Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
This paper introduces an algorithm of digitalwatermarking based on Discrete Wavelet Transform (DWT) and Steganography Based on Least Significant Bit(LSB). Steganography is a branch of information hiding. According to the characters of human vision, the information of digital watermarking which has been discrete wavelet transformed, is put into the high frequency band of the image which has been wavelet transformed. Then distills the digital watermarking with the help of the original image and the watermarking image. The steganography is the process of concealing one medium of information within another. There are lots of techniques available to achieve steganography like least significant bit insertion method and transform domain technique. This project implements the new method selecting a cover image and applying the watermarking for the copyright protection and embedding the secrete file into the watermarked image providing password with encryption method and sending to other system through the network.
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
Steganography is the science that involves
communicating secret information in an appropriate
carrier so no one apart from the sender and the recipient
even can recognize that there is hidden
information. Steganography is the art of hiding
messages inside unsuspicious medium such as images,
videos, various types of files…etc. It's a method to
establish a secure communication channel between two
parties. The purpose of steganography is to hide the
existence of a message from an eavesdropper or third
parties. Steganalysis is the branch of data processing
that seeks the identification of carrier vessels and
retrieval of message hidden. In this paper we present
enhanced implementation for Steganography algorithm,
an algorithm that we claim to be safe, built over DCT
(Discrete Cosine Transformation) frequency
domain mutation[12], the algorithm uses error reductive
measurements such as pattern matching to obtain
a reasonable a better image quality by reducing number
of changes that steganography algorithm made during
the embedding process.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Steganography
1. 1
INTRODUCTION:
The objective of steganography is to hide a secret message within a cover-media in such
a way that others cannot discern the presence of the hidden message. Technically in simple
words “steganography means hiding one piece of data within another”.
Within the field of Computer Forensics, investigators should be aware that steganography can be
an effective means that enables concealed data to be transferred inside of seemingly innocuous
carrier files. Knowing what software applications are commonly available and how they work
gives forensic investigators a greater probability of detecting, recovering, and eventually denying
access to the data that mischievous individuals and programs are openly concealing. Generally
speaking, steganography brings science to the art of hiding information. The purpose of
steganography is to convey a message inside of a conduit of misrepresentation such that the
existence of the message is both hidden and difficult to recover when discovered. The word
steganography comes from two roots in the Greek language, “Stegos” meaning hidden covered
or roof, and “Graphia” simply meaning writing.
Modern steganography uses the opportunity of hiding information into digital multimedia
files and also at the network packet level.
Hiding information into a media requires following elements:
1) The cover media(C) that will hold the hidden data
2) The secret message (M), may be plain text, cipher text or any type of data
3) The stego function (Fe) and its inverse (Fe-1)
4) An optional stego-key (K) or password may be used to hide and unhide the Message.
The stego function operates over cover media and the message (to be hidden) along with
a stego-key (optionally) to produce a stego media (S). The schematic of steganographic operation
is shown below.
Figure 1: Steganographic operation
2. 2
Steganography and Cryptography are great partners in spite of functional difference. It is
common practice to use cryptography with steganography.
1. ANCIENT TECHNIQUES OF STEGANOGRAPHY:
Hiding messages by masking their existence is nothing new. Classical examples include a
Roman general that shaved the head of a slave tattooing a message on his scalp. When the
slave’s hair grew back, the General dispatched the slave to deliver the hidden message to its
intended recipient.
Ancient Greeks covered tablets with wax and used them to write on. The tablets were
composed of wooden slabs. A layer of melted wax was poured over the wood and allowed to
harden as it dried. Hidden messages could be carved into the wood prior to covering the slab.
When the melted wax was poured over the slab, the now concealed message was later revealed
by the recipient when they re-melted the wax and poured it from the tablet.
Pliny the elder proved how the milk of thithymallus plant dried to transparency when
applied to paper but darkened to brown when subsequently heated.
