stegno

51
STEGANOGRAPHY Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application. INTRODUCTION Johannes Trithemius (1462-1516) was a German Abbot. His writing, “Steganographia: hoe est ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa” is ostensibly a work describing methods to communicate with spirits. A rough translation of the Latin title is: “Steganography: the art through which writing is hidden requiring recovery by the minds of men.” Although people have hidden secrets in plain sight—now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. What is Steganography: Steganography literally means

Transcript of stegno

Page 1: stegno

STEGANOGRAPHY

Steganography (a rough Greek translation of the term Steganography is secret writing) has been

used in various forms for 2500 years. Steganography is the art and science of hiding information

by embedding messages within other, seemingly harmless messages. It has found use in

variously in military, diplomatic, personal and intellectual property applications. Briefly stated,

steganography is the term applied to any number of processes that will hide a message within an

object, where the hidden message will not be apparent to an observer. This paper will explore

steganography from its earliest instances through potential future application.

INTRODUCTION

Johannes Trithemius (1462-1516) was a German Abbot. His writing, “Steganographia: hoe est

ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa” is ostensibly a

work describing methods to communicate with spirits. A rough translation of the Latin title is:

“Steganography: the art through which writing is hidden requiring recovery by the minds of

men.” Although people have hidden secrets in plain sight—now called steganography—

throughout the ages, the recent growth in computational power and technology has propelled it to

the forefront of today’s security techniques.

What is Steganography: Steganography literally means

covered writing or hidden writing i.e., writing that is known

to casual observer, is derived from Greek words ‘steganos’

meaning covered or secret and ‘graphy’ meaning writing or

drawing. This technique includes all methods of secure and

secret communication that conceal the existence of secret

message. From the time of Herodotus in Greece till today, Steganography has been used in

various places. Today the field attains new dimensions with the advent of digital computer.

When a message is encrypted, it has no meaning, and it’s easy to understand that it contains

sensitive information, a secret – and someone might try to break it. Steganography solves this

Page 2: stegno

problem by hiding the sensitive information in a harmless file called carrier file. Steganographic

software enables information to be hidden in graphics, sound files. By this technique data can be

hidden inside the normal picture without changing its appearance or size. The hidden messages

need not be encrypted and it can be in plain everyday English. Recent advances in computing

and recent interest in privacy has led to the development of steagnography.

SECRET COMMUNICATION METHODS:

The secret communications methods are invisible dots, microdots, character arrangement (other

than cryptographic methods of permutation and substitution), digital signatures, covert channels

and spread-spectrum signals.

It’s also notoriously known that there are different ways of hiding writing between the lines of an

ordinary letter. The text or picture that you drew would only appear if you colored over the

written area with a special marker. In this case a chemical reaction would take place once the

two substances touched thus revealing the hidden message.

The common form of invisible writing is through the use of invisible inks whose sources are

milk, vinegar, fruit juices and urine. These darken when heated and they are easy to decode.

With improvements in technology, many sophisticated inks were developed which react with

various chemicals. Some messages had to be ‘developed’ much as photographs are developed

with a number of chemicals in processing labs.

The Germans developed microdot technology during World War II which was referred to as ‘the

enemy’s masterpiece of espionage’. Microdots are photographs, the size of a printed period

having the clarity of standard-sized type-written pages. In the USSR all international mailings

were screened in attempt to detect any hostile activities.

Page 3: stegno

IMPLEMENTATION OF STEGANOGRAPHY:

There are ways to hide information in an image, audio

and even text files. Moreover, if that message is in

addition encoded then it has one more supplemental level

of protection. Computer steganography is based on two

principles. The first one is that the files that contain

digitized images or sound can be altered to a certain extend without loosing their functionality

unlike other types of data that have to be exact in order to function properly, an example of that

would

be a

computer program.

If one step is missed or overlooked you cannot continue the process. The other principle deals

with the human inability to distinguish negligible changes in image color or sound quality, which

is especially easy to make use of in objects that contain redundant information, be it 16-bit

sound, 8-bit or even better 24-bit image. This just meaning that it is very hard to distinguish

minor changes in images with the human eye. Speaking of images, changing the value of the

least significant bit of the pixel color

Won’t result in any perceivable change of that color. One of the best and most widely spread

steganographic products for Windows95/98/NT is S-Tools.

Background, Evaluation method and Software evaluation which include S-Tools and Hide and

Seek v4.1 are the software packages which were reviewed with respect to Steganographic

manipulation of images. A very useful feature is the status line that displays the largest message

size that can be stored in the carrier file. All the softwares uses the LSB method to both images

and audio files. Steganography allows you to hide information in five innocent looking files

types: JPEG, PNG, BMP, HTML and WAV.

Allows the secure transfer

of passwords between two

computers using an

encrypted internet line.

An Application

Locker to password

protects any

application installed

on your computer.

Features five

innocent carriers for

hiding: JPEG, PNG,

BMP, HTML and

WAV.

