Examining The Importance Of Steganography Information Technology Essay
✅ Paper Type: Free Essay | ✅ Subject: Information Technology |
✅ Wordcount: 5374 words | ✅ Published: 1st Jan 2015 |
Steganography comes from the Greek and literally means,”Covered writing”. It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishes steganography from covert channel techniques, which instead of trying to transmit data between two entities that were unconnected before. Steganography is defined by Markus Kahn as follows, “Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity”[1]. The goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present”.
The only missing information for the “enemy” is the short easily exchangeable random number sequence, the secret key, without the secret key, the “enemy” should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place.
Steganography is closely related to the problem of “hidden channels” n secure operating system design, a term which refers to all communication paths that cannot easily be restricted by access control mechanisms. In an ideal world we would all be able to sent openly encrypted mail or files to each other with no fear of reprisals. However there are often cases when this is possible, either because the working company does not allow encrypted email or the local government does not approve of encrypt communication (a reality in some parts of the world). This is where steganography can come into play.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Find out more about our Essay Writing Service
Steganography has developed a lot in recent years, because digital techniques allow new ways of hiding informations inside other informations, and this can be valuable in a lot of situations. The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible.
Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, after the international Wassenaar agreement, with which around thirty of the major – with respect to technology – countries in the world decided to apply restrictions in cryptography export similar to the US’s ones.
In a digital world, Steganography and Cryptography are both intended to protect information from unwanted parties. Both Steganography and Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security. Steganography can be used in a large amount of data formats in the digital world of today. The most popular data formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav. Mainly because of their popularity on the Internet and the ease of use of the steganographic tools that use these data formats. These formats are also popular because of the relative ease by which redundant or noisy data can be removed from them and replaced with a hidden message. Steganographic technologies are a very important part of the future of Internet security and privacy on open systems such as the Internet. Steganographic research is primarily driven by the lack of strength in the cryptographic systems on their own and the desire to have complete secrecy in an open-systems environment. Many governments have created laws that either limit the strength of cryptosystems or prohibit them completely. This has been done primarily for fear by law enforcement not to be able to gain intelligence by wiretaps, etc. This unfortunately leaves the majority of the Internet community either with relatively weak and a lot of the times breakable encryption algorithms or none at all. Civil liberties advocates fight this with the argument that “these limitations are an assault on privacy”. This is where Steganography comes in. Steganography can be used to hide important data inside another file so that only the parties intended to get the message even knows a secret message exists.
STEGANOGRAPHY AND CRYPTOGRAPHY
Steganography and cryptography are cousins in spy-craft family. Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in cipher text for instance might arouse suspicion on the part of the recipient while an “invisible” message created with steganographic methods will not. In this way, we can say that steganography completes cryptography, and actually there are usually two ciphers to break when trying to extract the embedded message: one is the one with which the message was embedded, and the other is the one with which the
message was enciphered.
A BRIEF HISTORY OF STEGANOGRAPHY
The earliest recordings of Steganography were by the Greek historian Herodotus in his chronicles known as “Histories” and date back to around 440 BC. Herodotus recorded two stories of Steganographic techniques during this time in Greece[2]. The first stated that King Darius of Susa shaved the head of one of his prisoners and wrote a secret message on his scalp. When the prisoner’s hair grew back, he was sent to the Kings son in law Aristogoras in Miletus undetected. The second story also came from Herodotus, which claims that a soldier named Demeratus needed to send a message to Sparta that Xerxes intended to invade Greece. Back then, the writing medium was text written on wax-covered tablets. Demeratus removed the wax from the tablet, wrote the secret message on the underlying wood, recovered the tablet with wax to make it appear as a blank tablet and finally sent the document without being detected.
Romans used invisible inks, which were based on natural substances such as fruit juices and milk. This was accomplished by heating the hidden text, thus revealing its contents. Invisible inks have become much more advanced and are still in limited use today. During the 15th and 16th centuries, many writers including Johannes Trithemius (author of Steganographia) and Gaspari Schotti (author or Steganographica) wrote on Steganagraphic techniques such as coding techniques for text, invisible inks, and incorporating hidden messages in music.
Between 1883 and 1907, further development can be attributed to the publications of Auguste Kerckhoff (author of Cryptographic Militaire) and Charles Briquet (author of Les Filigranes). These books were mostly about Cryptography, but both can be attributed to the foundation of some steganographic systems and more significantly to watermarking techniques.