From the 1st century through World War II invisible inks were often used to conceal
hidden messages. At first, the inks were organic substances that oxidized when heated. The heat
reaction revealed the hidden message. As time passed, compounds and substances were chosen
based on desirable chemical reactions. When the recipient mixed the compounds used to write
the invisible message with a reactive agent, the resulting chemical reaction revealed the hidden
data. Today, some commonly used compounds are visible when placed under an ultraviolet light
With any type of hidden communication, the security of the message often lies in the
secrecy of its existence and/or the secrecy of how to decode it. Cryptography often uses only a
worst case approach assuming only one of these two conditions holds.
During World War II, Velvalee Dickinson, a spy for Japan in New York City, sent
information to accommodation addresses in neutral South America. She was a dealer in dolls,
and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders,
while the concealed "plaintext" was itself encoded and gave information about ship movements,
etc. Her case became somewhat famous and she became known as the Doll Woman
3. 3
2. MODERN TECHNIQUES OF STEGANOGRAPHY:
Focusing the discussion on steganographic techniques used in digital media, traditional
methods are employed to modify the data that defines the carrier or cover file. Modifications are
made to achieve a desired pattern. The pattern used to modify the carrier defines a bit sequence
that contains the hidden message or data. The basic principle of steganography ensures that
modifications to the data in the cover file must have insignificant or no impact to the final
presentation. Insignificant or no impact on final presentation means changes so minor in nature
that the casual observer cannot tell that a hidden message is even present.
Every digital file is composed of a sequence of binary digits (0 or 1). It is also a relatively
simple task to modify the content of a file by changing a single bit in the sequence.
Accomplishing the modification without changing the presentation or the final form of the file is
altogether a different task. For example, the binary value of the decimal number 13 consists of 4
bits (1101), changing one bit in the sequence changes the decimal value of the number it
represents and ultimately changes the meaning of the value, (i.e. 1100 is the decimal equivalent
of the number 12 not 13). The common modern technique of steganography exploits the property
of the media itself to convey a message.
The following media are the candidate for digitally embedding message: -
·Plaintext
·Still imagery
·Audio and Video
·IP datagram.
2.1 PLAINTEXT STEGANOGRAPHY
In this technique the message is hidden within a plain text file using different schemes
like use of selected characters, extra white spaces of the cover text etc.
2.1.1 USE OF SELECTED CHARACTERS OF COVER TEXT:
Sender sends a series of integer number (Key) to the recipient with a prior agreement that
the secret message is hidden within the respective position of subsequent words of the cover text.
For example the series is ‘1, 1, 2, 3, 4, 2, 4,’ and the cover text is “A team of five men joined
today”. So the hidden message is “Atfvoa”. A “0” in the number series will indicate a blank
4. 4
space in the recovered message. The word in the received cover text will be skipped if the
number of characters in that word is less than the respective number in the series (Key) which
shall also be skipped during the process of message unhide.
2.1.2 USE OF EXTRA WHITE SPACE CHARACTERS OF COVER TEXT:
A number of extra blank spaces are inserted between consecutive words of cover text.
This numbers are mapped to a hidden message through an index of a lookup table. For example
extra three spaces between adjacent words indicate the number “3” which subsequently indicates
a specific text of a look-up table which is available to the both communicating parties as a prior
agreement.
2.2 STILL IMAGERY STEGANOGRAPHY:
The most widely used technique today is hiding of secret messages into a digital image.
This steganography technique exploits the weakness of the human visual system (HVS). HVS
cannot detect the variation in luminance of color vectors at higher frequency side of the visual
spectrum. A picture can be represented by a collection of color pixels. The individual pixels can
be represented by their optical characteristics like 'brightness', 'chroma' etc. Each of these
characteristics can be digitally expressed in terms of 1s and 0s.
Noting that by using 7 bits to represent 5 volts of amplitude, we create a relatively small
division between values (0.04V). By modifying the least significant bit (LSB) of any datum we
can only change its reproduced value by the same amount (0.04V). This imperceptible change
means that intentional modifications to the LSB of every sample may go unnoticed and allow
data to be embedded into the bit sequence. Using sequential data points to carry our message, we
can inject a 25,000 bit message into the LSB for every second of data we have recorded. When
viewing the waveform after modification, the difference in voltage at any given datum is
imperceptible to the naked eye.
