You are on page 1of 8

Authorised By

SANTOSH BHARADWAJ REDDY


Email: help@matlabcodes.com
Engineeringpapers.blogspot.com
More Papers and Presentations available on above site

1
ABSTRACT: Bret and Crystal. Amy wants to send a secret
As the information age is growing rapidly and message (M) to Bret using a random (R) harmless
message to create a cover (C) which can be sent to
data becomes highly valuable and sensitive, Bret without raising suspicion. Amy then changes
methods need to be discovered to protect and the cover message (C) to a stego-object (S) by
embedding the secret message (M) into the cover
secure sensitive data. One such method that message (C) by using a stego-key (K). Amy should
transfers data over network securely is achieved by then be able to send the stego-object (S) to Bret
without being detected by Crystal. Bret will then be
Steganography. This paper deals with some of the able to read the secret message (M) because he
steganographic techniques and detailed look at knows the stego-key (K) used to embed it into the
cover message (C).
hiding information in Image and TCP/IP protocol
that are used frequently in the internet.

INTRODUCTION
"Steganography is the art and science of
communicating in a way which hides the existence
of the communication”. This basically
comes down to using unnecessary bits in an
innocent file to store your sensitive data. The
techniques used make it impossible to detect that
there is anything inside the innocent file, but the
intended recipient can obtain the hidden data. This
way, one can not only hide the message itself, but
also the fact that he is sending this message.

GOAL OF STEGANOGRAPHY
In contrast to Cryptography, where the enemy is
steganography_medium = secret message +
allowed to detect, intercept and modify messages
cover message + key [11]
without being able to violate certain security
premises guaranteed by a cryptosystem, the goal of
As Fabien A.P. Petitcolas points out, "in a 'perfect'
Steganography is to hide messages inside other
system, a normal cover should not be
harmless messages in a way that does not allow
distinguishable from a stego-object, neither by a
any enemy to even detect that there is a second
human nor by a computer looking for statistical
message present".
patterns." In practice, however, this is not always
the case. In order to embed secret data into a cover
A DETAILED LOOK AT message, the cover must contain a sufficient
STEGANOGRAPHY amount of redundant data or noise. This is because
This section discusses Steganography at length and the embedding process Steganography uses
deals with the different types which we actually replaces this redundant data with the secret
practice today along with some of the other message. This limits the types of data that one can
principles that are used in Steganography and some use with Steganography.
of the Steganographic techniques in use In practice there are three types of
today. This is where one can look at the nuts and steganography protocols used. They are Pure
bolts of Steganography and all the different ways Steganography, Secret Key Steganography and
one can use this technology. Public Key Steganography.

Let’s look at what a theoretically perfect Pure Steganography


secret communication. To illustrate this concept,
consider three fictitious characters named Amy,