Page 4: stegno

Null ciphers (unencrypted messages) were also used. The real message is "camouflaged" in an

innocent sounding message. Due to the "sound" of many open coded messages, the suspect

communications were detected by mail filters. However "innocent" messages were allowed to

flow through. An example of a message containing such a null cipher is German Spy in World

War II:

“Apparently neutral's protest is thoroughly discounted

And ignored. Isman hard hit. Blockade issue affects

Pretext for embargo on by products, ejecting suets and

Vegetable oils. ”

Taking the second letter in each word the following message emerges:

Pershing sails from NY June 1.

TYPES OF STEGANOGRAPHY:

Steganography can be split into two types, these are Fragile and Robust. The following section

describes the definition of these two different types of steganography.

Fragile – Fragile steganography involves embedding information into a file which is destroyed if

the file is modified. This method is unsuitable for recording the copyright holder of the file since

it can be so easily removed, but is useful in situations where it is important to prove that the file

has not been tampered with, such as using a file as evidence in a court of law, since any

Page 5: stegno

Codebook

tampering would have removed the watermark. Fragile steganography techniques tend to be

easier to implement than robust methods.

Robust – Robust marking aims to embed information into a file which cannot easily be

destroyed. Although no mark is truly indestructible, a system can be considered robust if the

amount of changes required to remove the mark would render the file useless. There are two

main types of robust marking: Fingerprinting and Water marking.

Text Techniques:

Hiding information is to conceal it in what seems to be inconspicuous text. It is more difficult

when it comes to electronic versions of text. Copies are identical and it is impossible to tell if it is

an original or a copied version. To embed information inside a document we can simply alter

some of its characteristics. These can be either the text formatting or characteristics of the

characters. The key to this problem is that we alter the document in a way that it is simply not

visible to the human eye yet it is possible to decode it by computer. Figure shows the general

principle in embedding hidden information inside a document.

Marked Documents

Page 6: stegno

Again, there is an encoder and to decode it, there will be a decoder. The codebook is a set of

rules that tells the encoder which parts of the document it needs to change. It is also worth

pointing out that the marked documents can be either identical or different. By different, we

mean that the same watermark is marked on the document but different characteristics of each of

the documents are changed.

Image Techniques:

LSB – Least Significant Bit Hiding (Image Hiding) –This method is probably the easiest way of

hiding information in an image and yet it is surprisingly effective. It works by using the least

significant bits of each pixel in one image to hide the most significant bits of another.

(i) First load up both the host image and the image you need to hide.

(ii) Next chose the number of bits you wish to hide the secret image in. The more bits used in the

host image, the more it deteriorates. Increasing the number of bits used though obviously has a

beneficial reaction on the secret image increasing its clarity.

(iii) Now you have to create a new image by combining the pixels from both images. If you

decide for example, to use 4 bits to hide the secret image, there will be four bits left

for the host image.

Host Pixel: 10110001

Page 7: stegno

Secret Pixel: 00111111

New Image Pixel: 10110011

(iv) To get the original image back you just need to know how many bits were used to store the

secret image. You then scan through the host image, pick out the least significant bits according

the number used and then use them to create a new image with one change - the bits extracted

now become the most significant bits.

Host Pixel: 10110011

Bits used: 4

New Image: 00110000

Audio Techniques

Spread Spectrum — spread spectrum systems encode data as a binary sequence which sounds

like noise but which can be recognised by a receiver with the correct key.

MIDI — MIDI files are good places to hide information due to the revival this format has had

with the surge of mobile phones, which play MIDI ring tones.

MP3 — The MP3 format is probably the most widespread compression format currently used for

music files. Due to this, it also happens to be very good for hiding information in. The more

inconspicuous the format, the more easily the hidden data may be overlooked.

Page 8: stegno

Video — For video, a combination of sound and image techniques can be used. This is due to the

fact that video generally has separate inner files for the video (consisting of many images) and

the sound. So techniques can be applied in both areas to hide data. Due to the size of video files,

the scope for adding lots of data is much greater and therefore the chances of hidden data being

detected is quite low.

Limitations:

There are limitations on the use of steganography due to the size of the medium being used to

hide the data. In order for steganography to be useful the message should be hidden without any

major changes to the object it is being embedded in. This leaves limited room to embed a

message without noticeably changing the original object. This is most obvious in compressed

files where many of the obvious candidates for embedding data are lost. Detecting hidden data

remains an active area of research. How do you protect against malicious Steganography?

Unfortunately, all of the methods mentioned above can also be used to hide illicit, unauthorized

or unwanted activity. What can be done to prevent or detect issues with steganography? Other

uses for steganography range from the trivial to the abhorrent, including Criminal

communications, Fraud, Hacking, Electronic payments, Gambling, pornography, Harassment,

Intellectual property offensesViruses,Pedophilia.

Advantages:

Attempting to detect the use of steganography is called Steganalysis (the task of detecting and

possibly disabling steganographic information) and can be either passive, where the presence of

the hidden data is detected, or active, where an attempt is made to retrieve the hidden data it is

not infallible. But it considerably increases the work of any experienced code-breaker, who must

identify first the right carrier, extract the sensitive data from it, and only after that (if he gets this

far) – the hard work of breaking the code. Today, less painful but more cryptic methods could be

used to hide information in publicly available web site images. The image is visibly indiscernible

even to a trained eye. The only hope is to enlist science to see past the pixels, but is this possible?

