ArticlePDF Available

Steganography- A Data Hiding Technique

Authors:

Abstract and Figures

Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique.
Content may be subject to copyright.
International Journal of Computer Applications (0975 8887)
Volume 9 No.7, November 2010
19
Steganography- A Data Hiding Technique
Arvind Kumar Km. Pooja
Assistant Professor Vankateshwara institute of computer
Vidya College of engineering, Meerut, India Science and technology, Meerut, India
ABSTRACT
Steganography is the art of hiding information and an effort to
conceal the existence of the embedded information. It serves as a
better way of securing message than cryptography which only
conceals the content of the message not the existence of the message.
Original message is being hidden within a carrier such that the
changes so occurred in the carrier are not observable. In this paper we
will discuss how digital images can be used as a carrier to hide
messages. This paper also analyses the performance of some of the
steganography tools. Steganography is a useful tool that allows covert
transmission of information over an over the communications
channel. Combining secret image with the carrier image gives the
hidden image. The hidden image is difficult to detect without
retrieval.
This paper will take an in-depth look at this technology by
introducing the reader to various concepts of Steganography, a brief
history of Steganography and a look at some of the Steganographic
technique.
KEYWORDS
Steganography, Steganalysis, Digital watermarking, Stego key, Stego
image and Cryptography.
1. INTRODUCTION
Internet users frequently need to store, send, or receive private
information. The most common way to do this is to transform the data
into a different form. The resulting data can be understood only by
those who know how to return it to its original form. This method of
protecting information is known as encryption. A major drawback to
encryption is that the existence of data is not hidden. Data that has
been encrypted, although unreadable, still exists as data. If given
enough time, someone could eventually unencrypt the data. A
solution to this problem is steganography. The ancient art of hiding
messages so that they are not detectable. No substitution or
permutation was used. The hidden message is plain, but unsuspecting
to the reader. Steganography's intent is to hide the existence of the
message, while cryptography scrambles a message so that it cannot be
understood.
Before the invention of digital means, traditional methods were being
used for sending or receiving messages. Before phones, before mail
messages were sent on foot. For the messages where privacy was of
prime concern, the ways of implementing security were following:
1. Choosing the messenger capable of delivering the message
securely.
2. Write the message using such notations that actual meaning of the
message was concealed.
3. Hide the message such that even its presence can’t be predicted.
In steganography, the possible cover carriers are innocent looking
carriers (images, audio, video, text, or some other digitally
representative code) which will hold the hidden information. A
message is the information hidden and may be plaintext, cipher text,
images, or anything that can be embedded into a bit stream. Together
the cover carrier and the embedded message create a stego-carrier.
Hiding information may require a stego key which is additional secret
information, such as a password, required for embedding the
information. For example, when a secret message is hidden within a
cover image, the resulting product is a stego-image.
A possible formula of the process may be represented as: cover
medium + embedded message + stego key = stego-medium
Figure 1.1 Graphical Version of the Steganographic System
fE : steganographic function "embedding"
fE-1 : steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
stego: cover data with the hidden message
The advantage of steganography is that it can be used to secretly
transmit messages without the fact of the transmission being
discovered. Often, using encryption might identify the sender or
receiver as somebody with something to hide. For example, the
picture of our cat could conceal the plans for our company's latest
technical innovation.
2. HISTORY OF STEGANOGRAPHY
It is believed that steganography was first practiced during the Golden
Age in Greece. An ancient Greek record describes the practice of
melting wax off wax tablets used for writing messages and then
inscribing a message in the underlying wood. The wax was then
reapplied to the wood, giving the appearance of a new, unused tablet.
The resulting tablets could be innocently transported without anyone
suspecting the presence of a message beneath the wax.
An ancient Greek record describes the practice of melting wax off
wax tablets used for writing messages and then inscribing a message
in the underlying wood. The wax was then reapplied to the wood,
International Journal of Computer Applications (0975 8887)
Volume 9 No.7, November 2010
20
giving the appearance of a new, unused tablet. The resulting tablets
could be innocently transported without anyone suspecting the
presence of a message beneath the wax.