2
It is defined as a steganographic system that does text itself or reformatting the text to some other
not require the exchange of a cipher such as a form (from .TXT to .PDF, etc.). There are
stego-key. This method of Steganography is the numerous methods by which to accomplish text
least secure means by which to communicate based Steganography.
secretly because the sender and receiver can rely
only upon the presumption that no other parties are Line-shift encoding
aware of this secret message. Using open systems It involves actually shifting each line of text
such as the Internet, this is not the case at all. vertically up or down by as little as 3 centimeters.
Depending on whether the line was up or down
Secret Key Steganography from the stationary line would equate to a value
It is defined as a steganographic system that that would or could be encoded into a secret
requires the exchange of a secret key (stego-key) message.
prior to communication. Secret Key Steganography
takes a cover message and embeds the secret Word-shift encoding
message inside of it by using a secret key (stego- It works in much the same way that line-shift
key). Only the parties who know the secret key can encoding works, only one can use the horizontal
reverse the process and read the secret message. spaces between words to equate a value for the
Unlike Pure Steganography where a perceived hidden message. This method of encoding is less
invisible communication channel is present, Secret visible than line-shift encoding but requires that the
Key Steganography exchanges a stego-key, which text format support variable spacing.
makes it more susceptible to interception. The
benefit to Secret Key Steganography is even if it is Feature specific encoding
intercepted, only parties who know the secret key It involves encoding secret messages into
can extract the secret message. formatted text by changing certain text attributes
such as vertical/horizontal length of letters such as
Public Key Steganography b, d, etc.
It takes the concepts from Public Key This is by far the hardest text encoding method to
Cryptography as explained below. Public Key intercept as each type of formatted text has a large
Steganography is defined as a steganographic amount of features that can be used for encoding
system that uses a public key and a private key to the secret message. All three of these text based
secure the communication between the parties encoding methods require either the original file or
wanting to communicate secretly. The sender will the knowledge of the original files formatting to be
use the public key during the encoding process and able to decode the secret messages.
only the private key, which has a direct
mathematical relationship with the public key, can ENCODING SECRET
decipher the secret message. Public Key MESSAGES IN IMAGE
Steganography provides a more robust way of Coding secret messages in digital images is
implementing a steganographic system because it widely used in the digital world of today. This is
can utilize a much more robust and researched because it can take advantage of the limited power
technology in Public Key Cryptography. It also has of the human visual system (HVS). Almost any
multiple levels of security in that unwanted parties plain text, cipher text, image and any other media
must first suspect the use of steganography and that can be encoded into a bit stream can be hidden
then they would have to find a way to crack the in a digital image. With the continued growth of
algorithm used by the public key system before strong graphics power in computers and the
they could intercept the secret message. research being put into image based
Steganography, this field will continue to grow at a
very rapid pace. To the computer, an image is an
ENCODING SECRET array of numbers that represent light intensities at
MESSAGE IN TEXT various points (pixels). These pixels make up the
Encoding secret messages in text can be a very images raster data. When dealing with digital
challenging task. This is because text files have a images for use with Steganography, 8-bit and 24-
very small amount of redundant data to replace bit per pixel image files are typical. Both have
with a secret message. Another drawback is the advantages and disadvantages,
ease of which text based Steganography can be • 8-bit images are a great format to use
altered by an unwanted parties by just changing the because of their relatively small size. The

3
drawback is that only 256 possible colors Logic: A 24-bit bitmap will have 8 bits
can be used which can be a potential representing each of the three color values (red,
problem during encoding. Usually a gray green, and blue) at each pixel. If we consider just
scale color palette is used when dealing the blue there will be 28 different values of blue.
with 8-bit images such as (.GIF) because The difference between say 11111111 and
its gradual change in color will be harder 11111110 in the value for blue intensity is likely to
to detect after the image has been encoded be undetectable by the human eye. If we do it with
with the secret message. the green and the red as well we can get one letter
• 24-bit images offer much more flexibility of ASCII text for every three pixel.
when used for Steganography. The large Therefore, the least significant bit can be used
number of colors (over 16 million) that (more or less undetectably) for something else
can be used go well beyond the human other than color information. As you can see, much
visual system (HVS), which makes it very more information can be stored in a 24-bit image
hard to detect once a secret message, has file. Disadvantage of using LSB alteration are
been encoded. The one major drawback to mainly in the fact that it requires a fairly large
24-bit digital images is their large size cover image to create a usable amount of hiding
(usually in MB) makes them more suspect space. Even now a day, uncompressed image of
than the much smaller 8-bit digital images 800 x 600 pixels are not often used on the Internet,
(usually in KB) when sent over an open so using these might raise suspicion. Another
system such as the Internet. disadvantage will arise when compressing an
image concealing a secret using a lossy
Digital image compression is a good solution to compression algorithm. The hidden message will
large digital images such as the 24-bit images. not survive this operation and is lost after the
There are two types of compression techniques. transformation.
They are,
Masking and filtering
• Lossless compression is preferred when
These techniques are usually restricted to 24 bits or
there is a requirement that the original
grayscale images; take a different approach to
information remain intact (as with
hiding a message. These methods are effectively
steganographic images). The original
similar to paper watermarks, creating markings in
message can be reconstructed exactly.
an image. This can be achieved for example by
This type of compression is typical in GIF
modifying the luminance of parts of the image.
and BMP images.
While masking does change the visible properties
of an image, it can be done in such a way that the
• Lossy compression, while also saving human eye will not notice the anomalies. Since
space, may not maintain the integrity of masking uses visible aspects of the image, it is
the original image. This method is typical more robust than LSB modification with respect to
in JPG images and yields very good compression, cropping and different kinds of image
compression. processing.

