Encoding is then applied to each modified quantized DCT coefficient to produce compressed Stego Image. Figure 2: Example of still imagery steganography. Left hand side image is the original cover image, whereas right hand side does embedding a text file into the cover image make the stego image.
  • 7. 7 2.3 AUDIO STEGANOGRAPHY: In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. There are several methods are available for audio steganography. Some of them are as follows: - 2.3.1 LSB CODING: Sampling technique followed by Quantization converts analog audio signal to digital binary sequence. Figure 3: Sampling of the Sine Wave followed by Quantization process. The LSB bits of the audio signal are then replaced with the secret binary message. For example if we want to hide the letter ‘A’ (binary equivalent 01100101) to an digitized audio file where each sample is represented with 16 bits, then LSB of 8 consecutive samples (each of 16 bit size) is replaced with each bit of binary equivalent of the letter ‘A’. Sampled Audio Stream (16 bit) ‘A’ in binary Audio stream with encoded message 1001 1000 0011 1100 0 1001 1000 0011 1100 1101 1011 0011 1000 1 1101 1011 0011 1001 1011 1100 0011 1101 1 1011 1100 0011 1101 1011 1111 0011 1100 0 1011 1111 0011 1100 1011 1010 0111 1111 0 1011 1010 0111 1110 1111 1000 0011 1100 1 1111 1000 0011 1101 1101 1100 0111 1000 0 1101 1100 0111 1000 1000 1000 0001 1111 1 1000 1000 0001 1111 Table 1: sending secret binary message in audio stream
  • 8. 8 2.3.2 PHASE CODING: Human Auditory System (HAS) can’t recognize the phase change in audio signal as easy it can recognize noise in the signal. The phase coding method exploits this fact. This technique encodes the secret message bits as phase shifts in the phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to- noise ratio. 2.3.3 ECHO HIDING: In this method the secret message is embedded into cover audio signal as an echo. Three parameters of the echo of the cover signal namely amplitude, decay rate and offset from original signal are varied to represent encoded secret binary message. They are set below to the threshold of Human Auditory System (HAS) so that echo can’t be easily resolved. Video files are generally consists of images and sounds, so most of the relevant techniques for hiding data into images and audio are also applicable to video media. In the case of Video steganography sender sends the secret message to the recipient using a video sequence as cover media. 2.4 VIDEO STEGANOGRAPHY: Optional secret key ‘K’ can also be used during embedding the secret message to the cover media to produce ‘stego-video’. After that the stego-video is communicated over public channel to the receiver. At the receiving end, receiver uses the secret key along with the extracting algorithm to extract the secret message from the stego-object. The original cover video consists of frames represented by Ck(m,n) where 1 < k < N. ‘N’ is the total number of frame and m,n are the row and column indices of the pixels, respectively. The binary secret message denoted by Mk(m, n) is embedded into the cover video media by modulating it into a signal. Mk(m, n) is defined over the same domain as the host Ck(m, n).The stego-video signal is represented by the equation Sk(m, n) = Ck(m, n)+ak (m, n) Mk(m, n) , k = 1, 2, 3 . . .N where ak (m, n) is a scaling factor. For simplicity ak(m, n) can be considered to be constant over all the pixels and frames. So the equation becomes: Sk(m, n) = Ck(m, n)+a(m, n) Mk(m, n) , k = 1, 2, 3 . . .N
  • 9. 9 2.5 IP DATAGRAM STEGANOGRAPHY: This is another approach of steganography, which employs hiding data in the network datagram level in a TCP/IP based network like Internet. Network Covert Channel is the synonym of network steganography. Overall goal of this approach to make the stego datagram is undetectable by Network watchers like sniffer, Intrusion Detection System (IDS) etc. In this approach information to be hide is placed in the IP header of a TCP/IP datagram. Some of the fields of IP header and TCP header in an IPv4 network are chosen for data hiding. First we will demonstrate how ‘Flags’ and ‘Identification’ field of Ipv4 header can be exploited by this methodology. Figure 4: IPv4 header 2.5.1 CHANNEL COMMUNICATION USING ‘FLAGS’ FIELD: The size of Flag field is 3 bit. There are 3 flags denoted by each bit. First bit is reserved. Second and third one denoted by DF (Don’t fragment) and MF (More Fragment) respectively. An un-fragmented datagram has all zero fragmentation information (i.e. MF = 0 and 13-bit Fragment Offset = 0) which gives rise to a redundancy condition, i.e. DF (Do not Fragment) can carry either ‘0’ or ‘1’ subject to the knowledge of the maximum size of the datagram. Now if sender and recipient both have a prior knowledge of Maximum Transfer Unit (MTU) of their network then they can covertly communicate with each other using DF flag bit of IP header. Datagram length should be less than path MTU otherwise packet will be fragmented and this method will not work. The following table shows the how the sender communicates 1 and 0 to the recipient by using DF flag bit.