Later on Germans developed microdot technology which FBI
Director J. Edgar Hoover referred to as "the enemy's masterpiece of
espionage. Microdots are photographs the size of a printed period
having the clarity of standard-sized typewritten pages. The first
microdots were discovered masquerading as a period on a typed
envelope carried by a German agent in 1941. The message was not
hidden, nor encrypted. It was just so small as to not draw attention to
itself. Besides being so small, microdots permitted the transmission of
large amounts of data including drawings and photographs.
Another common form of invisible writing is through the use of
Invisible inks. Such inks were used with much success as recently as
WW-II. An innocent letter may contain a very different message
written between the lines. Early in WW-II steganographic technology
consisted almost exclusively of invisible inks. Common sources for
invisible inks are milk, vinegar, fruit juices and urine. All of these
darken when heated.
3. USES OF STEGANOGRAPHY
1. Steganography can be a solution which makes it possible to send
news and information without being censored and without the fear of
the messages being intercepted and traced back to us.
2. It is also possible to simply use steganography to store information
on a location. For example, several information sources like our
private banking information, some military secrets, can be stored in a
cover source. When we are required to unhide the secret information
in our cover source, we can easily reveal our banking data and it will
be impossible to prove the existence of the military secrets inside.
3. Steganography can also be used to implement watermarking.
Although the concept of watermarking is not necessarily
steganography, there are several steganographic techniques that are
being used to store watermarks in data. The main difference is on
intent, while the purpose of steganography is hiding information,
watermarking is merely extending the cover source with extra
information. Since people will not accept noticeable changes in
images, audio or video files because of a watermark, steganographic
methods can be used to hide this.
Figure3.1 Steganography Types
4. E-commerce allows for an interesting use of steganography. In
current e-commerce transactions, most users are protected by a
username and password, with no real method of verifying that the
user is the actual card holder. Biometric finger print scanning,
combined with unique session IDs embedded into the fingerprint
images via steganography, allow for a very secure option to open e-
commerce transaction verification.
5. Paired with existing communication methods, steganography can
be used to carry out hidden exchanges. Governments are interested in
two types of hidden communications: those that support national
security and those that do not. Digital steganography provides vast
potential for both types. Businesses may have similar concerns
regarding trade secrets or new product information.
6. The transportation of sensitive data is another key use of
steganography. A potential problem with cryptography is that
eavesdroppers know they have an encrypted message when they see
one. Steganography allows to transport of sensitive data past
eavesdroppers without them knowing any sensitive data has passed
them. The idea of using steganography in data transportation can be
applied to just about any data transportation method, from E-Mail to
images on Internet websites.
Figure 3.2 Steganography on the Internet
4. STEGANOGRAPHY AND
CRYPTOGRAPHY
4.1 Comparison of Steganography and
Cryptography
Steganography and cryptography are closely related. Cryptography
scrambles messages so it can’t be understood. Steganography on the
other hand, hide the message so there is no knowledge of the
existence of the message. With cryptography, comparison is made
between portions of the plaintext and portions of the cipher text. In
steganography, comparisons may be made between the cover-media,
the stego-media, and possible portions of the message. The end result
in cryptography is the cipher text, while the end result in
steganography is the stego-media. The message in steganography may
or may not be encrypted. If it is encrypted, then a cryptanalysis
technique is applied to extract the message.
International Journal of Computer Applications (0975 8887)
Volume 9 No.7, November 2010
21
4.2 Combination of Steganography and
Cryptography
Those who seek the ultimate in private communication can combine
encryption and steganography. Encrypted data is more difficult to
differentiate from naturally occurring phenomena than plain text is in
the carrier medium. There are several tools by which we can encrypt
data before hiding it in the chosen medium.
In some situations, sending an encrypted message will across
suspicion while an invisible message will not do so. Both methods
can be combined to produce better protection of the message. In case,
when the steganography fails and the message can be detected, it is
still of no use as it is encrypted using cryptography techniques.
