Stegnography
Most of us wondered why couldn't the FBI detect or get a clue about the September
11th attack? Though the terrorist communicated all their information's through the web it wasn't easy to tamper! Have you
wondered
why? It was because of a special technique called Steganography. To
ensure
the security of data, a technique called STEGANOGRAPHY is used.
"Steganography is the art and science of communicating in a way which
hides
the existence of the communication"
Steganography (Greek for 'covered writing') is a science that is
quite
different from cryptography. In the field of Steganography,
some
terminology is used. The term "cover" is used to describe the
original,
innocent message, data, audio, still, video and so on. When
referring to
audio signal steganography, the cover signal is sometimes called the
"host"
signal. The information to be hidden in the cover data is known as
the
"embedded" data. The "stego" data is the data containing both the
cover
signal and the "embedded" information. Logically, the processing of
putting
the hidden or embedded data, into the cover data, is sometimes
known as
embedding. Occasionally, especially when referring to image
steganography,
the cover image is known as the container.
Data hiding can be done in three different media: -
Text, Images,
Audio
signals
This is done based on Bender's specification.
Bender's Specification :
The cover data should not be significantly degraded by the
embedded
data, and the embedded data should be as imperceptible as
possible.
(This does not mean that the embedded data needs to be
invisible; it
is possible for the data to be hidden while it remains in
plain
sight.)
The embedded data should be directly encoded into the media,
rather
than into a header or wrapper, to maintain data consistency
across
formats.
The embedded data should be as immune as possible to
modifications
from intelligent attacks or anticipated manipulations such
as
filtering and resampling.
Some distortion or degradation of the embedded data can be
expected
when the cover data is modified. To minimize this,
error-correcting
codes should be used.
The embedded data should be self-clocking or arbitrarily re-entrant.
This
ensures that the embedded data can still be extracted when only
portions of
the cover data are available.
Steganography in Text :
Various methods of text steganography are available. They are Line
shift
coding ,Word shift coding, Feature
coding
an e.g. for the text Steganography.
Consider a text :
Apparently neutrals protest is thoroughly discounted and ignored.
Isman
hard hit. Blockade issue affects pretext for embargo on
byproducts,
ejecting suets and vegetable oil.
When we take only the second letter of each word in the above text we
get
the following message.
Perishing sails from NY June 1.
This shows that there is the message hidden behind the given text is
highly
secure. The original message does not arise any suspicion for the
readers.
The message reaches the correct person over a common channel.
Steganography in Images :
Image steganography has come in recent years with the
development of
powerful graphical computers, and steganographic software is now
available
over the Internet for everyday users.
Guidelines to Image Steganography :
Digital images are typically stored in either 24-bit or 8-bit per
pixel
files. 24-bit images are sometimes known as true colour images or
gray
scale images. Gray-scale images are very good because the shades
gradually
change from byte to byte. The importance is not whether the
image is
gray-scale or not, the importance is the degree to which the colors
change
between bit values.Once a suitable cover image has been selected, an
image
encoding technique needs to be chosen.
The most common
approaches to
information hiding in images are:
Least significant bit (LSB) insertion: The least significant bit
insertion
method is probably the most well-known image steganography technique.
It is
a common, simple approach to embedding information in a graphical
image
file.
Masking and filtering techniques: Masking and filtering techniques
hide
information by marking an image in a manner similar to paper
watermarks.
Because watermarking techniques are more integrated into the image,
they
may be applied without fear of image destruction from lossy
compression. By
covering, or masking a faint but perceptible signal with another to
make
the first non-perceptible, we exploit the fact that the human visual
system
cannot detect slight changes in certain temporal domains of the image.
Algorithms and transformations:
JPEG images are used across networks
such
as the Internet because of the high colour quality with good
compression.
JPEG images use the discrete cosine transform (DCT) to achieve
compression.
Here is a sample image that hides the given message using the
LSB
technique. Here the container file is a "Shakespeare's" image. The
message
displayed is hidden behind the image.
Container File :
Message :
Steganography is the art and science of communicating in a way,
which hides the existence of the communication.
Stego
Thus we find no change in the steg image.
Audio Steganography :
Methods of Data Hiding : There are three methods of data hiding
Low-bit Encoding:
Similarly to how data was stored in the
least-significant
bit of images, binary data can be stored in the least-significant
bit of
audio files. Ideally the channel capacity is 1kb per second per
kilohertz;
so for example, the channel capacity would be 44kbps in a 44 kHz
sampled
sequence.
Phase Coding:
The phase coding method works by substituting the phase
of an
initial audio segment with a reference phase that represents the data.
Echo data hiding:
Echo data hiding embeds data into a host
signal by
introducing an echo. Varying three parameters of the echo hides the
data:
initial amplitude, decay rate, and offset, or delay. As the offset
between
the original and the echo decreases, the two signals blend. At a
certain
point, the human ear cannot distinguish between the two signals, and
the
echo is merely heard as added resonance. This point depends on factors
such
as the quality of the original recording, the type of sound, and
the
listener.
Is Steganography only for such a destrcutive purpose?
Steganographic techniques can be used for a number of purposes other
than
covert communication or deniable data storage: information tracing
and
finger printing, tamper detection, and perhaps most importantly
digital
watermarking. A digital watermark (inserted into, say, an image as we
see
in our currencies) is invisible to the eye, undetectable without
the
appropriate secret key, but contains small ownership identification.
Writers, photographers, musicians, and artists are among those who
have
taken adantage of the worldwide publishing opportunities provided by
the
Internet, yet these same people are frequently taken advantage
of by
on-line pirates. A much wider field of steganography is
digital
watermarking allows copyright owners to incorporate into their
work
identifying information invisible to human eye, yet protecting against
the
dangers of copyright infringement.