Beruflich Dokumente
Kultur Dokumente
information across the Internet have unused another technique in which both sender and
space in the packet headers. The TCP packet receiver share a key value.
header has six unused (reserved) bits and the IP 2. Operating in a transform space- in this
packet header has two reserved bits. Thousands technique they embedded data into image as
of packets are transmitted with each well as use high compression technique in
communication channel, which provides an steganography.
excellent covert communication channel if 3. A general model- in this technique they first
unchecked.[2] embedded data into image then change some set
of bit of image using some random no.[10]
1.1 Steganography
Three types of steganographic technique used for image is
The term steganography literally means “covered writing” 1. LSB techniques
and involves transmission of secret messages through 2. Masking and filtering techniques
apparently innocent files without detection of the fact that a 3. Algorithms and transformation techniques [11]
message was sent [3]. The innocuous file is known as the Techniques for data hiding in audio and video file is
cover (or innocent or clean) medium, while the file 1. Low bit coding
containing the hidden-message is referred to as the stego (or 2. Phase coding
infected) medium. There are many tools available [4] that 3. Echo data hiding [12]
can hide messages in images, audio and video files, and
steganography is now in common use [3]. Recent terrorist 1.2 Cryptography
activity has been tentatively linked to the use of It is the practical art of converting messages or data into a
steganography [5] and is seen by various agencies as a different form, such that no-one can read them without
growing method of sending covert information [6]. having access to the 'key'. The message may be converted
Figure 2. Steganographic Model using a 'code' (in which case each character or group of
characters is substituted by an alternative one), or a 'cypher'
Whereas cryptography was the preferred secret message
or 'cipher' (in which case the message as a whole is
converted, rather than individual underlying cryptography.
Cryptanalysis is the science of 'breaking' or 'cracking'
encryption schemes, i.e. discovering the decryption key.
Cryptographic systems are generically classified along three
independent dimensions [13].
2. Proposed System
Information hiding techniques have been widely used to
sending tool of the past, relying on complex ciphers to transmission of hiding secret message for long time.
prevent identification of the message, the huge bandwidth of Ensuring data security is a big challenge for computer users.
the Internet now offers an alternate and complementary Businessmen, professionals, and home users all have some
approach. Steganography allows hiding messages important data that they want to secure from others. The
innocuously amongst the vast content of Internet sites: for idea behind to develop that proposed system we have some
instance, an image containing a hidden message maybe requirement.
posted to a website (eBay is often cited [7]) where others can 1. The first important requirement for message as
download the image and recover the message with the well as file (either in the form of data file or
appropriate password. The process of detecting image file that hide some information) is also
steganographic messages is known as steganalysis and a transmitted.
particular steganalysis technique is called an attack. The 2. The provision for encryption and stenography
current state of the art involves identifying a particular technique will be used.
signature associated with a particular steganographic 3. The provision for multiple times (multilevel)
technique and devising a statistical test to identify this steganography.
signature. Such handcrafted approaches are very useful but 4. The provision for multi types of steganography.
suffer from a high false positive rate and are vulnerable to 5. The provision for authentication as well as
steganographic approaches that hide messages in such a way confidentiality also requires.
as to reinstate an expected property [8]. Steganalysis can be
viewed as a two-stage process: 1) Classification of an image In multilevel steganography we can apply stenography
as being stego-bearing or not, and 2) Finding the location of multiple times with using different type’s stego files. This
stego-bearing pixels (i.e. the pixels containing the hidden work use following algorithm multiple times for accruing
message bits) with an aim to extracting, manipulating or multilevel steganography.
sterilizing the message. There has been considerable work
on the first stage using statistical techniques to identify a 2.1 Algorithm HideFile (CF, SF, STF, K)
particular steganographic technique [9]. Input: CF is innocent cover file, SF is secret text
The Art of steganography is defined in three ways. message/ secret message file / setgo file, STF is a file
1. Simple System- in this technique we just name or location to save stego file and K is secret
embedded data in to LSB of image and also use shared key.
(IJCNS) International Journal of Computer and Network Security, 27
Vol. 2, No. 1, January 2010
Output: STF stego file and a validation number. extracting secret information. All these ways are mentioned
in following cases.
Procedure:
3.1 Oscar tries to detect the transmitted file as a stego
Step1: Open STF in write mode and CF in read mode.
file
Step2: Write all contents of CF into STF.
Step3: Close CF and add some random space into STF, Oscar tries to identify the file that has been transmitted as
generate and return a validation number. a stego file. He tries to access the original cover file and
Step4: Open SF in read mode and encrypt all content of compare cover file with stego file. With the use of multilevel
SF, using shared key K and write into STF. steganography then this detection is quite complex.
Step5: Close SF and STF. 3.2 Oscar tries to find out validation number and
secret key
Stego file detection is not sufficient for extracting secret
data from it. Oscar requires validation number, secret key
and needs to know the specific steganographic approach.
This is quite a complex task in itself since technique of
steganography varies with stego file.
3.3 Oscar tries to find out the number of times and
types of steganography Alice or Bob has used
Figure 3. Information hidding
The number of levels of steganography and the specific
approach to be used at each level is agreed upon by the Alice
2.2 Algorithm UnHideFile( STF,TF,VD,K) and Bob prior to actual transfer. Henceforth detecting the
Input: STF is a file name or location for stego file, TF levels of steganography and specific approach of
is a file name or location to save secret message file, steganography used is difficult to determine.
VD is validation number and K is secret shared key.
Output: TF secret message file. 4. Analysis of Proposed Steganography against
Procedure:
media oriented detection techniques
Step1: Open STF in read mode and TF in write mode.
Step2: Start reading STF from the value of validation A good steganographic algorithm is one that avoids the
number until end of file is reached. detection of stego file. Proposed work provides adequate
Step3: Decrypt the contents of STF using shared key K resistance against various medium specific detection
and write it into TF file. techniques in comparison to existing tools. Cover files
Step4: Close STF and TF. supported by the framework are image, audio, and video
files.
4.1 When stego file is image file
Detection of stego file could not succeed against the
following tests:
• Examination of color palette.
• Examination of size of image file.
• Comparison of Stego file format with that of
cover file.
• Application of filter to steganogram resulted
Figure 4. Extracting Information from stego file
from stego file.
• Visible representation of statistical data of stego
3. Analysis of Proposed Steganography
file
technique against detection strategies
4.2 When stego file is audio file
The encrypted secret message is steganographed in a
comparatively innocent file. This stego file has almost the • Analysis of patterns in background noise
same properties as original cover file. Moreover encrypted couldn’t detect the existence of stego file in the
contents are steganographed multiple times using either transferred audio file.
same or different steganographic approaches. Result of first
A. 4.3 When stego file is video file
round of the steganography is given as input to the next
round of steganography process with a different cover file. • Examination of distinguishing movements in
The introduction of multiple phases of steganographic video could not point out video file as stego
process increases the deciphering complexity of the secret video file.
message.
Let Alice and Bob use steganography and Oscar try to 5. Resistant Against StirMark Benchmark
identify it as well as extracting secret information from it.
There are many ways for Oscar to identify it as well as A StirMark attack is the best and most successful attack
on reputed Stegangraphic images. StirMark is a tool
28 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 1, January 2010
developed for testing the robustness of an image-marking 6. Comparison with current tools
algorithm. At its lowest level StirMark introduces errors
into the image (as if the image had been high quality printed The limitation of current tools is following
and scanned in again). A slight distortion (consisting of a • Limit of size
stretch, shear and possible a subtle rotation) is applied. [14] • Authentication
StirMark benchmark apply following attacks • Type of steganography
• PSNR Multilevel Steganography tried to resolve these factors.
• EmbedTime Table 1 shows limitation of current tools, table 2 shows
• AddNoice techniques used by current tools and proposed work, and
• Test JPEG table 3 shows feature of current tools and proposed work.
• MedianCut
• ConvFilter Table 1: Limitation of current tools
• Selfsimilarities
S.No. Name of Tool Limits
• Removelime 1 EzStego [9] Only for GIF file.
• Rescale 2 S-Tool [11],[9] Only for GIF and BMP image.
• Rotation Not sport JPEG file.
• Rotationcrop 3 Steganos [9] Only for GIF and BMP image.
• RotationScale Not sport JPEG file.
• Affine 4 JSteg [9] Loss of information.
5 Stego DOS [11] Only for BMP image, size
• SmallRandomDistortion restriction 320×200 and 256
• LatestSmallRandomDistortions color.
6 White Noise Loss of many bit and sport only
Result of some stirMark Benchmark is show by following Stom [11] IBM Paint brush (PCX) file.
fig. 7 Hide and seek [9] Only for GIF file. Not sport
JPGE file.
7. Application
There are a number of applications driving interest in the
Figure 8. Result after Rotation subject of information hiding:
(IJCNS) International Journal of Computer and Network Security, 29
Vol. 2, No. 1, January 2010
• Military and intelligence agencies require [5] Starr, B., and Utley, G. CNN, July 23, 2002:
unobtrusive communications. Even if the content is http://www.cnn.com/2002/US/07/23/binladen.interne
encrypted, the detection of a signal on a modern t
battlefield may lead rapidly to an attack on the [6] http://www.cise.nsf.gov/accomp/index.cfm?div=iis
signaler. For this reason, military communications [7] Kelley, J. USA Today, July 10, 2002:
use techniques such as spread spectrum modulation http://www.usatoday.com/news/world/2002/07/10/we
or meteor scatter transmission to make signals hard bterror-cover.htm
for the enemy to detect or jam. [8] Provos N., “Defending against Statistical
• Criminals also place great value on unobtrusive Steganalysis”, Proc. 10th USENIX Security
communications. Their preferred technologies Symposium, 2001.
include prepaid mobile phones, mobile phones that [9] A.Westfeld & A. Pfitzmann, “Attacks on
have been modified to change their identity Steganographic System”,
frequently, and hacked corporate switchboards http://www.ece.cmu.edu/~adrian/487-s06/westfeld-
through which calls can be rerouted. pfitzmann-ihw99.pdf
• Law enforcement and counter intelligence agencies [10] R. J. Anderson & F. A. P. Petitcolas, “On the limits
are interested in understanding these technologies of Steganography”, IEEE Journal of Selected Areas
and their weaknesses, so as to detect and trace in communications, 16(4), pp. 474-481, May 1998.
hidden messages. [11] N. F. Johnson & S. Jajodia, “Exploring
• Recent attempts by some governments to limit Steganography: Seeing the Unseen”, IEEE computer,
online free speech and the civilian use of vol. 31, no. 2, pp. 26-34, Feb 1998.
cryptography have spurred people concerned about [12] W. Bender, D. Gruhl, N. Morimoto & A. Lu
liberties to develop techniques for anonymous ,“Techniques for Data hiding”,IBM Systems Journal,
communications on the net, including anonymous vol. 35, pp. 313-336,1996
remailers and Web proxies. [13] Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar,
• Schemes for digital elections and digital cash make “Cryptography and Steganography of Video
use of anonymous communication techniques. InformationIn Modem communication”, Electronics
• Marketeers use email forgery techniques to send And Energetics, vol. 11, pp. 115-125, 1998.
out huge numbers of unsolicited messages while [14] J. Watkins, “Steganography – Message Hidden in
avoiding responses from angry users. [1] Bits”,
http://mms.ecs.soton.ac.uk/mms2002/papers/6.pdf
8. Conclusion
Data hiding techniques have been widely used for
transmission of hiding secret message for long time. The
goal is to modify the carrier in an imperceptible way only,
so that it reveals nothing neither the embedding of a
message nor the embedded message itself. The text here
proposes a good technique for information hiding, but
sometimes the selection of cover is difficult. The
deciphering complexity of algorithm is reasonably high.
This work given an idea about how we can enhance in the
steganography, that’s by we can resolve the limitation of
current steganography tools. This paper gives an idea about
various types of information hiding techniques and also
discus about resistance against detection strategies, media
oriented detection technique and strimark benchmark attack.
References
[1] F. A. P. Petitcolas, R. J. Anderson & M. G. Kuhn,
“Information Hiding – A Survey”, IEEE Journal of
special issue on protection of multimedia content,
87(7), pp. 1062-1078, July 1999.
[2] N. F. Johnson & S. Jajodia, “Steganalysis: The
Investigation of Hidden Information”, IEEE
Information technology conference, pp. 113-116, Sep.
1st -3rd 1998.
[3] Johnson, N., Duric, Z., and Jajodia S., “Information
Hiding: Steganography and Watermarking”, 2001.
[4] http://www.jjtc.com/stegoarchive/stego/software.html