For example: a 24-bit bitmap will have 8 bits, representing each of the three color values
(red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values
of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely
to be undetectable by the human eye. Hence, if the terminal recipient of the data is nothing but
human visual system (HVS) then the Least Significant Bit (LSB) can be used for something else
5. 5
other than color information. This technique can be directly applied on digital image in bitmap
format as well as for the compressed image format like JPEG. In JPEG format, each pixel of the
image is digitally coded using discrete cosine transformation (DCT). The LSB of encoded DCT
components can be used as the carriers of the hidden message.
The details of above techniques are explained below:
In some documents binary information can be stored by shifting the placement of letters
slightly to represent a binary value. Although usually accomplished with a pictorial
representation of the letter or the entire document, it is possible to embed the information in a
Microsoft Office Word document such as this. Consider embedding the binary value of the
ASCII letter “T” - 01010100 into the word “Singular.” We can inject the binary string by varying
the spacing between the letters to indicate a zero or a one. For comparison, a fixed or naturally
spaced version of the word is displayed below the encoded version.
Grey lines have been added to more easily identify the characters that have been shifted
to represent a binary value of one. In the example below, all non-shifted (i.e. normally spaced
and not touching the reference line) characters are assumed to represent a zero.
Note that the “i", “g”, and the “l” are touching grey lines thus indicating a high state or
the binary value one for that position. When pieced back together the values are as follows S-0,
i-1, n- 0, g-1, u-0, l-1, a-0, r-0 or 01010100. Other methods of encoding files include a stepped
character approach (where the message is conveyed with embedded characters separated by a
fixed number or constant step) and the addition or subtraction of white space and/or carriage
returns at the end of every line. The stepped character method is more difficult to accomplish
because producing indistinguishable carrier messages that mask the hidden content may require
unnatural or awkward language.
2.2.1 MODIFICATION OF LSB OF A COVER IMAGE IN 'BITMAP' FORMAT:
In this method binary equivalent of the message (to be hidden) is distributed among the
LSBs of each pixel. For example we will try to hide the character ‘A’ into an 8-bit color image.
We are taking eight consecutive pixels from top left corner of the image.
The equivalent binary bit pattern of those pixels may be like this: -
00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111
6. 6
Then each bit of binary equivalence of letter 'A' i.e. 01100101 are copied serially (from the left
hand side) to the LSB's of equivalent binary pattern of pixels, resulting the bit pattern will
become like this: -
00100110 11101001 11001001 00100110 11001000 11101001 11001000 00100111
The only problem with this technique is that it is very vulnerable to attacks such as image
compression and formatting.
2.2.2 APPLYING LSB TECHNIQUE DURING DISCRETE COSINE
TRANSFORMATION (DCT) ON COVER IMAGE:
The following steps are followed in this case: -
1. The Image is broken into data units each of them consists of 8 x 8 block of pixels.
2. Working from top-left to bottom-right of the cover image, DCT is applied to each pixel of
each data unit.
3. After applying DCT, one DCT Coefficient is generated for each pixel in data unit.
4. Each DCT coefficient is then quantized against a reference quantization table.
5. The LSB of binary equivalent the quantized DCT coefficient can be replaced by a bit from
secret message.
6. Encoding is then applied to each modified quantized DCT coefficient to produce compressed
Stego Image.
Figure 2: Example of still imagery steganography. Left hand side image is the original
cover image, whereas right hand side does embedding a text file into the cover image make
the stego image.
7. 7
2.3 AUDIO STEGANOGRAPHY:
In audio steganography, secret message is embedded into digitized audio signal which
result slight altering of binary sequence of the corresponding audio file. There are several
methods are available for audio steganography. Some of them are as follows: -
2.3.1 LSB CODING:
Sampling technique followed by Quantization converts analog audio signal to digital
binary sequence.
Figure 3: Sampling of the Sine Wave followed by Quantization process.
The LSB bits of the audio signal are then replaced with the secret binary message.
For example if we want to hide the letter ‘A’ (binary equivalent 01100101) to an digitized audio
file where each sample is represented with 16 bits, then LSB of 8 consecutive samples (each of
16 bit size) is replaced with each bit of binary equivalent of the letter ‘A’.
