Image and Audio Steanography
Image and Audio Steanography
Image and Audio Steanography
COLLEGE
(AFFILIATED TO POKHARA UNIVERSITY)
BUDDHANAGAR, KATHMANDU
SUBMITTED BY
SUBMITTED TO
DEPARTMENT OF ELECTRONICS AND COMPUTER ENGINEERING
EVEREST ENGINEERING AND MANAGEMENT COLLEGE
BUDDHANAGAR, KATHAMANDU
September, 2017
DIGITAL STEGANOGRAPHY
Submitted by
Submitted to
Department Of Electronics and Computer Engineering
Everest Engineering and Management College
Buddhanagar, Kathamandu
September,2017
COPYRIGHT
The author has agreed that the library, Everest Engineering and management
Collage, may make this report freely available for inspection. Moreover the author
has agreed that permission for extensive copying of this project report for
scholarly purpose may be granted by the lecturers, who supervised the project
works recorded herein or, in their absence, by the Head of Department wherein
the project report was done. It is understood that the recognition will be given to
the author of the report and to the Department of Computer and Electronics,
EEMC in any use of the material of this project report. Copying or publication or
other use of this report for financial gain without approval of the Department and
author’s written permission is prohibited. Request for permission to copy or to
make any other use of the material in this report in whole or in part should be
addressed to:
Head
Department of Computer and Electronics Engineering
Everest Engineering and Management College
Buddhanagar, Kathmandu
Nepal
CERTIFICATE
The undersigned certify that they have read and recommended to the Department
of Electronics and Computer Engineering for acceptance, a project report entitled
“Digital Steganography”, submitted by Kamal Thapa,Kundan Puri,Prashanna Puri
,Pratik Neupane in partial fulfillment of the requirement for the Bachelor’s degree
in Computer Engineering.
Supervisor:
...................................
Ranjan Adhikari
Lecturer
External Examiner:
...................................
Name of External
examiner
Designation
ACCEPTANCE
……………………………..
Yangya Murti Pokhrel
Principal
Everest Engineering and Management
College,
Kathmandu, Nepal.
……………………………..
Nabin Thapa
Head of the Department
Department of Electronics
and Computer Engineering,
Everest Engineering and
Management College,
Kathmandu, Nepal.
ACKNOWLEDGEMENT
We are also obliged to our parents for their continuous support and
encouragement. The credit to our success goes to all those people who have
helped us directly and indirectly.
Project Members:
i
ABSTRACT
Steganography is the art and science of writing hidden message in such a way
that no one apart from the sender and intended recipent even realizes there is a
hidden message.There are often cases when it is not possible to send messages
openly or in encrypted form. This is where steganography can come into play.
While cryptography provides privacy, steganography is intended to provide
secrecy. Steganography is the art of hiding the fact that communication is taking
place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their
frequency on the Internet. For hiding secret information in images, there exists a
large variety of steganographic techniques some are more complex than others
and all of them have respective strong and weak points. Different applications
have different requirements of the steganography technique used. For example,
some applications may require absolute invisibility of the secret information,
while others require a larger secret message to be hidden. This project intends to
give an overview of image steganography, its uses and techniques. It also supports
steganography in Audio files. For a more secure approach, the project encrypts the
message using secret key and then sends it to the receiver. The receiver then
decrypts the message to get the original one
This project deals with hiding of text behind multimedia,i.e digital images,wave
audio,realmedia audio etc. Cryptographic ciper is used before hiding text to make
this procedure more secure.The GUI has been given a funky look.
Key Words:
ii
Contents
ACKNOWLEDGEMENT .............................................................................................. i
ABSTRACT ...................................................................................................................ii
Background ........................................................................................................ 1
Objectives .......................................................................................................... 4
Applications ....................................................................................................... 5
Algorithm ......................................................................................................... 21
iii
3.2.3 Algorithm to encode the message in audio ............................................ 22
3.2.4 Algorithm to decode the message in audio ............................................ 23
MODULE DESCRIPTION ............................................................................. 29
Result ............................................................................................................... 30
Limitations ....................................................................................................... 34
Conclusion ....................................................................................................... 35
REFERENCES ............................................................................................................ 36
iv
LIST OF FIGURES
FIGURE PAGE
v
LIST OF TABLES
TABLE PAGE
vi
LIST OF ABBREVIATION
vii
CHAPTER 1: INTRODUCTION
Background
Traditional means are used for encryption of stenographic messages and then the
cover text is further changed in some or other manner. The encrypted message
results in stegotext. Letter size, typeface, spacing and other convert text
characteristics can changes are made to execute the hidden message. This means
that only the receiver of the message can recover and decryption it. Stenographic
coding present in a transport layer likeMP3 file and protocol like UDP are then
used in the electronic communication system.
