STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Similar documents
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Application of Data Hiding in Audio-Video Using Advance Algorithm

Jeff Hinson CS525, Spring 2010

A Novel Information Security Scheme using Cryptic Steganography

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Comparative Analysis of Different Transformation Techniques in Image Steganography

Steganography. Brent McClain Rob Carey

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

A Survey on Digital Image Steganography and Steganalysis

Information and Communications Security: Encryption and Information Hiding

An Analysis of Various Techniques in Audio Steganography

A Hybrid Method of Hiding The Text Information Using Stegnography

Appendix A. Definition of Terms

Image Steganography (cont.)

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique

A NOVEL METHOD FOR HIDING INFORMATION

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Random Image Embedded in Videos using LSB Insertion Algorithm

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

Effect of Audio Steganography based on LSB insertion with Image Watermarking using AVI video

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Reversible Data Hiding in Colour Images using AES Data Encryption System

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

Topics. Number Theory Review. Public Key Cryptography

Distributed Steganography

A New Approach to Compressed Image Steganography Using Wavelet Transform

CHAPTER 3. Digital Carriers of Steganography

LSB Based Audio Steganography Using Pattern Matching

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Steganography and Steganalysis

Invisible Watermarking Audio Digital with Discrete Cosine Transform

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Steganography: A Security Model for Open Communication

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Implementation of Random Byte Hiding algorithm in Video Steganography

Secured Way of Ciphering Text Using Audio Steganography

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Steganography using MATLAB

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Reversible Steganographic Technique Based on IWT for Enhanced Security

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

Steganography. John Von Dollen. Ron Lepper. Coen 150: Information Security Systems

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Image Analysis for Online Dynamic Steganography Detection

Seminar report Steganography

Analysis of Steganography as a Security Technique

Secret Communication through Audio for Defense Application

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE APPLICATIONS OF STEGANOGRAPHY

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

STEGANOGRAPHY: HIDDEN IN PLAIN SIGHT BY: KEVIN R. MEDINA SANTIAGO

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Enhanced LSB Based Audio Steganography

Image Processing and Watermark

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Data Hiding on Text Using Big-5 Code

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Robust DWT Based Technique for Digital Watermarking

A Performance of Embedding Process for Text Steganography Method

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Keywords PSNR, NCC, DCT, DWT, HAAR

Steganography in Multiple Data: Review

A Review of Approaches for Steganography

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Digital Image Watermark Key Extraction with Encryption and Decryption Scheme in MATLAB

A Study Of Steganography And The Art Of Hiding Information. Alain C. Brainos II. East Carolina University

Overview Of Techniques Of Stegnography On Various Media

A Novel Method for Compressing Encrypted Images using Auxiliary Information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Adaptive Pixel Pair Matching Technique for Data Embedding

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Image Steganography by Mapping Pixels to Letters

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

(2½ hours) Total Marks: 75

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

Detect Covert Channels in TCP/IP Header using Naive Bayes

Shubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Transcription:

Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com, 2 ume2222@gmail.com ISSN:2348-6953 Abstract: This paper presents a base study of Steganography. Steganography is an important area of research in recent years involving a number of applications. In another words we can say that it is technique of hidden communication in which existence of secret hidden remains invisible. Here we have critically compared various information security methods and also have covered Steganography overview, its major types, classification with less detail of Steganalysis, which is the art and science of defeating Steganography. Keywords: Cryptography, Fingerprinting, Steganalysis, Steganography, Watermarking. 1. INTRODUCTION In the present word of communication, internet is the most popular medium now a day. But message transmission over the internet is facing some problem such as data security, copyright control etc. Security has become a critical feature for thriving networks. So we need secret communication methods. Cryptography and Steganography are well known and widely used technique that manipulates information (message) in order to cipher or hide their existence [1]. Cryptography scrambles a message by using certain cryptographic algorithms for converting (encrypt) the secret data (information) into unintelligible (cipher text ) form by using a secret key it can only be decoded (decrypted) by the party that possesses the associated key. When encrypted message crushed by someone, it is known as cryptanalysis or code breaking [2, 3]. 669 P a g e

