Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION
Steganography comes from the Greek and literally means, "Covered writing". It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishes steganography from covert channel techniques, which instead of trying to transmit data between two entities that were unconnected before. The goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present. The only missing information for the enemy is the short easily exchangeable random number sequence, the secret key, without the secret key, the enemy should not have the slightest chance of even becoming suspicious that on an observed communication channel, hidden communication might take place. Steganography is closely related to the problem of hidden channels n secure operating system design, a term which refers to all communication paths that cannot easily be restricted by access control mechanisms. In an ideal world we would all be able to sent openly encrypted mail or files to each other with no fear of reprisals. However there are often cases when this is possible, either because the working company does not allow encrypted email or the local government does not approve of encrypt communication (a reality in some parts of the world). This is where steganography can come into play. Data hiding techniques can also be classified with respect to the extraction process: Cover Escrow methods need both the original piece of information and the encoded one in order to extract the embedded data. Blind or Oblivious schemes can recover the hidden message by means only of the encoded data. Steganography has developed a lot in recent years, because digital techniques allow new ways of hiding informations inside other informations, and this can be valuable in a lot of situations. The first to employ hidden communications techniques -with radio transmissions were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become
1
more and more important just in these days, after the international Wassenaar agreement, with which around thirty of the major - with respect to technology - countries in the world decided to apply restrictions in cryptography export similar to the USs ones.Another application of steganography is the protection of sensitive data. A file system can be hidden in random looking files in a hard disk, needing a key to extract the original files. This can protect from physical attacks to people in order to get their passwords, because maybe the attacker cant even know that some files are in that disk. The major concern of steganography is stealth, because if an attacker, either passive or active, can detect the presence of the message, from that point he can try to extract it and, if encrypted, to decrypt it. The resistance to attempt at destruction or noise is not required, since we consider the sender and the receiver equally interested in exchanging messages, so that they will try to transmit the stegomedium in the best way they can. If the stego-data can be transmitted over the selected channel, and this is usually the case with all the media that are used, like images or sounds, then the embedded data will be preserved along with them. Thus, data hiding techniques for steganography must focus on the maximum strength against detection and extraction. As a second request, we would prefer a high data rate, because we will usually want to be able to exchange any amount of data, from simple messages to top secret images.
Cryptography plays an important role in this. Today, cryptography uses principles from several disciplines such as mathematics, computer science, etc. Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since, nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention.
Fig: Unifying model Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. Since nobody except the sender and the receiver knows the existence of the message, it does not attract unwanted attention. Steganography was used even in ancient times and these ancient methods are called Physical Steganography. Some examples for these methods are messages hidden in messages body, messages written in secret inks, messages written on envelopes in areas covered by stamps, etc. Modern Steganography methods are called Digital Steganography. These modern methods include hiding messages within noisy images, embedding a message within random data, embedding pictures with the message within video files, etc. Furthermore, Network Steganography is used in telecommunication networks. This includes techniques like Steganophony (hiding a message in Voice-over-IP conversations) and WLAN Steganography (methods for transmitting Steganograms in Wireless Local Area Networks). there are three types of cryptographic algorithms used called Symmetric key cryptography, Public-key cryptography and hash functions. Symmetric key cryptography involves encryption methods where both the sender and the receiver share the same key used to encrypt the data.
4
Fig: Mapping between model components Steganography and cryptography are cousins in spy-craft family. Cryptography scrambles a message so it cannot be understood. Steganography hides the message so it cannot be seen. A message in cipher text for instance might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. In this way, we can say that steganography completes cryptography, and actually there are usually two ciphers to break when trying to extract the embedded message: one is the one with which the message was embedded, and the other is the one with which the message was enciphered. Cryptography is the study of hiding information, while Steganography deals with composing hidden messages so that only the sender and the receiver know that the message even exists. In Steganography, only the sender and the receiver know the existence of the message, whereas in cryptography the existence of the encrypted message is visible to the world. Due to this, Steganography removes the unwanted attention coming to the hidden message. Cryptographic methods try to protect the content of a message, while Steganography uses methods that would hide both the message as well as the content. By combining Steganography and Cryptography one can achieve better security. The major concern of steganography is stealth, because if an attacker, either passive or active, can detect the presence of the message, from that point he can try to extract it and, if encrypted, to decrypt it. The resistance to attempt at destruction or noise is not required, since we consider the
5
sender and the receiver equally interested in exchanging messages, so that they will try to transmit the stego-medium in the best way they can. If the stego-data can be transmitted over the selected channel, and this is usually the case with all the media that are used, like images or sounds, then the embedded data will be preserved along with them.
digitalization,images contain the so-called quantization noise which provides space to embed data (Westfeld and Pfitzmann, 1999). In this article, we will concentrate only on images as carrier media. The modern formulation of steganography is often given in terms of the prisoners problem (Simmons, 1984; Kharrazi et al., 2004) where Alice and Bob are two inmates who wish to communicate in order to hatch an escape plan. However, all communication between them is examined by the warden, Wendy, who will put them in solitary confinement at the slightest suspicion of covert communication.