Transformations
The popular digital image encoding techniques A more complex way of hiding a secret inside an
used today are least significant bit (LSB) encoding, image comes with the use and modifications of
masking & filtering, Transformation, spread discrete cosine transformations. Discrete cosine
spectrum steganography, statistical steganography, transformations (DCT)), are used by the JPEG
distortion, and covers generation steganography. compression algorithm to transform successive 8 x
The following are some of these techniques. 8 pixel blocks of the image, into 64 DCT
coefficients each. It follows Jsteg algorithm
Least significant bit (LSB) encoding (D.Upham) used JPEG image format. According to
It is by far the most popular of the coding Jsteg algorithm,
techniques used for digital images. By using the Replace sequentially the least-significant bit
LSB of each byte (8 bits) in an image for a secret of discrete cosine transform coefficients with the
message, one can store 3 bits of data in each pixel message data .
for 24-bit images and 1 bit in each pixel for 8-bit Logic: The secret data is inserted into the cover
images. image in the DCT domain. The signature (secret

4
message) DCT coefficients are encoded using a set of discrete data values". The FFT expresses a
lattice coding scheme before embedding. Each finite set of data points in terms of its component
block of cover DCT coefficients is first checked for frequencies. It also solves the identical inverse
its texture content and the signatured codes are problem of reconstructing a signal from the
appropriately inserted depending on a local texture frequency data. Thus simple logic for encoding and
measure. Experimental results indicate that high decoding using transforms is hiding the data. The
quality embedding is possible, with no visible steps are to take the DCT or wavelet transform of
distortions. Signature images can be recovered the cover image and find the coefficients below a
even when the embedded data is subject to specific threshold. Replace these bits with bits to
significant lossy JPEG compression. be hidden (for example, use LSB insertion) and
then take the inverse transform and store it as a
Each DCT coefficient F (u, v) of an 8 x 8 block of regular image.
image pixels f(x, y) is given by:
Recovering the data To extract the hidden data
take the transform of the modified image and find
the coefficients below a specific threshold. Extract
bits of data from these coefficients and combine
the bits into an actual message.

where C(x) = 1/√2 when x equals 0 and C(x) = 1 Patchwork


otherwise. After calculating the coefficients, the Patchwork is a statistical technique that uses
following quantizing operation is performed: redundant pattern encoding to embed a message in
an image. The algorithm adds redundancy to the
hidden information and then scatters it throughout
the image.