Page 9: stegno

STEGANOGRAPHY vs CRYPTOGRAPHY

Cryptography

(i) Message is not hidden.

(ii) Enemy can intercept the message.

(iii) Enemy can decrypt the message.

Steganography

(i) Message is hidden.

(ii) Enemy must discover the medium.

File encryption is based on encryption algorithms - a process capable of translating data into a

secret code. In Cryptography, encrypted message is sent. If it is intercepted, the interceptor

knows that the text is an encrypted message. In Steganography, the fact that the message is being

sent is unknown. So, the interceptor may not know the object contains a message. Steganography

is not intended to replace Cryptography but supplement it, Cryptography + Steganography =

Secured Steganography.

STEGANOGRAPHY vs DIGITAL WATERMARK

Digital watermark

Digital watermarks are employed in an attempt to provide proof of ownership and identify illicit

copying and distribution of multimedia information. The role of digital watermarking as a means

of aiding in copyright and ownership issues. Alternatives to digital watermarking techniques are

explored as countermeasures to distortion attacks against carrier. Despite, Steganography may

have nothing to do with the cover which is the object of communication.

Page 10: stegno

MATLAB

OVERVIEW OF MATLAB

MATLAB is a high0performance language for technical computing. It integrates

computation, visualization, and programming in an easy-to-use environment where

problems and solutions are expressed in familiar mathematical notation.

Typical uses include

Math and computation

Algorithm development

Data acquisition

Modeling, simulation, and prototyping

Data analysis, exploration, and visualization

Scientific and engineering graphics

Application development, including graphical user interface building

MATLAB is an interactive system whose basic data element is an array that does not

require dimensioning. This allows you to solve many technical computing problems,

especially those with matrix and vector formulations, in a fraction of the time it would

take to write a program in a scalar non interactive language such as C or Fortran.

The name MATLAB stands for matrix laboratory. MATLAB was originally written to

provide easy access to matrix software developed by the LINPACK and EISPACK

projects. Today, MATLAB engines incorporate the LAPACK and BLAS libraries,

embedding the state of the art in software for matrix computation.

Page 11: stegno

MATLAB has evolved over a period of years with input from many users. In university

environments, it is the standard instructional tool for introductory and advanced courses

in mathematics, engineering, and science.

In industry, MATLAB is the tool of choice for high-productivity research, development,

and analysis.MATLAB features a family of add-on application-specific solutions called

toolboxes. Very important to most users of MATLAB, toolboxes allow you to learn and

apply specialized technology. Toolboxes are comprehensive collections of MATLAB

functions (M-files) that extend the MATLAB environment to solve particular classes of

problems. Areas in which toolboxes are available include signal processing, control

systems, neural networks, fuzzy logic, wavelets, simulation, and many others.

The MATLAB System: The MATLAB system consists of these main parts:

Desktop Tools and Development Environment:

This is the set of tools and facilities that help you use MATLAB functions and files.

Many of these tools are graphical user interfaces. It includes the MATLAB desktop and

Command Window, a command history, an editor and debugger, a code analyzer and

other reports, and browsers for viewing help, the workspace, files, and the search path.

The MATLAB Mathematical Function Library:

This is a vast collection of computational algorithms ranging from elementary functions,

like sum, sine, cosine, and complex arithmetic, to more sophisticated functions like

matrix inverse, matrix eigenvalues, Bessel functions, and fast Fourier transforms.

The MATLAB Language: This is a high-level matrix/array language with control flow

statements, functions, data structures, input/output, and object-oriented programming

features. It allows both "programming in the small" to rapidly create quick and dirty

throw-away programs, and "'programming in the large" to create large and complex

application programs.

Page 12: stegno

GRAPHICS:

MATLAB has extensive facilities for displaying vectors and matrices as graphs, as well

as annotating and printing these graphs. It includes high-level functions for two-

dimensional and three-dimensional data visualization, image processing, animation and

presentation graphics. It also includes low-level functions that allow you to fully

customize the appearance of graphics as well as to build complete graphical user

interfaces on your MATLAB applications.

MATLAB EXTERNAL INTERFACES:

This is a library that allows you to write C and Fortran programs that interact with

MATLAB. It includes facilities for calling routines from MATLAB (dynamic linking),

calling MATLAB as a computational engine, and for reading and writing MAT-files.

MATLAB DOCUMENTATION:

MATLAB provides extensive documentation, in both printable and HTML format, to

help you learn about and use all of its features. If you are a new user, start with this

Getting Started book. It covers all the primary MATLAB features at a high level,

including many examples.

To view the online documentation, select MATLAB Help from the Help menu in

MATLAB. Online help appears in the Help browser, providing task-oriented and

reference information about MATLAB features.

