Acknowledgement: Diksha Singh 0821631017 B-Tech (Ec) Iiiyear
Acknowledgement: Diksha Singh 0821631017 B-Tech (Ec) Iiiyear
First and foremost I would like to thank the almighty, who bestowed upon me the patience,
strength and the ability to embark upon this work and carry it to its completion. It is a matter of
great pride and privilege for me to have esteemed supervisions of Mr. Dinesh Kumar Yadav as
the seminar coordinator and seminar guide.
I am thankful to Mr. Umesh Kumar (Head of Department) for providing the internet facility in
college which served as a boon in material collection. A special thanks to all faculty members.
Diksha Singh
0821631017
B-Tech(EC)
IIIyear
1
WHAT IS STEGANOGRAPHY?
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message. The word
steganography is of Greek origin and means "concealed writing" from the Greek words steganos
(στεγανός) meaning "covered or protected", and graphein (γράφειν) meaning "to write". The first
recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise
on cryptography and steganography disguised as a book on magic. Generally, messages will
appear to be something else: images, articles, shopping lists, or some other covertext and,
classically, the hidden message may be in invisible ink between the visible lines of a private
letter.
The advantage of steganography, over cryptography alone, is that messages do not attract
attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will
arouse suspicion, and may in themselves be incriminating in countries where encryption is
illegal. Therefore, whereas cryptography protects the contents of a message, steganography can
be said to protect both messages and communicating parties.
2
INTRODUCTION
The objective of steganography is to hide a secret message within a cover-media in such a way
that others cannot discern the presence of the hidden message. Technically in simple words
“steganography means hiding one piece of data within another”.
Modern steganography uses the opportunity of hiding information into digital multimedia files
and also at the network packet level.
·The secret message (M), may be plain text, cipher text or any type of data
·An optional stego-key (K) or password may be used to hide and unhide the message.
The stego function operates over cover media and the message (to be hidden) along with a stego-
key (optionally) to produce a stego media (S).
3
The schematic of steganographic operation is shown below.
HISTORY
In 480 BC a Greek by the name of Demaratus sent a message to the Spartans warning of a
pending invasion by Xerxes. Heroclotus described the method used by Demaratus:
“As the danger of discovery was great, there was only one way in which he could contrive to get
the message through: this was by scraping the wax off a pair of wooden folding tables, writing
on the wood underneath what Xerxes intended to do, and then covering the message over with
the wax again. In this way the tablets, being apparently blank, would cause no trouble with the
guards along the road….”
In more recent history, several stenographic methods were used during World War II. Microdots
developed by the Nazis are essentially microfilm chips created at high magnification (usually
4
over 200X). These microfilm chips are the size of periods on a standard typewriter. These dots
could contain pages of information, drawings, etc. The Nazis also employed invisible inks and
null ciphers. One of the most noted null cipher messages sent by a Nazi spy follows:
Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade
issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.
Using the second letter from each word, the following message appears:
Other suspected methods of passing secret messages ranged from the arrangement of dials on
wristwatches to chess games being played via the mail.
The common modern technique of steganography exploits the property of the media itself
to convey a message. The following media are the candidate for digitally embedding
message: -
Plaintext
Still imagery
IP datagram.
5
Plaintext steganography
In this technique the message is hidden within a plain text file using different schemes like use of
selected characters, extra white spaces of the cover text etc.
Sender sends a series of integer number (Key) to the recipient with a prior agreement that the
secret message is hidden within the respective position of subsequent words of the cover text.
For example the series is ‘1, 1, 2, 3, 4, 2, 4,’ and the cover text is “A team of five men joined
today”. So the hidden message is “Atfvoa”. A “0” in the number series will indicate a blank
space in the recovered message. The word in the received cover text will be skipped if the
number of characters in that word is less than the respective number in the series (Key) which
shall also be skipped during the process of message unhide.
6
Still imagery steganography
The most widely used technique today is hiding of secret messages into a digital image. This
steganography technique exploits the weakness of the human visual system (HVS). HVS cannot
detect the variation in luminance of color vectors at higher frequency side of the visual spectrum.
A picture can be represented by a collection of color pixels. The individual pixels can be
represented by their optical characteristics like 'brightness', 'chroma' etc. Each of these
characteristics can be digitally expressed in terms of 1s and 0s.
For example: a 24-bit bitmap will have 8 bits, representing each of the three colors values (red,
green, and blue) at each pixel. If we consider just the blue there will be 28 different values of
blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to
be undetectable by the human eye. Hence, if the terminal recipient of the data is nothing but
human visual system (HVS) then the Least Significant Bit (LSB) can be used for something else
other than color information.