For transmission of data safely and securely the stenographic system is used and it
also enables safe storage of data in the network. There are many files that are
important and include confidential data, they can be stored in encrypted form in
the server. These files can be used only by authorized users.
Transmission of these files can be made possible only in the form of encrypted
data and it does not disclose the message to the intruders. This means that the
hackers and intruders will not able to make out any meaningful information during
the transit. Moreover before trying to use the files the users need to enter the
1
system with the help of valid password and user id that is allotted by the
administrator to him.
Cryptography – the science of writing in secret codes – address all of the elements
necessary for secure communicaation over an insecure channel, namely privacy,
confidentiality, key exchange, authentication and non-repudiation. But
cryptography does not always provide safe communication. Consider an
environment where the very use of encrypted messages causes suspicion.
Consider the following text file; what else is it likely to be if not encrypted?
The message above is a sentence in english that is encrypted using Pretty Good
Privacy (PGP), probably the most commonly used e-mail encryption software
today.
2
Whereas the goal of cryptography is to make data unreadable by a third party, the
goal of steganography is to hide the data from a third party. Often, steganography
and cryptography are used together to ensure security of the covert message.
Steganography is a very interesting and advantageous science these days and has
following uses:
Digital Watermaking
3
Problem Statement
The problem in the hiding information or Steganography is the size of data that
user want to embed inside the multimedia file, image is one of the multimedia file,
the most commend method for hiding information in the image is LSB, LSB is
efficient instead of that it’s not easy to analysis, however, it is not effective in
term of the data hidden quantity, all researchers agreed the fact that the size of
data hidden is a problem in that particular area, the other problem that faced there,
in fact if we try to increase the quantity of data in the image there will be a suspect
changes which become clear to human eyes, for instance, this research will face a
challenge that high rate data hidden without affecting the images quality.
Objectives
4
Applications
As our project is mainly used for hiding and retrieving secret messages. The major
area of application is listed below:
Digital Watermaking
Adding fictional names to mailing lists
Providing message secracy to users
Hiding the text message in an image file or an audio WAV file.
Encryption of the same message, so as to support more secure steganography.
The decoding of the message, decryption and source message retrieval are also
supported
Project Features
We are able to integrate some good features in our application. Some of the plus
points of our program are:
5
Feasibility Analysis
Our project requires a PC and JAVA. As JAVA has its slogan “Write Once, Run
Anywhere”, our project will be easy to run. So, operating system services of
various operating systems allow for feasible implementation of this system. As
this Service can be implemented as a stand-alone application and it satisfies
technological hardware and software capabilities of presently available personal
computers, the proposed project is technically feasible.
The proposed software will be easy to install and with short installation time.
The system will have user friendly interface.
6
System Requirement
7
Overview of report
The third chapter of our project includes the Methodology where we have
described about the project plans and tools the algorithm of our project where we
have defined how to encode the message in image as well as how to decode the
message from image .we have also included the algorithm to encode message in
audio and also the algorithm to decode the message from audio. Even the module
description has been included in the topic.
8
CHAPTER 2: LITERATURE REVIEW
Antiquity Steganography is far from new, and its initial simplicity has grown in
sophistication since its inception. Just as cryptography dates back to antiquity and
specifically Julius Caesar, recorded uses of steganography go back to ancient
Greece. The historian Herodotus reported in about 474 B.C. how Histaeus of
Miletus concealed messages by tattooing them on the shaved scalp of slaves and
waiting until regrown hair hid them [Kahn, 1996]. Less invasive forms of
steganography soon appeared. The Greek soldier Demeratus inscribed a message
that King Xerxes planned to invade Greece on the wood under the wax on a
writing tablet. Mathematicians in China and Italy created similar techniques
independently [Katzenbeisser and Petitcolas, 2000].
Middle Ages to Victorian Age In the Middle Ages, two authors wrote seminal
works on steganography. Johannes Trithemius (1462–1526) wrote the three
volumes of Steganographia (ca. 1499) which superficially describes black magic
but contains treatises on cryptography and steganography hidden by simple
substitution methods. More than a century later, Gaspari Schotti
Twentieth Century and Beyond As late as World War II, spies and resistance
fighters wrote messages with invisible ink (juices, urine, or milk) and revealed the
message by heating the document. The invention of microfilm allowed hiding
microscopic images under fingernails in the Russian war of 1905 and the use of
9
microdots in World War I [White, 1989]. The advent of computers, and especially
the development of the Internet, has moved steganography into the digital realm.
