Steganography In The Information Technology Sector Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

This document focus on an unfamiliar field of study in IT sector i.e. Steganography. This document covers various concepts in Steganography, A brief history of Steganography and introducing few types of techniques available today in Steganography. It also covers other topics like security in Steganography, mobile messaging, MMS Steganography related information. This document closes with a summery and proper solution .

STEGANOGRAPHY TERMS

Steganalysis - The process of detecting hidden information inside of a file.

Stego key - This is a secrete key used in extracting the hidden message

Carrier File - A file which has hidden information inside of it.

Stego-Medium - The medium in which the information is hidden.

Redundant Bits - Pieces of information inside a file which can be overwritten or altered without damaging the file.

Payload - The information which is to be concealed.

HISTORY OF STEGANOGRAPHY

The initial footages of Steganography were by the Greek historian Herodotus in hischronicles known as "Histories" and date back to around 440 BC. Herodotus recorded two stories of Steganographic techniques during this time in Greece. The first stated that King Darius of Susa shaved the head of one of his prisoners and wrote a secret message on his scalp. When the prisoner's hair grew back, he was sent to the Kings son in law Aristogoras in Miletus undetected. The second story also came from Herodotus, which claims that a soldier named Demeratus needed to send a message to Sparta that Xerxes intended to invade Greece. Back then, the writing medium was text written on wax-covered tablets. Demeratus removed the wax from the tablet, wrote the secret message on the underlying wood, recovered the tablet with wax to make it appear as a blank tablet and finally sent the document without being detected. Romans used invisible inks, which were based on natural substances such as fruit juices and milk. This was accomplished by heating the hidden text, thus revealing its contents.

Invisible inks have become much more advanced and are still in limited use today. During the 15th and 16th centuries, many writers including Johannes Trithemius (author of Steganographia) and Gaspari Schotti (author or Steganographica) wrote on Steganagraphic techniques such as coding techniques for text, invisible inks, and incorporating hidden messages in music. Between 1883 and 1907, further development can be attributed to the publications of Auguste Kerckhoff (author of Cryptographic Militaire) and Charles Briquet (author of Les Filigranes). These books were mostly about Cryptography, but both can be attributed to the foundation of some Steganographic systems and more significantly to watermarking techniques.

During the times of WWI (World War 1) and WWII (World War 11), significant advances in Steganography took place.

Concepts such as null ciphers (taking the 3rd letter from each word in a harmless message to create a hidden message, etc), image substitution and microdot (taking data such as pictures and reducing it to the size of a large period on a piece of paper) were introduced and embraced as great steganographic techniques.

In the recent digital world of today, namely 1992 to present, Steganography is being used all over the world on computer systems. Many tools and technologies have been created that take advantage of old steganographic techniques such as null ciphers, coding in images, audio, video and microdot. With the research this topic is now getting a lot of great applications for Steganography in the near future.

HOW STEGANOGRAPHY WORKS

Steganography replaces unneeded or unused bits in regular computer files (Graphics, sound, text) with bits of different and invisible information. Hidden information can be any other regular computer file or encrypted data.

Steganography differs from cryptography in a way that it masks the existence of the message where cryptography works to mask the content of the message.

Steganography sometimes used in conjunction with encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered,the hidden information is not seen.

.

TYPES OF STEGANOGRAPHY

There are different ways to hide the message in another, well known are Least Significant bytes and Injection.

When a file or an image is created there are few bytes in the file or image which are not necessary or least important. These type of bytes can be replaced with a message without damaging or replacing the original message, by which the secrete message is hidden in the file or image.

Another way is a message can be directly injected into a file or image. But in this way the size of the file would be increasing accordingly depending on the secrete message

STEGANOGRAPHY IN IMAGE

Digital images are the most widely used cover objects for steganography. Due to the availability of various file formats for various applications the algorithm used for these formats differs accordingly.

An image is collection of bytes (know as pixels for images) containing different light intensities in different areas of the image. When dealing with digital images for use with Steganography, 8-bit and 24-bit per pixel image files are typical. Both have advantages and disadvantages 8-bit images are a great format to use because of their relatively small size. The drawback is that only 256 possible colors can be used which can be a potential problem during encoding. Usually a gray scale color palette is used when dealing with 8-bit images such as (.GIF) because its gradual change in color would be harder to detect after the image has been encoded with the secret message. 24-bit images offer much more flexibility when used for Steganography. The large numbers of colors (over 16 million) that can be used go well beyond the human visual system (HVS), which makes it very hard to detect once a secret message, has been encoded.

Large amount of data can be encoded in to 24-bit images as it is compared to 8-bit images. The drawback of 24-bit digital images is their size which is very high and this makes them suspicious our internet due to their heavy size when compared to 8-bit images. Depending on the type of message and type of the image different algorithms are used.