The MATLAB documentation is organized into these main topics:

· Desktop Tools and Development Environment - Startup and shutdown, the desktop, and

other tools that help you use MATLAB

Mathematics - Mathematical operations

Page 13: stegno

Data Analysis - Data analysis, including data fitting, Fourier analysis, and time-

series tools

Programming - The MATLAB language and how to develop MATLAB

applications

Graphics - Tools and techniques for plotting, graph annotation, printing, and

programming with Handle Graphics®

3-D Visualization - Visualizing surface and volume data, transparency, and

viewing and lighting techniques

Creating Graphical User Interfaces - GUI-building tools and how to write

callback functions

External Interfaces - MEX-files, the MATLAB engine, and interfacing to Java,

COM, and the serial port

MATLAB also includes reference documentation for all MATLAB functions:

"Functions - By Category" - Lists all MATLAB functions grouped into categories

Handle Graphics Property Browser - Provides easy access to descriptions of

graphics object properties

C and Fortran API Reference - Covers those functions used by the MATLAB

external interfaces, providing information on syntax in the calling language,

description, arguments, return values, and examples

The MATLAB online documentation also includes

· Examples - An index of examples included in the documentation

· Release Notes - New features, compatibility considerations, and bug reports

· Printable Documentation - PDF versions of the documentation suitable for

printing.

In addition to the documentation, you can access demos from the Help browser by

clicking the Demos tab. Run demos to learn about key functionality of Math Works

products and tools.

Page 14: stegno

Starting MATLAB

On Windows platforms, start MATLAB by double-clicking the MATLAB shortcut icon

on your Windows desktop.

On UNIX platforms, start MATLAB by typing matlab at the operating system prompt.

You can customize MATLAB startup. For example, you can change the directory in

which MATLAB starts or automatically execute MATLAB statements in a script file

named startup. m.

MATLAB Desktop:

When you start MATLAB, the MATLAB desktop appears, containing tools (graphical

user interfaces) for managing files, variables, and applications associated with MATLAB.

The following illustration shows the default desktop. You can customize the arrangement

of tools and documents to suit your needs.

Page 15: stegno
Page 16: stegno

IMAGE AND SOUND COMPRESSION USING

DISCRETE WAVELET TRANSFORM

SYNOPSIS

Signal analysts already have at their disposal an impressive arsenal of tools. Perhaps the most

well-known of these is Fourier analysis, which breaks down a signal into constituent sinusoids of

different frequencies. Another way to think of Fourier analysis is as a mathematical technique for

transforming our view of the signal from time-based to frequency-based. Fourier analysis has a

serious drawback. In transforming to the frequency domain, time information is lost. When

looking at a Fourier transform of a signal, it is impossible to tell when a particular event took

place.

If the signal properties do not change much over time — that is, if it is what is called a stationary

signal—this drawback isn’t very important. However, most interesting signals contain numerous

nonstationary or transitory characteristics: drift, trends, abrupt changes, and beginnings and ends

of events. These characteristics are often the most important part of the signal, and Fourier

analysis is not suited to detecting them.

In an effort to correct this deficiency, Dennis Gabor (1946) adapted the Fourier transform to

analyze only a small section of the signal at a time—a technique called windowing the signal.

Gabor’s adaptation, called the Short-Time Fourier Transform (STFT), maps a signal into a two-

dimensional function of time and frequency.

Page 17: stegno

The STFT represents a sort of compromise between the time- and frequency-based views of a

signal. It provides some information about both when and at what frequencies a signal event

occurs. However, you can only obtain this information with limited precision, and that precision

is determined by the size of the window.

While the STFT compromise between time and frequency information can be useful, the

drawback is that once you choose a particular size for the time window, that window is the same

for all frequencies. Many signals require a more flexible approach—one where we can vary the

window size to determine more accurately either time or frequency.

Wavelet analysis represents the next logical step: a windowing technique with variable-sized

regions. Wavelet analysis allows the use of long time intervals where we want more precise low-

frequency information, and shorter regions where we want high-frequency information.

wavelet analysis does not use a time-frequency region, but rather a time-scale region. For more

information about the concept of scale and the link between scale and frequency, One major

advantage afforded by wavelets is the ability to perform local analysis — that is, to analyze a

localized area of a larger signal.

Wavelet analysis is capable of revealing aspects of data that other signal analysis techniques

miss, aspects like trends, breakdown points, discontinuities in higher derivatives, and self-

similarity. Furthermore, because it affords a different view of data than those presented by

traditional techniques, wavelet analysis can often compress or de-noise a signal without

appreciable degradation.

Page 18: stegno

Image Compression

In this project we implement a lossy image/sound compressions technique where we used the

transform (wavelet) of the original signal, then calculated a threshold based on the compression

ratio required by the user. The image was compressed using the Matlab wavelet toolbox and

MatLab functions .

Applications:

Photography and printing

Face detection, feature detection, face identification

Satellite image processing

Medical image processing

-----###-----

Steganographic techniques

Physical steganography

Steganart example. Within this picture, the letter positions of a hidden

message are represented by increasing numbers (1 to 20), and a letter

value is given by its intersection position in the grid. For instance, the

first letter of the hidden message is at the intersection of 1 and 4. So,

Page 19: stegno

after a few tries, the first letter of the message seems to be the 14th letter of the alphabet; the last

one (number 20) is the 5th letter of the alphabet.

Steganography has been widely used, including in recent historical times and the present day.

Possible permutations are endless and known examples include:

Hidden messages within wax tablets — in ancient Greece, people wrote messages on the

wood, then covered it with wax upon which an innocent covering message was written.

Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the

story of a message tattooed on a slave's shaved head, hidden by the growth of his hair,

and exposed by shaving his head again. The message allegedly carried a warning to

Greece about Persian invasion plans. This method has obvious drawbacks, such as

delayed transmission while waiting for the slave's hair to grow, and the restrictions on the

number and size of messages that can be encoded on one person's scalp.

During World War II, the French Resistance sent some messages written on the backs of

couriers using invisible ink.

Hidden messages on paper written in secret inks, under other messages or on the blank

parts of other messages.

Digital steganography:

This article needs attention from an expert on the subject. See the talk page for details.

WikiProject History of Science or the History of Science Portal may be able to help recruit an

expert.

Page 20: stegno

Image of a tree. Removing all but the two least significant bits of each color component produces

an almost completely black image. Making that image 85 times brighter produces the image

below.

Image of a cat extracted from above image.

Modern steganography entered the world in 1985 with the advent of the personal computer being

applied to classical steganography problems. Development following that was slow, but has

since taken off, going by the number of "stego" programs available: Over 800 digital

steganography applications have been identified by the Steganography Analysis and Research

Center. Digital steganography techniques include:

Concealing messages within the lowest bits of noisy images or sound files.

Concealing data within encrypted data or within random data. The data to be concealed is first

encrypted before being used to overwrite part of a much larger block of encrypted data or a block

of random data (an unbreakable cipher like the one-time pad generates ciphertexts that look

perfectly random if you don't have the private key).

Page 21: stegno

Mimic functions convert one file to have the statistical profile of another. This can thwart

statistical methods that help brute-force attacks identify the right solution in a ciphertext-only

attack.

Concealed messages in tampered executable files, exploiting redundancy in the targeted

instruction set.Pictures embedded in video material (optionally played at slower or faster speed).

Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in

keypresses in some applications (telnet or remote desktop software) can mean a delay in packets,

and the delays in the packets can be used to encode data.

Changing the order of elements in a set.

Content-Aware Steganography hides information in the semantics a human user assigns to a

datagram. These systems offer security against a non-human adversary/warden.

Blog-Steganography. Messages are fractionalized and the (encrypted) pieces are added as

comments of orphaned web-logs (or pin boards on social network platforms). In this case the

selection of blogs is the symmetric key that sender and recipient are using; the carrier of the

hidden message is the whole blogosphere.

Network steganography:All information hiding techniques that may be used to exchange

steganograms in telecommunication networks can be classified under the general term of

network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski

in 2003. Contrary to the typical steganographic methods which utilize digital media (images,

audio and video files) as a cover for hidden data, network steganography utilizes communication

protocols' control elements and their basic intrinsic functionality. As a result, such methods are

harder to detect and eliminate.

Typical network steganography methods involve modification of the properties of a single

network protocol. Such modification can be applied to the PDU (Protocol Data Unit), to the time

relations between the exchanged PDUs,or both (hybrid methods).Moreover, it is feasible to

utilize the relation between two or more different network protocols to enable secret

communication. These applications fall under the term inter-protocol steganography.

Page 22: stegno

Network steganography covers a broad spectrum of techniques, which include, among others:

Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the

employment of delayed or corrupted packets that would normally be ignored by the receiver (this

method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding

information in unused header fields.

WLAN Steganography – the utilization of methods that may be exercised to transmit

steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography

is the HICCUPS system (Hidden Communication System for Corrupted Networks)

Printed steganography

Digital steganography output may be in the form of printed documents. A message, the plaintext,

may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous

covertext is modified in some way so as to contain the ciphertext, resulting in the stegotext. For

example, the letter size, spacing, typeface, or other characteristics of a covertext can be

manipulated to carry the hidden message. Only a recipient who knows the technique used can

recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a

technique.

The ciphertext produced by most digital steganography methods, however, is not printable.

Traditional digital methods rely on perturbing noise in the channel file to hide the message, as

such, the channel file must be transmitted to the recipient with no additional noise from the

transmission. Printing introduces much noise in the ciphertext, generally rendering the message

unrecoverable. There are techniques that address this limitation, one notable example is ASCII

Art Steganography

Text steganography

Steganography can be applied to different types of media including text, audio, image and video

etc. However, text steganography is considered to be the most difficult kind of steganography

due to lack of redundancy in text as compared to image or audio but still has smaller memory

Page 23: stegno

occupation and simpler communication. The method that could be used for text steganography is

data compression. Data compression encodes information in one representation into another

representation. The new representation of data is smaller in size. One of the possible schemes to

achieve data compression is Huffman coding. Huffman coding assigns smaller length codewords

to more frequently occurring source symbols and longer length codewords to less frequently

occurring source symbols.

Steganography using Sudoku Puzzle

This is the art of concealing data in an image using Sudoku which is used like a key to hide the

data within an image. Steganography using sudoku puzzles has as many keys as there are

possible solutions of a Sudoku puzzle, which is . This is equivalent to around 70

bits, making it much stronger than the DES method which uses a 56 bit key.

Additional terminology

In general, terminology analogous to (and consistent with) more conventional radio and

communications technology is used; however, a brief description of some terms which show up

in software specifically, and are easily confused, is appropriate. These are most relevant to

digital steganographic systems.