Sampled Audio Stream
(16 bit)
‘A’ in binary
Audio stream with encoded
message
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1010 0111 1111 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Table 1: sending secret binary message in audio stream
8. 8
2.3.2 PHASE CODING:
Human Auditory System (HAS) can’t recognize the phase change in audio signal as easy
it can recognize noise in the signal. The phase coding method exploits this fact. This technique
encodes the secret message bits as phase shifts in the phase spectrum of a digital signal,
achieving an inaudible encoding in terms of signal-to- noise ratio.
2.3.3 ECHO HIDING:
In this method the secret message is embedded into cover audio signal as an echo. Three
parameters of the echo of the cover signal namely amplitude, decay rate and offset from original
signal are varied to represent encoded secret binary message. They are set below to the threshold
of Human Auditory System (HAS) so that echo can’t be easily resolved. Video files are
generally consists of images and sounds, so most of the relevant techniques for hiding data into
images and audio are also applicable to video media. In the case of Video steganography sender
sends the secret message to the recipient using a video sequence as cover media.
2.4 VIDEO STEGANOGRAPHY:
Optional secret key ‘K’ can also be used during embedding the secret message to the
cover media to produce ‘stego-video’. After that the stego-video is communicated over public
channel to the receiver. At the receiving end, receiver uses the secret key along with the
extracting algorithm to extract the secret message from the stego-object.
The original cover video consists of frames represented by Ck(m,n) where 1 < k < N.
‘N’ is the total number of frame and m,n are the row and column indices of the pixels,
respectively. The binary secret message denoted by Mk(m, n) is embedded into the cover video
media by modulating it into a signal. Mk(m, n) is defined over the same domain as the host
Ck(m, n).The stego-video signal is represented by the equation
Sk(m, n) = Ck(m, n)+ak (m, n) Mk(m, n) , k = 1, 2, 3 . . .N
where ak (m, n) is a scaling factor. For simplicity ak(m, n) can be considered to be constant over
all the pixels and frames. So the equation becomes:
Sk(m, n) = Ck(m, n)+a(m, n) Mk(m, n) , k = 1, 2, 3 . . .N
9. 9
2.5 IP DATAGRAM STEGANOGRAPHY:
This is another approach of steganography, which employs hiding data in the network
datagram level in a TCP/IP based network like Internet. Network Covert Channel is the synonym
of network steganography. Overall goal of this approach to make the stego datagram is
undetectable by Network watchers like sniffer, Intrusion Detection System (IDS) etc. In this
approach information to be hide is placed in the IP header of a TCP/IP datagram. Some of the
fields of IP header and TCP header in an IPv4 network are chosen for data hiding.
First we will demonstrate how ‘Flags’ and ‘Identification’ field of Ipv4 header can
be exploited by this methodology.
Figure 4: IPv4 header
2.5.1 CHANNEL COMMUNICATION USING ‘FLAGS’ FIELD:
The size of Flag field is 3 bit. There are 3 flags denoted by each bit. First bit is reserved.
Second and third one denoted by DF (Don’t fragment) and MF (More Fragment) respectively.
An un-fragmented datagram has all zero fragmentation information (i.e. MF = 0 and 13-bit
Fragment Offset = 0) which gives rise to a redundancy condition, i.e. DF (Do not Fragment) can
carry either ‘0’ or ‘1’ subject to the knowledge of the maximum size of the datagram.
Now if sender and recipient both have a prior knowledge of Maximum Transfer Unit
(MTU) of their network then they can covertly communicate with each other using DF flag bit of
IP header. Datagram length should be less than path MTU otherwise packet will be fragmented
and this method will not work. The following table shows the how the sender communicates 1
and 0 to the recipient by using DF flag bit.
10. 10
Datagram 3-bit Flag field 13-bit fragment offset Remarks
1 010 00…00
Datagram 1 covertly
communicating ‘1’
2 000 00…00
Datagram 2 covertly
communicating ‘0’
Table 2: sending secret message in flag field of datagram
This is an example of covert communication since there is no way to the network
monitoring devices like IDS or sniffer to detect the communication because cover datagram is a
normal datagram. As the payload is untouched, there is no way an IDS or any other content
filtering device could recognize this activity. In major constraint of this approach is both parties
should have prior knowledge of path MTU and datagram from sender should not be fragmented
further in the way.
