Free Essay

Steganography

In: Computers and Technology

Submitted By PratyuTsetty
Words 3246
Pages 13
International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010

Steganography- A Data Hiding Technique
Arvind Kumar
Assistant Professor Vidya College of engineering, Meerut, India

Km. Pooja
Vankateshwara institute of computer Science and technology, Meerut, India

ABSTRACT
Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique.

In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information. A message is the information hidden and may be plaintext, cipher text, images, or anything that can be embedded into a bit stream. Together the cover carrier and the embedded message create a stego-carrier. Hiding information may require a stego key which is additional secret information, such as a password, required for embedding the information. For example, when a secret message is hidden within a cover image, the resulting product is a stego-image. A possible formula of the process may be represented as: cover medium + embedded message + stego key = stego-medium

KEYWORDS
Steganography, Steganalysis, Digital watermarking, Stego key, Stego image and Cryptography.

1. INTRODUCTION
Internet users frequently need to store, send, or receive private information. The most common way to do this is to transform the data into a different form. The resulting data can be understood only by those who know how to return it to its original form. This method of protecting information is known as encryption. A major drawback to encryption is that the existence of data is not hidden. Data that has been encrypted, although unreadable, still exists as data. If given enough time, someone could eventually unencrypt the data. A solution to this problem is steganography. The ancient art of hiding messages so that they are not detectable. No substitution or permutation was used. The hidden message is plain, but unsuspecting to the reader. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. Before the invention of digital means, traditional methods were being used for sending or receiving messages. Before phones, before mail messages were sent on foot. For the messages where privacy was of prime concern, the ways of implementing security were following: 1. Choosing the messenger capable of delivering the message securely. 2. Write the message using such notations that actual meaning of the message was concealed. 3. Hide the message such that even its presence can’t be predicted.

Figure 1.1 Graphical Version of the Steganographic System fE : steganographic function "embedding" fE-1 : steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden stego: cover data with the hidden message The advantage of steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered. Often, using encryption might identify the sender or receiver as somebody with something to hide. For example, the picture of our cat could conceal the plans for our company's latest technical innovation.

2. HISTORY OF STEGANOGRAPHY
It is believed that steganography was first practiced during the Golden Age in Greece. An ancient Greek record describes the practice of melting wax off wax tablets used for writing messages and then inscribing a message in the underlying wood. The wax was then reapplied to the wood, giving the appearance of a new, unused tablet. The resulting tablets could be innocently transported without anyone suspecting the presence of a message beneath the wax. An ancient Greek record describes the practice of melting wax off wax tablets used for writing messages and then inscribing a message in the underlying wood. The wax was then reapplied to the wood,

19

giving the appearance of a new, unused tablet. The resulting tablets could be innocently transported without anyone suspecting the presence of a message beneath the wax. Later on Germans developed microdot technology which FBI Director J. Edgar Hoover referred to as "the enemy's masterpiece of espionage. Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941. The message was not hidden, nor encrypted. It was just so small as to not draw attention to itself. Besides being so small, microdots permitted the transmission of large amounts of data including drawings and photographs. Another common form of invisible writing is through the use of Invisible inks. Such inks were used with much success as recently as WW-II. An innocent letter may contain a very different message written between the lines. Early in WW-II steganographic technology consisted almost exclusively of invisible inks. Common sources for invisible inks are milk, vinegar, fruit juices and urine. All of these darken when heated.

International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 username and password, with no real method of verifying that the user is the actual card holder. Biometric finger print scanning, combined with unique session IDs embedded into the fingerprint images via steganography, allow for a very secure option to open ecommerce transaction verification. 5. Paired with existing communication methods, steganography can be used to carry out hidden exchanges. Governments are interested in two types of hidden communications: those that support national security and those that do not. Digital steganography provides vast potential for both types. Businesses may have similar concerns regarding trade secrets or new product information. 6. The transportation of sensitive data is another key use of steganography. A potential problem with cryptography is that eavesdroppers know they have an encrypted message when they see one. Steganography allows to transport of sensitive data past eavesdroppers without them knowing any sensitive data has passed them. The idea of using steganography in data transportation can be applied to just about any data transportation method, from E-Mail to images on Internet websites.

3. USES OF STEGANOGRAPHY
1. Steganography can be a solution which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. 2. It is also possible to simply use steganography to store information on a location. For example, several information sources like our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside. 3. Steganography can also be used to implement watermarking. Although the concept of watermarking is not necessarily steganography, there are several steganographic techniques that are being used to store watermarks in data. The main difference is on intent, while the purpose of steganography is hiding information, watermarking is merely extending the cover source with extra information. Since people will not accept noticeable changes in images, audio or video files because of a watermark, steganographic methods can be used to hide this.