Logic: A pseudorandom generator is used to select


where Q (u, v) is a 64-element quantization table. two areas of the image (or patches), patch A and
A simple pseudo-code algorithm to hide a message patch B. All the pixels in patch A is lightened
inside a JPEG image could look like this: while the pixels in patch B are darkened. In other
words the intensities of the pixels in the one patch
Input: message, cover image are increased by a constant value, while the pixels
Output: steganographic image containing message of the other patch are decreased with the same
while data left to embed do constant value. The contrast changes in this patch
get next DCT coefficient from cover subset encodes one bit and the changes are
image typically small and imperceptible, while not
if DCT . 0 and DCT . 1 then changing the average luminosity.
get next LSB from message
replace DCT LSB with message bit A disadvantage of the patchwork approach is that
end if only one bit is embedded. One can embed more
insert DCT into steganographic image bits by first dividing the image into sub-images and
end while applying the embedding to each of them.
Although a modification of a single DCT will
affect all 64 image pixels, the LSB of the quantized The advantage of using this technique is that the
DCT coefficient can be used to hide information. secret message is distributed over the entire image,
Lossless compressed images will be suspectible to so should one patch be destroyed, the others may
visual alterations when the LSB are modified. This still survive. This however, depends on the
is not the case with the above described method, as message size, since the message can only be
it takes place in the frequency domain inside the repeated throughout the image if it is small enough.
image, instead of the spatial domain and therefore If the message is too big, it can only be embedded
there will be no visible changes to the cover image. once.
There are also other methods that are not discussed
In addition to DCT, images can be processed with in this paper which are of less utility over the
Fast Fourier transform (FFT). FFT is "an above topics.
algorithm for computing the Fourier transform of a

5
ENCODING INFORMATION techniques are used to encode and decode for much
IN A TCP/IP HEADER safety.
The TCP/IP header contains a number of areas
where information can be stored and sent to a Manipulating IP packet identification field
remote host in a covert manner. Take the following The identification field of the IP protocol helps
diagrams which are textual representations of the with re-assembly of packet data by remote routers
IP and TCP headers respectively: and host systems. Its purpose is to give a unique
IP Header (Numbers represent bits of data from 0 value to packets so if fragmentation occurs along a
to 32 and the relative position of the fields in the route, they can be accurately re- assembled. In the
datagram) following example, the lines below show a tcp
dump representation of the packets on a network
between two hosts "nemesis.psionic.com" and
"blast.psionic.com". This is one of the packets
received during transmission which has character
„H. in its IP packet identification field.

Manipulating Initial Sequence Number field


(ISN)
The Initial Sequence Number field (ISN) of the
TCP/IP protocol suite enables a client to establish a
reliable protocol negotiation with a remote server.
It is similar to above but here it has 32 bits field,
Fig 5.1 Basic IP Header Structure [4] hence it serves as a perfect medium for
TCP Header (Numbers represent bits of data from transmitting clandestine data. Consider following
0 to 32 and the relative position of the fields in the line. Here 1207959552 is ISN. Dividing it by
diagram.) 65536*256 gives 72(i.e., „H.)
Because of the sheer amount of information any
one can represent in a 32 bit address space
(4,294,967,296 numbers), the sequence number
makes an ideal location for storing data. Aside
from the obvious example given above, a number
of other techniques are used to store information in
either a byte fashion, or as bits of information
represented through careful manipulation of the
Fig 5.2 Basic TCP header structure [4] sequence number. The simple algorithm of the
Logic: Within each header there are multitudes of covert tcp program takes the ASCII value of our
areas that are not used for normal transmission or data and converts it to a usable sequence number
are "optional" fields to be set as needed by the Also there are other methods for hiding data in
sender of the datagrams. An analysis of the areas of TCP/IP header that may vary depending on the
a typical IP header that are either unused or type of application and requirement. Also data can
optional reveals many possibilities where data can be hidden in audio and video files which are not
be stored and transmitted. discussed in this paper. And they are also widely
For general purposes, this paper focuses on used in open environment systems.
encapsulation of data in the more mandatory fields.
Because these fields are not as likely to be altered APPLICATIONS
in transit as say the IP or TCP options fields which The three most popular and researched uses for
are sometimes changed or stripped off by packet steganography in an open systems environment are
filtering mechanisms or through fragment re- covert channels, embedded data and digital
assembly. They are watermarking.
- The IP packet identification field. • Covert channels in TCP/IP involve
- The TCP initial sequence number field. masking identification information in the
- The TCP acknowledged sequence number field. TCP/IP headers to hide the true identity of
Hence data can be placed into these fields. Though one or more systems. This can be very
the ASCII code of character can be placed simply, useful for any secure communications
it will not look innocent thus some special needs over open systems such as the