2.5.2 CHANNEL COMMUNICATION USING ‘IDENTIFICATION’ FIELD:
The ‘16-bit identification field’ in IPv4 header is used to identify the fragmented packed
of an IP datagram. If there is no fragmentation of datagram, then this Identification field can be
used to embed sender specified information.
3. STEGANALYSIS:
Steganalysis is the process of identifying steganography by inspecting various parameter of a
stego media. The primary step of this process is to identify a suspected stego media. After that
steganalysis process determines whether that media contains hidden message or not and then try
to recover the message from it.
Steganalysis is the art and science behind the detection of the use of steganography by a
third party. The basic function of steganalysis is to first detect or estimate the probability that
hidden information is present in any given file. The detection and estimation is based only on the
data presented in its observable form (i.e. nothing is known about the file prior to investigation).
Because simply detecting the presence of hidden data may not be sufficient, steganalysis also
covers the functions of extracting the message, disabling and/or destroying the hidden message
so that it cannot be extracted, and finally, altering the hidden message such that misinformation
can be sent to the intended recipient instead of the original message.
11. 11
In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly
contains the hidden message because the message is scrambled. But in the case of steganalysis
this may not be true. The suspected media may or may not be with hidden message. The
steganalysis process starts with a set of suspected information streams. Then the set is reduced
with the help of advance statistical methods.
A good method to find hidden messages inside pictures is by using an hexadecimal editor
and read the image header first bytes, for example a GIF image seen by an hexadecimal editor
will always read “47 49 46 38″, it means “GIF” in ASCII code, if a GIF image has been used to
hide a message within it when viewed with an hex editor the first identifying bytes will be
different from the standard ones.
There are automated tools to detect steganography, one such tool is Stegdetect, capable of
detecting messages in jpeg images, after a hidden message has been found a brute force attack
can be launched, with dictionary words attempting to guess the password and expose the data.
Highly compressed data like .rar, .mp3 or .jpeg files make it more difficult to hide data
inside because they have less “spare” bits available, if you want to make it tough for someone to
find your hidden data use an uncompressed carrier file, like .bmp for images and .wav for sound.
3.1 STEGANALYSIS TECHNIQUES:
The properties of electronic media are being changed after hiding any object into that.
This can result in the form of degradation in terms of quality or unusual characteristics of the
media: Steganalysis techniques based on unusual pattern in the media or Visual Detection of the
same. In the case of Visual detection steganalysis technique a set of stego images are compared
with original cover images and note the visible difference. Signature of the hidden message can
be derived by comparing numerous images. Cropping or padding of image also is a visual clue of
hidden message because some stego tool is cropping or padding blank spaces to fit the stego
image into fixed size. Difference in file size between cover image and stego images, increase or
decrease of unique colors in stego images can also be used in the Visual Detection steganalysis
technique.
12. 12
3.2 STEGANOGRAPHY ATTACKS:
Steganographic attacks consist of detecting, extracting and destroying hidden object of the stego
media. Steganography attack is followed by steganalysis. There are several types of attacks
based on the information available for analysis. Some of them are as follows: -
Known carrier attack: The original cover media and stego media both are available for
analysis.
Steganography only attack: In this type of attacks, only stego media is available for analysis.
Known message attack: The hidden message is known in this case.
Known steganography attack: The cover media, stego media as well as the steganography tool
or algorithm, are known.
4. ADVANTAGES OF STEGANALYSIS:
It does not attract attention: Encrypting a message gives away that there is something of
value and this will attract unwanted attention.
Packet sniffing barrier: Encrypted email messages start with a line identifying them as an
encrypted message, making it easy for a packet sniffer on an ISP to flag encrypted emails
by just scanning for the word PGP or GnuPG, this can not be used against steganography.
Makes Internet surveillance difficult: If someone’s Internet activities are being monitored
visiting Flickr and uploading personal family photos with hidden messages will not
trigger any alarm but sending encrypted messages and visiting a political discussion
forum will.