Figure 3.2 Steganography on the Internet

4. STEGANOGRAPHY AND CRYPTOGRAPHY 4.1 Comparison Cryptography of Steganography and

Figure3.1 Steganography Types 4. E-commerce allows for an interesting use of steganography. In current e-commerce transactions, most users are protected by a

Steganography and cryptography are closely related. Cryptography scrambles messages so it can’t be understood. Steganography on the other hand, hide the message so there is no knowledge of the existence of the message. With cryptography, comparison is made between portions of the plaintext and portions of the cipher text. In steganography, comparisons may be made between the cover-media, the stego-media, and possible portions of the message. The end result in cryptography is the cipher text, while the end result in steganography is the stego-media. The message in steganography may or may not be encrypted. If it is encrypted, then a cryptanalysis technique is applied to extract the message.

20

International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010

4.2 Combination Cryptography

of

Steganography

and

transport information across the Internet have unused or reserved space in the packet headers.

Those who seek the ultimate in private communication can combine encryption and steganography. Encrypted data is more difficult to differentiate from naturally occurring phenomena than plain text is in the carrier medium. There are several tools by which we can encrypt data before hiding it in the chosen medium. In some situations, sending an encrypted message will across suspicion while an invisible message will not do so. Both methods can be combined to produce better protection of the message. In case, when the steganography fails and the message can be detected, it is still of no use as it is encrypted using cryptography techniques.

6.2. Visual detection
Analyzing repetitive patterns may reveal the identification of a steganography tool or hidden information. To inspect these patterns an approach is to compare the original cover image with the stego image and note visible differences. This is called a known-carrier attack. By comparing numerous images it is possible that patterns emerge as signatures to a steganography tool. Another visual clue to the presence of hidden information is padding or cropping of an image. With some stego tools if an image does not fit into a fixed size it is cropped or padded with black spaces. There may also be a difference in the file size between the stego-image and the cover image. Another indicator is a large increase or decrease in the number of unique colors, or colors in a palette which increase incrementally rather than randomly.

5. STEGANALYSIS
Steganalysis is "the process of detecting steganography by looking at variances between bit patterns and unusually large file sizes”. It is the art of discovering and rendering useless covert messages. The goal of steganalysis is to identify suspected information streams, determine whether or not they have hidden messages encoded into them, and, if possible, recover the hidden information. Unlike cryptanalysis, where it is evident that intercepted encrypted data contains a message.

6.3. Tools to detect Steganography
The disabling or removal of hidden information in images is dependent on the image processing techniques. For example, with LSB methods of inserting data, simply compressing the image using lossy compression is enough to disable or remove the hidden message. There are several available steganographic detection tools such as Encase by Guidance Software Inc., ILook Investigator by Electronic Crimes Program, Washington DC, various MD5 hashing utilities, etc.

7. IMPLEMENTATION AND RESULTS
All of the approaches to steganography have one thing in common that they hide the secret message in the physical object which is sent. The following figure shows the steganography process of the cover image being passed into the embedding function with the message to encode resulting in a steganographic image containing the hidden message. A key is often used to protect the hidden message. This key is usually a password, so this key is also used to encrypt and decrypt the message before and after the embedding. Secrets can be hidden inside all sorts of cover information: text, images, audio, video and more. However, there are tools available to store secrets inside almost any type of cover source. The most important property of a cover source is the amount of data that can be stored inside it, without changing the noticeable properties of the cover.

Figure 1. A Graphical Version of the Steganographic System Steganalysis generally starts with several suspect information streams but uncertainty whether any of these contain hidden message. The steganalyst starts by reducing the set of suspect information streams to a subset of most likely altered information streams. This is usually done with statistical analysis using advanced statistics techniques.

6. STEGANALYSIS TECHNIQUES
Hiding information within an electronic medium cause alteration of the medium properties that can result in some form of degradation or unusual characteristics.

6.1. Unusual patterns
Unusual patterns in a stego image are suspicious. For example, there are some disk analysis utilities that can filter hidden information in unused partitions in storage devices. Filters can also be used to

identify TCP/IP packets that contain hidden or invalid information in the packet headers. TCP/IP packets used to

Figure 5.1 Steganography Procedure

21

International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 In this phase, here we are going to implement steganography technique on the following images.

Figure 5.5 Histogram of Cover Image

Figure 5.2 Cover Image

Figure 5.6 Histogram of Stego Image The above two Figure 5.5 shows the histogram of our Cover Image and Figure 5.6 shows the histogram of Stego Image. Both the images are different from each other.