5. STEGANALYSIS
Steganalysis is "the process of detecting steganography by looking at
variances between bit patterns and unusually large file sizes”. It is the
art of discovering and rendering useless covert messages. The goal of
steganalysis is to identify suspected information streams, determine
whether or not they have hidden messages encoded into them, and, if
possible, recover the hidden information. Unlike cryptanalysis, where
it is evident that intercepted encrypted data contains a message.
Figure 1. A Graphical Version of the Steganographic System
Steganalysis generally starts with several suspect information streams
but uncertainty whether any of these contain hidden message. The
steganalyst starts by reducing the set of suspect information streams
to a subset of most likely altered information streams. This is usually
done with statistical analysis using advanced statistics techniques.
6. STEGANALYSIS TECHNIQUES
Hiding information within an electronic medium cause alteration of
the medium properties that can result in some form of degradation or
unusual characteristics.
6.1. Unusual patterns
Unusual patterns in a stego image are suspicious. For example, there
are some disk analysis utilities that can filter hidden information in
unused partitions in storage devices. Filters can also be used to
identify TCP/IP packets that contain hidden or invalid
information in the packet headers. TCP/IP packets used to
transport information across the Internet have unused or
reserved space in the packet headers.
6.2. Visual detection
Analyzing repetitive patterns may reveal the identification of a
steganography tool or hidden information. To inspect these patterns
an approach is to compare the original cover image with the stego
image and note visible differences. This is called a known-carrier
attack. By comparing numerous images it is possible that patterns
emerge as signatures to a steganography tool. Another visual clue to
the presence of hidden information is padding or cropping of an
image. With some stego tools if an image does not fit into a fixed size
it is cropped or padded with black spaces. There may also be a
difference in the file size between the stego-image and the cover
image. Another indicator is a large increase or decrease in the number
of unique colors, or colors in a palette which increase incrementally
rather than randomly.
6.3. Tools to detect Steganography
The disabling or removal of hidden information in images is
dependent on the image processing techniques. For example, with
LSB methods of inserting data, simply compressing the image using
lossy compression is enough to disable or remove the hidden
message. There are several available steganographic detection tools
such as Encase by Guidance Software Inc., ILook Investigator by
Electronic Crimes Program, Washington DC, various MD5 hashing
utilities, etc.
7. IMPLEMENTATION AND RESULTS
All of the approaches to steganography have one thing in common
that they hide the secret message in the physical object which is sent.
The following figure shows the steganography process of the cover
image being passed into the embedding function with the message to
encode resulting in a steganographic image containing the hidden
message. A key is often used to protect the hidden message. This key
is usually a password, so this key is also used to encrypt and decrypt
the message before and after the embedding.
Secrets can be hidden inside all sorts of cover information: text,
images, audio, video and more. However, there are tools available to
store secrets inside almost any type of cover source. The most
important property of a cover source is the amount of data that can be
stored inside it, without changing the noticeable properties of the
cover.
Figure 5.1 Steganography Procedure
International Journal of Computer Applications (0975 8887)
Volume 9 No.7, November 2010
22
In this phase, here we are going to implement steganography
technique on the following images.
Figure 5.2 Cover Image
Figure 5.3 Secret Image
The figure 5.2 is our Cover Image and Figure 5.3 is our Secret Image.
After applying this technique on it we get the following image. This
will be known as Stego Image.
Figure 5.4 Stego Image
After implementation of this technique if we take a look on the
histogram of both the images cover image and stego image
respectively we will find both are very different from each other. The
following figures show the histogram of cover image and stego
image.
Figure 5.5 Histogram of Cover Image
Figure 5.6 Histogram of Stego Image
The above two Figure 5.5 shows the histogram of our Cover Image
and Figure 5.6 shows the histogram of Stego Image. Both the images
are different from each other.