Few types in Steganography in Images:

Least significant bit insertion

Masking and filtering

Redundant Pattern Encoding

Encrypt and Scatter

Algorithms and transformations

Least significant bit insertion

Least Significant Bit (LSB) insertion is most widely known algorithm for image steganography ,it involves the modification of LSB layer of image. In this technique,the message is stored in the LSB of the pixels which could be considered as random noise.Thus, altering them does not have any obvious effect to the image.

Masking and filtering

Masking and filtering techniques work better with 24 bit and grey scale images. They hide info in a way similar to watermarks on actual paper and are sometimes used as digital watermarks. Masking the images changes the images. To ensure that changes cannot be detected make the changes in multiple small proportions. Compared to LSB masking is more robust and masked images passes cropping, compression and some image processing. Masking techniques embed information in significant areas so that the hidden message is more integral to the cover image than just hiding it in the "noise" level. This makes it more suitable than LSB with, for instance, lossy JPEG images.

Redundant Pattern Encoding

Redundant pattern encoding is to some extent similar to spread spectrum technique. In this technique, the message is scattered through out the image based on algorithm. This technique makes the image ineffective for cropping and rotation. Multiple smaller images with redundancy increase the chance of recovering even when the stegano-image is manipulated.

Encrypt and Scatter

Encrypt and Scatter techniques hides the message as white noise and White Noise Storm is an example which uses employs spread spectrum and frequency hopping. Previous window size and data channel are used to generate a random number.And with in this random number ,on all the eight channels message is scattered through out the message.Each channel rotates,swaps and interlaces with every other channel. Single channel represents one bit and as a result there are many unaffected bits in each channel. In this technique it is very complex to draw out the actual message from stegano-image. This technique is more secure compared to LSB as it needs both algorithm and key to decode the bit message from stegano-image. Some users prefer this methos for its security as it needs both algorithm and key despite the stegano image. This method like LSB lets image degradation in terms of image processing, and compression.

Algorithms and transformations

LSB modification technique for images does hold good if any kind of compression is done on the resultant stego-image e.g. JPEG, GIF. JPEG images use the discrete cosine transform to achieve compression. DCT is a lossy compression transform because the cosine values cannot be calculated exactly, and repeated calculations using limited precision numbers introduce rounding errors into the final result. Variances between original data values and restored data values depend on the method used to calculate DCT

STEGANOGRAPHY IN AUDIO

Implanting secrete message into an audio is the most challenging technique in Steganography. This is because the human auditory system (HAS) has such a vibrant range that it can listen over. To put this in perspective, the (HAS) recognize over a range of power greater than one million to one and a range of frequencies greater than one thousand to one making it extremely hard to add or remove data from the original data structure. The only weakness in the (HAS) comes at trying to differentiate sounds (loud sounds drown out quiet sounds) and this is what must be exploited to encode secret messages in audio without being detected.

Below are the lists of methods which are commonly used for audio Steganography.

LSB coding

Parity coding

Phase coding

Spread spectrum

Echo hiding

LSB coding

Using the least-significant bit is possible for audio, as modifications usually would not create recognizable changes to the sounds. Another method takes advantage of human limitations. It is possible to encode messages using frequencies that are indistinct to the human ear. Using frequencies above 20.000Hz, messages can be hidden inside sound files and can not be detected by human checks.

Parity coding

Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples and encodes each bit from the secret message in a sample region's parity bit. If the parity bit of a selected region does not match the secret bit to be encoded, the process flips the LSB of one of the samples in the region. Thus, the sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive fashion.

Phase coding

Phase coding attends to the disadvantages of the noise inducing methods of audio Steganography. Phase coding uses the fact that the phase components of sound are not as audible to the human ear as noise is. Rather than introducing perturbations, this technique encodes the message bits as phase shifts in the phase spectrum of a digital signal, attaining an indistinct encoding in terms of signal-to-perceived noise ratio.

Spread spectrum

In the context of audio Steganography, the basic spread spectrum (SS) method attempts to spread secret information across the audio signal's frequency spectrum as much as possible. This is comparable to a system using an implementation of the LSB coding that randomly spreads the message bits over the entire audio file. However, unlike LSB coding, the SS method spreads the secret message over the sound file's frequency spectrum, using a code that is independent of the actual signal. As a result, the final signal occupies a bandwidth in excess of what is actually required for broadcast.

Echo hiding

In echo hiding, information is implanted in a sound file by introducing an echo into the separate signal. Like the spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior strength when compared to the noise inducing methods. If only one echo was produced from the original signal, only one bit of information could be encoded. Therefore, the original signal is broken down into blocks before the encoding process begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal.

