0% found this document useful (0 votes)
91 views4 pages

Analysis of Stenography

Ransacking for just the right article is the foremost preferred and is sort of challenging to look out supported the current requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views4 pages

Analysis of Stenography

Ransacking for just the right article is the foremost preferred and is sort of challenging to look out supported the current requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Analysis of Stenography
Udit Kalra
1
B.Tech Scholar, Department of IT, Maharaja Agrasen Institute Of Technology, Delhi

Abstract:- Ransacking for just the right article is the disadvantage is that if someone gives sufficient time, then
foremost preferred and is sort of challenging to look out the person can easily decrypt the encrypted text.
supported the current requirements. With the
advancement in technology day by day, the occurrence To overcome this issue data is embedded within some
of hacking is increasing very often. In these modern digital media in such a way that nobody can easily extract it.
times, the area of cybersecurity is in desperate need of This better solution is stenography.
prevention from hacking. Gone are those days when
firewalls were handy to protect your data. We require to Steganography is the practice of hiding a message, an
try to do this individually to prevent cybercrime. In image, a file or any significant data within another message,
keeping with Kaspersky Labs, the standard cost of a image, or file to make sure it is safe.
cyber-breach is $1.23 million. This paper is on the brink
to give the simplest possible ways to assist and helping to Unlike cryptography, stenography's goal is to
secure data by concealing. Security of data has become a thoroughly hide the presence of any data rather than hiding
vital challenge because of common vulnerabilities and its content. Imperceptibility, embedding dimensions and
day-to-day hacking. Data Hiding/ Encapsulation can be robustness are the major problems with image
done in many ways. Some methods to protect your data steganography.
are cryptography and steganography. Once you know
that your data is safe and cannot be misused by someone, The main objective of this project is to classify the
I think when might be less accentuated. Steganography, different types of stenographic methods, their advantages
a non-orthographic and syllabic-ideographic and their implementation [16]. This paper has been divide
orthography, maybe a model to research different into many sections. The previous one was abstract. Section I
hemispheric reading processes in Western subjects. I is that the introduction of the subject. Section II is about
have thoroughly researched the most general Related Work. It contains information about the topic and
stenographic methods and created a live environment to some work related to this paper. In, Section III there is a
hide your message using an image. During this paper, I comparison between stenography and cryptography. Section
have discussed in detail what steganography is. What are IV is about the methodology of stenography is performed.
its advantages? Its types and finally discussed about the Section V is about the implementation and result. It contains
environment which I created. snapshots of how encryption and decryption were done.
Section VI is all that says the conclusion and future scope on
Keywords:- Hacking, Cyber Security, Data Hiding, my research. In the end, there are some References to some
Application Security, Encapsulation, Cryptography, other research papers.
Steganography.
II. RELATED WORK
I. INTRODUCTION
Stenography's first use has been traced back to 440 BC
In this world of digitalization, several businesses and when ancient Greece people wrote messages on wood and
corporations are often the victims of malicious attacks by coated it with wax, which acted as the means of covering
hackers who wish to steal customer data. Several companies [9]. Also, Romans used various types of Invisible In1ks.
understand the use of the word protection and as a result, And to decipher these hidden messages, light or heat were
they use various cryptographic techniques to encrypt their the means used. During World War II, the Germans
data and decrypt it in future when required to be used. A introduced microdots. Here, they reduced the size of every
minute change or a minute error can cause colossal damage file to the size of a dot and attached it with the paperwork.
[16]. Therefore handled carefully to allow the best possible Now, we have many modern stenographic techniques and
results. Many researchers try to search for a praiseworthy tools to make sure that our data remains secret [14]. The
solution to unravel these problems. most suitable cover media for stenography is image
stenography. Other types of stenographic methods are text,
The growing use of the web must store, send and video, audio and network stenography.
receive personal information in an exceedingly secured
manner. For this, we may adopt an approach that may Types of Stenography
transfer the data into different forms through encryption and
then convert it into the original format using decryption [4], 1. Text Stenography
[6], [9]. However, this method has a disadvantage. The Text Steganography, as the name suggests, means
hiding information inside the text files [2], [17]. It involves

