Sie sind auf Seite 1von 5

4* National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia

Information Hiding using Steganography


M. M Amin, M. Salleh, S . Ibrahim, M.R.Katmin,and M.Z.I. Shamsuddin
Faculty of Computer Science & Information Systems,
Universiti Teknologi Malaysia.
81300 Skudai, Johor, Malaysia.

Abstract - Due to advances in ICT, most of ii. With fingerprint, the owner of the data set
information are kept electronically. Consequently, embeds a serial number that uniquely identifies
the security of information has become a him as the owner. This adds to copyright
fundamental issue. Besides cryptography, information and makes it possible to trace any
steganography can be employed to secure unauthorized used of the data set.
information. Steganography is a technique of iii. Steganography hides the secret message within
hiding information in digital media. In contrast to the host data set and its presence is
cryptography, the message or encrypted message is imperceptible.
embedded in a digital host before passing it
through the network, thus the existence of the In those applications, information is hidden
message is unknown. Besides hiding data for within a host data set and is to be reliably
confidentiality, this approach of information hiding communicated to a receiver. The host data set is
can be extended to copyright protection for digital purposely corrupted, but in a covert way, and
media: audio, video, and images. designed to be invisible to an informal analysis.
However, this paper will only focus on information
1. Introduction hiding using steganography approach.
In section 2, we give an overview about
The growing possibilities of modem steganography in detail in order to avoid confusion
communications need the special means of security with cryptography since steganography is normally
especially on computer network. The network interpreted as a synonym for cryptography. Section
security is becoming more important as the number 3 discusses several sfeganographic techniquesn..
of data being exchanged on the Internet increases. Section 4 describes an information hiding system
Therefore, the confidentiality and data integrity are that was developed by using one of the
required to protect against unauthorized access. steganography techniques. Finally, section 5
This has resulted in an explosive growth of the outlines further work that will he carried out in the
field of information hiding. near future.
- In addition, the rapid growth of publishing and
broadcasting technology also requires an 2. Overview on Steganography
altemative solution in hiding information. The
copyright of digital media such as audio, video and The word steganography comes from the
other media available in digital form may lead to Greek Steganos, which means covered or secret
large-scale unauthorized copying. This is because and -graphy means writing or drawing. Therefore,
the digital formats make it possible to provide high steganography means, literally, covered writing.
image quality even under multi-copying. The Steganography is the art and science of hiding
problem of unauthorized copying is of great information such that its presence cannot be
concem especially to the music, film, book and detected [3]. A secret information is encoded i n a
software publishing industries. To overcome this manner such that the very existence of the
problem, some invisible information can be information is concealed. Paired with existing
embedded in the digital media in such a way that it communication methods, steganography can be
could not be easily extracted without a specialized used to carry out hidden exchanges.
technique [I]. The main goal of steganography is to
Information hiding is an emerging research communicate securely in a completely undetectable
area, which encompasses applications such as manner [4] and to avoid drawing suspicion t o t he
copyright protection for digital media, transmission of a hidden data [SI. It is not to keep
watermarking, fingerprinting, and steganography others from knowing the hidden information, but it
[Z].All these applications of information hiding are is to keep others from thinking that the information
quite diverse. even exists. If a steganography method causes
i. In watermarking applications, the message someone to suspect there is a secret information in
contains information such as owner a carrier medium, then the method has failed [6].
identification and a digital time stamp, which
is usually applied for copyright protection.

0-7803-7773-7/03/$17.00 02003 IEEE. 21


Until recently, information hiding techniques iii. File and Disk that can hide and append files by
received very much less attention from the research using the slack space.
community and from industry than cryptography. iv. Text files such as html and java.
This situation is, however, changing rapidly and the v. Image files such as bmp, gif and jpg, where
first academic conference on this topic was they can be both color and gray-scale.
organized in 1996. Since then, there has been a
rapid growth of interest in steganography. This is In general, the information hiding process
due to two main reasons [7]: extracts redundant bits from cover-object. The
i. The publishing and broadcasting industries process consists of two steps [9, IO].
have become interested in techniques for i. Identification of redundant bits in a cover-
hiding encrypted copyright marks and serial object. Redundant hits are those bits that can
numbers in digital films, audio recordings, he modified without corrupting the quality or
hooks and multimedia products. destroying the integrity of the cover-object.
ii. Moves by various governments to restrict the ii. Embedding process. It selects the subset of the
availability of encryption services have redundant bits to be replaced with data from a
motivated people to study methods by which secret message. The stego-object is created by
private messages can be embedded in replacing the selected redundant bits with
seemingly innocuous cover messages. message bits.