The payload is the data to be covertly communicated. The carrier is the signal, stream, or data

file into which the payload is hidden; which differs from the "channel" (typically used to refer to

the type of input, such as "a JPEG image"). The resulting signal, stream, or data file which has

the payload encoded into it is sometimes referred to as the package, stego file, or covert message.

The percentage of bytes, samples, or other signal elements which are modified to encode the

payload is referred to as the encoding density and is typically expressed as a number between 0

and 1.

In a set of files, those files considered likely to contain a payload are called suspects. If the

suspect was identified through some type of statistical analysis, it might be referred to as a

candidate.

Countermeasures and detection

Page 24: stegno

Detection of physical steganography requires careful physical examination, including the use of

magnification, developer chemicals and ultraviolet light. It is a time-consuming process with

obvious resource implications, even in countries where large numbers of people are employed to

spy on their fellow nationals. However, it is feasible to screen mail of certain suspected

individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During World War

II, a technology used to ease monitoring of POW mail was specially treated paper that would

reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the

Technical Director of the United States Government Printing Office, Morris S. Kantrowitz,

describes in general terms the development of this paper, three prototypes of which were named

Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and

stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a

hidden message the special paper would render it visible. At least two US patent were granted

related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and

Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one,

"Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948.

A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that

"runs" when in contact with a water-based invisible ink.

In computing, detection of steganographically encoded packages is called steganalysis. The

simplest method to detect modified files, however, is to compare them to known originals. For

example, to detect information being moved through the graphics on a website, an analyst can

maintain known-clean copies of these materials and compare them against the current contents of

the site. The differences, assuming the carrier is the same, will compose the payload. In general,

using extremely high compression rate makes steganography difficult, but not impossible. While

compression errors provide a hiding place for data, high compression reduces the amount of data

available to hide the payload in, raising the encoding density and facilitating easier detection (in

the extreme case, even by casual observation).

Steganographic techniques

Physical steganography

Page 25: stegno

Steganart example. Within this picture, the letter positions of a hidden

message are represented by increasing numbers (1 to 20), and a letter

value is given by its intersection position in the grid. For instance, the

first letter of the hidden message is at the intersection of 1 and 4. So,

after a few tries, the first letter of the message seems to be the 14th

letter of the alphabet; the last one (number 20) is the 5th letter of the

alphabet.

Steganography has been widely used, including in recent historical times and the present day.

Possible permutations are endless and known examples include:

Hidden messages within wax tablets — in ancient Greece, people wrote messages on the

wood, then covered it with wax upon which an innocent covering message was written.

Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the

story of a message tattooed on a slave's shaved head, hidden by the growth of his hair,

and exposed by shaving his head again. The message allegedly carried a warning to

Greece about Persian invasion plans. This method has obvious drawbacks, such as

delayed transmission while waiting for the slave's hair to grow, and the restrictions on the

number and size of messages that can be encoded on one person's scalp.

During World War II, the French Resistance sent some messages written on the backs of

couriers using invisible ink.

Hidden messages on paper written in secret inks, under other messages or on the blank

parts of other messages.

Digital steganography:

Page 26: stegno

This article needs attention from an expert on the subject. See the talk page for details.

WikiProject History of Science or the History of Science Portal may be able to help recruit an

expert.

Image of a tree. Removing all but the two least significant bits of each color component produces

an almost completely black image. Making that image 85 times brighter produces the image

below.

Image of a cat extracted from above image.

Modern steganography entered the world in 1985 with the advent of the personal computer being

applied to classical steganography problems. Development following that was slow, but has

since taken off, going by the number of "stego" programs available: Over 800 digital

steganography applications have been identified by the Steganography Analysis and Research

Center. Digital steganography techniques include:

Concealing messages within the lowest bits of noisy images or sound files.

Page 27: stegno

Concealing data within encrypted data or within random data. The data to be concealed is first

encrypted before being used to overwrite part of a much larger block of encrypted data or a block

of random data (an unbreakable cipher like the one-time pad generates ciphertexts that look

perfectly random if you don't have the private key).

Mimic functions convert one file to have the statistical profile of another. This can thwart

statistical methods that help brute-force attacks identify the right solution in a ciphertext-only

attack.

Concealed messages in tampered executable files, exploiting redundancy in the targeted

instruction set.Pictures embedded in video material (optionally played at slower or faster speed).

Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in

keypresses in some applications (telnet or remote desktop software) can mean a delay in packets,

and the delays in the packets can be used to encode data.

Changing the order of elements in a set.

Content-Aware Steganography hides information in the semantics a human user assigns to a

datagram. These systems offer security against a non-human adversary/warden.

Blog-Steganography. Messages are fractionalized and the (encrypted) pieces are added as

comments of orphaned web-logs (or pin boards on social network platforms). In this case the

selection of blogs is the symmetric key that sender and recipient are using; the carrier of the

hidden message is the whole blogosphere.

Network steganography:All information hiding techniques that may be used to exchange

steganograms in telecommunication networks can be classified under the general term of

network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski

in 2003. Contrary to the typical steganographic methods which utilize digital media (images,

audio and video files) as a cover for hidden data, network steganography utilizes communication

protocols' control elements and their basic intrinsic functionality. As a result, such methods are

harder to detect and eliminate.