Concepts such as null ciphers (taking the 3rd letter from each word in a harmless message to create a hidden message, etc), image substitution and microdot (taking data such as pictures and reducing it to the size of a large period on a piece of paper) were introduced and embraced as great steganographic techniques.
In the recent digital world of today, namely 1992 to present, Steganography is being used all over the world on computer systems. Many tools and technologies have been created that take advantage of old steganographic techniques such as null ciphers, coding in images, audio, video and microdot. With the research this topic is now getting we will see a lot of great applications for Steganography in the near future.
3. Some definitions
Some definitions common to the steganography field:
Cover medium: This is the medium in which we want to hide data, it can be an innocent looking piece of information for steganography, or some important medium that must be protected for copyright or integrity reasons.
Embedded message: This is the hidden message we want to put in the cover. It can be some data for steganography and some copyright informations or added content for digital watermarking.
Stegokey: This is represented by some secret information, which is needed in order to extract the embedded message from the stego-medium
Stego-medium: This is the final piece of information that the casual observer can see.
We can define this simple formula:
Cover-medium + embedded-message = stego-message
THE BASIC METHOD BEHIND STEGANOGRAPHY
Password (key)
Stego-media
Steganography Application Tool
Image or Sound File
File to Hide
-Image
-Text
-Any File
SENDING A STEGANOGRAPHIC MESSAGE:
First we need to select a carrier file.
Then we need to choose the method of steganography used.
Choose a program to hide message in carrier file.
Communicate the chosen method to the receiver using a different channel.
Embed the message in carrier file, if possible, encrypt it.
Choose a regular medium to transfer the file.
In practice there are three types of steganography protocols used:
Pure steganography,
Secrete key steganography,
Public key steganography.
Pure steganography:
Pure steganography is defined as a steganographic system where there is no need to exchange any password that is stego-key in order for the receiver to read the message.This method of Steganography is the least secure means by which to communicate secretly because the sender and receiver can rely only upon the presumption that no other parties are aware of this secret message.
Secrete key steganography:
Secret Key Steganography is defined as a steganographic system that requires the exchange of a secret key (stego-key) prior to communication.only the persons who know this secrete key can reverse the process using stego-key and read the message. The benefit to Secret Key Steganography is even if it is intercepted, only parties who know the secret key can extract the secret message.
Public key steganography:
Public Key Steganography is defined as a steganographic system that uses a public key and a private key to secure the communication between the parties wanting to communicate secretly. The sender will use the public key during the encoding process and only the private key, which has a direct mathematical relationship with the public key can be used by the receiver to read the message. It also has multiple levels of security in that unwanted parties must first suspect the use of steganography and then they would have to find a way to crack the algorithm used by the public key system before they could intercept the secret message.
STEGANOGRAPHY UNDER VARIOUS MEDIA
Often, although it is not necessary, the hidden messages will be encrypted. This meets a requirement posed by the “Kerckhoff principle” in cryptography. This principle states that the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key. Without this secret key, the enemy should not have the chance to even suspect that on an observed communication channel, hidden communication is taking place. When embedding data it is important to remember the following restrictions and features:
The cover data should not be significantly degraded by the embedded data, and the
embedded data should be a imperceptible as possible.
The embedded data should be directly encoded into the media, rather than into a
header or wrapper, to maintain data consistency across formats.
The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations such as filtering and resampling.
Some distortion or degradation of the embedded data can be expected when the cover data is modified. To minimize this, error correcting codes should be used.
The embedded data should be self clocking or arbitrarily re-entrant. This ensures that the embedded data can still be extracted when only portions of the cover data is available.
Steganography works has been carried out on different transmission mediums like text, audio, video, images.
STEGANOGRAPHY IN TEXT
Hiding in Text
The steganographic principles can also be applied to a normal text file. Sometimes, this is done by hiding the message in the blank spaces between words. The message is separated between the lsbs of the binary code for the empty space throughout the text. Once again, this method requires the text you are sending to be considerably longer than the message you are hiding within it. You can also hide messages in PDF documents and in a variety of other standards, depending on which program you wish to use.
The most difficult kind of steganography is the test steganography because due to the lack of redundant information in the text when compared to image or audio file. The advantages of the text steganography over other mediums are its smaller memory occupation an simpler communication.
