Distributed Steganography

Similar documents
Jeff Hinson CS525, Spring 2010

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Business Data Networks and Security 10th Edition by Panko Test Bank

Secret Sharing in Audio Steganography

Image Steganography (cont.)

Secured Way of Ciphering Text Using Audio Steganography

DLP FAIL!!! Using Encoding, Steganography and Covert Channels to Evade DLP and other Critical Controls

BS801E-BSCS. Cryptography

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Cryptography Lesson Plan

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

NeoMedia s Patent on Using Identification Code to Access Networked Computers. U.S. Patent No. 6,199,048

Chapter 7 Lab A: Exploring Encryption Methods

Network Security Issues and Cryptography

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1

CHAPTER 3. Digital Carriers of Steganography

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

International Journal of Recent Engineering Research and Development (IJRERD) ISSN: Volume 03 Issue 04 April 2018 PP.

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

SYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Virtual Private Radio via Virtual Private Network - patent application

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION

System and method for encoding and decoding data files

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Wireless IP for M2M / IoT 101

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

(2½ hours) Total Marks: 75

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

LSB Based Audio Steganography Using Pattern Matching

Computers and Security

The Steganography In Inactive Frames Of Voip

Random Image Embedded in Videos using LSB Insertion Algorithm

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Application of Data Hiding in Audio-Video Using Advance Algorithm

Secret Communication through Audio for Defense Application

Enhanced LSB Based Audio Steganography

Uses of Cryptography


Image Steganography by Mapping Pixels to Letters

Steganography using MATLAB

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Analysis of Steganography as a Security Technique

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Architectural Design of Multi Level Steganography System for Data Transmission

P2_L6 Symmetric Encryption Page 1

Wireless IP for IoT / M2M 101 The Basics

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

CPSC 467b: Cryptography and Computer Security

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Lecture 2. Computer Networks Models. Network Models 1-1

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Assignment 9 / Cryptography

Covert channels in TCP/IP: attack and defence

ARC BRIEF. Software-defined Industrial Networks Deliver Cybersecurity Breakthroughs. Keywords. Summary. By Harry Forbes

Cisco How Virtual Private Networks Work

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

e-commerce Study Guide Test 2. Security Chapter 10

An Analysis of Various Techniques in Audio Steganography

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2012/34

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

8/16/12. Computer Organization. Architecture. Computer Organization. Computer Basics

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

Implementation of Random Byte Hiding algorithm in Video Steganography

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

DATA COMMUNICATION AND NETWORKS

On using Emoticons and Lingoes for Hiding Data in SMS

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Steganography in Commonly Used HF Radio Protocols

Anonymity. Assumption: If we know IP address, we know identity

PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

HTML Steganography using Relative links & Multi web-page Embedment

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Steganography: A Security Model for Open Communication

Covert Communication & Malicious Cryptography

A Review of Approaches for Steganography

The Shortcut Guide To. Protecting Against Web Application Threats Using SSL. Dan Sullivan

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1. Breiner et al. (43) Pub. Date: Mar. 4, 2010

CA DLP. NBA Release Notes. Release 14.0

NEURAL NETWORKS - A NEW DIMENSION IN DATA SECURITY

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

IP Mobility vs. Session Mobility

CPSC 467b: Cryptography and Computer Security

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

CSC 5930/9010 Cloud S & P: Cloud Primitives

Security. Communication security. System Security

Transcription:

Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into another image. However there are permutations where video is hidden in another video, or sound in sound or even sound in video. The image/sound/video that the underlying message is hidden in is referred to as a carrier or cover file or signal. The most common method is to use the least significant bits of an image to store data. For example in a high resolution graphics file, each pixel is represented by 24 bits. By using the least significant (i.e. the last 1 or 2 bits) to store other data, the image is not compromised and data is hidden in the image. Specialized tools exist, including free software available on the internet, to insert a text or image into a carrier image. There have been modifications to the underlying technique, such as these: Patent 6,557,103 B1 Spread Spectrum Steganography. This patent is primarily concerned with hiding an image/text within another image so that errors are minimal and detection of the image is more difficult. Patent 7,242,790 Video Steganography. The purpose of this invention is to hide some signal in a video transmission. Patent 6,266,430 B1Audio or Video Steganography. In this invention two signals (the message and the carrier) are combined to form a new signal. This invention also includes calibration data to facilitate adding and retrieving the hidden signal. Patent 6,211,849 Encryption Based Selection System for Steganography. The purpose of this invention is to integrate encryption with steganography. Discussion The purpose of steganography, regardless of the implementation, is to hide some underlying message so that an observer is not even aware the message is present. This is very useful in covert communications, particularly in the intelligence community. Most permutations of steganography deal with how to embed the message (text, image, video, or audio) into the carrier file. Some permutations, such as SNOW, even use blanks at the end of text files in order to hide messages. However this process is concerned with