This technique can be directly applied on digital image in bitmap format as well as for the
compressed image format like JPEG. In JPEG format, each pixel of the image is digitally coded
using discrete cosine transformation (DCT). The LSB of encoded DCT components can be used
as the carriers of the hidden message.
We are taking eight consecutive pixels from top left corner of the image. The equivalent binary
bit pattern of those pixels may be like this: -
7
00100111 11101001 11001000 00100111 11001000 11101001
11001000 00100111
Then each bit of binary equivalence of letter 'A' i.e. 01100101 are copied serially (from the left
hand side) to the LSB's of equivalent binary pattern of pixels, resulting bit pattern will become
like this: -
The only problem with this technique is that it is very vulnerable to attacks such as image
compression and formatting.
1. The Image is broken into data units each of them consists of 8 x 8 block of pixels.
2. Working from top-left to bottom-right of the cover image, DCT is applied to each pixel of
each data unit.
3. After applying DCT, one DCT Coefficient is generated for each pixel in data unit.
5. The LSB of binary equivalent the quantized DCT coefficient can be replaced by a bit from
secret message.
8
6. Encoding is then applied to each modified quantized DCT coefficient to produce compressed
Stego Image.
Figure 2: Example of still imagery steganography. Left hand side image is the original cover
image, whereas right hand side does embedding a text file into the cover image make the stego
image.
In audio steganography, secret message is embedded into digitized audio signal which result
slight altering of binary sequence of the corresponding audio file.
There are several methods are available for audio steganography. Some of them are as follows: -
LSB Coding: Sampling technique followed by Quantization converts
analog audio signal to digital binary sequence.
9
In this technique LSB of binary sequence of each sample of digitized audio file is replaced with
binary equivalent of secret message. For example if we want to hide the letter ‘A’ (binary
equivalent (01100101) to an digitized audio file where each sample is represented with 16 bits,
then LSB of 8 consecutive samples (each of 16 bit size) is replaced with each bit of binary
equivalent of the letter ‘A’.
Phase Coding:
Human Auditory System (HAS) can’t recognize the phase change in audio signal as easy it can
recognize noise in the signal. The phase coding method exploits this fact. This technique encodes
the secret message bits as phase shifts in the phase spectrum of a digital signal, achieving an
inaudible encoding in terms of signal-to- noise ratio.
Spread Spectrum:
10
There are two approaches are used in this technique: the direct sequence spread spectrum (DSSS)
and frequency hopping spread spectrum (FHSS). Direct-sequence spread spectrum (DSSS) is a
modulation technique used in telecommunication. As with other spread spectrum technologies,
the transmitted signal takes up more bandwidth than the information signal that is being
modulated.
The resulting signal resembles white noise. However, this noise-like signal can be used to
exactly reconstruct the original data at the receiving end, by multiplying it by the same
pseudorandom sequence (because 1 × 1 = 1, and −1 × −1 = 1). This process, known as "de-
spreading",
Echo Hiding:
11
In this method the secret message is embedded into cover audio signal as an echo. Three
parameters of the echo of the cover signal namely amplitude, decay rate and offset from original
signal are varied to represent encoded secret binary message. They are set below to the threshold
of Human Auditory System (HAS) so that echo can’t be easily resolved.
Video files are generally consists of images and sounds, so most of the relevant techniques for
hiding data into images and audio are also applicable to video media. In the case of Video
steganography sender sends the secret message to the recipient using a video sequence as cover
media. Optional secret key ‘K’ can also be used during embedding the secret
message to the cover media to produce ‘stego-video’.
After that the stego-video is communicated over public channel to the receiver. At the receiving
end, receiver uses the secret key along with the extracting algorithm to extract the secret message
from the stego-object. The original cover video consists of frames represented by Ck(m,n) where
1 £ k £ N. ‘N’ is the total number of frame and m,n are the row and column indices of the pixels,
respectively. The binary secret message denoted by Mk(m, n) is embedded into the cover video
media by modulating it into a signal. Mk(m, n) is defined over the same domain as the host
Ck(m, n).The stego-video signal is represented by the equation
where ak (m, n) is a scaling factor. For simplicity ak (m, n) can be considered to be constant over
all the pixels and frames. So the equation becomes:
IP datagram steganography
12
This is another approach of steganography, which employs hiding data in the network datagram
level in a TCP/IP based network like Internet. Network Covert Channel is the synonym of
network steganography. Overall goal of this approach to make the stego datagram is undetectable
by Network watchers like sniffer, Intrusion Detection System (IDS) etc.