The basic model of steganography consists of 2.1 Steganography vs Cryptography


Carrier, Message and Password. Carrier is also Basically, the purpose of cryptography and
known as a cover-object, which embeds the steganography is to provide secret communication.
message and serves to hide its presence. However, steganography is not the same as
Basically, the model for steganography is cryptography. Cryptography hides the contents of a
shown in Figure 1. Message is the data that the secret message from malicious people, whereas
sender wishes to remain it confidential. It can he steganography even conceals the existence of the
plain text, ciphertext, other image, or anything that message. Steganography must not be confused with
can be embedded in a hit stream such as a cryptography, where we transform the message so
copyright mark, a covert communication, or a serial as to make its meaning obscure to malicious people
number. Password is known as a stega-key, which who intercept it. Therefore, the definition of
ensures that only the recipient who knows the breaking the system is different [ll]. In
corresponding decoding key will be able to extract cryptography, the system is broken when the
the message from a cover-object. The cover-object attacker can read the secret message. Breaking a

- --
with the secretly embedded message is then called
the stego-object.
steganographic system needs the attacker to detect
that steganography has been used and he is able to
read the embedded message.
In cryptography, the structure of a message is
scrambled to make it meaningless and
unintelligible unless the decryption key is
available. It makes no attempt to disguise or hide
the encoded message. Basically, cryptography
offers the ability of transmitting information

L3t-I
between persons in a way that prevents a third
Stego-key, party from reading it. Cryptography can also
provide authentication for verifying the identity of
someone or something.
Figure 1 -Basic Steganography Model In contrast, steganography does not alter the
structure of the secret message, but hides it inside a
Recovering message from a stego-object cover-image so that it cannot be seen. A message in
requires the cover-object itself and a corresponding a ciphertext, for instance, might arouse suspicion
decoding key if a stego-key was used during the on the part of the recipient while an “invisible”
encoding process. The original image may or may message created with steganographic methods will
not be required in most applications to extract the not. In other word, steganography prevents an
message. unintended recipient from suspecting that the data
There are several suitable carriers that can he exists. In addition, the security of classical
used as the cover-object as listed below [SI: steganography system relies on secrecy of the data
i. Network Protocols such as TCP, IP and UDP. encoding system [9].Once the encoding system is
ii. Audio that use digital audio formats such as known, the steganography system is defeated.
way, midi, avi, mpeg, mpi and voc.

22
It is possible to combine the techniques by hidden communication is not detected by other
encrypting message using cryptography and then people.
hiding the encrypted message using steganography.
The resulting stego-image can be transmitted 3. Stegauographic Techniques
without revealing that secret information is being
exchanged. Furthermore, even if an attacker were There have been many techniques for hiding
to defeat the steganographic technique and detect information or messages in images in such a
the message from the stego-object, he would still manner that the alterations made to the image are
require the cryptographic decoding key to decipher perceptually indiscemible. Common approaches
the encrypted message [I?.]. Table 1 shows that include [5]:
both technologies have counter advantages and i. Least significant bit insertion (LSB)
disadvantages [SI. ii. Masking and filtering
iii. Transform techniques
TABLE 1
Comparison between Steganography and LSB is a simple approach to embed
Cryptography. information in image file. The simplest
steganographic techniques embed the bits of the
Steganography Cryptography message directly into least significant bit plane o f
Unknown message Known message the cover-image in a deterministic sequence.
passing. passing. Modulating the least significant bit does not .result
in human-perceptible difference because the
Little known Common technology. amplitude of the change is small.
technology. Masking and filtering techniques, usually
restricted to 24 bits and gray scale images, hide
Technology still being Most algorithms information by marking an image, in a manner
developed for certain known to govemment similar to paper watermarks. The techniques
formats. departments. performs analysis of the image,. thus embed the
information i n significant areas sot hat the hidden
Once detected message Strong algorithms are message is more integral to the cover-image than
is known. currently resistant to just hiding it in the noise level.
brute force attack. Transform techniques embed the message by
Large expensive modulating coefficients in a transform domain,
computing power such as the Discrete Cosine Transform (DCT) used
required for cracking. in P E G compression, Discrete Fourier Transform,
Technology increase or Wavelet Transform. These methods bide
reduces strength. messages in significant areas of the cover-image,
which make them more robust to attack.
Many Carrier formats Transformations can be applied over the entire
image, to block through out the image, or other
variants.

