Professional Documents
Culture Documents
com
STEGANOGRAPHY
---A Better information security mechanism
Introduction
As commercially available computational resources grow in power, so does their ability to break encryption schemes. To provide new ways to ensure security of internet communications, researchers are developing alternative techniques. To human eyes, data usually contains known forms like images,e-mail,sounds and text. Most Internet data naturally includes gratuitous headers, too. Take a moment to read the previous paragraph.If you think it is a vague and awkward,then I have succeeded in using a very simple form of steganography.By taking the first letter of the every word of the previous paragraph we will discover a message that says :The duck flies at midnight.
hides private information and even the existence of the information with in the other medium. Now, it is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video.
Definitions:
Steganography: Steganography is a means
of storing information in such a way that it
History
Our earliest records of steganography were recorded by the Greek historian Herodotus and date back to Greek times. When the Greek tyrant Histiaeus was held as a prisoner by king Darius in Susa during the 5th century BCE, he had to send a secret message to his son-in-law Aristagoras in Miletus.
Steganography Media
under
Various
In the following three sections we will try to show how steganography can and is being used through the media of text, images, and audio.
Embedding Data
The goal of steganography is to conceal data. There are a few features and restrictions to successfully hide data. The goal is for the data to remain hidden. . The word hidden has two meanings here, (1) the data can be hidden and not visible to the human eye (2) the data can be visible and still not visible to the human eye. If the focus is deterred from the data, the data will not be seen, which means that it is hidden. The following guidelines represent a few features and restrictions when embedding data. Often, although it is not necessary, the hidden messages will be encrypted. This meets a requirement posed by the ``Kerckhoff principle'' in cryptography. This principle states that the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key. Without this secret key, the enemy should not have the chance to even suspect that on an observed communication channel, hidden communication is taking place. Most of the software that we will discuss later meets this
Steganographic Process
In the above figure cover media is the carrier medium - such as text ,image ,audio, video and even the network packet.
Simultaneous transfer
image
and
text
file
Image as carrier
Images are a good medium for hiding the data. The more detailed an image, the fewer constraints there are on how much data it can hide before it becomes suspect. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility.
If you want to transfer an image file and a text file, you have to store the text inside the image file by using text-on-image algorithm.
Text-on-image algorithm
Inputs: Image file and the text file Output: Text embedded image Procedure: Step 1: Extract all the pixels in the given image and store it in the array called PixelArray Step 2: Extract all the characters in the given text file and store it in the array called Character-Array Step 3: Repeat for every pixel in the PixelArray a) If the index of the Pixel-Array is less than the size of the text file: (i) Store the current character value of the Character-Array in the Alpha field of the current pixel in the PixelArray. b) Else (i) Store the value 0 in the alpha field of the current pixel in the PixelArray c) Increment the index of both the arrays (Character-Array and Pixel-Array) The above algorithm works only if the size of the text file is less than the size of the image file. This algorithm changes only the Alpha field in every pixel. The change is not visible by the human eyes. Thus the image and the text files can be transferred in the same time it takes to transfer the image file. On the receiving side reverse of the algorithm is used to get the actual message.
Alpha: Gives the degree of transparency for a pixel Red: Gives the intensity of red color in that pixel Green: Gives the intensity of green color in that pixel Blue: Gives the intensity of blue color in that pixel Therefore we can store one byte of information in the alpha field off every pixel, because it doesn't affect color value of the pixel. This way we can store the secret messages inside the image and send this message to the destination. At the receiving end, we extract the characters from the pixels and reconstruct the message from the image.
IMAGE FILE
TEXT_ON_IMA GE ALGORITHM
TEXT FILE
IMAGE FILE2
Image-on-Image algorithm
Inputs: Two image files Output: Image embedded image procedure: Step 1: Extract all the pixels in the given first image and store it in the array called PixelArray1 Step 2: Extract all the pixels in the given second image and store it in the array called Pixel-Array Step 3: Repeat for every pixel in the PixelArray1 1) If the index of Pixel-Array2 is less than the size of the first image: (i) Store the Red value of the current pixel in the pixelArray2 to the Alpha field of the current pixel in the PixelArray1 (ii) Increment the index value of the pixel-Array1 (iii)Store the Green value of the current pixel in the pixelArray2 to the Alpha field of the current pixel in the PixelArray1 (iv)Increment the index value of the pixel-Array1 (v)Store the Blue value of the current pixel in the pixelArray2 to the Alpha field of
the current pixel in the PixelArray1 (vi)Increment the index value of the pixel-Array1 2) Else (i) Store the value 0 to the Alpha field of the current pixel in the PixelArray1 (ii)Increment the index value of the Pixel-Array1 (iii) Store the value 0 to the Alpha field of the current pixel in the Pixel-Array1 (iv)Increment the index value of the Pixel-Array1 (v) Store the value 0 to the Alpha field of the current pixel in the PixelArray1 (vi)Increment the index value of the Pixel-Array1
Future Enhancements
The bandwidth reduced file transfer technique has been worked out in a LAN network using Java as implementing language. This technique is particularly efficient and useful when implemented on the Internet. And it can be used as an alternative to the compression and decompression techniques in file transfer.
Steganography is the art of hiding one message in another. In this note, the host message is defined as a block of random data available to both sender and receiver. This,
where T1, T2 and T3 are used for the address of an eight entry dynamic look-up table that determines the message bit. For completeness, it should be noted that there could also be an Implied Look-Up Table scheme.
