Information Hiding Using Digital Steganography

Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly recommended on which stenographic technique are more suitable for which applications.

Chapter One

Introduction

1.1 Background to the Study

Currently, the digital information revolution has brought significant changes in our society and daily routines. In line with the revolution, Internet and wireless network offer ubiquitous channels to deliver and exchange information. Therefore, public information exchange is secured by using an encryption method where a secret data can be encrypted to prevent the content from being intercepted. However, with the technological advancement of information security, most Internet users are not aware that sending encrypted messages will draw unnecessary attention to malicious black hats such as crackers and hackers. This is because the encrypted data appears as a string of gibberish data that might arouse suspicion. Moreover, there is a possibility of illegal exploitation attempts to the vulnerability of the encrypted messages due to curiosity and inquisitiveness of a hacker. As a result, the secret data which has been encrypted could be illegally intercepted, unauthorized tampered or even damaged during data transmission.

In order to alleviate the issue mentioned above, steganography is introduced as an alternative design to conceal a secret data into an unsuspicious cover-object so that it can be sent stealthily through a public communication channel without drawing any unnecessary attention of the black hats.

Steganography is derived from the findings of Johannes Trithemus (1462-1516) entitled Steganographia which comes from the Greek words (στεγανό-ς, γραυ-ειν), steganos literally means “covered”; and graphia means “writing”. Eventually the entire definition is defined as covered writing (Petitcolas et al., 1999).

1.2 Statements of the Problem

Over the years, numerous steganography techniques that embed secret data into cover-objects such as image, audio, video etc. have been invented and implemented. However, in the current image-based steganography technology, there are several problems arise due to

i. Distortion produced in a stego-image after embedding a secret data.

There are certain existing schemes such as Hide and Seek 4.1 and Hide in the Picture 2.1 result in a distorted stego-image after embedding a secret data. Due to this factor, the stego-image produced is able to raise suspicion and can be clearly distinguished by an attacker. Thus, researches on alleviating the distortion problem in the stego-image need to be carried out.

ii. There is a restriction on embedding certain file types during selection of secret data.

A stenographic scheme is not feasible for users if the secret data is restricted to only a few data types, for instance, text, document and image file only. Some stenographic schemes such as Gifshuffle v2.0 and EzStego only allow certain types of secret data, for instance, text and document file to be embedded (Bailey and Curran, 2006). As a result, the study on embedding other files extension is needed to be explored to ease the restriction.

iii. Limited capacity for embedding a secret data into the cover-image.

There are some existing stenographic tools which are encountering a relatively limited payload. In SecurEngine Professional v1.0 alpha, the secret data is required to be 30% of the cover-image size. In other words, a secret data needs a cover which is three times larger to fulfil the embedding ratio of 1:3. As an example, a secret data which contains of 1MB needs to be embedded in a 3MB cover. Besides, StegoMagic 1.0 has an embedding ratio of 1:8 by limiting the user to hide only 12.5% of secret data inside the cover. Apparently, there is a commercial stenographic tool named steganos Privacy Suite 2008 which consists of multiple features such as encryption, shredder, antivirus and safes for data protection (Steganos GmbH, 2009), but only allows approximately 13% (embedding ratio of 1:7.69) of secret data to be embedded in the cover. Due to the mentioned existing tools did not consider the aspect of payload as the priority, suspicion and curiosity obviously will be arisen when an unreasonably large file is sent over the network during data transmission. Hence, research on the improvement and optimization of the payload capacity is essential to be carried out.

1.3 Research Question

After understanding the problem statements which relate to the current trend of steganography development, several research questions have been formulated as follows:

Which type of cover-image would be suitable for stenographic usage?

What are the methods that can be used to embed a secret data into a cover-image?

What method can be used to retain the file size of a stego-image to prevent unnecessary suspicion?

What are the methods that can be used to embed all file formats?

 

1.4 Purpose of the Study

The primary objective of this dissertation is to develop a prototype which is able to embed a secret data into a bitmap cover-image as well as alleviate the above- mentioned issues which are the occurrence of a distorted stego-image, file types restriction for a secret data and improvement of the payload. In order to achieve the goal, several secondary objectives have been defined as follows:

To study and analyze the image format which is compatible for steganography usage.

To study and analyze the Least Significant Bit (LSB) substitution mechanism.

To analyze and evaluate the proposed algorithm in terms of a) accuracy, b) quality of stego-image produced, c) capacity of secret data which can be embedded and d) types of secret data which can be embedded.

 

1.5 Scope of the Study

The scope of study in the proposed scheme includes the implementation of a prototype which is able to

Embed various type of data file through the encoding and decoding process.