2.2 Steganography Applications 4. Secure Information Hiding System (SIHS)


There are many steganographic applications
for digital image, including copyright protection, An information hiding system, Secure
feature tagging, and secret communication [12,13]. Information Hiding System (SIHS) has been
Copyright notice or watermark can be embedded developed to provide confidentiality security
inside an image to identify it as intellectual service. SIHS employs an image file as a carrier to
property. If someone attempts to use this image hide a message and focuses on Least Signifcant Bit
without permission, we can prove by extracting the (LSB) as one of the steganography techniques as
watermark. mentioned in previous section 3.
In feature tagging, captions, annotations, time Before embedding process, the size of image
stamps, and other descriptive elements can be and the message must be defined by the system.
embedded inside an image. Copying the sfego- This is important to ensure the image can support
image also copies the embedded features and only the message to be embedded. The ideal image size
parties who possess the decoding sfego-key will be is 800x600 pixels, which can embed up to 60kB
able to extract and view the features. On the other messages. As a preliminary work, SIHS simply
hand, secret communication does not advertise a embeds the message into the cover-image without
covert communication by using steganography. using any password or sfego-key.
Therefore, it can avoid scrutiny of the sender,
message and recipient. This is effective only if the

23
We tested the system by using several images. The resultant Stego-image is shown in Figure
However, in this paper, a sample of the image will 5 . The Stego-image obtained seems identical to the
be presented. The image in Figure 4, which is in cover-image even though the cover-image is
the gij format to hold the hidden information and combined with the message. This is because the
an btml tile in Figure 3 as the message to be amplitude of the change is small, and therefore
bidden. Figure 2 illustrates the process of hiding modulating the LSB does not result in a human-
the message in the cover-image. perceptible difference. Thus allowing high
perceptual transparency of LSB.
Coverlmaee Rein In the experiment, we found that the size of
information to he hidden relatively depends on the
size of the cover-image. The message size must he
Stego Image
smaller than the image [14]. A large capacity
allows the use of smaller cover-image for the
message of fixed size, and thus decreases the
bandwidth required to transmit the stego-image.
Message

i When some bits in the LSB plane of the stego-


image are altered then the original message
embedded in the cover-image cannot be obtained.
Therefore, if this method causes someone to
suspect something hidden in the stegc-image, then
the method is not secure. In addition the stego-
Figure 2 -Producing Stego-Image Process image cannot be manipulated in any way, such as
through scaling, rotation, cropping, addition of
noise or lossy compression because manipulation
will also destroy the hidden message.

5. Conclusion

In this paper we gave an overview of


steganograpby. It can enhance confidentiality of
information and provides a means of
communicating privately. We have also presented .
an image steganographic system using LSB
approach. However, there are some advantages and
disadvantages of implementing LSB on a digital
image as a carrier.
Figure 3 -Message The advantage of LSB is its simplicity to
embed the bits of the message directly into the LSB
plane of cover-image and many applications use
this method [15]. Another advantage is its
perceptual transparency whereby the changes made
to the cover-image cannot be traced by human eye.
One of the disadvantages is that LSB is not
robust. It is very sensitive to any kind of filtering or
manipulation of the stegc-image. Another
weakness is that it is tamper resistance. An attacker
. . can casily dcstruct the message by rentoting or
. . O ' .

modified stegc-image.
Further work on this research is to enhance the
system by using a password to embed the message.
We will also implement another two approaches of
steganographic system on a digital image. Then, a
comparative study on these different approaches
will be done.