Steganography was used even in ancient times and these ancient methods are called Physical Steganography. Some examples for these methods are messages hidden in messages body, messages written in secret inks, messages written on envelopes in areas covered by stamps, etc. Modern Steganography methods are called Digital Steganography.
Specifically, in the general model for steganography, we have Alice (the sender) wishing to send a secret message M to Bob (the receiver): in order to do this, Alice chooses a cover image C.The steganographic algorithm identifies Cs redundant bits (i.e., those that can be modified without arising Wendys suspicion), then the embedding process creates a stego
6
image S by replacing these redundant bits with data from M. S is transmitted over a public channel (monitored by Wendy) and is received by Bob only if Wendy has no suspicion on it. Once Bob recovers S, he can get M through the extracting process.
Fig: ISC embedded process The embedding process represents the critical task for a steganographic system since S must be as similar as possible to C for avoidingWendys intervention (Wendy acts for the eavesdropper). Least significant bit (LSB) insertion is a common and simple approach to embed information in a cover file: it overwrites the LSB of a pixel with anMs bit
Unfortunately, modifying the cover image changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego images statistical properties. In fact, the embedding of high-entropy data (often due to encryption) changes the histogram of colour frequencies in a predictable way (Provos and Honeyman, 2003; Westfeld and Pfitzmann, 1999). Westfeld (Westfeld, 2001) proposed F5, an algorithm that does not overwrite LSB and preserves the stego images statistical properties (see Sect. 5.2). Since standard steganographic systems do not provide strong message encryption, they recommend to encrypt M before embedding. Because of this, we have always to deal with a two-steps protocol: first we must cipher M (obtaining M) and then we can embeded M in C. Figure shows the result of such comparison obtained using a JPEG cover set Cset of 20 images (1024 x 768, average size 330 KB). In every image of Cset we have embedded a canto from Dantes Divina Commedia (about 5 KB for each canto) with a JPEG quality factor set to 80. Only for ISC, we also used the images of Cset as key images. The mean difference (in percentage) for every AC coefficient in the interval [8,8] is shown on the yaxis in Fig. 7, in particular the black columns represent the differences introduced by F5 embedding step while the white ones correspond to the number of modifications yielded by ISC embedding process. As one can notice, the respective difference values are comparable. Em1 is a simplified version of ISC, because actually ISC spreads M over the entire stego image, yielding the same embedding density everywhere. In doing this, ISC neither uses permutative straddling nor matrix encoding, but simply divides the nonzero coefficients array in blocks of the same length. If necessary, only one of the coefficients in each block is modified. Furthermore, ISC presents an on-line mechanism for correcting the statistical deviations created by the embedding step. If the message length is sufficiently short (i.e., it is less than the number of AC nonzero coefficients), ISC transforms useless coefficients in order to restore the original statistical properties characterizing the cover medium. As an example, if ISC transforms an AC coefficient from -1 into -2, when it encounters the first unused -2, it transforms this value in -1 in order to reequilibrate the histogram. Naturally, the more information we embed in the cover image, the less ISC can correct the introduced modifications. . If we choose a 24-bit image as cover, we can store 3 bits in each pixel. To the human eye, the resulting stego image will look identical to the cover image (Johnson and Jajodia, 1998).