8. STEGANOGRAPHY SOFTWARE APPLICATION
8.1 Digital Watermarking
Digital watermarking is the process of embedding information into a
digital signal in a way that is difficult to remove. The signal may be
audio, pictures or video, for example. If the signal is copied, then the
information is also carried in the copy. A signal may carry several
different watermarks at the same time.
8.1.1 Visible Watermarking
In this, the information is visible in the picture or video. Typically, the
information is text or a logo which identifies the owner of the media.
When a television broadcaster adds its logo to the corner of
transmitted video, this is also a visible watermark.
8.1.2 Invisible Watermarking
In this, information is added as digital data to audio, picture or video,
but it cannot be perceived as such (although it may be possible to
detect that some amount of information is hidden). The watermark
may be intended for widespread use and is thus made easy to retrieve
or it may be a form of Steganography, where a party communicates a
secret message embedded in the digital signal. In either case, as in
International Journal of Computer Applications (0975 8887)
Volume 9 No.7, November 2010
23
visible watermarking, the objective is to attach ownership or other
descriptive information to the signal in a way that is difficult to
remove. It is also possible to use hidden embedded information as a
means of covert communication between individuals.
Digital Watermarking can be used for a wide range of applications
such as: Copyright protection Source Tracking (Different recipients
get differently watermarked content). The numbers of possible
applications for digital watermarking technologies are increasing
rapidly. For example, in the field of data security, watermarks may be
used for certification, authentication, and conditional access.
Certification is an important issue for official documents, such as
identity cards or passports. Digital watermarks are created by
converting copyright information into apparently random digital
"noise" using an algorithm that is imperceptible to all but special
watermark reading software. So while a JPEG file that is read by a
Web browser may display a pretty picture, that same file will display
the copyright when read by the watermark software.
9. CONCLUSION AND FUTURE SCOPE
Steganography transmits secrets through apparently innocuous covers
in an effort to conceal the existence of a secret. Digital image
steganography and its derivatives are growing in use and application.
In areas where cryptography and strong encryption are being
outlawed, citizens are looking at steganography to circumvent such
policies and pass messages covertly. As with the other great
innovations of the digital age: the battle between cryptographers and
cryptanalysis, security experts and hackers, record companies and
pirates, steganography and Steganalysis will continually develop new
techniques to counter each other.
In the near future, the most important use of steganographic
techniques will probably be lying in the field of digital watermarking.
Content providers are eager to protect their copyrighted works against
illegal distribution and digital watermarks provide a way of tracking
the owners of these materials. Steganography might also become
limited under laws, since governments already claimed that criminals
use these techniques to communicate.
The possible use of steganography technique is as following:
Hiding data on the network in case of a breach.
Peer-to-peer private communications.
Posting secret communications on the Web to avoid
transmission.
Embedding corrective audio or image data in case corrosion
occurs from a poor connection or transmission.
REFERENCES
[1] Ahsan K., and Kundur D., “Practical Internet Steganography:
Data Hiding in IP” found online at
http://www.ece.tamu.edu/~deepa/pdf/txsecwrksh03.pdf.
[2] Anderson R.J. and Petitcolas F.A.P., “On the Limits of
steganography,” J. Selected Areas in Comm., vol. 16, no.4, 1998,
pp. 474481.
[3] Bailey, K. and Curran, K. “An evaluation of image-based
steganography methods”. International Journal of Digital
Evidence, Fall 2003.
[4] Chapman, M. Davida G, and Rennhard M.. “A Practical and
Effective Approach to Large-Scale Automated Linguistic
Steganography found online at
http://www.nicetext.com/doc/isc01.pdf
[5] Dai Y., Liu G., and WangBreaking Z., “Predictive-Coding-
Based Steganography and Modification for Enhanced Security”,
IJCSNS International Journal of Computer Science and Network
Security, vol.6 no. 3b, March 2006.
[6] Chin-Chen Chang , Iuan-Chang Lin, and Yaun-Hui YU, A
new Steganographic method for color and gray scale image
hiding”, Computer Vision and Image Understanding, 20
December 2006.