Figure 5 -Result of Stego-Image

24
6. References

[l] Z. Hrytskiv, S. Voloshynovskiy & Y. Rytsar [12] E.T. Lin and E.J. Delp, “A Review of Data
“Cryptography of Video Information In Hiding in Digital Images”,
Modem Communications”, Electronics And [I31 W. Bender, D. Gruhl, N. Morimoto and A.
Energefics, vol. 11, pp. 115-125, 1998. Lu, “Techniques for Data Hiding”, Sysfems
[2] P.Moulin & J.A. O’Sullivan, “Information - Journal, vol. 35, 1996.
Theoretic Analysis of Information Hiding”, at [14] M.Z.I. Shamsuddin, “Menggunakan Least
IEEE Infernational Symposium on Informafion Significant Bit: Steganografi“, 2002.
Theory, Boston, MA, October, 1999. [IS] N.F. Johnson & S. Jajodia, “Steganalysis of
[3] C . Cachin, “An Information-Theoretic Model Images Created Using Current
for Steganography”, in proceeding 2nd Steganography Software”, in
Information Hiding Workshop, vol. 1525, pp. Proceeding for the Second Information
306-318, 1998 Hiding Workhop, Portland 0 regon,
[4] R Chandramouli, N. Memon, “Analysis of USA, April 1998, pp. 273-289.
LSB Based Image Steganography [ 161 N.F. Johnson and S. Jajodia, “Exploring
Techniques”, IEEE pp. 1019-1022,2001. Steganography: Seeing the Unseen”, IEEE,
[SI N.F. Johnson, S. Jajodia, “Staganalysis: The pp. 26-34, 1998.
Investigation of Hiding Information”, IEEE, [17] M. Ramkumar & A.N. Akansu. “Some
pp. 113-116, 1998. Design Issues For Robust Data biding
[6] D. Artz, “Digital Steganography: Hiding Data Systems”
within Data”, IEEE Internet Compufing, pp. [18] Richard Popa,”An Analysis of Steganographic
75-80, May-Jun 2001. System”, 1998.
[7] R.J. Anderson, F.A.P. Petitcolas, “On The [I91 Y.K. Lee and L.H. Chen, “High Capacity
Limits of Steganography”, IEEE Journal of Image Steganographic Model”.
Selected Area in Communicafions, pp. 474- [ZO] Y.K. Lee and L.H. Chen, “A Secure Robust
481, May 1998. Image Steganographic Model”, in parf by
[SI R A Isbell, “Steganography: Hidden Menace or the Nafional Science Council.
Hidden Saviour”, Steganography White Paper, [21] S. Tanako, K. Tanaka and T. Sugimura, “Data
IO May 2002. Hiding via Steganographic Image
[9] N. Provos, P. Honeyman, “Detecting Transformation”, ZEICE Tram.
Steganography Content on the Internet”. Fundamentals, vol. E83-A, pp. 31 1-319,
[lo] N. Provos, “Probabilistic Methods for February, 2000
Improving Information Hiding”, CITI [221] F.A.P Peticolas, R.J. Anderson and M.G.
Technical Report 01-1, January 31,2001. Kuhn, “Information Hiding - A Survey”, in
[ l l ] J. Zollner, H. Federrath, H. Klimant, et al., proceeding of IEEE, pp. 1062-1078, July
“Modeling the Security of Steganographic 1999.
Systems”, in 2nd Workshop on Informafion [23] S. Katzenbeisser and F.A.P. Peticolas,
Hiding, Portland, April 1998, pp. 345-355. “Defining Security in Steganographic
Systems”.

25

Das könnte Ihnen auch gefallen