Fig.1: Types of Information Security Fig.2: Cryptographic Flow Steganography is the activity of hiding the existence of communication. The process used in Steganography makes it tough to observe that there is a secret message inside an innocent file (cover image). By using this method anyone can hide the message itself, and the fact that you are sending the message. In this context the cover medium hide the secret information, which may be encrypted using the stego-key & get the resultant file i.e. stegomedium [2, 3]. Two other technologies that are adjacent to Steganography, one is Watermarking and another is Fingerprinting. These technologies are basically focused on the protection of intellectual property. In watermarking all the instance of an object are signed in the same way. The use of watermarking is usually a signature of signifies source or ownership for intend of copyright protection. On the other hand, distinct marks are implant on different copies of the carrier object that are provided to distinct customers. This allows the intellectual property owner to recognize customers who crack their licensing agreement by giving the stuff to third parties. In fingerprinting and watermarking the fact that data is hidden inside the files may be known by people. Sometimes it may even be visible. While in Steganography the invisibility of the information is essential [3]. 670 P a g e

Fig.3: Steganographic Flow 2. COMPARISON OF STEGANOGRAPHY, WATERMARKING AND ENCRYPTION Comparison among Steganography, watermarking and cryptography as following: [4] Table.1: Comparison of Information Security Techniques 671 P a g e

3. STEGANOGRAPHY The term Steganography came into use in 1500s after the appearance of Trithemius book on the subject steganographia. The word Steganography technically means covered or hidden writing. Its existence can be found back to 440 BC. The term Steganography was invented at the termination of the 15 th century, the use of Steganography was ancient. In the past, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits or tattooed on the scalps of salves. Invisible ink & microdots has been in demand for centuries for fun by children & students and for serious work by spies & terrorists [5]. The majority of today steganographic system uses multimedia object like image, audio, video etc as cover medium because people usually send out digital images over internet communication as email, whatsapp, facebook etc. In present time Steganography utilize the chance of hiding data into digital multimedia object and at the network packet level too. Hiding information into a medium requires following elements: 1. The cover medium (C) that will hold the secret message. 2. The secret message (M) may be plain text, digital image file or any type of data. 3. The steganographic techniques. 4. A stego-key (K) may be used to hide and unhide the message. 3.1 Classification of Steganography There are two general approaches to classify steganographic system. The first approach is based on the type of cover file while the second approach is based on the hiding method or layout of modification used in the embedding process [6]. Fig.4: Classification of Steganography Since many kid of digital media can be used as cover file of Steganography. However the properties of these cover files vary from one to another & these properties control how the secret data can be hidden in those cover file. 672 P a g e

Image Steganography: Taking the cover object as image in Steganography is known as image Steganography. Generally in this technique pixel intensities are used to hide the information. Video Steganography: It is a technique to hide any kind of files or information into digital video format. Video (combination of pictures) is used as carrier for hidden information. Generally discrete cosine transform (DCT) alter values (e.g. 5.668 to 6) which is used to hide the information in each of the image in the video, which is not noticeable by the human eye. Video Steganography uses such as H.264, MP4, MPEG, AVI or the other video formats. Audio Steganography: When talking audio as a carrier for information hiding it is called audio Steganography. It has become very significant medium due to voice over IP (VOIP) popularity. Audio Steganography uses digital audio formats such as WAVE, MIDI, AVI, MPEG or etc for Steganography. The methods are commonly used for audio Steganography are: LSB coding, Parity coding, Phase coding, Spread coding, Spread coding and Echo hiding. Text Steganography: General technique in text Steganography, such as number of tabs, white spaces, capital letters, just like Mores code and etc is used to achieve information hiding. Protocol Steganography: When taking cover object as network protocol such as TCP, UDP, ICMP, IP etc. Where protocol is used as carrier is known as network protocol Steganography. In the OSI network layer model there exist covert channels where Steganography can be achieved in unused header bits of TCP/IP fields. Regardless of the cover type used for data hiding. Steganography can be classified according to the method used to hide secret data. Accordingly there are three ways to hide secret data in cover files:- Insertion Based Method: This method depends on finding some areas in cover files which are usually ignored by applications that read this cover file and then embedding the secret data in these areas. Since this method inserts the secret data inside the cover file. The size of the stego file would be larger than the size of cover file. As a result, the contents of the cover file would not be changed after the embedding process since this method relies on accumulating or adding the secret data to the cover file. Substitution Based Method: Unlike the insertion based method, this method does not add the secret data to the cover file data. However, substitution based method depends on finding some insignificant regions or information in cover file and replacing this information with the secret data. Therefore, the size of both the stego file and the cover file are similar since some of the cover data is just modified or replaced without any additional data. However, the quality of cover file can be degrading after the embedding process. Additionally, the limited amount of insignificant information in cover file restricts the size of secret data that can be hidden. Generation Based Method: Unlike both methods explained above, this method does not need a cover file since it uses secret data to generate appropriate stego files. One of the Steganography detection techniques depends on comparing cover files with their stego files. Therefore, one advantage of the generation based Steganography is preventing such kind of detection since only stego file are available and there is no cover files used. The major limitation of this method is the limited stego files which can be generated. Moreover, the 673 P a g e