Fig: ISC technique In the next sections we will present a new all-in one method able to perform steganography providing strong encryption at the same time. Our method has been planned either to work with bit streams scattered over multiple images (in an online way of functioning) or to work with still images; it yields random outputs, in order to make steganalysis more difficult and it can cipher M in a theoretically secure manner preserving the stego images statistical properties.The simplicity of our method gives the possibility of using it in real-time applications such as mobile video communication
4.Some history
The first description of the use of steganography dates back to the Greeks. Herodotus tells how a message was passed to the Greeks about Xerses hostile intentions underneath the wax of a writing tablet, and describes a technique of dotting successive letters in a cover text with a secret ink, due to Aeneas the Tactician. Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphei
9
() meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messagesno matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal.[1] Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. Kahn tells of a trick used in China of embedding a code ideogram at a prearranged position in a dispatch; a similar idea led to the grille system used in medieval Europe, where a wooden template would be placed over a seemingly innocuous text, highlighting an embedded secret message. Invisible ink offered a common form of invisible writing. Early in WWII, steganographic technology consisted almost exclusively of these inks. With invisible ink, a seemingly innocent letter could contain a very different message written between the lines. During WWII the grille spies used method or some variants. In the same period, the Germans developed microdot technology, which prints a clear, good quality photograph shrinking it to the size of a dot. During the "Cold War" period, USSR and US wanted to hide their sensors in the enemys facilities. These devices had to send data to their nations, without being spotted.
5.SOME DEFINITIONS
We give some definitions common to the steganography field:
10
Cover medium: This is the medium in which we want to hide data, it can be an innocent looking piece of information for steganography, or some important medium that must be protected for copyright or integrity reasons. Embedded message: This is the hidden message we want to put in the cover. It can be some data for steganography and some copyright informations or added content for digital watermarking. Stegokey: This is represented by some secret information, which is needed in order to extract the embedded message from the stegomedium. Stego-medium: This is the final piece of information that the casual observer can see. We can define this simple formula: Cover-medium + embedded-message = stego-message
Fig:Steganography process
7.IMAGE FILES
To a computer, an image is an array of numbers that represent an array of numbers that represent light intensities at various points or pixels. These pixels make up the images raster data. A common image size is 640 * 480 and 256 colors (or 8 bits per pixel). Such an image could contain about 300 kb of data. Digital images are typically stored as either 24-bit or 811
bit files. A 24-bit image provides the most space for hiding information, however, it can be quite large except for the JPEG images. A 24-bit image of 1,024 pixels width and 768 pixels height has more than two million pixels, each having 24-bits, which would produce a file exceeding 2 Mega bytes. Such a file would attract attention during transmission. File compression would thus be beneficial, if not necessary, to transmit such a file.
7.1.File compression
There are two types of file compression methods- lossless and lossy. Both methods save storage space but have different results, interfering with the hidden information, when information is uncompressed. Lossless compression lets us reconstruct the original message exactly; therefore it is preferred when the original information must remain intact (as with steganographic images). Lossless compression as typical of images saved as GIF and 8-bit BMP. Lossless compression, on the other hand, saves space but may not maintain the original images integrity. This method typifies images saved as JPEG. Due to the lossy compression algorithm, which we discuss later, the JPEG formats provide close approximations to highquality digital photographs but not an exact duplicate. Hence the term lossy compression.
7.2.Embedding data
Embedding data, which is to be hidden, into an image requires two files. The first is the innocent looking image that will hold the hidden information, called the cover image. The second file is the message- the information to be hidden. A message may be plain text, cipher text, other images, or anything that can be embedded in a bit stream, when combined, the cover image and the embedded message make a stego- image. A stego-key (a type of password) may also be used to hide, and then later decode, the message. Most steganographic software neither supports not recommends using JPEG images. But recommends instead the use of lossless 24-bit images such as BMP. The next best alternative to 24-bit images is 256- color or gray scale images. The most common of these found on the Internet are GIF files. Every AC coefficient in the interval [8,8] is shown on the yaxis in Fig. 7, in particular the black columns represent the differences introduced by F5 embedding step while the white ones correspond to the number of modifications yielded by ISC embedding process.
12
Fig:ISC for JPEG sequence(Extracting step) In 8-bit color images such as GIF files, each pixel is represented by a single byte, and each pixel nearly points to a color index able (a palette) with 256 possible colors. The pixels value is between 0 and 255. The software simply paints the indicated color on the screen at the selected pixel position. Many steganography experts recommend the use of images featuring 256 shades of grapy. Gray scale images are preferred because the shades change very gradually from byte to byte, and the less the value changes between palette entries, the better they can hide information.
13
When considering an image in which to hide information, you must consider the image as well as the palette. Obviously, an image with large areas of solid colors is a poor choice, as variances created from the embedded massage will be noticeable in the solid areas.