STEGANOGRAPHY IN VIDEO

In video steganography, a video file would be embedded with supplementary data to hide secret messages. In the process, an intermediate signal which is a function of hidden message data and data of content signal would be generated. Content data (video file) is then combined with this intermediate signal to result encoding. The supplementary data can include copy control data which can be brains by consumer electronic device and used to disable copying.

The intermediate signal may also contain a pseudo arbitrary key data so as to hide encoding and decode needs corresponding key to extract hidden information from encoded content. In some implementations regulation data is embedded in the content signal with auxiliary data. This regulation data consists of known properties enabling its identification in the embedded content signal. This encoding is robust against scaling, resampling and other forms of content degradation, so that the supplementary data can be detected from the content which might have been degraded.

There are different approaches for video steganography apart from the above mentioned. Most widely known are listed and discussed below.

Least Significant Bit Insertion

This is the most simple and popular approach for all types of steganography. In this method the digital video file is considered as separate frames and changes the displayed image of each video frame. LSB of 1 byte in the image is used to store the secret information. Effecting changes are too small to be recognized by human eye. This method enhances the capacity of the hidden message but compromises the security requirements such as data integrity.

Real time video steganography

This kind of steganography involves hiding information on the output image on the device. This method considers each frame shown at any moment irrespective of whether it is image; text .The image is then divided into blocks. If pixel colors of the blocks are similar then changes color characteristics of number of these pixels to some extent. By labeling each frame with a sequence number it would even be easy to identify missing parts of information. To extract the information, the displayed image should be recorded first and relevant program is used then.

STEGANOGRAPHY IN DOCUMENT

Steganography in documents just focuses on altering some of its characteristics. They can either be characteristics of text or even text formatting. Below are few ways listed and discussed to implement the same.

Since everyone can read, encoding text in neutral sentences is doubtfully effective. But taking the first letter of each word of the previous sentence, one can see that it is possible and not very difficult. Hiding information in plain text can be done in many different ways. One way is by simple adding white space and tabs to the ends of the lines of the document .The last technique was successfully used in practice and even after a text has been printed and copied on paper for ten times, the secret message could still be retrieved.

Another possible way of storing a secret inside a text is using a publicly available cover source, a book or a newspaper, and using a code which consists for example of a combination of a page number, a line number and a character number. This way, no information stored inside the cover source leads to the hidden message. Discovering it depends exclusively on gaining knowledge of the secret key.

Setting background color and font color is one of the mainly used staganographic approach. This method is focused for Microsoft word documents. Choose predefined colors and set font and background colors of invisible characters such as space, tab or the carriage return characters. R,G,B values are 8 bits means we have allowed range of 0 to 255.Most of the viewers would not feel interested about color values of these invisible characters hence 3 bytes of information is easily hidden in each occurrence of space,tab or carriage return.This approach needs no extra information to hide required bits.

SECURITY IN STEGANOGRAPHY

PURE KEY STEGANOGRAPHY

Pure Steganography is a Steganography system that doesn't require prior exchange of some secret information before sending message; therefore, no information is required to start the communication process: the security of the system thus depends entirely on its secrecy .The pure Steganography can be defined as the quadruple (C, M, D, and E) where:

C: the set of possible covers.

M: the set of secret massage with |C| ≥ |M|.

E: CÃ-M→C the embedding function.

D: C→M of the extraction function with the property that D (E(c,m))=m for all m Є M and c Є C.

Cover (C)

Message (M)

Embedding (E)

Extracting (D)

Strgo-Object

Message(M)

In most applications, pure Steganography is preferred, since no stego-key must be shared between the communication partners, although a pure Steganography protocols don't provide any security if an attacker knows the embedding method

PRIVATE KEY STEGANOGRAPHY

A Private Key Steganography system is similar to a symmetric cipher, where the sender chooses a cover and embeds the secret message into the cover using a secret key. If the Private Key used in the embedding process is known to the receiver, he can reverse the process and extract the secret message.

Anyone who doesn't know the Private Key should not be able to obtain evidence of the encoded information. The Private Key Steganography can be defined as the quintuple (C, M, K, DK, and EK) where:

C: the set of possible covers.

M: the set of secret message.

K: the set of secret keys.