IJISRT21JUN243 www.ijisrt.com 35
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
process like changing the form of existing text, changing three techniques for message hiding, the transform
terms within a text, creating random character sequences, or technique has been employed in embedding the message by
making use of context-free grammars to come up with changing coefficients during a transform domain.
readable texts [7]. Different methods accustomed to
covering the data within the text are Format Based Method, After going through these five types of stenography, I
Random and Statistical Generation, and Linguistic Method. created an environment that works on Image stenography.
Here one can store a message in an image, maintain more
2. Audio Stenography security and use comparatively less space.
In audio steganography, the information is hidden
inside an audio signal which modifies the binary sequence III. STENOGRAPHY AND CRYPTOGRAPHY
of the analogous audio file [17]. Hiding a secret message
inside the audio is a way tougher process than compared Stenography and cryptography are closely related.
with others like Image or Text Steganography [7]. Different Cryptography jumbles messages in such an order that one
methods accustomed to covering the data with audio include cannot understand them [3]. Whereas in steganography, the
Least Significant Bit Encoding, Parity Encoding, Phase message is hidden so that there is no awareness of the
Coding and Spread Spectrum. In this method, the data is existence of a message. In cryptography, the structure of
hidden with WAV, AU, and MP3 type sound files. data can be altered, whereas, in stenography, the structure of
data remains the same. Stenography supports only
3. Video Stenography Confidentiality and Authentication whereas, Cryptography
In Video stenography, the information is hidden inside supports all Confidentiality, Authentication, Data Integrity
a video type format [17]. The advantage of this type of and Non-repudiation [15]. The message in stenography may
stenography is that a lot of data can be hidden, and the or might not be encrypted. If it's encrypted, then a
reason is the size and the fact that it is a moving stream of cryptanalysis technique is applied to extract the message.
images and audios. One can say that this is the combination Sometimes, sending an encrypted message can arouse
of Image Steganography and Audio Steganography [7]. Two suspicion while an invisible message will not do so. But,
main categories of Video Steganography comprise: both methods combined can provide better protection of a
Embedding data in uncompressed raw video and message. In case one method fails the message can be
compressing it later or Embedding data directly into the detected. But, it will be of still of no use because it is also
compressed data stream. encrypted using the second method.

4. Network Stenography (Protocol Stenography) IV. METHODOLOGY


In this stenography, the information is embedded
within network control protocols utilized in data In this section, we discuss a method for image hiding
transmission like TCP, UDP, ICMP and more. One can use where we store our message in an image file. The primary
this steganography in some covert channels that, can be objective is to use the steganography technique to provide
easily found within the OSI model [7]. An example, one can more security and simultaneously using less storage [1].
hide information within the header of a TCP/IP packet in
some optional fields. The tool creates a canvas with an image uploaded and
an identically sized canvas with the text entered by the user.
5. Image Stenography It then searches through every pixel of the text canvas and if
Image Steganography means hiding information inside it sees black, it knows the pixel its viewing is also a
the image files [5]. In the digital type of steganography, component of the message. It'll find the pixel at the same
image stenography is a widely used cover source because point in your image canvas and ensure that the green value
there are a large number of bits present in the digital of the RGB ends in an exceedingly very 7. If it sees white or
description of an image. Different methods accustomed to transparent, it knows that it is not on the text entered and can
covering information with images include Substitution, confirm the identically located pixel on your image canvas's
Masking and Filtering, Transform Technique, and Least green value doesn't end in 7. After this has been performed
Significant Bit Technique [10], [11]. on the whole image, we now have a picture where every
pixel's green value doesn't end during a 7, except where it'll
The substitution method commonly doesn't expand the spell a message. The decode function reverses the above
scale of the file [4], [6]. Depending on the scale of that process by using the pixels of the uploaded image as it hides
hidden image, it eventually causes a coherent change from any pixel where it does not find any green value ending at 7.
the unmodified variant of the image. The Least Significant
Bit (LSB) insertion technique is an approach for securing The working of this model is quite simple. In the first
data in a very cover image. When operating a 24-bit image, step, the user has to enter a message in a text area. After
one tiny bit of each of the first color components is used for entering that message, the user has to upload an image from
LSB [12], [18]. The masking and filtering techniques start his system. Once that image is uploaded, the text and the
with the interpretation of the image. Subsequent, we image overlap, and we can only see the image. Dimensions
discover the various places where the hidden message is of both text and image are the same, which means their
combined to hide the image, and lastly, we embed the width and height are the same so that only the image is
information in a particular area. In addition, to the above visible. This phase is called the encryption phase.