Page 28: stegno

Typical network steganography methods involve modification of the properties of a single

network protocol. Such modification can be applied to the PDU (Protocol Data Unit), to the time

relations between the exchanged PDUs,or both (hybrid methods).Moreover, it is feasible to

utilize the relation between two or more different network protocols to enable secret

communication. These applications fall under the term inter-protocol steganography.

Network steganography covers a broad spectrum of techniques, which include, among others:

Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the

employment of delayed or corrupted packets that would normally be ignored by the receiver (this

method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding

information in unused header fields.

WLAN Steganography – the utilization of methods that may be exercised to transmit

steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography

is the HICCUPS system (Hidden Communication System for Corrupted Networks)

Printed steganography

Digital steganography output may be in the form of printed documents. A message, the plaintext,

may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous

covertext is modified in some way so as to contain the ciphertext, resulting in the stegotext. For

example, the letter size, spacing, typeface, or other characteristics of a covertext can be

manipulated to carry the hidden message. Only a recipient who knows the technique used can

recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a

technique.

The ciphertext produced by most digital steganography methods, however, is not printable.

Traditional digital methods rely on perturbing noise in the channel file to hide the message, as

such, the channel file must be transmitted to the recipient with no additional noise from the

transmission. Printing introduces much noise in the ciphertext, generally rendering the message

unrecoverable. There are techniques that address this limitation, one notable example is ASCII

Art Steganography

Page 29: stegno

Text steganography

Steganography can be applied to different types of media including text, audio, image and video

etc. However, text steganography is considered to be the most difficult kind of steganography

due to lack of redundancy in text as compared to image or audio but still has smaller memory

occupation and simpler communication. The method that could be used for text steganography is

data compression. Data compression encodes information in one representation into another

representation. The new representation of data is smaller in size. One of the possible schemes to

achieve data compression is Huffman coding. Huffman coding assigns smaller length codewords

to more frequently occurring source symbols and longer length codewords to less frequently

occurring source symbols.

Steganography using Sudoku Puzzle

This is the art of concealing data in an image using Sudoku which is used like a key to hide the

data within an image. Steganography using sudoku puzzles has as many keys as there are

possible solutions of a Sudoku puzzle, which is . This is equivalent to around 70

bits, making it much stronger than the DES method which uses a 56 bit key.

Additional terminology

In general, terminology analogous to (and consistent with) more conventional radio and

communications technology is used; however, a brief description of some terms which show up

in software specifically, and are easily confused, is appropriate. These are most relevant to

digital steganographic systems.

The payload is the data to be covertly communicated. The carrier is the signal, stream, or data

file into which the payload is hidden; which differs from the "channel" (typically used to refer to

the type of input, such as "a JPEG image"). The resulting signal, stream, or data file which has

the payload encoded into it is sometimes referred to as the package, stego file, or covert message.

The percentage of bytes, samples, or other signal elements which are modified to encode the

payload is referred to as the encoding density and is typically expressed as a number between 0

and 1.

Page 30: stegno

In a set of files, those files considered likely to contain a payload are called suspects. If the

suspect was identified through some type of statistical analysis, it might be referred to as a

candidate.

Countermeasures and detection

Detection of physical steganography requires careful physical examination, including the use of

magnification, developer chemicals and ultraviolet light. It is a time-consuming process with

obvious resource implications, even in countries where large numbers of people are employed to

spy on their fellow nationals. However, it is feasible to screen mail of certain suspected

individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During World War

II, a technology used to ease monitoring of POW mail was specially treated paper that would

reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the

Technical Director of the United States Government Printing Office, Morris S. Kantrowitz,

describes in general terms the development of this paper, three prototypes of which were named

Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and

stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a

hidden message the special paper would render it visible. At least two US patent were granted

related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and

Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one,

"Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948.

A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that

"runs" when in contact with a water-based invisible ink.

In computing, detection of steganographically encoded packages is called steganalysis. The

simplest method to detect modified files, however, is to compare them to known originals. For

example, to detect information being moved through the graphics on a website, an analyst can

maintain known-clean copies of these materials and compare them against the current contents of

the site. The differences, assuming the carrier is the same, will compose the payload. In general,

using extremely high compression rate makes steganography difficult, but not impossible. While

compression errors provide a hiding place for data, high compression reduces the amount of data

available to hide the payload in, raising the encoding density and facilitating easier detection (in

the extreme case, even by casual observation).

Page 31: stegno

APPLICATIONS

Steganography is applicable to, but not limited to, the following areas.

1) Confidential communication and secret data storing

2) Protection of data alteration

3) Access control system for digital content distribution

4) Media Database systems

The area differs in what feature of the steganography is utilized in each system.

1. Confidential communication and secret data storing

The "secrecy" of the embedded data is essential in this area.

Historically, steganography have been approached in this area. Steganography provides us with:

(A) Potential capability to hide the existence of confidential data

(B) Hardness of detecting the hidden (i.e., embedded) data

(C) Strengthening of the secrecy of the encrypted data

In practice, when you use some steganography, you must first select a vessel data according to

the size of the embedding data. The vessel should be innocuous. Then, you embed the

confidential data by using an embedding program (which is one component of the steganography

software) together with some key. When extracting, you (or your party) use an extracting

program (another component) to recover the embedded data by the same key ( "common key" in

terms of cryptography). In this case you need a "key negotiation" before you start

communication.