Protection Level Scheme). This kind of steganographic systems are used in such tasks as, for instance, adding a digital signature for proof of copyright. Data embedding performance is not changed in comparison with the fastest approach of the first protection level usage. Steganographic data channels that use key schemes based distribution of a message through the container and or preprocessing of an embedded message for data hiding are more secure. When the third protection level key scheme is used it affects the distribution of a message through the container (see figure The Third Protection Level Scheme, where F(P, L) distribution function of a message within a container; P minimum number of container samples that are needed to embed one message sample; L step of a message distribution within a container). Accordingly, the performance of container processing will be lower than in the case of the first and the second key schemes. Taking into account that PL, the simplest representation of the F(P, L) function could be as following: F(P, L) = cycle*L + step*P, where cycle is a number of the current L section and step is a number of the embedded message sample. The difference between the fourth protection level scheme and the third one is that in steganographic system there are two distribution functions of a message within a container are used. The first is responsible for a message samples selection according to some function G(Q, N), and the second function F(P, L) is responsible for position selection in a container for message sample hiding. Here Q the size of message block to be inserted; N the size (in bits) of one sample of the message file (see figure The Fourth Protection Level Scheme).
use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison A number of ways exist to hide information in digital images. Common approaches include: Least significant bit (LSB) insertion. Masking and filtering. Algorithms and transformations.
the hidden message is more integral to the cover image than just hiding it in the noise level. This makes it more suitable than LSB with lossy JPEG images.
treated paper that would reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a hidden message the special paper would render it visible. At least two US patents were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948. A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that "runs" when in contact with a water-based invisible ink. In computing, detection of steganographically encoded packages is called steganalysis. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. In general, using extremely high compression rate makes steganography difficult, but not impossible. While compression errors provide a hiding place for data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in the extreme case, even by casual observation).
18
8-bit color: every pixel can have one in 256 (2^8) colors, chosen from a palette, or a table of colors. 8-bit gray-scale: every pixel can have one in 256 (2^8) shades of gray. LSB insertion modifies the LSBs of each color in 24-bit images, or the LSBs of the 8-bit value for 8-bit images.
9.2.Data Rate
The most basic of LSBs insertion for 24-bit pictures inserts 3 bits/pixel. Since every pixel is 24 bits, we can hide 3 hidden-bits/pixel / 24 data-bits/pixel = 1/8 hidden-bits/databits. So for this case we hide 1 bit of the embedded message for every 8 bits of the cover image. If we pushed the insertion to include the second LSBs, the formula would change to: 6 hidden-bits/pixel / 24 data-bits/pixel = 2/8 hidden-bits/databits And we would hide 2 bits of the embedded message for every 8 bits of the cover image. Adding a third-bit insertion, we would get: 9 hidden-bits/pixel / 24 data-bits/pixel = 3/8 hidden-bits/databits Acquiring a data rate of 3 embedded bits every 8 bits of the image. The data rate for insertion in 8-bit images is analogous to the 1 LSB insertion in 24-bit images, or 1 embedded bit every 8 cover bits. We can see the problem in another light, and ask how many cover bytes are needed to send an embedded byte. For 1-LSB insertion in 24-bit images or in 8-bit images this value would be 8/1*8 = 8 Bytes. For 2-LSBs insertion in 24-bit pictures it would be 8/2*8 = 4 Bytes, for 3-LSBs insertion it would be 8/3*8 = 21.33 Bytes.
9.3.Robustness
LSB insertion is very vulnerable to a lot of transformations,even the most harmless and usual ones. Lossy compression, e.g. JPEG, is very likely to destroy it completely. The problem is that the "holes" in the Human Visual System that LSB insertion tries to exploit little sensitivity to added noise - are the same that lossy compression algorithms rely on to be able to reduce the data rate of images.
19
Geometrical transformations, moving the pixels around and especially message, and the only one that could allow recovery is a simple translation. Any other kind of picture transformation, like blurring or other effects, usually will destroy the hidden data. All in all, LSB insertion is a very little robust technique for data hiding. displacing them from the original grid, are likely to destroy the embedded
9.4.Ease of detection/extraction
There is no theoretical outstanding mark of LSB insertion, if not a little increase of background noise. Its very easy, instead, to extract LSBs even with simple programs, and to check them later to find if they mean something or not.