Difficult to prove it exists: In some countries like the United Kingdom you can be
required by the police to provide the password to your encrypted files, refusing to do so
carries a prison sentence, if the data has been hidden inside a photograph the police
would first have to show beyond reasonable doubt that there is definitely something
hidden inside the file.
Advantages of Steganography over Cryptography:
The advantage of steganography over cryptography alone is that messages do not attract
attention to themselves. Plainly visible encrypted messages no matter how unbreakable will
13. 13
arouse suspicion, and may in themselves be incriminating in countries where encryption is
illegal. Therefore, whereas cryptography protects the contents of a message, steganography can
be said to protect both messages and communicating parties.
5. DISADVANTAGES OF STEGANALYSIS:
The main problem with this is that either you or the person you're sending the "secret"
message to need to be able to find the message. And if you can find it, then the bad guys
you want to keep the message a secret from can find it, too.
There are many limitations to this particular algorithm/ implementation. It relies on every
single bit of information in the image being preserved. If, at any stage, the image is
converted to a lossy format for storage (such as JPEG file), the subtle color information is
lost.
Even simple rounding/changes, smoothing, color palette optimizations, contrast
adjustments; totally blows away all the hidden information, and you only get garbage
noise when decoding.
If there is a bit flipping caused by any degradation in the image, video or datagram, then
the hidden message even when retrieved will contain incomplete information.
Threat to national security when used by the wrong hands.
6. APPLICATIONS OF STEGANOGRAPHY:
Modern day printers: Steganography is used by some modern printers,
including HP and Xerox brand color laser printers. Tiny yellow dots are added to each
page. The dots are barely visible and contain encoded printer serial numbers, as well as
date and time stamps.
Use by terrorists: if some of them want to send a data into the other part of the country
even with all the IDS, then they have to secretly send the data using steganography.
Military applications: when someone wants to send a message to a base camp, probably
one which attracts less attention, then steganography can be of use.
Foreign intelligence services; espionage against sensitive but poorly defended data in
government and industry systems; subversion by insiders, including vendors and
14. 14
contractors; criminal activity, primarily involving fraud and theft of financial or identity
information, by hackers and organized crime groups.
Alleged use by intelligent services: In 2010, the Federal Bureau of Investigation revealed
that the Russian foreign intelligence service uses customized steganography software for
embedding encrypted text messages inside image files for certain communications with
"illegal agents" (agents under non-diplomatic cover) stationed abroad.
7. CONCLUSION:
In this paper, different techniques are discussed for embedding data in text, image, audio/video
signals and IP datagram as cover media. All the proposed methods have some limitations. The
stego multimedia produced by mentioned methods for multimedia steganography are more or
less vulnerable to attack like media formatting, compression etc. In this respect, IP datagram
steganography technique is not susceptible to that type of attacks. Steganalysis is the technique
to detect steganography or defeat steganography. The research to device strong steganographic
and steganalysis technique is a continuous process.
Computer forensic professionals need to be aware of the difficulties in identifying the use
of steganography in any investigation. As with many digital age technologies, steganography
techniques are becoming increasingly more sophisticated and difficult to reliably detect. Once
use is detected or discovered, obtaining the ability to recover the embedded content is becoming
difficult as well. Acquiring knowledge of current steganographic techniques, along with their
associated data types, can provide a critical advantage to an investigator by adding valuable tools
to their forensic toolkit.
Finally, due to the relatively simple techniques capable of denying the exploitation of a
covert steganographic channel, companies may wish to take precautionary measures. By
enacting measures discussed in this paper, they can ensure their proprietary and trade secret
information is not being shoplifted inside of the daily podcast, shared in family photos, or
distributed via the latest YouTube video.
15. 15
8. REFERENCES:
Steganography from Wikipedia:
http://en.wikipedia.org/wiki/Steganography
An Overview of Steganography, James Madison University Infosec Techreport,
Department of Computer Science:
http://ce.sharif.edu/courses/Steganography.pdf
Watermarking techniques:
Digital Image Processing by Gonzalez and woods, 3rd edition.
Steganography and Steganalysis, Tata institute of technology paper.
www.tifr.res.in/Soumyendu_Steganography_Steganalysis