[7] Shareza Shirali, M.H, “Anew Approach to persain/Arabic Text
Stegraphy”, Computer and Information Science, 2006, ICIS-
COMSAR 2006, 5th IEEE/ACIS International Conference, 10-
12 July 2006 pp 310-315.
[8] Fabien A.P., and Petitcolas, “Information Hiding: Techniques for
Steganography and Digital Watermarking.”, 2000.
[9] National Academy of Sciences, How do Wavelets work?
National Academy of Sciences,
http://www.beyonddiscovery.org/content/view.page.asp?I=1956,
2003 .
[10] Digital Watermarking for Digital Media, Information Science
Publishing.
[11] Hiding in Plain Sight: Steganography and the Art of Covert
Communication Cole, Eric.
[12] Information Hiding: Steganography and Watermarking Attacks
and Countermeasures (Advances in Information Security,
Volume 1) Johnson, Neil F. / Doric, Zoran / Jajodia.
[13] Computerworld. Steganography: Hidden Data. Quick study by
Deborah Radcliff. [Online] 2002.
http://www.computerworld.com/securitytopics/security/story/0,1
0801,71726,00. html.
... The issue with cryptography is that security will be compromised after decryption. Steganography is proposed to address the drawback related to cryptography [3]. Steganography is the art or science in which the secret message is embedded undetectably in the carrier so that no one except the sender and receiver will be aware of its existence of it [4]- [6]. ...
... Offset. Hiding rate is 320bps [29] Advantage: Sender has more of a choice in encoding the secret b Disadvantage: Not Robust (5) Spread Spectrum: This method attempts to spread secret information across the frequency spectrum of the audio signal using a code which is independent of the actual signal [6]. Two versions of Spread Spectrum can be used in audio Steganography: Direct-sequence (attempts to spread out the secret message by a constant called the chip rate and then modulated with a pseudorandom signal and interleaved with the cover-signal) [7] and Frequency-hopping (here the frequency spectrum of audio files is changed so that it hops rapidly between frequencies). ...
Conference Paper
Full-text available
The rapid spread in digital data usage in many real-life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganography techniques. We can communicate with each other by passing messages which is not secure, but we make a communication be kept secret by embedding the message into carrier or by special tools. Steganography is an effective way of securing communication. You can first encrypt a confidential file and then hide it inside an image of another kind of file be fore sending it to some other. It will decrease the chances of being intercepted. This paper presents some of the audio steganography techniques for data hiding. Least Significant Bit (LSB) technique is one of the simplest approaches for secure data transfer. Audio steganography techniques can also be combined with existing cryptography methods so along with encryption information can also be made hidden. The advantage of one technique over other depends upon the type of application and its requirements.
... Watermarking can be implemented using steganography [2]. The purpose of digital watermarking is to protect digital media from copyright infringements. ...
Article
In today's world, data is king. Information relies on raw facts, and sharing this data is crucial for collaboration between users, even those in different locations. However, during transfer, data confidentiality and privacy are paramount. We need a way to convert digital data into an unreadable format to protect it from tampering by intruders. Steganography offers a solution, in which the original data will be embedded into a Cover file. If any unauthorized person, try to access the message, the original data will not be visible instead cover file will be visible. This technique hides data within various mediums like images, audio, or video. This paper explores how image steganography can be used to encrypt data.
Article
The research is an attempt to focus on some common terms of computer sciences and remote sensing. It aims at proving that translating such terms, which have been chosen randomly from different references, from Arabic into English constitutes problems, posing difficulties for fourth year students of translation / University of Mosul. The study hypothesizes that some terms cause confusion for fourth students of translation due to the lack of adequate scientific background knowledge in the fields of computer sciences and remote sensing. Sometimes, absence of linguistic background knowledge of some phenomena hinders the translation of terms in these fields. It is handy for the students in the study to know what these terms could mean by resorting to dictionaries, knowing the scientific fields in the study, and having a good span of time for the questionnaire. However, not having adequate background knowledge of scientific terms in general and in these fields make some students stand helpless in translating the terms from Arabic into English.