generated stego files might be unrealistic files for end users (e.g. an image contains different shapes and colour without any sense or a text without any meaning) therefore, the main media for such technique are random looking image and English text files. 4. STEGANALYSIS Steganalysis is a new research area with few write-ups appearing before the late-1990s. Steganalysis is "the approach of identifying Steganography by looking at variation between bit patterns and abnormally large file sizes". It is a process of recognizing and interpreting unusable covert messages. The purpose of Steganalysis is to discover doubtful information streams, find out whether or not they have hidden information encoded into them, and try to retrieve that secret message. [7] The problem of Steganalysis is that: 1. The doubtful information stream, such as a file or a signal, may or may not have hidden information encoded into them. 2. The secret data, if any, may have been encrypted before being inserted into the file or signal. 3. Some of the suspicious file or signal may have unconnected data or noise encoded into them for making analysis extremely time consuming. 4. Until it is possible to completely retrieve, decrypt and explore the hidden information, usually one has only a doubtful information stream and cannot be assured that it is being used for transferring secret information. 4.1 Types of Attacks Attacks and analysis on hidden information may take various forms: detecting, obtaining, and defusing, destroying or modifying hidden data. An attack process is based on what data is available to the steganalyst (A person skilled at finding messages hidden using steganography) [7]. The possible attacks on a stego media can be one of the following: 1. Steganography-only attack: Only the Steganography medium is accessible for evaluation. 2. Known-carrier attack: The original cover (the carrier) and Steganography medium both exist for analysis. 3. Known-message attack: The hidden data is identified. 4. Chosen-Steganography attack: The Steganography media and algorithms or tools are both known. 5. Chosen-message attack: A recognized message and Steganography tool or algorithms are used to produce Steganography media for future analysis and comparison. The aim of this attack is to find out related patterns in the Steganography medium that may point to the use of particular Steganography tools or algorithms. 6. Known-Steganography attack: The Steganography tool or algorithm as well as the carrier and Steganography medium, all are known. 5. APPLICATION OF STEGANOGRAPHY The sudden advent in the Steganography technologies suggests the great demand of robust Steganography systems. These systems cover vast application areas. A few most common 674 P a g e

applications are Owner Identification, Copy Protection, Broadcast Monitoring Medical applications, Fingerprinting, Data Authentication etc. 6. CONCLUSION Steganography is related to Cryptography. These both techniques are used for security purposes but they both have different approaches or implementation. Steganography hides the information in information, so it hides the existence of the communication. Another way is to deform the secret data into an unusable or non-interpretable form is called cryptography. At last if some secret data having the owner identification is hidden in the medium to claim the originality of the medium, this process is called watermarking. Steganography classify by two types: according to type of cover image (text, audio, video, image, and network) & according to the method used to hide data (insertion, substitution, generation). Attacks on methods of Steganography are called Steganalysis. Now a day s Steganography has a vast application area in digital world. REFERENCES [1]. Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique, International Journal of Computer Applications (0975-8887) Volume-9 No. 7, November 2010. [2]. Sujuy Narayana, Gaurav Prasad, Two New Approaches for Secured Image Steganography Using Cryptography Techniques and Type Conversions, Signal & Image Processing: An International Journal (SIPIJ), Vol. 1, No. 2, December, 2010. [3]. M. Sitaram Prasad, S. Naganjaneyulu, Ch. Gopi Krishna, C. Nagaraju, A Novel Information Hiding Technique for Security By Using Image Steganography, Journal of Theoretical & Applied Information Technology (JATIT) 2005-2009. [4]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, Elsevier, Signal Processing, 2009, pp. 727-752. [5]. U. Rizwan, H. Faheem Ahmed, A New Approach In Steganography Using Different Algorithms and Applying Randomization Concept, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 9, November 2012. [6]. Mehdi Hussain, Mureed Hussain, A Survey of Image Steganography Techniques, International Journal of Advanced Science & Technology, Vol. 54, May, 2013. [7]. Vijay Kumar Sharma, Vishal Shrivastava, A Steganography Algorithm for Hiding Image in Image by Improved LSB Substitution by Minimize Detection, Journal of Theoretical and Applied Information Technology, Vol. 36, No. 1, February, 2012. 675 P a g e