Page 32: stegno

Attaching a stego file to an e-mail message is the simplest example in this application area. But

you and your party must do a "sending-and-receiving" action that could be noticed by a third

party. So, e-mailing is not a completely secret communication method.

There is an easy method that has no key-negotiation. We have a model of "Anonymous Covert

Mailing System." See the reference.

There is some other communication method that uses the Internet Webpage. In this method you

don't need to send anything to your party, and no one can detect your communication.

Each secrecy based application needs an embedding process which leaves the smallest

embedding evidence. You may follow the following.

(A) Choose a large vessel, larger the better, compared with the embedding data.

(B) Discard the original vessel after embedding.

For example, in the case of Qtech Hide & View, it leaves some latent embedding evidence even

if the vessel has a very large embedding capacity. You are recommended to embed only 25% or

less (for PNG / BMP output) of the maximum capacity, or only 3% of the vessel size (for JPEG

output)..

2. Protection of data alteration

We take advantage of the fragility of the embedded data in this application area.

We asserted in the Home Page that "the embedded data can rather be fragile than be very

robust." Actually, embedded data are fragile in most steganography programs. Especially, Qtech

Hide & View program embeds data in an extremely fragile manner. We demonstrate this in the

other page.

However, this fragility opens a new direction toward an information-alteration protective system

such as a "Digital Certificate Document System." The most novel point among others is that "no

Page 33: stegno

authentication bureau is needed." If it is implemented, people can send their "digital certificate

data" to any place in the world through Internet. No one can forge, alter, nor tamper such

certificate data. If forged, altered, or tampered, it is easily detected by the extraction program.

3. Access control system for digital content distribution

In this area embedded data is "hidden", but is "explained" to publicize the content.

Today, digital contents are getting more and more commonly distributed by Internet than ever

before. For example, music companies release new albums on their Webpage in a free or charged

manner. However, in this case, all the contents are equally distributed to the people who accessed

the page. So, an ordinary Web distribution scheme is not suited for a "case-by-case" and

"selective" distribution. Of course it is always possible to attach digital content to e-mail

messages and send to the customers. But it will takes a lot of cost in time and labor.

If you have some valuable content, which you think it is okay to provide others if they really

need it, and if it is possible to upload such content on the Web in some covert manner. And if

you can issue a special "access key" to extract the content selectively, you will be very happy

about it. A steganographic scheme can help realize a this type of system.

We have developed a prototype of an "Access Control System" for digital content distribution

through Internet. The following steps explain the scheme.

(1) A content owner classify his/her digital contents in a folder-by-folder manner, and embed the

whole folders in some large vessel according to a steganographic method using folder access

keys, and upload the embedded vessel (stego data) on his/her own Webpage.

(2)  On that Webpage the owner explains the contents in depth and publicize worldwide. The

contact information to the owner (post mail address, e-mail address, phone number, etc.) will be

posted there.

Page 34: stegno

(3) The owner may receive an access-request from a customer who watched that Webpage. In

that case, the owner may (or may not) creates an access key and provide it to the customer (free

or charged)..

In this mechanism the most important point is, a "selective extraction" is possible or not.

4. Media Database systems

In this application area of steganography secrecy is not important, but unifying two types of data

into one is the most important.

Media data (photo picture, movie, music, etc.) have some association with other information. A

photo picture, for instance, may have the following.

(1) The title of the picture and some physical object information

(2) The date and the time when the picture was taken

(3) The camera and the photographer's information

Formerly, these are annotated beside the each picture in the album.

Recently, almost all cameras are digitalized. They are cheap in price, easy to use, quick to shoot.

They eventually made people feel reluctant to work on annotating each picture. Now, most home

PC's are stuck with the huge amount of photo files. In this situation it is very hard to find a

specific shot in the piles of pictures. A "photo album software" may help a little. You can sort the

pictures and put a couple of annotation words to each photo. When you want to find a specific

picture, you can make a search by keywords for the target picture. However, the annotation data

in such software are not unified with the target pictures. Each annotation only has a link to the

picture. Therefore, when you transfer the pictures to a different album software, all the

annotation data are lost.

This problem is technically referred to as "Metadata (e.g., annotation data) in a media database

system (a photo album software) are separated from the media data (photo data) in the database

managing system (DBMS)." This is a big problem.

Page 35: stegno

Steganography can solve this problem because a steganography program unifies two types of

data into one by way of embedding operation. So, metadata can easily be transferred from one

system to another without hitch. Specifically, you can embed all your good/bad memory (of your

sight-seeing trip) in each snap shot of the digital photo. You can either send the embedded

picture to your friend to extract your memory on his/her PC, or you may keep it silent in your

own PC to enjoy extracting the memory ten years after. Qtech Hide & View v02may be a good

program for such purposes.

If  a "motion picture steganography system" has been developed in the near future, a keyword

based movie-scene retrieving system will be implemented. It will be a step to a "semantic movie

retrieval system."