Preeti Singh,
Sakshi Kushwaha,
Sudeep Srivastava,
Uttam Singh.
Introduction
Steganography
(covered writing, covert channels)
Watermarking Fingerprinting
(all objects are marked (identify all objects, every
in the same way) object is marked specific)
Steganography Encryption
(hide existence of the secret message, (encrypt the message,
but do not use encryption) but do not hide the message)
• Ideally nobody can see both parties • Anybody can see both parties
are secretly communicating. are communicating in secret.
• Innocent. • Suspicious.
History
• 440 B.C.
– Histiaeus shaved the head of his most trusted slave and tattooed it with a message
which disappeared after the hair had regrown. To instigate a revolt against Persians.
• Current
– Special inks are used to write a hidden messages on bank notes.
– Industry demands for digital watermarking and fingerprinting of audio and video.
Etymology
The word steganography comes from the Greek
steganos (covered or secret) and -graphy (writing or
drawing) and thus means, literally, covered writing.
Steganography is usually given as a synonym for
cryptography but it is not normally used in that way
Hiding Information Digitally
Requirements
• Secret data integrity must remain after being embedded in stego object.
• The stego object must remain unchanged or almost unchanged to naked eye.
• We assume the attacker knows secret data is hidden inside the stego object.
Basic Principle in Steganography
Secret
Mess
Stego Object
Cover
Image
Encoder
Secret Decoder
Mess Communications
Channel
Original
Cover
Suitable Media for Steganography
• Text Files
– Hidden information destroyed as soon as object is modified.
– Useful in proving objects have not been manipulated and changed e.g.
evidence in a court of law.
• Audio files
– It should be infeasible to remove the hidden data without degrading the
perceived quality of the data.
• Binary Files
• Text
– Document
• Images
– LSB
• Audio
MP3
• Other Types
Information Hiding in Documents
• One of three techniques are applied to hiding data:
– Line Shift Coding - Vertical shifting of lines
Shifts lines up slightly up or down h-i
Shifted up slightly h+i
Lines to be shifted decided by Codebook
• Simple Watermarking
+ =
Image Techniques
• Store host image and hidden image in memory.
• Pick the number of bits you wish to hide the hidden image in.
• Scan through the host image and alter its LSB’s with the hidden images MSB’s. So
when 4 bits are used to hide information…
• To extract the hidden image, you basically take out the LSB’s from the host image
and create a new image from them.
Image Techniques
– A simple yet effective way of hiding data in an image for any purpose.
– The least significant bits of the host image are used to hide the most
significant bits of the hidden image (for image-in-image hiding).
– The least significant bits can always be used to hide other data types.
– The next example will show how image-in-image hiding works via this method.
Image Techniques
Original
Bit Level
Images
1
4
7
Other Techniques
• Video
• DNA
– Use different DNA bases to code secret messages via some cipher key.
• Hardware
CPU 1.7GHz
RAM 1 GB
Hard Disk 1GB
Design Pattern
Advantages:-
Database is not driver specific.
Reduces the redundancy of code.
Complexity also reduces.
Modules of project
Admin User
module module
Process Module
Data Module
Database
Product Module
Download image
User Management
Upload image
System
ID/password
Message
services
Select
Services
Data store
Data store
Data services
Data store
ID/password
Admin
Manage
Data store
Level 2-DFD
Id,
Id, password Check password Validate Valid
Next
for Null user Process
Invalid
data
Get User
Store data
Data store
Level 2-User registration
Get User
Store
data
Data store
Level 3-Submit Form
Not Available
• Geometric distortion
• Transfer function
Digital
No Yes No
Signatures
• Many techniques are not robust enough to prevent detection and removal of
embedded data.