Figure 5.3 Secret Image The figure 5.2 is our Cover Image and Figure 5.3 is our Secret Image. After applying this technique on it we get the following image. This will be known as Stego Image.

8. STEGANOGRAPHY SOFTWARE APPLICATION

8.1 Digital Watermarking
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The signal may be audio, pictures or video, for example. If the signal is copied, then the information is also carried in the copy. A signal may carry several different watermarks at the same time.

8.1.1 Visible Watermarking
In this, the information is visible in the picture or video. Typically, the information is text or a logo which identifies the owner of the media. When a television broadcaster adds its logo to the corner of transmitted video, this is also a visible watermark. Figure 5.4 Stego Image After implementation of this technique if we take a look on the histogram of both the images cover image and stego image respectively we will find both are very different from each other. The following figures show the histogram of cover image and stego image.

8.1.2 Invisible Watermarking
In this, information is added as digital data to audio, picture or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden). The watermark may be intended for widespread use and is thus made easy to retrieve or it may be a form of Steganography, where a party communicates a secret message embedded in the digital signal. In either case, as in

22

visible watermarking, the objective is to attach ownership or other descriptive information to the signal in a way that is difficult to remove. It is also possible to use hidden embedded information as a means of covert communication between individuals. Digital Watermarking can be used for a wide range of applications such as: Copyright protection Source Tracking (Different recipients get differently watermarked content). The numbers of possible applications for digital watermarking technologies are increasing rapidly. For example, in the field of data security, watermarks may be used for certification, authentication, and conditional access. Certification is an important issue for official documents, such as identity cards or passports. Digital watermarks are created by converting copyright information into apparently random digital "noise" using an algorithm that is imperceptible to all but special watermark reading software. So while a JPEG file that is read by a Web browser may display a pretty picture, that same file will display the copyright when read by the watermark software.

International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 [2] Anderson R.J. and Petitcolas F.A.P., “On the Limits of steganography,” J. Selected Areas in Comm., vol. 16, no.4, 1998, pp. 474–481. [3] Bailey, K. and Curran, K. “An evaluation of image-based steganography methods”. International Journal of Digital Evidence, Fall 2003. [4] Chapman, M. Davida G, and Rennhard M.. “A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography” found online at http://www.nicetext.com/doc/isc01.pdf [5] Dai Y., Liu G., and WangBreaking Z., “Predictive-CodingBased Steganography and Modification for Enhanced Security”, IJCSNS International Journal of Computer Science and Network Security, vol.6 no. 3b, March 2006. [6] Chin-Chen Chang , Iuan-Chang Lin, and Yaun-Hui YU, “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, 20 December 2006. [7] Shareza Shirali, M.H, “Anew Approach to persain/Arabic Text Stegraphy”, Computer and Information Science, 2006, ICISCOMSAR 2006, 5th IEEE/ACIS International Conference, 1012 July 2006 pp 310-315. [8] Fabien A.P., and Petitcolas, “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000. [9] National Academy of Sciences, How do Wavelets work? National Academy of Sciences, http://www.beyonddiscovery.org/content/view.page.asp?I=1956, 2003 . [10] Digital Watermarking for Digital Media, Information Science Publishing. [11] Hiding in Plain Sight: Steganography and the Art of Covert Communication Cole, Eric. [12] Information Hiding: Steganography and Watermarking Attacks and Countermeasures (Advances in Information Security, Volume 1) Johnson, Neil F. / Doric, Zoran / Jajodia. [13] Computerworld. Steganography: Hidden Data. Quick study by Deborah Radcliff. [Online] 2002. http://www.computerworld.com/securitytopics/security/story/0,1 0801,71726,00. html.

9. CONCLUSION AND FUTURE SCOPE
Steganography transmits secrets through apparently innocuous covers in an effort to conceal the existence of a secret. Digital image steganography and its derivatives are growing in use and application. In areas where cryptography and strong encryption are being outlawed, citizens are looking at steganography to circumvent such policies and pass messages covertly. As with the other great innovations of the digital age: the battle between cryptographers and cryptanalysis, security experts and hackers, record companies and pirates, steganography and Steganalysis will continually develop new techniques to counter each other. In the near future, the most important use of steganographic techniques will probably be lying in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials. Steganography might also become limited under laws, since governments already claimed that criminals use these techniques to communicate. The possible use of steganography technique is as following: Hiding data on the network in case of a breach. Peer-to-peer private communications. Posting secret communications on the Web to avoid transmission. Embedding corrective audio or image data in case corrosion occurs from a poor connection or transmission.