The block diagram of generic text steganograhic system is:
Cover Text
Secret Message
Embedding Algorithm
Communication Channel
Secret Message
Secret Key
Extracting Algorithm
Stego Text
Stego Text
Here a message is embedded in a text through an embedding algorithm. Then the message is passed to receiver over a channel and is extracted by using a secrete key by the receiver.
Text steganography is broadly divided into 3 types
Format based,
Random and statistical generations
Linguistic method
FORMAT BASED:
Format-based methods use and change the formatting ofthe cover-text to hide data. They do not change any word or sentence, so it does not harm the ‘value’ of the cover-text.In this method extra white spaces are added into the text to hide information. These white spaces can be added after end of each word, sentence or paragraph. A single space is interpreted as “0” and two consecutive spaces are interpreted as “1”. Although a little amount of data can be hidden ina document, this method can be applied to almost all kindsof text without revealing the existence of the hidden data. Another two format-based methods are word shifting and line shifting.
Word shift coding
In word-shift coding, code words are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance. The method, of course, is only applicable to documents with variable spacing between adjacent words, such as in documents that have been text-justified. As a result of this variable spacing, it is necessary to have the original image, or to at least know the spacing between words in the un-encoded document. Word-shift coding should be less visible to the reader than line-shift coding, since the spacing between adjacent words on a line is often shifted to support text justification.
Here the horizontal alignments of some words are shifted by changing distances between words to embed information . These changes are hard to interpret because varying distances between words are very common in documents. Another method of hiding information in manipulation of white spaces between words and paragraph.
Line shift coding:
Here vertical alignments of some lines of the text are shifted to create a unique hidden shape to embeda message in it.
In this method, text lines are vertically shifted to encode the document uniquely. Encoding and decoding can generally be applied either to the format file of a document, or the bitmap of a page image. By moving every second line of document either 1/300 of an inch up or down, Brassil et al. Found that line-shift coding worked particularly well, and documents could still be completely decoded, even after the tenth photocopy. It is probably the most visible text coding technique to the reader.
Feature coding:
This is applied either to the bitmap image of a document, or to a format file. In feature coding, certain text features are altered, or not altered, depending on the codeword. Generally, before encoding, feature randomization takes place. That is, character end-line lengths would be randomly lengthened or shortened, then altered again to encode the specific data. This removes the possibility of visual decoding, as the original end-line lengths would not be known. Alternative, interesting text-coding methods are provided by Bender. The three major methods of encoding data:
Open space methods, similar to the ones suggested by Brassil.
Syntactic methods, that utilize punctuation and contractions.
Semantic methods, that encode using manipulation of the words themselves.
Other methods of syntactic encoding include the controlled use of contractions and abbreviations. Although such syntactic encoding is very possible in the English language, the amount of data that could be encoded would be very low, somewhere in the order of a several bits per kilobyte of text.
RANDOM AND STATISTICAL GENERATION METHODS:
This method is used to generate cover text according to the statistical properties of the language. These methods use example grammars to produce cover-text in a certain natural language. A probabilistic context-free grammar (PCFG) is a commonly usedlanguage model where each transformation rule of a contextfreegrammar has a probability associated with it . The sentences are constructed according to the secrete message to be hide in it. The quality of the generated stego message depends directly on the quality of the grammar used. Another method is to generate words having same statistical properties like word length and letter frequency as the original message[6].
LINGUSITICS METHOD:
Syntactic method is the linguistics steganography method where some punctuation sign like comma(,) and full stop(.) are placed in the proper places to embed the data. This needs proper identification of places where the signs can be inserted properly. Another linguistics method is the semantic method where, the synonym of words for some pre-selected are used. The words are replaced by their synonyms to hide information in it.
OTHER METHODS:
Many researchers have suggested many methods for hiding information in text besides above three categories such as feature coding, text steganography by specific characters in words, abbreviations etc. or by changing words spelling.
B. STEGANOGRAPHY IN IMAGES
Digital images (those that appear on your computer) are broken up into pixels – tiny dots with a specific colour that together make up the image you can see. For images, steganographers encode the message into the pixel LSB. This means that, to the human eye, the colour of the pixel (represented by binary code to the computer) does not change. The hidden message can be withdrawn from the picture provided you know: a) that there is a message in the image b) that you use the same steganographic program for decoding as the one used to hide the message.