  • 10. 10 Datagram 3-bit Flag field 13-bit fragment offset Remarks 1 010 00…00 Datagram 1 covertly communicating ‘1’ 2 000 00…00 Datagram 2 covertly communicating ‘0’ Table 2: sending secret message in flag field of datagram This is an example of covert communication since there is no way to the network monitoring devices like IDS or sniffer to detect the communication because cover datagram is a normal datagram. As the payload is untouched, there is no way an IDS or any other content filtering device could recognize this activity. In major constraint of this approach is both parties should have prior knowledge of path MTU and datagram from sender should not be fragmented further in the way. 2.5.2 CHANNEL COMMUNICATION USING ‘IDENTIFICATION’ FIELD: The ‘16-bit identification field’ in IPv4 header is used to identify the fragmented packed of an IP datagram. If there is no fragmentation of datagram, then this Identification field can be used to embed sender specified information. 3. STEGANALYSIS: Steganalysis is the process of identifying steganography by inspecting various parameter of a stego media. The primary step of this process is to identify a suspected stego media. After that steganalysis process determines whether that media contains hidden message or not and then try to recover the message from it. Steganalysis is the art and science behind the detection of the use of steganography by a third party. The basic function of steganalysis is to first detect or estimate the probability that hidden information is present in any given file. The detection and estimation is based only on the data presented in its observable form (i.e. nothing is known about the file prior to investigation). Because simply detecting the presence of hidden data may not be sufficient, steganalysis also covers the functions of extracting the message, disabling and/or destroying the hidden message so that it cannot be extracted, and finally, altering the hidden message such that misinformation can be sent to the intended recipient instead of the original message.
  • 11. 11 In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly contains the hidden message because the message is scrambled. But in the case of steganalysis this may not be true. The suspected media may or may not be with hidden message. The steganalysis process starts with a set of suspected information streams. Then the set is reduced with the help of advance statistical methods. A good method to find hidden messages inside pictures is by using an hexadecimal editor and read the image header first bytes, for example a GIF image seen by an hexadecimal editor will always read “47 49 46 38″, it means “GIF” in ASCII code, if a GIF image has been used to hide a message within it when viewed with an hex editor the first identifying bytes will be different from the standard ones. There are automated tools to detect steganography, one such tool is Stegdetect, capable of detecting messages in jpeg images, after a hidden message has been found a brute force attack can be launched, with dictionary words attempting to guess the password and expose the data. Highly compressed data like .rar, .mp3 or .jpeg files make it more difficult to hide data inside because they have less “spare” bits available, if you want to make it tough for someone to find your hidden data use an uncompressed carrier file, like .bmp for images and .wav for sound. 3.1 STEGANALYSIS TECHNIQUES: The properties of electronic media are being changed after hiding any object into that. This can result in the form of degradation in terms of quality or unusual characteristics of the media: Steganalysis techniques based on unusual pattern in the media or Visual Detection of the same. In the case of Visual detection steganalysis technique a set of stego images are compared with original cover images and note the visible difference. Signature of the hidden message can be derived by comparing numerous images. Cropping or padding of image also is a visual clue of hidden message because some stego tool is cropping or padding blank spaces to fit the stego image into fixed size. Difference in file size between cover image and stego images, increase or decrease of unique colors in stego images can also be used in the Visual Detection steganalysis technique.