6
Internet when absolute secrecy is needed [3]. Steganography - Wikipedia, the free
for an entire communication process and encyclopedia_files
not just one document as mentioned next. URL: http://en.wikipedia.org/wiki/Steganography
• Embedding Data using containers [4]. Embedding Covert Channels into TCP/IP -
(cover messages) is by far the most Steven J. Murdoch and Stephen Lewis
popular use of Steganography today. This URL: http://www.cl.cam.ac.uk/users/{fsjm217,
method of Steganography is very useful srl32g}/
when a party must send a top secret, [5]. Krenn, R., “Steganography and Steganalysis”,
private or highly sensitive document over URL: http://www.krenn.nl/univ/cry/steg/article.pdf
an open systems environment such as the [6]. Rowland, C.H.: Covert channels in the TCP/IP
Internet. By embedding the hidden data protocol suite. First Monday 2 (1997) URL:
into the cover message and sending it, you http://www.firstmonday.org/issues/issue2_5/rowla
can gain a sense of security by the fact nd/
that no one knows you have sent more [7]. Steganography Links & Whitepapers
than a harmless message other than the (Computer Forensics)
intended recipients. URL: http:// www.forensics.nl/steganography/
[8].URL:http://io.acad.athabascau.ca/~grizzlie
• Digital watermarking is usually used for
[9]. The WEPIN Store, “Steganography (Hidden
copy write reasons by companies or
Writing)”, 1995,
entities that wish to protect their property
URL: http://www.wepin.com/pgp/stego.html
by either embedding their trademark into
[10]. Petitcolas, Fabien A.P., “The Information
their property or by concealing serial
Hiding Homepage: Digital Watermarking and
numbers/license information in software,
Steganography”, URL:
etc. Digital watermarking is very
http://www.cl.cam.ac.uk/~fapp2/steganography/
important in the detection and prosecution
[11].Forensic Science Communications - July 2004
of software pirates/digital thieves.
URL:
http://www.fbi.gov/hq/lab/fsc/backissu/july2004/re
CONCLUSION search/
Although only some of the main image [12]. Steganography-Tutorial
steganographic techniques were discussed in this URL: http://www.jjtc.com/stegdoc/stegdoc.html
paper, one can see that there exists a large selection [13]. Steganography Papers, Johnson, N.F.&
of approaches to hiding information in images. All Jajodia, S., “Exploring Steganography:
the major image file formats have different Seeing the Unseen”, Computer Journal, February
methods of hiding messages, with different strong 1998
and weak points respectively. Where one technique URL:http://www.cs.arizona.edu/~collberg/Teachin
lacks in payload capacity, the other lacks in g/620/1999/Handouts/hual1.ps
robustness. For example, the patchwork approach [14]. Bender, W., Gruhl, D., Lu, A., Morimoto, N.,
has a very high level of robustness against most IBM Systems Journal, “Techniques for Data
type of attacks, but can hide only a very small Hiding
amount of information. Least significant bit (LSB)
in both BMP and GIF makes up for this, but both
approaches result in suspicious files that increase
the probability of detection when in the presence of
a warden. Thus for an agent to decide on which Authorised By
steganographic algorithm to use, he would have to
decide on the type of application he want to use the
algorithm for and if he is willing to compromise on SANTOSH BHARADWAJ REDDY
some features to ensure the security of others. Email: help@matlabcodes.com
Engineeringpapers.blogspot.com
REFERENCES More Papers and
[1]. Hide and Seek: An Introduction to Presentations available on
Steganography - Niels Provos and Peter Honeyman
URL: http:// niels.xtdnet.nl/papers/practical.pdf above site
[2]. Johnson, Neil F., “Steganography”, 2000,
URL: http://www.jjtc.com/stegdoc/index2.html

You might also like