The carrier image
A fragment from the photo, representing different values of individual pixels
The top two rows of the palette have the word ‘OK’ embedded into the LSBs
The resulting steganographic image
Steganographic images are detectable. They do not appear any different to the human eye, but computers, programmed to look for them, can notice slight colour variations when modifying the LSB. It is for this reason that many security experts doubt the practicality of using steganography. If this proves to be the case, other methods, like encryption, can also be used. Some programs will not only code your message into an image, but will encrypt it, too. The steganalysts (those responsible for decoding steganographic messages) would still have to break the encryption in the message extracted from the image.
Image steganography is about exploiting the limited powers of the human visual system (HVS). Within reason, any plain text, ciphertext, other images, or anything that can be embedded in a bit stream can be hidden in an image. Image steganography has come quite far in recent years with the development of fast, powerful graphical computers, and steganographic software is now readily available over the Internet for everyday users.
Encoding in an image
Assume a large number of color combinations
Agree upon a repeatable random sequence of pixel locations
While (more bits to encode)
Select the next pixel location
Get the next bit from the message
Set the low-order bit of a color component of the sample at the location to the current bit value of the message
Example
Message = 0001 1010 1101 0111
Image bit stream = …. 01101110 ….
New bit stream = …. 01101111 ….
Color intensity change = 1/255 of its range!
Decoding from an Image
While (there are more bits in the message)
Generate the next pixel location to examine
Extract the bit from the low-order position of the color component
Append the bit to the message bit stream, subdividing when appropriate boundaries occur
Boundaries may not be byte-sized. Messages can be images, sounds, text, programs, or data!
Concealment in digital images
Information can be hidden many different ways in images. To hide information, straight message insertion may encode every bit of information in the message or selectively embed the message in “noisy” areas that draw less attention- those areas where there is a great deal of natural color variation. The message may also be scattered randomly throughout the image. Redundant pattern encoding “wallpapers” the cover image with the message.
A number of ways exist to hide information in digital images. Common approaches include:
Least significant bit (LSB) insertion.
Masking and filtering.
Algorithms and transformations.
Least significant bit insertion
The least significant bit insertion method is probably the most well known image steganography technique. It is a common, simple approach to embedding information in a graphical image file. Unfortunately, it is extremely vulnerable to attacks, such as image manipulation. A simple conversion from a GIF or BMP format to a lossy compression format such as JPEG can destroy the hidden information in the image.
When applying LSB techniques to each byte of a 24-bit image, three bits can be encoded into each pixel. ( As each pixel is represented by three bytes.) Any changes in the pixel bits will be indiscernible to the human eye. For example, the letter A can be hidden in three pixels. Assume the original three pixels are represented by the three 24-bit words below:
(00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
The binary value for the letter A is (10000011). Inserting the binary value of A into the three pixels, starting from the top left byte, would result in:
(0010011111101000 11001000)
(00100110 11001000 11101000)
(11001000 0010011111101001)
The emphasized bits are the only bits that actually changed. The main advantage of LSB insertion is that data can be hidden in the least and second to least bits and still the human eye would be unable to notice it.
Image compression:
Image compression offers a solution to large image files. Two kinds of image compression are lossless and lossy compression. Both methods save storage space but have differing effects on any uncompressed hidden data in the image.
Lossy compression, as typified by JPEG (Joint Photographic Experts Group) format files, offers high compression, but may not maintain the original image’s integrity. This can impact negatively on any hidden data in the image. This is due to the lossy compression algorithm, which may “lose” unnecessary image data, providing a close approximation to high-quality digital images, but not an exact duplicate lossy compression is frequently used on true-color images, as it offers high compression rates.
Lossless compression maintains the original image data exactly; hence it is preferred when the original information must remain intact. It is thus more favored by steganographic techniques. Unfortunately, lossless compression does not offer such high compression rates as lossy compression like GIF (Graphics Interchange Format) and Microsoft’s BMP (Bitmap) format.
The image downgrading problem:
In multilevel security systems, such as the ones used by the army, it sometimes becomes necessary to declassify some information from a high level of access to a lower level. Unfortunately, downgrading of images can present a problem. Information could be covertly hidden in a “top secret” image for later retrieval when the image is declassified. This problem has been pointed out by Kurak and McHugh and is well demonstrated by the following sets of photographs, which illustrate how well data can be hidden. As can be seen in figures 1 and 2 on the following pages, the image of the Pentagon on the right of figure 1 is hidden in the picture of the original chapel on the left, giving the contaminated chapel picture and the encoded Pentagon picture below.