Ek: CÃ-MÃ-K→C With the property that DK (EK(c,m,k),k)=m for all m Є M, c Є C and k Є K

KEY

KEY

Strgo-Object

Cover (C)

Embedding (E)

Message (M)

Extracting (D)

Message (M)

PUBLIC KEY STEGANOGRAPHY

Public key Steganography does not depend on the swapping of a private key. It necessitates two keys, one of them private (secret) and the other public: the public key is stored in a public database, whereas the public key is used in the embedding process. The Private Key is used to reconstruct the secret message One way to build a public key Steganography system is to use a public key crypto system. The sender and the receiver can exchange public keys of some public key cryptography algorithm before imprisonment. Public key Steganography utilizes the fact that the decoding function in a Steganography system can be applied to any cover, whether or not it already contains a secret message. The public key Steganography relies on the fact that encrypted information is random enough to hide in plain sight. The sender encrypts the information with the receiver's public key to obtain a random-looking massage and embeds it in a channel known to the receiver, thereby replacing some of the natural arbitrariness with which every communication process is accompanied. Assume that both the cryptographic algorithms and the embedding functions are publicly known. The receiver who cannot decide a priori if secret information is transmitted in a specific cover suspect the arrival of message and simply try to extract and decrypt it using his private key. If the cover actually contained information, the decryption information is the sender's message

OTHER TYPES

MOBILE MESSAGING STEGANOGRAPHY

Mobile Messaging Service enables mobile users to send and receive messages containing image, audio and video. These messages are exchanged ultimately through a component known as Mobile Switching Center.

MMS messages have several benefits like communicating even when the server is busy, exchanging messages while making calls, sending offline messages. They also provide services like eCommerce. As there is possibility of disclosure of confidential and personal information between various systems, information security has got immense importance. MMS Steganography provides confidentiality and integrity with subtle unremovability.Users can profit from concealed channels in order to send and receive hidden messages and keys.

Multimedia objects may contain hidden information embedded to them using steganography techniques.

The steganography technique used must satisfy following:

Reliability of secreted information after it has been embedded inside the content should be correct.

Content object should remain intact or almost unchanged to the human eyes.

There can be mainly two types of steganography techniques possible for MMS objects.

Fragile steganography comprises of implanting information into a file which is destroyed if the file is modified.

Video Technique: Works over video files. Combinations of sound and image techniques are used to implement this as whole. The scope of adding lots of data is much greater.

Sound Technique: Works over audio files like Mp3 files. Encode data as binary to sound like noise and can be identified by receiver with correct key. Data being added is in narrow bandwidth compared to the medium.

Robust techniques aim to embed information into a file which cannot easily be destroyed.

Image Hiding: Works over images.

Lease Significant Bit

Least significant bits of each pixel in one image are used to hide the most significant bits of another. Simple and easy way of information hiding.

Direct Cosine Transform

Transformed DCT coefficients would be altered. Image would be made robust by scattering the hiding information evenly.

Wavelet Transform

Dividing whole image into small wavelets and then hide the information. Coefficients of wavelets are altered with tolerable noise.

Text Technique: Works over documents.Just by changing some of the characteristics of the content information can be embedded. Alterations would not be visible to user.

As MMS Steganography becomes more widely used now there must be a clear definition of robustness. This definition helps to prevent detection and removal of embedded data. Below are the few properties a good technique should hold:

Quality of media should not perceptibly degrade after embedding secret data.

Secret data should be imperceptible with out secret knowledge, typically the key.

If several data are there, they should not hamper with each other.

Secret data should survive which don't degrade the perceived quality of work.

MMS STEGANOGRAPHY RELATED WORK

As MMS carries multi formatted data such as Text, Audio, Video and images, it has got more chances of sending secret messages and can implement various methodologies in order to keep the message safe and secret. Currently this study is all about Text and Video based Steganography.

An MMS capable mobile with inbuilt cameras and customized applications has high importance in terms of steganography creation and extraction

Capacity

Efficiency

Processing time

Resource time consumption

Advantage

Text technique

Less

More

Less

Less

Easy and simple to implement

Video technique

More

More

More

More

Holds lot of information compared to text technique

Table -1- comparison between Text and Video steganography Techniques

PROPER SOLUTION

MMS Messages can hold any of video, audio, image and text encapsulated with in Synchronized Multimedia Integration Language (SMIL) .

The recommended steganography deals with three major parts of MMS which can provide us with maximum capacity possible and not compromising main aim which is total security. The most important issues in steganography are secrecy, payload, robustness and speed. Below steps describes proposed steganography working model:

First part of the process hides stegno key in SMIL using white space algorithm.

Then Least Significant Bit algorithm is used to hide the secret message in video.

Rest of the information would be hidden inside text of the MMS using abbreviation algorithm.

Ratio of information hiding in video part to text part is 6:1 hence I bit stored in text corresponds to 6 bits stored in 3gp video.

High security can be granted with reasonable processing speed and without affecting the performance of mobile.

2.10 CHAPTER SUMMERY

This document is all about available Steganography techniques and methodologies. It has listed down the various methodologies and their uses. Along with these, it has also included about the MMS Steganography importance and ways to do that.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.