Professional Documents
Culture Documents
Image Steganography
Abstract
Steganography is the art of hiding information and an effort to conceal the existence of the
embedded information. It serves as a better way of securing message than cryptography
which only conceals the content of the message not the existence of the message.
Original message is being hidden with a carrier are not observable. In this paper we will
discuss how digital images can be used as a carrier to hide messages. This paper also
analyses the performance of some of the steganography tools. Steganography is a useful
that allows convert transmission of information over an over the communication channel.
Motivation Behind The Seminar Topic
Steganography has developed a lot in recent years, because digital techniques allow new
ways of hiding information in a lot of situations. The first to employ hidden
communications techniques –with radio transmission- were the armies, because of the
strategic importance of secure communication and the need to conceal the source as much
as possible
Nowadays , new constraints in using strong encryption for messages are added by
international laws, so if two peers want to use it, they can resort in hiding the
communication into casual looking data. This problem has become more and more
important just in these days.
Introduction
Steganography is the art and science of writing hidden messages in such a way
that no one, apart from the sender and intended recipient, suspects the existence
of the message.
The word message ‘Steganography, is of Greek origin and means concealed
writing’ from the Greek words ‘stegan-x graf-ein’.
HISTORY
Ancient Chinese wrote messages on fine silk, which was then crunched into tiny ball and
covered in wax. The messenger then swallowed the ball of wax.
During Second World War a technique was developed to shrink photographically a page of
text into dot less than one millimeter in diameter, and ten hide this microdot in an
apparently innocuous letter.(The first microdot has been spotted by FBI in 1941.)
GENERAL STEGANOGRAPHIC MODEL
WAVELET
Wavelets are functions that wave above and below the x axis , have
1. Varying frequency
2. Limited duration
3. An average value of zero
What are Wavelets?
It can be used for safeguarding data, such as in the field of media where
copywriting ensures authenticity.
It can be used by intelligence agencies for sending their secret data.
Disadvantages
Huge number of data, huge file size, so someone can suspect about it.
If this technique is gone in the wrong hands like hackers, terrorists, criminals then this can
be very much dangerous for all.
Wavelets Transforms
1. Take a wavelet and compare it to a section at the start of the original signal.
2. Calculate a number c, that represents how closely correlated the wavelet is with
this section of the signal. The higher c is, the more the similarity.
CWT: Mains Steps
3. Shift the wavelet to the right and repeat steps 1 and 2 until you’ve covered the
whole signal.
CWT(Main Steps)
A discrete wavelet transform (DWT) is a transform thar decomposes a given signal into a
number of sets, where each set is a time series of coefficients describing the time evolution
of the signal in the corresponding frequency band.
Discrete wavelet transform(DWT)
Use of Steganography
There are various ways to conceal information using steganography. The most common
method is by embedding information into digital images say, a JPEG image, contains
several megabytes of data in form of pixels.
This allows some room to embed information within the digital image. With use of
steganography applications, one can alters the least significant bits of the data file and
embeds a malicious code into the image. Once the targeted user opens the image file in
their computer , the malware is activated.
Depending on its programming, the malware can now open a leeway for the attacker to
gain control over the user’s device or network.
Least Significant Bit Embedding
In this method, the attacker identifies the least significant bits of information in the carrier
image and substitutes it with their secret message, in this case, malicious code.
When the target downloads the carrier image, they introduce the malware into their
computer which allows the attacker access to this device and the hack begins.
LSB embedding can be divided into two categories: fixed size insertion method and
variable size insertion methods. Fixed size methods use a fixed number of LSBs to embed
the secret message in each byte of the cover image .
Variable size insertion method uses a variable number of LSBs from each byte of cover
image according to each pixel’s sustainability for embedding,
Weaknesses to LSB embedding
There are, however, weakness to the algorithm, mainly that the embedded information is
easy to detect should an attacker be aware of the technique used.
LSB embedding is also sensitive to image manipulation attacks, such as image cropping,
resizing, color space conversion or resampling. LSB embedding is thus not robust against
image manipulations attacks.
LSB embedding is also not resistant to statistical attacks, since the embedded information
is easy to detect. A fairly simple statistical attack, called a histogram attack, can be used to
detect the presence of embedded information by studying the histogram of a stego image.
Steganalysis
All of the approaches to steganography have one thing in common that they hide the secret
message in the physical object which is sent. The steganography process of the cover
image being passed into the embedding function with the message to encode resulting in a
steganographic image containing the hidden message.
The key is usually a password, so the key is also used to encrypt and decrypt the message
before and after the embedding. The most important property of a cover source is the
amount of data that can be stored inside it, without changing the noticeable properties of
the cover.
Conclusion
Steganography is a fascinating and effective method of hiding data that has been used
throughout history. Methods that can be employed to uncover such device tactics, but the
first step are awareness that such methods exist.
There are many good reasons as well to use this type of data hiding, including
watermarking or a more secure central storage system for such things as passwords, or
keypasswords, Regardless, this technology is easy to use and difficult to detect. As
Steganography becomes more mature it will be implemented as a standrd security tool the
way firewalls, virus detection software and intrusion detection programs currently are.
Future
In today’s world, we often listen a popular term “Hacking”. Hacking is nothing but an
unauthorized access of data which can be collected at the time of data transmission. With
respect to steganography this problem is often taken as steganolysis.
Steganolysis is a process in which a steganwlyzer cracks the cover object to get the hidden
data. So whatever be the technique will be developed in future, degree of security related
with has to be kept in mind. It is hoped that dual steganography, Steganography with along
with cryptography may be some of the future solution for the mentioned problem.
THANK YOU