100314
100314
100314
Abstract: This research paper focuses on the analysis and popular formulation of the problem: two prisoners, Alice
enhancement of steganographic strategies for multimedia data and Bob[2], wish to plan an escape from jail.
hiding authentication. Based on an authentication game
between an image and its authorized receiver, and an opponent,
security of authentication watermarking is measured by the
opponent's inability to launch a successful attack. In this work,
we consider two stages of data hiding mechanism: Hiding the
data in an image along with conditional security and detecting
the hidden data. First we detect whether there exists a hidden
message within the image and then applying the conditional
security mechanism, we extract that hidden message. We
propose a novel security enhancement strategy that results in
efficient and secure LSB-based embedding and verification
phenomenon. Both theoretical analysis and experimental results
are presented. They show that using our approach, protection is
achieved without significant increase in image size and color Figure 1. Stenography Process
distortion, and without sacrificing the image or video quality.
However, the prison warden, Ward, can monitor any
Keywords: Steganography, LSB, Stego image, Stego key, communication between Alice and Bob, and if he detects
payload, Watermarking, Covert Communication any hint of “unusual" communications, he throws them both
in solitary confinement. Alice and Bob must then transmit
1. Introduction their secret plans so that nothing in their communication
seems unusual" to Ward. There have been many proposed
The word steganography literally means covered writing as solutions to this problem, ranging from rudimentary
derived from Greek. It includes a vast array of methods of schemes using invisible ink to a protocol which is provably
secret communications that conceal the very existence of the secure assuming that one-way functions exist.
message. Among these methods are invisible inks,
microdots, character arrangement (other than the
cryptographic methods of permutation and substitution),
digital signatures, covert Channels and spread-spectrum
communications. Steganography is the art of concealing the
existence of information within seemingly inoffensive
carriers. Steganography can be viewed as parallel to
cryptography. Both have been used throughout recorded
history as means to protect information. At times these two
technologies seem to converge while the objectives of the
two differ. Cryptographic techniques "scramble" messages
so if intercepted, the messages cannot be understood.
Steganography, in an essence, "camouflages" a message to
hide its existence and make it seem "invisible" thus
concealing the fact that a message is being sent altogether.
Figure 2. General Model of Steganography
An encrypted message may draw suspicion while invisible
messages will not [1]. Steganography refers to the problem
of sending messages hidden in “innocent looking" 2. Literature Survey
communications over a public channel so that an adversary
eavesdropping on the channel cannot even detect the 2.1 Steganography Techniques
presence of the hidden messages. Simmons gave the most 2.1.1 Physical steganography
(IJCNS) International Journal of Computer and Network Security, 73
Vol. 2, No. 3, March 2010
Steganography has been widely used including recent • Concealing messages within the lowest bits of noisy
historical times and the present day. Possible permutations images or sound files.
are endless and known examples include • Concealing data within encrypted data. The data to be
•Hidden messages within wax tablets: in ancient Greece, concealed is first encrypted before being used to overwrite
people wrote messages on the wood, and then covered it part of a much larger block of encrypted data.
with wax upon which an innocent covering message was • Chaffing and winnowing.
written. • Mimic functions convert one file to have the statistical
• Hidden messages on messenger's body: also in ancient profile of another. This can thwart statistical methods that
Greece. Herodotus tells the story of a message tattooed on a help brute-force attacks identify the right solution in a
slave's shaved head, hidden by the growth of his hair, and ciphertext-only attack.
exposed by shaving his head again. The message allegedly • Concealed messages in tampered executable files,
carried a warning to Greece about Persian invasion plans. exploiting redundancy in the i386 instruction set.
This method has obvious drawbacks such as delayed • Pictures embedded in video material (optionally played at
transmission while waiting for the slave's hair to grow, and slower or faster speed).
its one-off use since additional messages requires additional • Injecting imperceptible delays to packets sent over the
slaves. In WWII, the French Resistance sent some messages network from the keyboard. Delays in key presses in some
written on the backs of couriers using invisible ink. applications (telnet or remote desktop software) can mean a
• Hidden messages on paper written in secret inks, under delay in packets, and the delays in the packets can be used to
other messages or on the blank parts of other messages. encode data.
• Messages written in morse code on knitting yarn and then •Content-Aware Steganography hides information in the
knitted into a piece of clothing worn by a courier. semantics a human user assigns to a datagram. These
• Messages written on the back of postage stamps. systems offer security against a non-human
adversary/warden.
2.1.2 Digital steganography
•Blog-Steganography. Messages are fractionalized and the
Modern steganography entered the world in 1985 with the advent
of the personal computer applied to classical steganography (encrypted) pieces are added as comments of orphaned web-
problems. Development following that was slow, but has since logs (or pin boards on social network platforms). In this case
taken off, going by the number of 'stego' programs available: Over the selection of blogs is the symmetric key that sender and
725 digital steganography applications have been identified by the recipient are using; the carrier of the hidden message is the
Steganography Analysis and Research Center. whole blogosphere.
When working with larger images of greater bit depth, the 3.1 Proposed Main Flow Diagram
images tend to become too large to transmit over a standard
Internet connection. In order to display an image in a The proposed methodology in this work is to embed the
reasonable amount of time, techniques must be incorporated stego message into image and video using LSB Technique.
to reduce the image’s file size. These techniques make use
of mathematical formulas to analyze and condense image
data, resulting in smaller file sizes. This process is called
compression. In images there are two types of compression,
Lossy and Lossless. Both methods save storage space, but
the procedures that they implement differ. Lossy
compression creates smaller files by discarding excess image
data from the original image. It removes details that are too
small for the human eye to differentiate, resulting in close
approximations of the original image, although not an exact
duplicate. An example of an image format that uses this
compression technique is JPEG (Joint Photographic Experts
Group). Lossless compression, on the other hand, never
removes any information from the original image, but
instead represents data in mathematical formulas. The Figure 5. Main Flow Diagram
original image’s integrity is maintained and the
decompressed image output is bit-by-bit identical to the
original image input. The most popular image formats that 3.2 Text in Image Flow Diagram
use lossless compression is GIF (Graphical Interchange
Format) and 8-bit BMP (a Microsoft Windows bitmap file).
3. Proposed Methodology
(IJCNS) International Journal of Computer and Network Security, 75
Vol. 2, No. 3, March 2010
3.6 Implementation of LSB Technique nothing has changed in the appearance of the image.
Nevertheless, even in case wherein all LSB’s are changed;
To illustrate implementation of LSB technique, consider the
most images would still retain their original appearance
following image of parrots showing true colors Palette of the
because of the fact that the LSB’s represent a very minute
Image
portion (roughly 1/255 or 0.39%) of the whole image. The
resulting difference between the new from the original color
value is called the embedding error. Since there are only
three LSB’s for each pixel, the total number of bits that can
be hidden is only three times the total number of pixels
having the dimensions 768x512.
The stego message is finally extracted as shown in the text Figure 16. Open Images
box in fig. 14
For merging the stego image in the original image user has
to enter the password and then the stego image embeds into
the original image.
The difference between the original image and the image Figure 22. View Frames
after insertion of stego message is shown in fig. 20. The two
images look exactly the same. The stego text is added to be embedded in the video as
shown in fig. 23
References