Chapter
With the advancements in technologies, there is an urgent need to secure the data. For secured mechanisms, two processes are combined, i.e. cryptography and steganography. This is stated as a multilevel secured mechanism as data is secured at various levels. This paper focuses on developing a multilevel secured mechanism for data communication. The proposed work encrypted the data using key-dependent encryption process making it robust and secure. Then the data is compressed using Huffman compression to achieve high embedding capacity for large-size data. The resultant data is then embedded into the edges of the image randomly using LSB steganography. To reveal the efficacy of the proposed methodology, it is compared with the existing renowned methods on the basis of various parameters using MATLAB R2014a. It is asserted from the Experimental results that the proposed model shows the best results in BER, UIQI, SSIM and visually as compared to other latest techniques available in the literature. Our model shows comparable results in terms of PSNR and MSE.KeywordsData communicationEncryptionSteganographySecurity
Chapter
Full-text available
Spin-transfer torque (STT) random-access memory is the most promising new memory, with great scalability, fast access speed, and non-volatility. We present various techniques that are suitable for STT Random Access Memory (RAM) in this paper. The spin-transfer torque in magnetic tunnel junction (MTJ) can be improved by using quantum well states in the barrier. Double barrier MTJ consumes low power as compared to single barrier MTJ. To reduce the bit error rate and enhance the sensing margin dynamic dual-reference sensing scheme is preferred. The non-destructive self-reference read technique (NSRS) is used to overwhelm the bit-to-bit resistance variations in STT-RAM. Multilevel SOT-MRAM is preferable to store two bits without requiring any extra area. For high-speed read operations, a voltage sense amplifier (VsenseAmp) with a specific perpendicular MTJ cell is preferred. The voltage-driven NSRS technique improves device tolerance while maintaining a low read latency. The dual-source-line-biasing technique is preferred for sensing accuracy. The dynamic current injector reduces the slow write current pulse in STT-RAM. Toggle spin torques—MRAM is an excellent choice for upper level caches when rapid operation and long write durability are required. The spin-transfer torque in MTJ can be improved by using quantum well states in the barrier.KeywordsMagnetic tunnel junctionMagnetic field sensorMagnetic random-access memories (MRAM)STT
Article
Full-text available
Summary The predictive-coding-based (PCB) steganography can embed a large amount of bits into the code stream of lossless compression with high imperceptibility. However, based on two elaborately chosen statistical features, the proposed steganalytic method can easily find the presence of a secret message with small error probability. To enhance the scheme's security, a modified one is proposed, which preserves the prediction errors' distribution by choosing the optimum adjustment parameter. Experimental results prove that the modified scheme can provide near-perfect security in Cachin's definition and defeat the steganalytic method proposed by ourselves.