REFERENCES
[1] Ahsan K., and Kundur D., “Practical Internet Steganography: Data Hiding in IP” found online at http://www.ece.tamu.edu/~deepa/pdf/txsecwrksh03.pdf.

23…...

Similar Documents

Free Essay

Steganography

...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...

Words: 8940 - Pages: 36

Free Essay

Paper

...Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview ● ● ● ● ● ● What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography? Stegacovered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia” What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective  Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text /......

Words: 681 - Pages: 3

Free Essay

Text Compression Using Ambigrams

...field is looking forward for improved and efficient methods in channel utilization. For some text, data recovery becomes indispensable because of importance of data it holds. Therefore, a lossless decomposition algorithm which is independent of the nature and pattern of text is today’s top concern. Efficiency of algorithms used today varies greatly depending on the nature of text. Such algorithms need some characters to be frequently appearing in the text and randomness in the characters present distorts the consistency to a large extent. This paper brings in the idea of using an art form called ambigram to compress text with consistency in the efficiency of the compression. Keywords Ambigrams, lossless compression, steganography, stego key, embedded algorithms, encryption. 1. Introduction When so many algorithms are available for compressing text, they hamper the readability of the text once compressed. Compressing the text using ambigrams also reduces the text to nearly 50% of its size. When most of the other compressing techniques depend on the nature of the text to be compressed, this technique is independent of the type of the text and requires only the corresponding data set. Hence, this method is consistent in performance. Ambigrams though known to many, has not found major applications in the field of technology. Probing further into this unravelled art form, it can be substantiated that ambigrams can be used to compress......

Words: 1801 - Pages: 8

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Free Essay

Is4670 Week 3 Lab

...capturing data in virtual machines? Proceed to Part 2 Week 3 Lab Part 2: Apply Steganography to Uncover Modifications to an Image File Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Use the S-Tools for Windows utility to search for possible steganographic activity embedded in image files * Extract a cipher key text file * Identify the use of steganographic data concealment techniques for covert communication and potential injected data * Extract steganographically-sequestered data from identified image files while conserving their integrity * Report the details of hidden files Week 3 Lab Part 2 - Assessment Worksheet Overview View the Demo Lab in the Practice section of Learning Space Unit 6 and answer the questions below. This demonstration will show the use of S-Tools and the Windows Image viewer to properly identify and extract embedded data in a carrier image. Lab Assessment Questions & Answers 1. What position is typically the least significant bit in a binary number? 2. What do the terms Little Endian and Big Endian deal with? 3. Attempt to describe a legitimate business need to leverage steganography. 4. Identify 3 Steganography tools not used in the lab. 5. What tools can be used to detect steganography? 6. What is steganography? Steganography is the art of hiding secret messages among non-secret files, videos, or......

Words: 635 - Pages: 3

Premium Essay

Idjgvjhgfjhgj

...thus the scope is wide. 3.) Steganography - A project on Secure Data Transfer Synopsis Data security is the essential in the today’s world of internet and networking. In any organization information is critical. In today’s world people are ready to spent thousands and lacks of money in order to ensure high level of information security. In spite of spending such a huge amount, still the objective of securing the information is not achieved as the data some how gets in the hands of hacker. As the technology for securing the data is advancing, hackers are also keeping pace with this technology. Hackers now make use of certain algorithm or other techniques to decode the data encoded by the senders. One of the ways to ensure security is to ensure that data is not visible to the hacker. This can be done by hiding the message itself behind some other objects. Here we are achieving this data security concept through the technique of Steganography. Objective and scope of the project Objective: The main objective for developing this application is that, it can provide the user with security of data. It will also provide the transfer of data from one machine to another in from of files. Only the authorized user and administrator can access the application. Scope: The project ‘Steganography’ will basically deal with data security. It will provide security of data by mechanism which is popularly known as ‘Steganography’ in the world of internet......