In this approach information to be hide is placed in the IP header of a TCP/IP datagram. Some of
the fields of IP header and TCP header in an IPv4 network are chosen for data hiding.
Let us see how ‘Flags’ and ‘Identification’ field of Ipv4 header can be exploited by this
methodology.
The size of Flag field is 3 bit. There are 3 flags denoted by each bit. First bit is reserved. Second
and third one denoted by DF (Don’t fragment) and MF (More Fragment) respectively. An un-
fragmented datagram has all zero fragmentation information (i.e. MF = 0 and 13-bit Fragment
Offset = 0) which gives rise to a redundancy condition, i.e. DF (Do not Fragment) can carry
either “0” or “1” subject to the knowledge of the maximum size of the datagram.
13
Now if sender and recipient both have a prior knowledge of Maximum Transfer Unit (MTU) of
their network then they can covertly communicate with each other using DF flag bit of IP header.
Datagram length should be less than path MTU otherwise packet will be fragmented and this
method will not work.
The following table shows the how the sender communicates 1 and 0 to the recipient by using
DF flag bit.
This is an example of covert communication since there is no way to the network monitoring
devices like IDS or sniffer to detect the communication because cover datagram is a normal
datagram. As the payload is untouched, there is no way an IDS or any other content filtering
device could recognize this activity. In major constraint of this approach is both parties should
have prior knowledge of path MTU and datagram from sender should not be fragmented further
in the way.
The ‘16-bit identification field’ in Ipv4 header is used to identify the fragmented packed of an IP
datagram. If there is no fragmentation of datagram, then this Identification field can be used to
embed sender specified information.
14
field:
ISN (Initial Sequence Number) in TCP header[14] is another candidate for cover media for
network steganography. Initial sequence number is a 32-bit digit generated during three-way
TCP/IP handshaking between client and server, which is as follows: -
(a) Client sends a TCP/IP packet with SYN flag is ON. This is segment 1 where client specifies
the port number of the server that it wants to connect to, and the client’s ISN.
(b) Sever responds with a TCP/IP packet with SYN flag is ON and also containing the server’s
ISN. Server also acknowledges the client’s SYN by ACK flag is ON in this packet with
acknowledgement number which is client’s ISN+1. This is segment 2.
(c) The client must acknowledge this server’s SYN packet by sending a packet with ACK flag is
ON with acknowledgement number, which is server’s ISN+1. This is segment 3.
15
Figure 5: TCPv4 header
The large 32-bit address space of the Sequence Number field can be used for covert channel. The
sender will craft a TCP/IP packet where the secret binary message can be embedded over the
Sequence Number field and the passively listening receiving party will then extract the data.
Steganography Attacks
Steganographic attacks consist of detecting, extracting and destroying hidden object of the stego
media. Steganography attack is followed by steganalysis. There are several types of attacks
based on the information available for analysis. Some of them are as follows: -
Known carrier attack: The original cover media and stego media both are available for
analysis.
Steganography only attack: In this type of attacks, only stego media is available for
analysis.
16
Known message attack: The hidden message is known in this case.
Known steganography attack: The cover media, stego media as well as the steganography
tool or algorithm, are known.
STAGANALYSIS
· Steganalysis Techniques
The properties of electronic media are being changed after hiding any object into that. This can
result in the form of degradation in terms of quality or unusual characteristics of the media:
Steganalysis techniques based on unusual pattern in the media or Visual Detection of the same.
For example in the case of Network Steganography unusual pattern is introduced in the TCP/IP
packet header. If the packet analysis technique of Intrusion Detection System of a network is
based on white list pattern (usual pattern), then this method of network steganography can be
defeated.
In the case of Visual detection steganalysis technique a set of stego images are compared with
original cover images and note the visible difference. Signature of the hidden message can be
derived by comparing numerous images. Cropping or padding of image also is a visual clue of
hidden message because some stego tool is cropping or padding blank spaces to fit the stego
17
image into fixed size. Difference in file size between cover image and stego images, increase or
decrease of unique colors in stego images can also be used in the Visual Detection steganalysis
technique.
APPLICATIONS
Example from modern practice: The larger the cover message is (in data content terms—
number of bits) relative to the hidden message, the easier it is to hide the latter. For this reason,
digital pictures (which contain large amounts of data) are used to hide messages on the Internet
and on other communication media. The objective for making steganographic encoding difficult
to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the
payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to
say, the changes are indistinguishable from the noise floor of the carrier. Any medium can be a
carrier, but media with a large amount of redundant or compressible information are better
suited.