how to fragment the message and hide it in various carrier/cover files making the detection of the entire message extremely difficult, approaching impossibility. In this process the message is distributed across multiple carrier signals/sources in order to further hide the message. For example a single text message would be broken into blocks, each block hidden in a different image. Another aspect if this process is that the block size can vary and the blocks are not necessarily stored in order. This means that the first carrier file will not necessarily hold the first segment of the hidden message/file. This is applying permutation to the blocks. It should be noted that many cryptographic algorithms employee permutation along with substitution in order to encrypt files. Normally blocks of larger sizes such as 64 bit up to even 1024 bit blocks would be useful. It is also possible to store much larger block sizes, depending on the size of the carrier signal (image, video, or sound). However for demonstration purposes let us consider a smaller block size. Consider an example with using 8 bit blocks on a message Steganography is cool. Each character represents 8 bits, so every 8 characters would be a separate block. Keep in mind that blanks are also represented by 8 bits, so this message would have 5 separate blocks stored in 5 separate images. A brief overview of the process is shown in figure 1-1. Figure 1.1 Distributed Steganography Overview The issue this process needs to overcome is how to retrieve the blocks. This issue would involve knowing how many blocks total were to be retrieved, the order of each block (i.e.

is this block 2 of 4, 3 of 7, etc.), and knowing the carrier/cover file to retrieve the blocks from. This process deals with all three issues. Total Blocks and Block Order Each block stored in an image would have an additional 2 bytes (16 bits) appended to the image. The first byte would contain information as to which block this was (i.e. block 3 of 9), and the second byte would store the total number of blocks the message contained (i.e. 9 blocks). This is shown in figure 1.2. Figure 1.2 Block numbering

Figure 1.3 Block numbering Continued Since 8 bits can store decimal numbers between 0 and 255 this would necessitate breaking a message down into no more than 255 blocks. The size of the block would be determined by the size of the original message divided by 255. In another embodiment of this process, additional bytes could be used to store the block numbering data. For example one could use 2 bytes (16 bits) to store the value of the current block and an additional 2 bytes (16 bits) to store the total number of blocks. This would allow a message to be broken into 65,535 total blocks. Use of up to 4 bytes (64 bits) for the value of the current block and 4 bytes (64 bits) for the total number of blocks would allow a message to be broken into 4,294,967,295 blocks. This would be appropriate for video or audio messages hidden in audio or video signals. These additional bytes indicating block number and total blocks, are called block pointers. The use of block numbering is similar to how TCP packets are sent over a network. Each packet has a number such as packet 2 of 10. This same methodology is applied to hiding blocks of data in diverse images. This requires distributed steganography to have a key, much like the keys used in encryption. However this key would contain the following information:

1. Block Size 2. Size of block pointer (i.e. the bytes used to indicate block numbering) The basic key is shown in figure 1.4: Figure 1.4 Distributed Steganography Key Locating the images The preferred way to find the location of the images containing secret messages would be to add that information to the key. This information could be an ip address or URL to find the image at (if images are stored at different locations), or the image name (if all images are on a single storage device). This would yield a key such as what is shown in figure 1-5.

Figure 1-5 Distributed Steganography Key 2 Notice that it is possible to store images on web pages, file servers, or FTP servers. This means the actual message could be fragmented and stored around the internet in various locations. In some cases it could even be stored on third party servers without their knowledge. In another embodiment of this process, the locations would be pre-determined. For example messages would always be hidden in specific images at pre-determined locations. Thus the person who needs to receive those messages would simply check those images at regular intervals. In another embodiment of this process, rather than embed the message into an image, it could be embedded into audio or video formats. The only alteration required would be the location of the carrier image would instead be the location of a video or sound file (.mp3,.wave, etc.). The actual encoding of the message could be done with any standard steganography technique, such as using the least significant bits to store the hidden message.

It would also be advisable to have the message first encrypted using any preferred encryption algorithm, before hiding it using distributed steganography. It would also be advisable to encrypt the steganography key. In yet another embodiment of this process a single message would be distributed in diverse media. This means some blocks would be embedded in to images (.jpg,.bmp, etc.), others embedded into sound files (.wav,.mp3) and still others could be embedded into video (.mov,.avi). This would not require any extension of the key. Since the file name would indicate the media type. However the decoding software would need to accommodate diverse media. In yet another embodiment of the process each block would not contain its block number (i.e. block 2 of 10). Instead the order of sources in the key would indicate the block number. This is shown in figure 1.6. Figure 1.6 Distributed Steganography Key 3 The previously discussed embodiments involve dividing the message up in blocks, akin to block symmetric encryption. The particular size of the block can be chosen in any given implementation of this process. This allows the user to divide the message up into as many or as few blocks as possible. Obviously the more blocks it is divided into the

more difficult it would be for someone to locate all the elements of the message. However more blocks also requires more carrier files. The uniqueness of this process The existing research in this area concentrates on how to embed the message into a carrier file. Using patent searches, IETF, ACM, and other sources I can find no incident of a message being distributed across multiple independent carriers. I would also argue that clearly this is not obvious to one of ordinary skill in the art for two clear reasons 1. It has not been done yet, so clearly many experts in the art have not seen this option. 2. This process discloses very specific details, along with alternatives, as to how to retrieve a message that has been distributed in multiple carrier files. This specificity is certainly not obvious. These details include: a. Determining where the various carrier/cover files are. b. The order of blocks to be retrieved. c. The total number of blocks to be retrieved.