International workshops on information hiding and steganography have been held
regularly since 1996 [Moulin and O’Sullivan, 2003]. In the first International
Workshop on Information Hiding, participants defined the following terminology
in steganography. The embedded data is the information to be hidden in the cover:
the original, innocent file such as an image, audio, text, or video. The process
itself is labeled embedding, and the cover and embedded data together form the
stego data [Pfitzmann, 1996]. These definitions are still valid, with the caveat that
the variety of carriers has increased. As we will discuss later, entire file systems
can be used as steganographic systems. Since the first workshops on information
hiding in the 1990s, the majority of development and use of computerized
steganography has occurred since 2000 [Cole, 2003]. Steganography can hide in
Internet telephony systems such as Skype [Mazurczyk and Szczypiorski, 2008].
Purdue University research found evidence of criminals using steganography
tools, mainly in child pornography and financial fraud [Higgins, 2007]. In 2010,
Russian spies used steganography software developed by the Russian intelligence
service SVR to communicate with each other and their agencies [Higgins, 2010]
One of the latest techniques that have been used in this area by researchers at the
Mount Sinai School MOUNT SINAI Medical in New York New York in 1999, as
they managed to hide the secret texts in Chromosome Strand human DNA by
using a technique called genetic system coverage (Genomic Steganography[1]),
and by placing signs resolution to be agreed upon in the nuclei chromosomes and
then integrate these with millions sentences and sent to the other end. To extract
the secret message is 4 soaking get special distinction sentences used on the other
and then placed under the microscope to extract the required text.(Clelland, Risca
& Bancroft, 1999). The oldest Authentications on Steganography taken from the
legendary stories Greeks Herodotus and then back to the fifth century BC, these
sources indicate that they felt they fly head of the Messenger and then write the
secret letter in the head (Flores, 2001), leaving hair to grow then be sent to the
required which is a re-extraction letter. (Johnson & Jajodia, 2001; Zaidan., 2008).
Authentications and other writing secret messages on the wood panels and then
10
covered wax and will be hid those writing panels appear free of anything. And
they were killing their animals as rabbit example corner confidential letter inside
it. Other means that the common use since the first century AD, invisible inks
Invisible Inks, which was able to write a confidential letter with any other
nonvalue-confidential and usually write between lines, for example those rabbis
some fruit juices Fruit Juices, milk, urine, vinegar, and all these species become
dark and visible when exposed to heat the written document.
Least Significant Bit (LSB) is the bit position in a binary integer giving the units
value, that is, determining whether the number is even or odd. The LSB is
sometimes referred to as the right-most bit, due to the convention in positional
notation of writing less significant digits farther to the right.
• LSB (Least Significant Bit) substitution is the process of adjusting the least
significant bit pixels of the carrier image.
• It is a simple approach for embedding message into the image / audio.
• The Least Significant Bit insertion varies according to number of bits in an
image / audio.
As image is consist of pixels and each pixel have various color value. But in our
project we use only red, green and blue color binary values from various pixels.
11
By using the LSB approach we can change the least significant bit of those values.
The message is stored in text file. Any text file consists of streams of character ,
each character is 1 byte (ASCII code) each byte as all of us of course know
consists of 8 bits.
12
The least significant bit of the image pixels as shown is changed according to the
binary equivalent of the message. And thus obtained new pixels is again generated
as a new image.
An audio is first sample as 16 bit audio stream. The message is stored in 16 bit
binary value as mentioned above. The rest of the audio will remain same. Thus
stored message is encoded to least significant bit of the audio as shown below:
The changing of the least significant bit of the audio/image is done using
XORING method. Following table shows the XORING method.
13
Table 2.1 : XORING Method
Case Study
As our project is a research based project. Many research are being held in
different universities about the steganography. Among them a research is still
undergoing on University of Pretoria, Pretoria, South Africa. T. Morkel, J.H.P.
Eloff, M.S. Olivier has been handling this research under Information and
Computer Security Architecture (ICSA) Research Group.With the help of this
research document we are handling our project.
14
CHAPTER 3: METHODOLOGY
This project has mainly one part that is front end. Front end handles task related
to user interface. This project requires wide knowledge of JAVA .