These comments apply to a group of protocols that embed a message, one bit at a time, in a block of (pseudo)random data. Implicit in these schemes is that both the sender and receiver have copies of, or can synthesize, the random data stream. The message should be compressed and then ciphered using standard techniques before the steganography is applied. The more random the message appears, the more difficult the attack will be. The requirement for message randomness may be fulfilled by a relatively weak cipher in this context. It is also assumed that the ratio of message to random data is quite low i.e. less than 1:10.
Event Span
I am indebted to Bruce Christianson for this suggestion. The span or distance between protocol events is used as an index into a dynamic look-up table: R1, R2, R3, R4, R5, R6 -> R1, R2, ~R3, R4, ~R5, R6 ^ ^ ^ ^ Here the indicated events are two bits apart and the number two can then be used with a dynamic look-up table to produce the next message bit.
Detecting Steganography
Attempts to detect the presence of steganographic messages are referred to as attacks. Usually attacks are either passive or active. In a passive attack, the interceptor is able to intercept the data. In an active attack the interceptor is ableto manipulate the data. Whether the attack is passive or active the steganographer must use caution when choosing certain data hiding techniques so that unusual patterns do not stand out to expose the possibility of hidden information. Shifts in word and line spacing may be difficult to detect hidden information in text. Opening the text with a word processor can easily reveal appended spaces and "invisible" characters. Images can appear to have distortions. The steganographer needs to ensure that the picture taken is the picture seen. The original image and the stego-image should not have detectable variations in color composition, luminance, and pixel relationships. Steganographers need to avoid well-known images for this reason. A checksum can be embedded into a stegoimage to be used as a tampering detector. The drawback here is that there is no way to tell how much the information has been tampered with. Audio can be detected with visible noise. Echoes and shadow signals reduce the chance of audible noise but can be detected with little processing.
sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say." Modern steganographers have far-more-powerful tools. Software like White Noise Storm and S-Tools allow a paranoid sender to embed messages in digitized information, typically audio, video or still image files that are sent to a recipient. It has been noted that the Abul Nidal organization and Bin Ladens al Qaida organization were using computerized Internet files by methods of e-mail, steganography, and en-cryption to communicate to their operations. It has been reported that the alleged hijackers in the September 11th attacks had Internet email accounts and were using them to communicate with each other. Mohammed Atta, one of the alleged hijackers was repeatedly seen in a Florida library downloading pictures of children and Middle Eastern scenes which authorities suspect he used as secret method of communication.
Practical implementation
For practical implementation here the working of S-Tool is described the corresponding screenshots are as follows. Steps: Hiding process: 1.Drag the particular image(gif/bmp) or sound(wav) file on to the S-Tool window. 2. Drag the text or image file that we want to hide on to the earlier image. Then following screen will be appeared.
3. in the next step we have to give the pass phase, it will be useful to encrypt the
www.1000projects.com www.fullinterview.com www.chetanasprojects.com hidden text, the universal crypto algorithm used by the S-Tool is International Data Encryption Algorithm(IDEA).
Revealing process: 1. Just clicking the right click of the mouse on the stego image and select the option REVEAL, then following screen will be appeared.
missing is the secret key for decryption. Steganography is harder to detect under traditional traffic pattern analysis . Steganography enhances the privacy of personal communication. Since encryption can be detected and some governments prohibit the use of encryption, steganography can be used to supplement encryption. Additional layers of security are a benefit to secrecy. If a steganogrphic message is detected, there still is the need for the encryption key. A hidden message need not be encrypted to qualify as steganography. The method of encrypting a message and then using steganography is most widely used by steganographers.
Disadvantages
However, there are disadvantages to mention. One of the biggest disadvantages is that quite frequently the size of a stagnated image is usually larger that the original image. There can be color changes, especially evident if well-know images are chosen as the steganographic cover. Images can be degraded when trying to analyze them. Another issue to mention, text messages are limited in size for the hiding of data. They need redundant data to replace a secret message. Changing the type of the format or replacing the readable text can alter text messages. Through the use of new technology, some Internet firewalls can detect steganographic messages. As this technology evolves detecting steganographic messages can be a drawback because an important message may be deleted or quarantined and this message may be the one that will save a country.
2. Right click on the filename and select save option to save the hidden data file.
Advantages
Why use steganography? The advantage of using steganography is to conceal information The transmission of messages is transparent to any given viewer. Messages can be concealed in different formats that are undetectable and unreadable to the human eye. Steganographic technologies are very important in Internet privacy today. With the use of steganography and encryption, corporations, governments, and law enforcement agencies can communicate secretly. Encryption protects data and can be detected; the only thing
Conclusion:
Steganography tools are becoming abundant and very easy to use. Many Internet sites offer free downloadable software. Often, although it is not necessary, the hidden messages will be encrypted. Encryption paired with steganography creates an extra layer of privacy. The security of the system depends
REFERENCES: 1. www.jjtc.com/steganography 2. www.cs.uct.ac.za/courses/cs400w/nis/ papers99/dsellrs/stego/htm 3. www.cotse.com/tools/stega.htm 4. A Research paper submitted at SANS Institute in 2003 as part of GIAC practical repository. 5. Information Technology magazine published in the month December 2002. 6. www.gyre.org/news/article/1575