Book
Full-text available
Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other works become available in digital form, the ease with which perfect copies can be made may lead to large-scale unauthorized copying, and this is of great concern to the music, film, book and software publishing industries. At the same time, moves by various governments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. This book surveys recent research results in the fields of watermarking and steganography, two disciplines generally referred to as information hiding. Included are chapters about the following topics: Chapter 1: Introduction to information hiding (Fabien A. P. Petitcolas) gives an introduction to the field of information hiding, thereby discussing the history of steganography and watermarking and possible applications to modern communication systems. Chapter 2: Principles of steganography (Stefan Katzenbeisser) introduces a model for steganographic communication (the ‘prisoners problem") and discusses various steganographic protocols (such as pure steganography, secret key steganography, public key steganography and supraliminal channels). Chapter 3: A survey of steganographic techniques (Neil F. Johnson and Stefan Katzenbeisser) discusses several information hiding methods useable for steganographic communication, among them substitution systems, hiding methods in two-colour images, transform domain techniques, statistical steganography, distortion and cover generation techniques. Chapter 4: Steganalysis (Neil F. Johnson) introduces the concepts of steganalysis – the task of detecting and possibly removing steganographic information. Included is also an analysis of common steganographic tools. Chapter 5: Introduction to watermarking techniques (Martin Kutter and Frank Hartung) introduces the requirements and design issues for watermarking software. The authors also present possible applications for watermarks and discuss methods for evaluating watermarking systems. Chapter 6: A survey of current watermarking techniques (Jean-Luc Dugelay and Stéphane Roche) presents several design principles for watermarking systems, among them the choice of host locations, psychovisual aspects, the choice of a workspace (DFT, DCT, wavelet), the format of the watermark bits (spread spectrum, low-frequency watermark design), the watermark insertion operator and optimizations of the watermark receiver. Chapter 7: Robustness of copyright marking systems (Scott Craver, Adrian Perrig and Fabien A. P. Petitcolas) discusses the crucial issue of watermark robustness to intentional attacks. The chapter includes a taxonomy of possible attacks against watermarking systems, among them protocol attacks like inversion, oracle attacks, limitations of WWW spiders and system architecture issues. Chapter 8: Fingerprinting (Jong-Hyeon Lee) discusses principles and applications of fingerprinting to the traitor tracing problem, among them statistical fingerprinting, asymmetric fingerprinting and anonymous fingerprinting. Chapter 9: Copyright on the Internet and watermarking (Stanley Lai and Fabrizio Marongiu Buonaiuti) finally discusses watermarking systems from a legal point of view and addresses various other aspects of copyright law on the Internet.
Article
Full-text available
Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The initial aim of this study was to investigate steganography and how it is implemented. Based on this work a number of common methods of steganography could then be implemented and evaluated. The strengths and weaknesses of the chosen methods can then be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Seven steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit or parity patterns, which correspond to the message being hidden.
Conference Paper
Full-text available
Several automated techniques exist to transform ciphertext into text that “looks like” natural-language text while retaining the ability to recover the original ciphertext. This transformation changes the ciphertext so that it doesn’t attract undue attention from, for example, attackers or agencies or organizations that might want to detect or censor encrypted communication. Although it is relatively easy to generate a small sample of quality text, it is challenging to be able to generate large texts that are “meaningful” to a human reader and which appear innocuous. This paper expands on a previous approach that used sentence models and large dictionaries of words classified by part-of-speech [7]. By using an “extensible contextual template” approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with NICETEXT.
Article
Full-text available
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive. Keywords--- Cryptography, Copyright protection, Data compression, Image registration, Jitter, Motion pictures, Multimedia systems, Music, Observability, Pseudonoise coded communication, Redundancy, Spread spectrum communication, Software protection I.
Article
In this paper, we present a steganographic method for embedding a color or a grayscale image in a true color image. Three types of secret images can be carried by the proposed method: hiding a color secret image, hiding a palette-based 256-color secret image, and hiding a grayscale image in a true color image. Secret data are protected by the conventional crypto system DES. We compare the image quality and hiding capacity of the proposed method with those of the scheme in Lin et al.’s scheme. According to the experimental results, the image quality of the proposed method is better than that of the Lin et al.’s scheme. In addition, annotation data can be hidden with the secret image in the host image. The hiding capacity of the proposed method is greater than that of other compared schemes. The experimental results show that the proposed method is a secure steganographic method that provides high hiding capacity and good image quality.
Article
This paper investigates practical techniques and uses of Internet steganography. Internet steganography is the exploitation of Internet elements and protocols for the purpose of covertly communicating supplementary data. Each scenario facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
Anew Approach to persain/Arabic Text Stegraphy
  • M Shareza Shirali
Shareza Shirali, M.H, "Anew Approach to persain/Arabic Text Stegraphy", Computer and Information Science, 2006, ICIS-COMSAR 2006, 5th IEEE/ACIS International Conference, 10-12 July 2006 pp 310-315.
How do Wavelets work?
National Academy of Sciences, How do Wavelets work? National Academy of Sciences, http://www.beyonddiscovery.org/content/view.page.asp?I=1956, 2003.