Image Steganography: B. Yellamma K. Kanaka Durga Iii Ece Iii Ece
Image Steganography: B. Yellamma K. Kanaka Durga Iii Ece Iii Ece
Image Steganography: B. Yellamma K. Kanaka Durga Iii Ece Iii Ece
B. Yellamma
III ECE
[email protected]
K. Kanaka Durga
III ECE
[email protected]
(Autonomous)
R.V.S. Nagar, Tirupati Road, CHITTOOR- 517 127
ABSTRACT:
The advantage of steganography is that the
intended secret message does not attract
attention to itself as an object of scrutiny. Thus,
whereas cryptography is the practice of protecting
the contents of a message alone, steganography is
concerned with concealing the fact that a secret
message is being sent, as well as concealing the
contents of the message.
Steganography includes the concealment of
information within computer files. In digital
steganography, electronic communications may
include steganographic coding inside of a
transport layer, such as a document file, image
file, program or protocol. Media files are ideal for
steganographic transmission because of their large
size. For example, a sender might start with an
innocuous image file and adjust the color of every
100th pixel to correspond to a letter in the
alphabet, a change so subtle that someone not
specifically looking for it is unlikely to notice it.
INTRODUCTION:
Steganography is the art or practice of
concealing a message, image, or file within
another message, image, or file. The word
steganography is of Greek origin and means
"covered writing" or "concealed writing". Some
implementations of steganography which lack a
shared secret are forms of security through
obscurity, whereas key-dependent steganographic
schemes adhere to Kerckhoffs's principle.It
combines the Greek words steganos meaning
"covered or protected", and graphei meaning
"writing". The first recorded use of the term was
in 1499 by Johannes Trithemius in his
Steganographia, a treatise on cryptography and
steganography, disguised as a book on magic.
Generally, the hidden messages will appear to be
(or be part of) something else: images, articles,
shopping lists, or some other cover text. For
example, the hidden message may be in invisible
ink between the visible lines of a private letter.
IMPORTANCE OF STEGANOGRAPHY:
Steganography is defined by Markus Kahn as
follows, "Steganography is the art and science of
communicating in a way which hides the
existence of the communication. In contrast to
Cryptography, where the enemy is allowed to
detect, intercept and modify messages without
being able to violate certain security premises
guaranteed by a cryptosystem, the goal of
Steganography is to hide messages inside other
harmless messages in a way that does not allow
any enemy to even detect that there is a second
message present". In a digital world,
Steganography and Cryptography are both
intended to protect information from unwanted
parties. Both Steganography and Cryptography
are excellent means by which to accomplish this
but neither technology alone is perfect and both
can be broken.
It is for this reason that most experts would
suggest using both to add multiple layers of
security. Steganography can be used in a large
amount of data formats in the digital world of
today. The most popular data formats used are
.bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav. Mainly
because of their popularity on the Internet and the
ease of use of the steganographic tools that use
these data formats. These formats are also popular
because of the relative ease by which redundant or
noisy data can be removed from them and
replaced with a hidden message. Steganographic
technologies are a very important part of the
future of Internet security and privacy on open
systems such as the Internet.
Steganographic research is primarily driven by
the lack of strength in the cryptographic systems
on their own and the desire to have complete
secrecy in an open-systems environment. Many
governments have created laws that either limit
the strength of cryptosystems or prohibit them
completely. This has been done primarily for fear
by law enforcement not to be able to gain
intelligence by wiretaps, etc. This unfortunately
leaves the majority of the Internet community
either with relatively weak and a lot of the times
breakable encryption algorithms or none at all.
Civil liberties advocates fight this with the
argument that these limitations are an assault on
TECHNIQUES:
PHISICAL:
Steganography has been widely used, including in
recent historical times and the present day.
Some of such examples are:
Hidden messages within wax tablets.
Hidden messages on messenger's body
also used in ancient Greece. Herodotus
tells the story of a message tattooed on the
shaved head of a slave of Histiaeus,
hidden by the hair that afterwards grew
over it, and exposed by shaving the head
again. The message allegedly carried a
warning to Greece about Persian invasion
plans. This method has obvious
drawbacks, such as delayed transmission
DIGITAL:
Concealing messages within the lowest
bits of noisy images or sound files.
Concealing data within encrypted data or
within random data. The data to be
concealed are first encrypted before being
used to overwrite part of a much larger
block of encrypted data or a block of
random data (an unbreakable cipher like
the one-time pad generates ciphertexts that
look perfectly random if one does not have
the private key).
Mimic functions convert one file to have
the statistical profile of another. This can
thwart statistical methods that help bruteforce attacks identify the right solution in a
ciphertext-only attack.
Concealed
messages
in
tampered
executable files, exploiting redundancy in
the targeted.
NETWORK:
All information hiding techniques that
may be used to exchange steganograms in
telecommunication networks can be
classified under the general term of
network
steganography.
This
nomenclature was originally introduced by
Krzysztof Szczypiorski in 2003.
Contrary to the typical steganographic
methods which utilize digital media
(images, audio and video files) as a cover
for hidden data, network steganography
utilizes communication protocols' control
elements and their basic intrinsic
functionality. As a result, such methods
are harder to detect and eliminate.
Typical network steganography methods
involve modification of the properties of a
single
network
protocol.
Such
modification can be applied to the PDU
(Protocol Data Unit.Moreover, it is
feasible to utilize the relation between two
or more different network protocols to
enable secret communication. These
applications fall under the term interprotocol steganography.
Network steganography covers a broad
spectrum of techniques, which include,
among others:
Steganophony - the concealment of
messages in Voice-over-IP conversations,
e.g. the employment of delayed or
corrupted packets that would normally be
ignored by the receiver (this method is
called LACK - Lost Audio Packets
Steganography), or, alternatively, hiding
information in unused header fields.
WLAN Steganography the utilization of
methods that may be exercised to transmit
steganograms in Wireless Local Area
Networks. A practical example of WLAN
Steganography is the HICCUPS system
(Hidden Communication System for
Corrupted Networks)
PRINTED:
Digital steganography output may be in the
form of printed documents. A message, the
plaintext, may be first encrypted by traditional
means, producing a ciphertext. Then, an
innocuous covertext is modified in some way so
as to contain the ciphertext, resulting in the
stegotext. For example, the letter size, spacing,
typeface, or other characteristics of a covertext
can be manipulated to carry the hidden message.
Only a recipient who knows the technique used
can recover the message and then decrypt it.
Francis Bacon developed Bacon's cipher as such a
technique.
The ciphertext produced by most digital
steganography methods, however, is not printable.
Traditional digital methods rely on perturbing
noise in the channel file to hide the message, as
such, the channel file must be transmitted to the
recipient with no additional noise from the
transmission. Printing introduces much noise in
the ciphertext, generally rendering the message
unrecoverable. There are techniques that address
this limitation, one notable example is ASCII Art
Steganography.
DIGITAL TEXT:
STEGANALYSIS:
CONCLUSION:
Although steganography is not a new
concept, its recent application with
technology instigates many new ideas. First,
substantial research is necessary to create
algorithms that are strong enough to
withstand the many unique forms of
steganalysis. Although in the past, the
government disagreed with individuals and
businesses on the issue of public use of
strong encryption products, each group must
recognize the benefits that this technology
brings to society. Further research in this
field will not only help to decrease the
effects of the drawbacks of public use, but it
will also create possibilities for even more
individual identity protection and a more
secure nation..