Fig 1: original image Fig 2: Encoded Pentagon
Masking and Filtering
Masking and filtering techniques usually restricted to 24-bit and tray-scale images hide information by marking an image, in a manner similar to paper watermarks. Watermarking techniques may be applied without fear of image destruction due to lossy compression because they are more integrated into the image.
Visible watermarks are not steganography by definition. The difference is primarily one of intent. Traditional steganography conceals information; watermarks extend information and become an attribute of the cover image. Digital watermarks may include such information as copyright, ownership, or license. In steganography, the object of communication is the hidden message. In digital watermarking, the object of communication is the cover.
To create a watermarked image, we increase the luminance of the masked area by 15 percent. If we were to change the luminance by a smaller percentage, the mask would be undetected by the human eye. Now we can use the watermarked image to hide plaintext or encoded information.
Masking is more robust than LSB insertion with respect to compression, cropping and some image processing. Masking techniques embed information in more significant areas so that the hidden message is more integral to the cover image than just hiding it in the “noise” level. This makes it more suitable than LSB with lossy JPEG images.
Algorithms and Transformations
LSB manipulation is a quick and easy way to hide information but is vulnerable to small changes resulting from image processing or lossy compression. Such compression is a key advantage that JPEG images have over other formats. High quality images can be stored in relatively small files using JPEG compression method.
One steganographic method that integrates the compression algorithm for hiding the information is Jpeg-Jsteg.
Jpeg-Jsteg creates a JPEG stego image from the input of a message to be hidden and a lossless cover mage.
Another method used in Patchwork and similar techniques is the redundant pattern encoding. Here the hidden information is scattered throughout the cover mage. These approaches may help protect against image processing such as cropping and rotations and they hide information more thoroughly than by simply masking. They also support image manipulation more readily than tools that rely on LSB. In using redundant pattern encoding, you must trade off message size against robustness. A large message may be embedded only once because it would occupy a much greater portion of the image area.
Other techniques encrypt and scatter the hidden data throughout an image. Scattering the message makes it appear more like noise. Proponents of this approach assume that even if the message bits are extracted, they will be useless without the algorithm and stego-key to decode them.
Scattering and encryption helps protect against hidden message extraction but not against message destruction through image processing. A scattered message in the image’s LSBs is still as vulnerable to destruction from lossy compression and image processing, as is a clear text message inserted in the LSBs.
STEGANOGRAPHY IN AUDIO
Hiding in Audio:
Steganography can also be applied to audio files. Take, for example, the MP3 format. It is a method of compressing a natural audio file to a much smaller size. This is achieved by removing the audio frequency that the human ear cannot pick up: our ears can only hear sounds of a particular range of frequency. Natural audio, however, records a much larger frequency, and removing the excess sounds does not significantly change the quality of the audio (to our ears). This is how MP3 files are made. Audio steganography adds the message to the unused frequency in them, and – once again – the human ear is unable to detect the difference in the sound quality.
Here’s a frequency diagram of an audio transcript
And here is the same piece of audio, with a message hidden within the frequency
An Overview of Steganography for the Computer Forensics Examiner
And whereas you may be able to detect the difference by looking at the diagram, it is much more difficult to hear.
Steganography in audio:
Because of the range of the human auditory system (HAS), data hiding in audio signals is especially challenging. When performing data hiding in audio, one must exploit the weaknesses of the HA, while at the same time being aware of the extreme sensitivity of the human auditory system.
Audio environment
When working with transmitted audio signals, one should bear in mind two main considerations. First, the means of audio storage, or digital representation of the audio, and second, the transmission medium the signal might take.
Digital representation
Digital audio files generally have two primary characteristics:
Sample quantization method:
The most popular format for representing samples of high-quality digital audio is a 16-bit linear quantisation, which is used by WAV (Windows Audio-Visual) and AIFF (Audio Interchange File Format).Some signal distortion is introduced by this format.
Temporal sampling rate:
The most popular temporal sampling rates for audio include 8kHz (kilohertz, 9.6kHz,10kHz, 12kHz, 16kHz, 22.05kHz and 44.1kHz.
Sampling rate puts an upper bound on the usable portion of the frequency range. Generally, usable data space increases at least linearly with increased sampling rate.
Another digital represent
Cite This Work
To export a reference to this article please select a referencing stye below:
Related Services
View allDMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: