Beruflich Dokumente
Kultur Dokumente
Abstract - Due to advances in ICT, most of ii. With fingerprint, the owner of the data set
information are kept electronically. Consequently, embeds a serial number that uniquely identifies
the security of information has become a him as the owner. This adds to copyright
fundamental issue. Besides cryptography, information and makes it possible to trace any
steganography can be employed to secure unauthorized used of the data set.
information. Steganography is a technique of iii. Steganography hides the secret message within
hiding information in digital media. In contrast to the host data set and its presence is
cryptography, the message or encrypted message is imperceptible.
embedded in a digital host before passing it
through the network, thus the existence of the In those applications, information is hidden
message is unknown. Besides hiding data for within a host data set and is to be reliably
confidentiality, this approach of information hiding communicated to a receiver. The host data set is
can be extended to copyright protection for digital purposely corrupted, but in a covert way, and
media: audio, video, and images. designed to be invisible to an informal analysis.
However, this paper will only focus on information
1. Introduction hiding using steganography approach.
In section 2, we give an overview about
The growing possibilities of modem steganography in detail in order to avoid confusion
communications need the special means of security with cryptography since steganography is normally
especially on computer network. The network interpreted as a synonym for cryptography. Section
security is becoming more important as the number 3 discusses several sfeganographic techniquesn..
of data being exchanged on the Internet increases. Section 4 describes an information hiding system
Therefore, the confidentiality and data integrity are that was developed by using one of the
required to protect against unauthorized access. steganography techniques. Finally, section 5
This has resulted in an explosive growth of the outlines further work that will he carried out in the
field of information hiding. near future.
- In addition, the rapid growth of publishing and
broadcasting technology also requires an 2. Overview on Steganography
altemative solution in hiding information. The
copyright of digital media such as audio, video and The word steganography comes from the
other media available in digital form may lead to Greek Steganos, which means covered or secret
large-scale unauthorized copying. This is because and -graphy means writing or drawing. Therefore,
the digital formats make it possible to provide high steganography means, literally, covered writing.
image quality even under multi-copying. The Steganography is the art and science of hiding
problem of unauthorized copying is of great information such that its presence cannot be
concem especially to the music, film, book and detected [3]. A secret information is encoded i n a
software publishing industries. To overcome this manner such that the very existence of the
problem, some invisible information can be information is concealed. Paired with existing
embedded in the digital media in such a way that it communication methods, steganography can be
could not be easily extracted without a specialized used to carry out hidden exchanges.
technique [I]. The main goal of steganography is to
Information hiding is an emerging research communicate securely in a completely undetectable
area, which encompasses applications such as manner [4] and to avoid drawing suspicion t o t he
copyright protection for digital media, transmission of a hidden data [SI. It is not to keep
watermarking, fingerprinting, and steganography others from knowing the hidden information, but it
[Z].All these applications of information hiding are is to keep others from thinking that the information
quite diverse. even exists. If a steganography method causes
i. In watermarking applications, the message someone to suspect there is a secret information in
contains information such as owner a carrier medium, then the method has failed [6].
identification and a digital time stamp, which
is usually applied for copyright protection.
- --
with the secretly embedded message is then called
the stego-object.
steganographic system needs the attacker to detect
that steganography has been used and he is able to
read the embedded message.
In cryptography, the structure of a message is
scrambled to make it meaningless and
unintelligible unless the decryption key is
available. It makes no attempt to disguise or hide
the encoded message. Basically, cryptography
offers the ability of transmitting information
L3t-I
between persons in a way that prevents a third
Stego-key, party from reading it. Cryptography can also
provide authentication for verifying the identity of
someone or something.
Figure 1 -Basic Steganography Model In contrast, steganography does not alter the
structure of the secret message, but hides it inside a
Recovering message from a stego-object cover-image so that it cannot be seen. A message in
requires the cover-object itself and a corresponding a ciphertext, for instance, might arouse suspicion
decoding key if a stego-key was used during the on the part of the recipient while an “invisible”
encoding process. The original image may or may message created with steganographic methods will
not be required in most applications to extract the not. In other word, steganography prevents an
message. unintended recipient from suspecting that the data
There are several suitable carriers that can he exists. In addition, the security of classical
used as the cover-object as listed below [SI: steganography system relies on secrecy of the data
i. Network Protocols such as TCP, IP and UDP. encoding system [9].Once the encoding system is
ii. Audio that use digital audio formats such as known, the steganography system is defeated.
way, midi, avi, mpeg, mpi and voc.
22
It is possible to combine the techniques by hidden communication is not detected by other
encrypting message using cryptography and then people.
hiding the encrypted message using steganography.
The resulting stego-image can be transmitted 3. Stegauographic Techniques
without revealing that secret information is being
exchanged. Furthermore, even if an attacker were There have been many techniques for hiding
to defeat the steganographic technique and detect information or messages in images in such a
the message from the stego-object, he would still manner that the alterations made to the image are
require the cryptographic decoding key to decipher perceptually indiscemible. Common approaches
the encrypted message [I?.]. Table 1 shows that include [5]:
both technologies have counter advantages and i. Least significant bit insertion (LSB)
disadvantages [SI. ii. Masking and filtering
iii. Transform techniques
TABLE 1
Comparison between Steganography and LSB is a simple approach to embed
Cryptography. information in image file. The simplest
steganographic techniques embed the bits of the
Steganography Cryptography message directly into least significant bit plane o f
Unknown message Known message the cover-image in a deterministic sequence.
passing. passing. Modulating the least significant bit does not .result
in human-perceptible difference because the
Little known Common technology. amplitude of the change is small.
technology. Masking and filtering techniques, usually
restricted to 24 bits and gray scale images, hide
Technology still being Most algorithms information by marking an image, in a manner
developed for certain known to govemment similar to paper watermarks. The techniques
formats. departments. performs analysis of the image,. thus embed the
information i n significant areas sot hat the hidden
Once detected message Strong algorithms are message is more integral to the cover-image than
is known. currently resistant to just hiding it in the noise level.
brute force attack. Transform techniques embed the message by
Large expensive modulating coefficients in a transform domain,
computing power such as the Discrete Cosine Transform (DCT) used
required for cracking. in P E G compression, Discrete Fourier Transform,
Technology increase or Wavelet Transform. These methods bide
reduces strength. messages in significant areas of the cover-image,
which make them more robust to attack.
Many Carrier formats Transformations can be applied over the entire
image, to block through out the image, or other
variants.
23
We tested the system by using several images. The resultant Stego-image is shown in Figure
However, in this paper, a sample of the image will 5 . The Stego-image obtained seems identical to the
be presented. The image in Figure 4, which is in cover-image even though the cover-image is
the gij format to hold the hidden information and combined with the message. This is because the
an btml tile in Figure 3 as the message to be amplitude of the change is small, and therefore
bidden. Figure 2 illustrates the process of hiding modulating the LSB does not result in a human-
the message in the cover-image. perceptible difference. Thus allowing high
perceptual transparency of LSB.
Coverlmaee Rein In the experiment, we found that the size of
information to he hidden relatively depends on the
size of the cover-image. The message size must he
Stego Image
smaller than the image [14]. A large capacity
allows the use of smaller cover-image for the
message of fixed size, and thus decreases the
bandwidth required to transmit the stego-image.
Message
5. Conclusion
modified stegc-image.
Further work on this research is to enhance the
system by using a password to embed the message.
We will also implement another two approaches of
steganographic system on a digital image. Then, a
comparative study on these different approaches
will be done.
24
6. References
[l] Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar [12] E.T. Lin and E.J. Delp, “A Review of Data
“Cryptography of Video Information In Hiding in Digital Images”,
Modem Communications”, Electronics And [I31 W. Bender, D. Gruhl, N. Morimoto and A.
Energefics, vol. 11, pp. 115-125, 1998. Lu, “Techniques for Data Hiding”, Sysfems
[2] P.Moulin & J.A. O’Sullivan, “Information - Journal, vol. 35, 1996.
Theoretic Analysis of Information Hiding”, at [14] M.Z.I. Shamsuddin, “Menggunakan Least
IEEE Infernational Symposium on Informafion Significant Bit: Steganografi“, 2002.
Theory, Boston, MA, October, 1999. [IS] N.F. Johnson & S. Jajodia, “Steganalysis of
[3] C . Cachin, “An Information-Theoretic Model Images Created Using Current
for Steganography”, in proceeding 2nd Steganography Software”, in
Information Hiding Workshop, vol. 1525, pp. Proceeding for the Second Information
306-318, 1998 Hiding Workhop, Portland 0 regon,
[4] R Chandramouli, N. Memon, “Analysis of USA, April 1998, pp. 273-289.
LSB Based Image Steganography [ 161 N.F. Johnson and S. Jajodia, “Exploring
Techniques”, IEEE pp. 1019-1022,2001. Steganography: Seeing the Unseen”, IEEE,
[SI N.F. Johnson, S. Jajodia, “Staganalysis: The pp. 26-34, 1998.
Investigation of Hiding Information”, IEEE, [17] M. Ramkumar & A.N. Akansu. “Some
pp. 113-116, 1998. Design Issues For Robust Data biding
[6] D. Artz, “Digital Steganography: Hiding Data Systems”
within Data”, IEEE Internet Compufing, pp. [18] Richard Popa,”An Analysis of Steganographic
75-80, May-Jun 2001. System”, 1998.
[7] R.J. Anderson, F.A.P. Petitcolas, “On The [I91 Y.K. Lee and L.H. Chen, “High Capacity
Limits of Steganography”, IEEE Journal of Image Steganographic Model”.
Selected Area in Communicafions, pp. 474- [ZO] Y.K. Lee and L.H. Chen, “A Secure Robust
481, May 1998. Image Steganographic Model”, in parf by
[SI R A Isbell, “Steganography: Hidden Menace or the Nafional Science Council.
Hidden Saviour”, Steganography White Paper, [21] S. Tanako, K. Tanaka and T. Sugimura, “Data
IO May 2002. Hiding via Steganographic Image
[9] N. Provos, P. Honeyman, “Detecting Transformation”, ZEICE Tram.
Steganography Content on the Internet”. Fundamentals, vol. E83-A, pp. 31 1-319,
[lo] N. Provos, “Probabilistic Methods for February, 2000
Improving Information Hiding”, CITI [221] F.A.P Peticolas, R.J. Anderson and M.G.
Technical Report 01-1, January 31,2001. Kuhn, “Information Hiding - A Survey”, in
[ l l ] J. Zollner, H. Federrath, H. Klimant, et al., proceeding of IEEE, pp. 1062-1078, July
“Modeling the Security of Steganographic 1999.
Systems”, in 2nd Workshop on Informafion [23] S. Katzenbeisser and F.A.P. Peticolas,
Hiding, Portland, April 1998, pp. 345-355. “Defining Security in Steganographic
Systems”.
25