20
Anyway, since we dont want our message to be only an encrypted and scrambled message, we must go back to the purpose of making the communication hidden. The two most important issues in this problem are: The choice of images The choice of the format (24-bit or 8-bit, compressed or not) The cover image first of all must seem casual, so it must be chosen between a set of subjects that can have a reason to be exchanged between the source and the receiver. Then it must have quite varying colors, it must be "noisy", so that the added noise is going to be covered by the already present one. Wide solid-color areas imagnify very much any little amount of noise added to them. Second, there is a problem with the file size, which involves the choice of the format. Unusually big files exchanged between two peers, in fact, are likely to arise suspicion. To solve this problem, it has been studied a modification to the JPEG algorithm that inserts LSBs in some of the lossless stages or pilots the rounding of the coefficients of the DCT used to compress the image to encode the bits. Since we need to have small image file sizes, we should resort in using 8-bit images if we want to communicate using LSB insertion, because their size is more likely to be considered as normal. The problem with 256 colors images is that they make use of an indexed palette, and changing a LSB means that we switch a pixel from a position to an adjacent one. If there are adjacent contrasting colors in the palette, it can happen that a pixel in the image changes its color abruptly and the hidden message becomes visible. To solve this problem different methods have been studied, like rearranging the palette so that adjacent colors dont contrast so much, or even reducing the palette to a smaller number of colors and replicating the same entry in the table in adjacent positions, so that the difference after the embedding of the message is not visible at all. Moreover for most images the reduction of colors from, for instance, 256 to 32 is hardly visible. Most of the experts, anyway, advise to use 8-bit grayscale images, since their palette is much less varying than the color one, so LSB insertion is going to be very hard to detect by the human eye.
21
modulation scheme is used to combine the message with the noise sequence, thereby composing the embedded signal, , which is then input into an interleaver using key 3. This signal is now added with the cover image to produce the stegoimage , which is appropriately quantized and clipped to preserve the initial dynamic range of the cover image. The stegoimage is then transmitted in some manner to the recipient. At the receiver the stegoimage is received by the recipient, who maintains the same keys as the sender, uses the stegosystem decoder to extract the hidden information. The decoder uses image restoration techniques to produce an estimate of the original cover image, , from the received stegoimage, . The difference between and is fed into a keyed deinterleaver to construct an estimate of the embedded signal, . With key 2, the noise sequence, is regenerated, the encoded message is then demodulated, and an estimate of the encoded message, , is constructed. The estimate of the message is then
22
decoded via the low-rate errorcontrol decoder, optionally decrypted using key 1 and revealed to the recipient. The interleaver in this scheme, which reorders the embedded signal before it is added to the cover image, serves a dual function. The first is to prevent a group or burst of errors. This allows the errors to occur almost independently within a codeword, thus giving the errorcorrecting code an equal chance at correcting the errors in all codewords. Second, since the interleaver requires a key to stipulate the interleaving algorithm, this key can serve as another level of security to establish the proper order of the embedded signal before decoding. We point out this technique as an example for spread spectrum data-hiding methods. Spread spectrum techniques are now widely used in military radio communications, due to their very high robustness to detection and extraction. SSIS is a quite mature process, and its aim is to achieve low detectability, ease of extraction, high data rate and good robustness to removal. It is based on spread spectrum techniques, but it enhances them by adding other encoding steps.
Fig:SSIS encoder
23
Fig:SSIS decoder
10.1.Technique basics
The core of SSIS is a spread spectrum encoder. These devices work by modulating a narrow band signal over a carrier. The carriers frequency is continually shifted using a pseudorandom noise generator fed with a secret key. In this way the spectral energy of the signal is spread over a wide band, thus decreasing its density, usually under the noise level. To extract the embedded message, the receiver must use the same key and noise generator to tune on the right frequencies and demodulate the original signal. A casual observer wont be able even to detect the hidden communication, since it is under the noise level.
10.2.Data Rate
The data rate for this technique can be fairly high, but it depends on the choices made for the different parameters of the encoding. We can assume that the message will be compressed before embedding to allow for a higher capacity. The ECC encoder instead is going to insert redundant data into the stream to be able to correct the errors. The more errors we want to correct, the more bits will be added. Then, we have a tradeoff between good retrieval and capacity. If we can allow for small glitches in the recovered message, then we can use a weaker encoding. Moreover, the more data we want to insert in the image, the more noise we are going to add to it. Then, if our cover is not noisy, we will be able to hide very little data, while if we choose a noisy one, its capacity will be higher. Experiments with 512x512 grey scale images (256 KB) could embed from 500 bytes to 5KB, depending on the cover. These experiments used a spread spectrum signal powerful enough to give almost total error-free retrieval, because the compression method adopted didnt allow for any errors. This means a data rate
24
varying from 1 hidden-bytes/50 cover-bytes to 10 hiddenbytes/ 50 cover-bytes, a rate surpassed only by LSB insertion.