The tools that will be used for the project are listed in the table below:
15
Fig3.1 : Incremental Model
16
SOFTWARE DESCRIPTION
17
Java ensures portability in two ways. First, Java compiler generates byte
code instructions that can be implemented on any machine. Secondly, the sizes of
the primitive’s data types are machine-independent.
3.2.4 Object-Oriented
Security becomes an important issue for a language that is used for programming
on Internet. Threat of viruses and abuse of resources is everywhere. Java systems
not only verify all memory access but also ensure that no viruses are
communicated with an applet. The absence of pointer in Java ensures that
programs cannot gain access to memory locations without proper authorization.
3.2.6 Distributed
18
3.2.7 Simple, Small and Familiar
Java is a small and simple language. Many features of C and C++ that are
either redundant or sources of unreliable code are not part of Java. For example,
java does not use pointers, preprocessor header files, go to statement and many
others. It also eliminates operators overloading and multiple inheritance.
Familiarity is another striking feature of Java. To make the language look
familiar to the existing programmers, it was modeled on C and C++ languages.
Java uses many constructs of C and C++ and therefore, Java code “looks like a
C++” code.
19
3.2.10 Dynamic and Extensible
Java programs support functions written in other languages such as C and C++.
These functions are known as native methods. This facility enables the
programmers to use the efficient functions available in these languages. Native
methods are linked dynamically at runtime.
20
Algorithm
21
3.3.2 Algorithm to decode the message in image
22
3.3.4 Algorithm to decode the message in audio
The audio file “output.wav” which has the message hidden into it.
Select From the offset that was specified at the sending side(i.e. 500) , take the
LSB of the next 8 bytes to get the length of the message (that was encoded in
the first 8 bytes from the given offset) which will help us to get the encoding
message only from the next 8 * length bytes of audio file.
Create a byte from the LSB of the next consecutive 8 bytes and go on printing
each of the character of the message string in the textbox.
Continue this process till the length of the string is reached. - Hence finally we
get the hidden message from the received audio file into the provided textbox.
-
Thus we have achieved the process of decoding a message from the audio file.
23
Use Case diagram for our design is :
Loading Picture
User 1
Entering Secret Information
24
Loading Stegano
Medium
Receiver
Getting Secret Information
25
Class diagram for our design is :
26
Activity diagram of our system is:
Start
Start Stegano
Application
Select Operation
Hide Break
Extract Secret
Generate Stegano Information
Medium
End
End
27
Architecture of our system is:
Secret Information
Stegano Medium
Secret Information
28
MODULE DESCRIPTION
29
CHAPTER 4: RESULT CONCLUSION AND
RECOMENDATION
The result of our digital steganography is not still fully favorable in diminished
environment with some slight degradation in audio quality. Our stenographic
output was 90% accurate in low bit text. The changes have been affective more
than before. The conversion from text to image and audio has been very much
effective in processing the image and audio.
The Analysis of this application has given us very much knowledge to process any
text to image and audio files which can be used as a secret medium for
programming purpose. The final results analyzed have given us the probable
accuracy determination for the application to be developed. For further
development of the algorithm for detection of text different image and audio
processing concept can be implied in the future.
The application development environment we used which is the net beans IDE has
helped us very much as it is real time complier of the source code and unlike other
IDE for app development; it contains debugging which is very much helpful for
directly compiling the project to our device at the same time.
30
Output Screenshots
31
fig 4.1.2 : Image Decrypt
32
fig 4.1.4: Audio Decrypt
33
Problems Faced
Following are the problem faced during the making of our project.
Limitations
1. Message in image and audio will remain hidden until and unless same
decoding algorithm is used to decode.
2. Quality of the audio may be degraded.
3. When size of message is more than the size of the image some of the data in
the message may get loss.
34
Conclusion
The project was completed successfully to build a tool called – Hiding in Plain
Sight. This tool can be used for hiding the text message in the image or the audio
files. Also, the message that is sent can be encrypted, so as to support secure
steganography. Regardless, the technology called steganography is easy to use and
difficult to detect. The more that you know about its features and functionality, the
more ahead you will be in the game. The development of the system includes the
user 1 and the user 2. System requirements were properly studied and the
processes were implemented using software engineering approach.
In the course of developing this system, we as a team learnt a lot. First and
foremost we learnt the importance of team work. Respecting each other’s work
and appreciating it encouraged us to move ahead and push our limits. The
platform we had chosen for this project was new to us so, it was a challenge but it
helped broaden our horizon of knowledge.
35
Future Enhancements
36
REFERENCES
37