18
Alleged use by terrorists: After the events of September 11, 2001, there was immediate
concern voiced regarding the possible use of steganography by the al Queda network. Initially,
there were reports that hidden messages might be located in images located on XXX rated sex
web sites. Beyond the concerns of hidden messages in images, there has been additional concern
voiced regarding the television broadcast of bin Laden. Remembering that steganography is
hardly the sole property of digital technology, there is the possibility that there could have been
hidden messages in the audio portion of the broadcasts, or even in the background of the
televised images.
FUTURE OF STAGANOGRAPHY
According to Richard E. Smith (a data security expert), he doesn’t “see many practical uses for
steganography because it only works as long as nobody expects you to use it.”“Defending
Against Statistical Steganalysis,” Provos presents new methods which would allow one to select
a file in which a message might be safely hidden and resistant to standard statistical analysis.
Legitimate Use
Steganographic techniques have obvious uses, some legitimate, some less so, and some are likely
illegal. The business case for protection of property, real and intellectual is strong. The
watermarking of digital media is constantly improving, primarily in an attempt to provide
hardened watermarks or proof of ownership. Individuals or organizations may decide to place
personal/private/sensitive information in steganographic carriers. Admittedly, there are usually
better ways to manage this task. One can liken these applications to the use of a deadbolt lock on
a door. The deadbolt will keep honest people honest, but those determined to break and enter can
simply break a window and gain entry. With advances in steganography, it is possible that this
medium could serve as a relatively secure storage/transmission method.
Illegal Use
Other uses for steganography range from the trivial to the abhorrent. There are claims (47) that
child pornography may be lurking inside innocent image or sound files. While this is entirely
possible, a search on the internet for confirmation of this claim was unsuccessful. An annual
report on High Technology crime (48) lists nine common types of computer crime:
Criminal communications
Fraud
19
Hacking
Electronic payments
Gambling and pornography
Harassment
Intellectual property offenses
Viruses
Pedophilia
In examining this list, one can identify several of these areas where steganography could be used,
especially considering the broad term “criminal communications.” If one includes
steganographic techniques other than computer related, the potential grows even more. In terms
of computer security, there are some areas to be aware of. One area that has potential far ranging
implications is “A protocol that uses steganography to circumvent network level censorship.”
(49) The author, Bennet Haselton, the coordinator of Peacefire.org (an organization that
“opposes censorship that targets Internet users under 18…”) describes a protocol that is
“undetectable to censors.”
Finally, computer warfare should be addressed. In his Masters Thesis, Jordan T. Cochran,
Captain, USAF investigates steganographic virus attacks (50). He finds that “The results indicate
that steganography tools are not conducive to be sole attack weapons. However, the tools
combined with other applications could be used to automatically extract the hidden information
with minimal user intervention.”
In another Masters Thesis, Dale A. Lathrop, Captain, USAF also investigates the possibility of
virus attacks using steganographic techniques. He finds that “The results of this research indicate
that the use of a separate engine followed by an HTML-based electronic mail message
containing a photographic image with a steganographically embedded virus or other payload is a
vulnerable attack if implemented without the proper environment variables in place.” He further
finds that “it still requires human intervention to initiate the virus attack.” For those who find
themselves as first responders in electronic crimes, the “Electronic Crime Scene Investigation, A
Guide for First Responders” written in July 2001 is freely available on the internet. This
publication offers basic, sound advice in the preservation and investigation of electronic crime
scenes, and does give mention to steganography.
20
CONCLUSION
In this paper, different techniques are discussed for embedding data in text, image, audio/video
signals and IP datagram as cover media. All the proposed methods have some limitations. The
stego multimedia produced by mentioned methods for multimedia steganography are more or
less vulnerable to attack like media formatting, compression etc. In this respect, IP datagram
steganography technique is not susceptible to that type of attacks. Steganalyis is the technique to
detect steganography or defeat steganography. The research to device strong steganographic and
steganalysis technique is a continuous process.
Steganography, in its multitude of forms, has been in use literally for thousands of years. It
appears to have been utilized primarily and most effectively in time of war or civil strife. It
would appear that based on the variety of forms that steganographic messages can take that there
21
could be steganographic content on the internet. Location of some forms of steganographic
content would require techniques other than statistical profiling not the least of which could be
visual examination (refer to Figure 10) notwithstanding the ability to encrypt.
While practical uses of steganography, with the exception of watermarking, seems to be
relatively limited with the abundance of other techniques freely available, it will likely fill a
niche for some activities.
REFERENCE
3. Wikipedia
22