Professional Documents
Culture Documents
Mr. P.D.Khandait
Dept. of Etrx.Engg.
K.D.K.C.E Nagpur (M.S.)
Prabhakark_117@yahoo.co.in
Mrs. S.P.Khandait
Dept.of Information Tech.
K.D.K.C.E Nagpur(M.S.)
prapti_khandait@yahoo.co.in
Abstract
Steganography is a technique used to ensure the security of data. A steganographic message (the plaintext) is often first
encrypted by some traditional means, and then a covertext is modified in some way to contain the encrypted message
(ciphertext), resulting in stegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can
be manipulated to carry the hidden message; only the recipient (who must know the technique used) can recover the message
and then decrypt it. This paper describes the LSB technique for secure data transfer. Section 1 gives the introduction, section 2
describes the technological background, section 3 describes the methods of implementing steganography with three more
subsections ,section 4 describes our software module with two more subsections i.e description & logical operation on the
BMP file ,working and section 5 describes the results obtained , section 6 highlights future development section 7 gives the
conclusion.
Keywords : steganography , covertext , cryptography, LSB , Masking , filtering, transformation , lossy compression etc
1. Introduction
Steganography is the art and science of writing hidden
messages in such a way that no one apart from the
intended recipient knows of the existence of the message;
this is in contrast to cryptography, where the existence of
the message itself is not disguised, but the content is
obscured i.e. Cryptography scrambles messages so they
cannot be understood. The purpose is to pass on the
information with out any regard or knowledge of others
safely to the destination. Generally, a steganographic
message will appear to be something else: a picture, an
article, a shopping list, or some other message.This can be
used to hide the original message (data, audio, still, video
and so on). The advantage of steganography over
cryptography alone is that messages do not attract
attention to themselves, to messengers, or to recipients. An
unhidden coded message, no matter how unbreakable it is,
will arouse suspicion and may in itself be incriminating, as
in some countries encryption is illegal. Both sciences can
be combined to produce better protection of the message.
In this case, when the steganography fails and the message
can be detected, it is still of no use as it is encrypted using
cryptography techniques. Therefore, the principle defined
once by Kerckhoffs for cryptography, also stands for
steganography: the quality of a cryptographic system
should only depend on a small part of information, namely
the secret key. The same is valid for good steganographic
systems: knowledge of the system that is used, should not
give any information about the existence of hidden
messages. Finding a message should only be possible with
knowledge of the key that is required to uncover it.
2. Technological Background
3.2.3 Transformations
A more complex way of hiding a secret inside an image
comes with the use and modifications of discrete cosine
transformations. Discrete cosine transformations (DCT)
are used by the JPEG compression algorithm to transform
successive 8 x 8 pixel blocks of the image, into 64 DCT
coefficients each. A simple pseudo-code algorithm to hide
a message inside a JPEG image could look like this:
Input: message, cover image
Output: steganographic image containing message
while data left to embed do
TEXT
GENERATES
MESSAGE STEGNOGRAPHY NEW FILE MESSAGE TEXT HIDDEN
PROGRAM - HIDE
BEHIND IMAGE FILE
MESSAGE
CODED IN
GENERATES
IMAGE FILE STEGNOGRAPHY IMAGE FILE
PROGRAM - UNHIDE
TEXT
FILE
THE SECOND PHASE IS
SEPERATING OUT IMAGE AND TEXT FILE
Fig.1.Phases of Steganography
4.1 Description
The hiding operation will be done on the basis of bit wise
message hiding concept. Where the message's each and
every character will be treated with there ASCII codes,
and then the codes will be hidden in the images. The main
image's, each pixel is treated accordingly with its
RED,GREEN,BLUE values and in due course of hiding
the text messages the ASCII value will get altered just by
one. This will generate a very small difference, for the
human
eye.
4. Our Module
Our Steganography software can perform the effectively
hiding of information in such a way that it is very difficult
to a casual person to detect that image contains some
information. It can't attract the attention of any user except
the intended recipient.
This can hide or retrieve the data by using the various
options present in the software these options can be:
1. Hide Message: -Hide the Text message into the Bitmap
file.
2. Retrieve Message:-Retrieve the Text message from the
Bitmap file.
3. Hide File:-Hide the text file/binary file into the Bitmap
file.
4. Recover File:-Recover the text file /binary file from the
Bitmap file.
IMAGE
FILE
4.3 Working
Here is a sample image that hides the given message
using the LSB technique. Here the container file is a
"Shakespeare's" image. The message displayed is hidden
behind the image, and the images are not having any spot
able difference.
5. Results
Here the user has to type a message which he wants to
hide along with name of BMP FILE where that message
is to be hided , name of target file and password . The
hiding operation is shown in the Fig.7.
Fig.4. BMP file header
After hiding the message the window looks like the one
shown in Fig. 8 . Here the module displays the message ,
bitmap capacity & bitmap size . The window also displays
indication of process completion. The recover operation
just does the opposite. It has to provided the source and
the target file and the password for security purpose,
otherwise the recover operation will not work. It is shown
in Fig.9. After clicking on the recover button the
message will appear on the blank screen as shown in the
Fig.10.
7. Conclusion
6. Future development
As the sky is not limit so is not for the development. Man
is now pushing away its own boundaries to make every
thought possible. So similarly these operations described
above can be further modified as it is in the world of
Information Technology. After designing any operation
every developer has a thought in his mind that he could
develop it by adding more features to it.
References
[01] Eric Cole ,"Hiding in Plain Sight: Steganography and
the Art of Covert Communication"
[02] Karen Bailey & Kevin Curran Steganography
[03] Gregory Kipper,"Investigator's Guide to
Steganography "
[04] Stefan Katzenbeisser and Fabien, A.P. Petitcolas ,
" Information Hiding Techniques for Steganography
and Digital Watermarking "
[05] Hiding secrets in computer files: steganography is the
new invisible ink, as codes stow away on images-An
article from: The Futurist by Patrick Tucker
[06] R.J. Anderson and F.A.P. Petitcolas, "On the Limits of
Steganography," IEEE Journal of Selected Areas in
Comm., vol. 16, no. 4, 1998, pp. 474-481.
[07] Ismail Avcbas, Member, IEEE, Nasir Memon,
Member, IEEE, and Blent Sankur, Member,
"Steganalysis Using Image Quality Metrics," IEEE
Transactions on Image Processing, Vol 12, No. 2,
February 2003.
[08] Neil F. Johnson and Sushil Jajodia, "Exploring
Steganography: Seeing the Unseen", IEEE, 1998.
[09] Niels Provos and Peter Honeyman, University of
Michigan, "Hide and Seek: An Introduction to
Steganography" IEEE Computer Society IEEE Security &
Privacy.
[10] R. Chandramouli and Nasir Memon, "Analysis of
LSB Based Image Steganography Techniques", IEEE
2001.