Fdocuments - in About Steganography
Fdocuments - in About Steganography
Y
SUBMITTED BY-
MAYANK JAISWAL(0900410041)
SUDHANSH GUPTA(0900410077)
Outline
• What is Steganography ?
• Steganography – History
• Watermarking and Cryptography
• Steganography vs. Cryptography
• Steganography vs. Watermarking
• Steganography – Carrier Files
• Modern Steganography Techniques
• Basics of Modern Steganography
• Important Requirement for Steganographic System
• Uses for Steganography
• Steganography – Tools
• Detection of Steganographic Content/Countermeasures
• Existing Steganographic Techniques
• Existing Attacks
• Conclusion
• Reference
What is Steganography ?
• Both Axis and Allied spies during World War II used such
measures as invisible inks using milk, fruit juice or urine
which darken when heated.
• It’s also a very good Anti-forensics mechanism to mitigate the
effectiveness of a forensics investigation
• In ancient Greece they used to select messenger & shave their
head, they would then write a message on their head, once the
message had been return the hair was allowed to grow back
after the hair grew back the messenger was sent to deliver the
message, the recipient would shave off the messengers hair to
seethe secret message
Watermarking and Cryptography
There are two major branches of information hiding, Cryptography and Watermarking.
Watermarking :-
• Communication in watermarking is the host signal, with the embedded data
providing copyright protection.
• The existence of a watermark is often declared openly.
• Any attempt to remove or invalidate the embedded content renders the host
useless.
Cryptography :-
• Doesn’t conceal the communication.
• Scrambles the data to prevent eavesdroppers understanding the content.
• Cryptography involves various methods and implementations.
• May be considered complementary and orthogonal (unrelated).
Security level
Figure-2
Steganography vs. Cryptography
Figure-3
Steganography – Carrier Files
Figure-4
fE: steganographic function "embedding"
fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
Important Requirement for
Steganographic System
1. Security of the hidden communication
Figure-5
Uses for Steganography
• Covert communications
Privacy
Espionage
Terrorism
Criminal activities
• Intellectual property protection
Digital watermarks
Digital signatures
Steganography - Tools
• Steganos
• S-Tools (GIF, JPEG)
• StegHide (WAV, BMP)
• Invisible Secrets (JPEG)
• JPHide
• Camouflage
• Hiderman
Many others…
Detection of Steganographic
Content/Countermeasures
The detection of steganographically encoded packages is called
Steganalysis.
• Visual Analysis tries to reveal the presence of secret
communication through inspection, either with the naked
eye or with the assistance of a computer.
• Statistical (Algorithmic) Analysis reveals tiny alterations
in an image's statistical behavior caused by steganographic
embedding.
• The nominally universal methods developed to detect
embedded stego-data are generally less effective than the
steganalytic methods aimed at specific types of
embedding.
DIFFERENT KINDS OF STEGANOGRAPHY
The four main categories of file formats that can be used for
steganography are:
I. Text
II. Images
III. Audio
IV. Protocol
Text steganography: Hiding information in text is the most important
method of steganography. The method was to hide a secret message in every
nth letter of every word of a text message. After booming of Internet and
different type of digital file formats it has decreased in importance. Text
stenography using digital files is not used very often because the text files
have a very small amount of redundant data.
Text steganography can be classified in three basic Categories:-
• Format-based
• Random
• Statistical generation and linguistic method.
Figure-6
Image steganography: Images are used as the popular cover objects for
steganography. A message is embedded in a digital image through an
embedding algorithm, using the secret key. The resulting stego image is
send to the receiver. On the other side, it is processed by the extraction
algorithm using the same key. During the transmission of stego image
unauthenticated persons can only notice the transmission of an image but
can’t guess the existence of the hidden message.
Figure-7
Audio steganography: Audio stenography is masking, which
exploits the properties of the human ear to hide information
unnoticeably. An audible, sound can be inaudible in the presene of
another louder audible sound .This property allows to select the
channel in which to hide information.
Figure-8
Protocol steganography: The term protocol
steganography is to embedding information within
network protocols such as TCP/IP. We hide
information in the header of a TCP/IP packet in some
fields that can be either optional or are never used.
Existing Steganographic Techniques
Spatial Domain:- These techniques use the pixel gray levels and
their color values directly for encoding the message bits.
2. It was found that the calibration step is indeed able to estimate image model.
To counter this a generalized framework has been proposed which disturbs this
model estimation of the attack.
4. Like this our security will remain consistent. Like this proposed algo will be
successful in breaking calibration based blind attacks.
Reference
Park,S.K, and Miller, K.W. (1988). "Random Number Generators: Good
Ones Are Hard To Find". Communications of the ACM 31 (10): 1192–
1201.
C. Kurak and J. McHugh, “A Cautionary Note On Image
Downgrading,” Proc. IEEE Eighth Ann. Computer Security
Applications Conf., IEEE Press, Piscataway, N.J., 1992
Websites:-
http://www.jjtc.com/Steganography/
http://azhar-paperpresentation.blogspot.in/2010/04/steganography-and-
digital-watermarking.html
THANK YOU