  • 12. 12 3.2 STEGANOGRAPHY ATTACKS: Steganographic attacks consist of detecting, extracting and destroying hidden object of the stego media. Steganography attack is followed by steganalysis. There are several types of attacks based on the information available for analysis. Some of them are as follows: - Known carrier attack: The original cover media and stego media both are available for analysis. Steganography only attack: In this type of attacks, only stego media is available for analysis. Known message attack: The hidden message is known in this case. Known steganography attack: The cover media, stego media as well as the steganography tool or algorithm, are known. 4. ADVANTAGES OF STEGANALYSIS:  It does not attract attention: Encrypting a message gives away that there is something of value and this will attract unwanted attention.  Packet sniffing barrier: Encrypted email messages start with a line identifying them as an encrypted message, making it easy for a packet sniffer on an ISP to flag encrypted emails by just scanning for the word PGP or GnuPG, this can not be used against steganography.  Makes Internet surveillance difficult: If someone’s Internet activities are being monitored visiting Flickr and uploading personal family photos with hidden messages will not trigger any alarm but sending encrypted messages and visiting a political discussion forum will.  Difficult to prove it exists: In some countries like the United Kingdom you can be required by the police to provide the password to your encrypted files, refusing to do so carries a prison sentence, if the data has been hidden inside a photograph the police would first have to show beyond reasonable doubt that there is definitely something hidden inside the file. Advantages of Steganography over Cryptography: The advantage of steganography over cryptography alone is that messages do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakable will
  • 13. 13 arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. 5. DISADVANTAGES OF STEGANALYSIS:  The main problem with this is that either you or the person you're sending the "secret" message to need to be able to find the message. And if you can find it, then the bad guys you want to keep the message a secret from can find it, too.  There are many limitations to this particular algorithm/ implementation. It relies on every single bit of information in the image being preserved. If, at any stage, the image is converted to a lossy format for storage (such as JPEG file), the subtle color information is lost.  Even simple rounding/changes, smoothing, color palette optimizations, contrast adjustments; totally blows away all the hidden information, and you only get garbage noise when decoding.  If there is a bit flipping caused by any degradation in the image, video or datagram, then the hidden message even when retrieved will contain incomplete information.  Threat to national security when used by the wrong hands. 6. APPLICATIONS OF STEGANOGRAPHY:  Modern day printers: Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps.  Use by terrorists: if some of them want to send a data into the other part of the country even with all the IDS, then they have to secretly send the data using steganography.  Military applications: when someone wants to send a message to a base camp, probably one which attracts less attention, then steganography can be of use.  Foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and
  • 14. 14 contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups.  Alleged use by intelligent services: In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad. 7. CONCLUSION: In this paper, different techniques are discussed for embedding data in text, image, audio/video signals and IP datagram as cover media. All the proposed methods have some limitations. The stego multimedia produced by mentioned methods for multimedia steganography are more or less vulnerable to attack like media formatting, compression etc. In this respect, IP datagram steganography technique is not susceptible to that type of attacks. Steganalysis is the technique to detect steganography or defeat steganography. The research to device strong steganographic and steganalysis technique is a continuous process. Computer forensic professionals need to be aware of the difficulties in identifying the use of steganography in any investigation. As with many digital age technologies, steganography techniques are becoming increasingly more sophisticated and difficult to reliably detect. Once use is detected or discovered, obtaining the ability to recover the embedded content is becoming difficult as well. Acquiring knowledge of current steganographic techniques, along with their associated data types, can provide a critical advantage to an investigator by adding valuable tools to their forensic toolkit. Finally, due to the relatively simple techniques capable of denying the exploitation of a covert steganographic channel, companies may wish to take precautionary measures. By enacting measures discussed in this paper, they can ensure their proprietary and trade secret information is not being shoplifted inside of the daily podcast, shared in family photos, or distributed via the latest YouTube video.
  • 15. 15 8. REFERENCES:  Steganography from Wikipedia: http://en.wikipedia.org/wiki/Steganography  An Overview of Steganography, James Madison University Infosec Techreport, Department of Computer Science: http://ce.sharif.edu/courses/Steganography.pdf  Watermarking techniques: Digital Image Processing by Gonzalez and woods, 3rd edition.  Steganography and Steganalysis, Tata institute of technology paper. www.tifr.res.in/Soumyendu_Steganography_Steganalysis