Chapter 9-Data Hiding and Steganography
Chapter 9-Data Hiding and Steganography
2
Introduction
3
Motivation
4
Steganography and
Cryptography
Steganography and Cryptography are closely related
The difference is in their objectives
Cryptography: although encrypted and unreadable, the
existence of data is not hidden
Steganography: no knowledge of the existence of the data
Steganography and Cryptography can be used together
to produce better protection
5
Steganography and
Cryptography
Confidentiality
6
Steganography and
Watermarking
Digital watermarking hides data in a file
The key difference is their objectives
Steganography: hiding information
Watermarking: extending the file with
extra information
Steganographic information must never
be apparent to a viewer unaware of its presence.
7
Basic Principle in
Steganography
Types of Steganography
Fragile
Hidden information destroyed as soon as object is modified
Protocols tend to be easy to implement
Useful in proving objects have not been manipulated and
changed e.g. evidence in a court of law
Robust
It should be infeasible to remove the hidden data without
degrading the perceived quality of the data
Protocols are more complex
One single protocol may not withstand all object
manipulations
Useful in copyright watermarking
Types of Digital
Steganography
Hiding a Message inside Text
First-letter algorithm
Every n-th character
Using a publicly available cover source
Altering the amount of whitespace
Hiding a Message inside Images
Least-significant bit (LSB) modifications
Masking and Filtering
Hiding a Message inside Audio and Video Files
Examples of Text
Steganography
Using 1st letter of each world
"PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE
NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW.
STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS.
YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT
IMMENSELY."
Secret message: PERSHING SAILS FROM NY JUNE I
COE426: Lecture 13 11
Example of Text
Steganography
Using publicly available cover space
THE MOST COMMON WORK ANIMAL IS THE HORSE.
THEY CAN BE USED TO FERRY EQUIPMENT TO AND
FROM WORKERS OR TO PULL A PLOW. BE CAREFUL,
THOUGH, BECAUSE SOME HAVE SANK UP TO THEIR
KNEES IN MUD OR SAND, SUCH AS AN INCIDENT AT THE
BURLINGTON FACTORY LAST YEAR. BUT HORSES REMAIN
A SIGNIFICANT FIND. ON A FARM, AN ALTERNATE WORK
ANIMAL MIGHT BE A BURRO BUT THEY ARE NOT AS
COMFORTABLE AS A TRANSPORT ANIMAL.
COE426: Lecture 13 12
Example of Text
Steganography
COE426: Lecture 13 13
Hiding a Message inside
Images
24-bit vs. 8-bit images
Tools to implement LSB: EzStego and S-Tools
Algorithms and Transformations
Least-Significant Bit (LSB)
Method
Most common form of digital steganography.
In a RGB image, Information is hidden in the
LSB[s] of the RGB values of each pixel.
In a 24-bit bitmap, each pixel represented by
3 bytes.
Effectively have 3-4 bits of data to hide
information in for every pixel:
8 required for ASCII character
Changing the LSB of the Red value by 1 (in
24-bit color depth) is undetectable by the
human eye
15
Example of LSB
COE426: Lecture 13 16
Simple Watermarking
Store host image and hidden image in memory
Pick the number of bits you wish to hide the hidden image in
Scan through the host image and alter its LSB’s with the hidden
images MSB’s. So when 4 bits are used to hide information…
Host Pixel: 10110001
Secret Pixel: 00111111
New Image Pixel: 10110011
Reverse the process To extract the hidden image
Image Techniques
+ =
Bit Level
Original 1
4
7
Images
Hiding a Message inside Audio or Videos Files
20
Steganalysis
21
Steganography Robustness
COE426: Lecture 13 22
Comparison
Unremovabilit
Confidentiality Integrity
y
Digital
No Yes No
Signatures
Steganograph
Yes/No Yes/No Yes
y
Conclusion