IJISRT21JUN243 www.ijisrt.com 36
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
After this, the user has to download this image. Once These are the steps one needs to follow:-
downloaded, the user can decrypt to get the hidden message.
For decryption, the user has to upload the downloaded 1. Enter your message :-
image, and once it is done, the entered message is displayed A text area is displayed, and the user has to enter the
as the output. message which he/she wants to hide.

Fig 2. Entered a message in the text area- “This is the


message to be hidden”

Fig 1. Process of Image Stenography [19] 1. Upload your image:-


After entering the text, the next step is to upload an
V. IMPLEMENTATION AND RESULT image to perform encryption.

[13] The following diagram makes easier to grasp how


we proceeded:-

Fig 3. Uploaded image- “my image.jpeg”

2. Download the encrypted image:-


Once the image is uploaded, the text and the image
overlap, both having equal dimensions in terms of height
and width. After this, the user has to download the
encrypted image.

Fig 4. Downloaded the image and saved as- “encrypted


image.png”

3. Upload the new image for decryption:-


Once downloaded, the user can decrypt the image to
get the hidden message. For decryption, the user has to
Fig 1. Working of the project upload the downloaded image.

IJISRT21JUN243 www.ijisrt.com 37
Volume 6, Issue 6, June – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
REFERENCES

[1]. Rajesh Kumar Tiwari, and Gadadhar Sahoo, “Some


New Methodologies for Image Hiding using
Stenographic Techniques”
[2]. Donovan Artz “Digital Steganography: Hiding Data
within Data”
[3]. Arvind Kumar, and Km.Pooja, “Stenography- A Data
Hiding Technique”
[4]. M.M Amin, M. Salleh, S. Ibrahim, M.R. Katmin, and
M.Z. I. Shamsuddin, “Information hiding using
Steganography”
Fig 5. Uploading the encrypted image for decryption. [5]. Mehmood, and Shah, “An overview of image
steganography”
4. Hidden message displayed:- [6]. Bret Dunbar, “A Detailed Look at Steganography
Once the encrypted image is uploaded, decryption techniques and their use in an Open Systems
takes place, and the hidden message is displayed. Environment”
[7]. Harjit Singh, “Analysis of Different Types of
Steganography”
[8]. J. L. Arnott, A. F. Newell and A. C. Downton, “A
comparison of plan type and stenograph for use in
speech transcription for the deaf”
[9]. Fabien A.P. Petitcolas, R.J. Anderson, and M.G. Khun,
“Information Hiding- A Survey”
[10]. Mehdi Hussain, and Mureed Hussain, “A Survey of
Image Steganography Techniques”
[11]. S Uma Maheswari, and Jude Hemanth D “Different
methodology for image steganography-based data
hiding”
[12]. Rajesh Kumar Tiwari, and Gadadhar Sahoo, “Some
Fig 6. Hidden message displayed New Methodologies for Image Hiding using
Stenographic Techniques”
VI. CONCLUSION & FUTURE SCOPE [13]. Chin-Chen Chang, Iuan-Chang Lin, and Yaun-Hui
YU, “A new Steganographic method for color and gray
In this paper, we have discussed five types of different scale image hiding”
methodologies for image hiding based on steganography [1]. [14]. Venkatraman. S, Ajith Abraham, Marcin Paprzycki
Steganography is beneficial for hiding messages for “Significance of Steganography on Data Security”
transmission. Steganography's purpose is to hinder the [15]. Hans Delfs, and Helmut Knebl, “Introduction to
transmission of malicious data. When properly Cryptography”
implemented, steganography is usually very difficult to [16]. Udit Kalra, “CSRF and XSS Attacks and Defense
detect but is not impossible. Digital image stenography and Mechanisms”
others are constantly growing in both use and application [17]. Navneet Kaur, and Sunny Behal “A Survey on various
and will continually develop new techniques to provide types of Steganography and analysis of Hiding
better protection. Techniques”
[18]. K.B. Raja, C.R. Chowdary, Venugopal K R, and L.M.
In the future, the principal use of stenographic Patnaik “ A Secure Image Steganography using LSB,
techniques will presumably be lying within the field of DCT, and Compression Techniques on Raw Images”
digital watermarking [3]. Content providers are continuously
trying to protect their copyrighted works against
unauthorized distribution and digital watermarking.
Stenography may provide a way of tracking the owners of
those who are using these unlawful means. Another possible
use of these stenographic techniques in the future can be
hiding data on the network in case of a breach, Posting
secret communications on the net to avoid transmission, and
more.

IJISRT21JUN243 www.ijisrt.com 38

You might also like