10.3.Robustness
Spread spectrum techniques are usually quite robust. Every transformation that adds noise to the image isnt able to destroy the message. Anyway, a determined attacker can quite easily compromise the embedded data using some digital processing, like for example:noise reduction filters, the same that are used in decoding to estimate the original cover.
10.4.Ease of detection/extraction
Spread spectrum encoding is widely used in military communications for its robustness against detection. An attacker cant usually even know if the message was embedded, and anyway it will be very hard for him to extract it without knowing the right key2 and key3.
25
however, will increase the error rate in the retrieval, because it reduces the power of the embedded signal.
11.Applications of Steganography
." Steganography is applicable to, but not limited to, the following areas.
1) Confidential communication and secret data storing 2) Protection of data alteration 3) Access control system for digital content distribution 4) Media Database systems The area differs in what feature of the steganography is utilized in each system.
26
method you don't need to send anything to your party, and no one can detect your communication. Each secrecy based application needs an embedding process which leaves the smallest embedding evidence. You may follow the following. (A) Choose a large vessel, larger the better, compared with the embedding data. (B) Discard the original vessel after embedding. For example, in the case of Qtech Hide & View, it leaves some latent embedding evidence even if the vessel has a very large embedding capacity. You are recommended to embed only 25% or less (for PNG / BMP output) of the maximum capacity, or only 3% of the vessel size (for JPEG output)..
noise. This noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition, lossy compression schemes (such as JPEG) always introduce some error into the decompressed data; it is possible to exploit this for steganographic use as well. Steganography can be used for digital watermarking, where a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified (for example, Coded Anti-Piracy), or even just to identify an image (as in the EURion constellation).
28
In this mechanism the most important point is, a "selective extraction" is possible or not.We have already developed such a selective extraction program to implement the system.
29
12.CONCLUSION
In this paper we tried to give an all-round view of steganography, both used to exchange messages and watermarking. First we gave an outline of the problem, telling also some of the history of this quickly developing field. Then we showed the different techniques invented, from the simplest to the more complex ones, trying to evaluate them under many points of view. Major emphasis was put on data hiding in images, for the techniques involved are usually more mature than the corresponding ones for other kinds of informations. Image encoding algorithms can also be representative for manipulation of other types of media like voice, text, binary files, binary files, communication channels etc. The strength of our system resides in the new concept of key image. Involving two images (the cover and the key) in place of only one (the cover) we are able to change the cover coefficients randomly. This opportunity does not give a steganalytic tool the chance of searching for a predictable set of modifications. The proposed approach has many applications in hiding and coding messages within standard medias, such as images or videos. As future work, we intend to study steganalytic techniques for ISC and to extend ISC to mobile video communication Then we gave an outline of the problems involved with watermarking, a field that has come into light after the development of broadband worldwide digital networks. Steganography and digital watermarking are undergoing a development process similar to that of encryption. Steganographys niche in security is to supplement cryptography and not to replace it. There is a continuous invention of new techniques for steganography followed by successful breakings and new improvements of them.
30
13.REFERENCES
Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998, pp. 26-34 W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for Data Hiding" IBM Systems Journal, Vol. 35 Ross Anderson, Roger Needham, Adi Shamir, "The Steganographic File System", 2nd Information Hiding Workshop, 1998 Ross J. Anderson, Fabien A.P. Petitcolas, "On the limits of steganography. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Syst. J., vol. 35, 1996. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for images, audio and video, in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 243246. D. Kahn, The CodebreakersThe Story of Secret Writing. New York: Scribner, 1967. F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer Mag., pp. 2634, Feb. 1998. B. Pfitzmann, Trials of traced traitors, in Information Hiding, First International Workshop, Lecture Notes in Computer Science, R. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, vol. 1, pp. 4964. J. R. Smith and B. O. Comisky, Modulation and information hiding in images, in Information Hiding, First International Workshop, Lecture Notes in Computer Science, R. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, vol. 1174, pp. 207226. L. M. Marvel and C. G. Boncelet, Jr., Capacity of the additive steganographic channel, submitted for publication. R. van Schyndel, A. Tirkel, and C. Osborne, A digital watermark, in Proc. IEEE Int. Conf. Image Processing, 1994, vol. 2, pp. 8690. R. B. Wolfgang and E. J. Delp, A watermark for digital images, in Proc. IEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 111, pp. 219222
31