Words: 1214 - Pages: 5

Premium Essay

Morocco

... Prepared by: Christie Mathew May 23, 2014 Subliminal Mind Programming by Advertisements Links: http://www.youtube.com/watch?v=6ZeNubFcKtg - McDonald’s Commercial - I http://www.youtube.com/watch?v=4FG7gE2CIbo - McDonald’s Commercial – II http://www.youtube.com/watch?v=LMzbwa6PvEE - McD’s Subliminal Image on Food Network http://www.youtube.com/watch?v=Rnkg-yCPryE - 1960’s Subliminal National Anthem (In Slow Motion) Introduction to Subliminal Mind Programming: Subliminal advertising is all around us in plain sight and we see those types of commercials all the time through media. Subliminal messages in advertisements come from the idea of steganography. Steganography is the art of writing hidden messages. The difference in steganography and subliminal messages is steganography is mostly used to completely hide the messages so only the person aware of the hidden messages has the ability to decipher or discover it while subliminal messages are a form of programming. Subliminal messages can bypass the conscious paradigm and directly influence the unconscious level of human brain without even realizing it. Verbal or visual commands can trick the brain into wanting any particular product Subliminal Images in McDonald’s Old Commercials: McDonald’s old commercials are the classic examples of subliminal manipulation. In many advertisements random images flashes for a very little time that our conscious mind doesn’t realize it. It happens in a......

Words: 899 - Pages: 4

Free Essay

Digital Forensics - Uganda’s Preparedness

...to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented to the recognition, identification, individualization and evaluation of physical evidence by the application of natural science to law-science problems (Gialamas, 2000) [1]. Digital forensics is the process of identifying, preserving, analysing, and......

Words: 7291 - Pages: 30

Premium Essay

Security Issues and Principles Research Paper

...SECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stə nóggrəfi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or "covered," and graphie, or "writing". Synonymous to abstraction, the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a......

Words: 6118 - Pages: 25

Premium Essay

Case Bibliofind

... | |Equifax Secure |http://www.equifaxsecure.com/ | |Thawte |http://www.thawte.com/ | |VeriSign |http://www.verisign.com/ | | | | | Steganography | | |Steganography and Digital Watermarking |http://www.jjtc.com/Steganography/ | | | | |Communication Channel Security | | | Secrecy Threats | | |Anonymizer |http://www.anonymizer.com/ ......

Words: 912 - Pages: 4

Free Essay

Information Hiding - Steganography

...Information Hiding – Steganography Steganography Types and Techniques Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the...

Words: 1519 - Pages: 7

Premium Essay

Motion Vector

...Messages Using Motion Vector Technique In Video Steganography P.Paulpandi1, Dr.T.Meyyappan,M.sc.,M.Phil.,M.BA.,Ph.D2 Research Scholar1, Associate professor2 Department of Computer Science & Engineering, Alagappa University,Karaikudi. Tamil Nadu,India. Abstract- Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated. Keywords- Data hiding, Video Steganography,PSNR, Moving objects, AES Algorithm. I. INTRODUCTION Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Steganography is a technology that hides a user defined information within an object, a text, or a picture or in a video files. Steganography is Greek word has the meaning of ,......

Words: 2564 - Pages: 11

Free Essay

Cis 417 Assignment 4 Data-Hiding Techniques

...Assignment 4 Data-Hiding Techniques Buy Now From Below: http://www.homeworkarena.com/cis-417-assignment-4-data-hiding-techniques Assignment 4 Data-Hiding Techniques.. Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or......

Words: 297 - Pages: 2

Premium Essay

Cis 60

...of visits. When a cookie is used like this, it can be used as a shopping cart application on the website. Cookies are stored on the user's hard drive. The directory is different for each platform. RQ2: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. Further, steganography can be used to tag notes to online images. Finally, steganography can be used to maintain the confidentiality of valuable information, to protect the data from possible sabotage, theft, or unauthorized viewing. E1: C1: 1. A firewall examines electronic data......

Words: 665 - Pages: 3

Free Essay

Child Pornography on the Internet

...Internet use grows, so do the risks of children being exposed to inappropriate material, in particular, criminal activity by paedophiles and child pornographers. Many children first come in contact with the Internet at a very young age. Some children become victims of child pornography through close relatives who may have abused them. Some children become involved with chat services or newsgroup threads. It is usually through these sites that they meet child pornographers. Children may be asked to send explicit pictures of themselves taken either by a digital camera or scanned from a polaroid. The pornographer will then post the pictures on their web site, sometimes hiding them through encryption, steganography or password protecting them using a javascript or applet. Certain efforts have been made to control child pornography through legislation. In 1977 the Sexual Exploitation of Children Act was put into Legislation. (U.S. Code : Title 18, Section 2251-2253) The law prohibits the use of a minor in the making of pornography, the transport of a child across state lines, the taking of a pornographic picture of a minor, and the production and circulation of materials advertising child pornography. It also prohibits the transfer, sale, purchase, and receipt of minors when the purpose of such transfer, sale, purchase, or receipt is to use the child or youth in the production of child pornography.......

Words: 1297 - Pages: 6

Thugs of Hindostan | Höchster Preis | Batterie camping car 12v 130ah à decharge lente haut de gamme prête à l'emploi