Manipulate maximum LSB(list significant bit) in an embedding mechanism

 

1.6 Significance of Study

Due to advances in ICT(information communication technology), most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images. The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity are requires to protect against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding.

1.7 Limitation of the Study

This project has an assumption that is both the sender and receiver must have shared some secret information before imprisonment. Pure steganography means that there is none prior information shared by two communication parties.

1.8 Operational Definition of Terms

There are some terminologies used in the field of steganography needed to be presented:

Cover-object refers to an object used as a carrier to embed messages. Many objects can be used as a cover, such as text, image, audio, HTML (Sui and Luo, 2004), XML (Takizawa et al., 2001) and even TCP/IP (Ahsan and Kundur, 2002). In the context of this research, the cover-object is a bitmap image and thus it is defined as cover-image.
Stego-object refers to the object which carries a hidden message after the process of data embedding. When given a cover-image, the secret message will be embedded into the cover-image and produces a stego-image.
Stego-image refers to a cover-image which is embedded with secret data.

Steganalysis refers to the process of detecting a secret message by distinguishing between cover-objects and stego-objects

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Information Hiding Using Digital Steganography, and acknowledges the contributions of scholars who have previously conducted similar research [REV67024] …

Document Information

    • Format: DOC/PDF
    • Title: Information Hiding Using Digital Steganography:

YOU MAY LOVE THESE (Recommended)

  • INTRODUCTION Most rental service firms today still use manual information system because their information needs are of moderate size and managers of such firms have probably been enjoying the manual system as regards to their relatively and comfortable low level of transaction activities. With the high level of social activities been experienced, It is only the rental firms with very large information or high capacity of rental servic […]

    45 Pages 1 - 5 Chapters 5,750 Words DOC/PDF Format Instant Download UPN63433

  • How to write the “Web Driven Information System Of Museums” Project

    1.1BACKGROUND OF THE STUDY Digital museums appeared in the Internet many years ago. First digital museums have emerged since 1991. However, despite the identity and quality of exhibitions their exhibits are comparable with traditional art museum publications albums, catalogues and books, while the Internet can create a qualitatively new displays, where previously impossible or inconsistent methods of display historical and artistic her […]

    51 Pages 1 - 5 Chapters 3,452 Words DOC/PDF Format Instant Download UPN63411

  • To start a project on Using Management Information System To Improve Customer Services In The Banking Industry, follow these guidelines: This research work was aimed at determining the extent to which the use of man agreement information system will improve customer services in inter-continental bank with much emphasis on the impact of computerization of its operations. A structured questionnaire made up of a little combination of…

    72 Pages 1 - 5 Chapters 8,969 Words DOC/PDF Format Instant Download UPN62716

  • To develop a project on Using Management Information System To Improve Customer Services And Growth In The Banking Industry, follow these approaches: This research work was carried out in order to examine the extent of using management information system (Mis) to improve customers service and growth in inter-continental bank Enugu with so much emphasis on the impact of computerization on its operation. This survey made are of information from …

    61 Pages 1 - 5 Chapters 7,069 Words DOC/PDF Format Instant Download UPN62715

  • To undertake a project on Use Of Management Information System As An Aid To Management Decision In Small Scale Firms, follow these effective ways: A clear understanding of managerial functions is very important for the accountant who must provide the necessary information which managers need to perform their functions. In a modern competitive economy the availability of relevant, timely and accurate information especially for planning contr…

    84 Pages 1 - 5 Chapters 10,933 Words DOC/PDF Format Instant Download UPN62712

  • To write a project on Use Of Information And Communication Technology In Academic Libraries, follow these structure: Academic libraries play a prominent role in providing information services in various forms to researchers, scientist, policy makers, planners etc. a well organized academic library should have ICT to assist both patrons and information professionals in the libraries. This research work highlight…

    58 Pages 1 - 5 Chapters 5,900 Words DOC/PDF Format Instant Download UPN63506

  • To carry out a project on Use Of Financial Accounting Information System For Management Decision Making, follow these effective methods: This study focused on the use of financial accounting information system for management devision making. The objective of the study was to determine whether financial accounting information system was used by management for efficient and effective performance, and the extent the information guide…

    62 Pages 1 - 5 Chapters 7,834 Words DOC/PDF Format Instant Download UPN62699

  • To start a project on Use Of Computer In Recording Accounting Information, Problems And Prospects, follow these guidelines: This research work is aimed at ascertaining the various roles played by using computer in recording accounting information problems and prospects in the modern business world using Bendel feed and flour mill, Ewu, Edo state as a case study. The importance of using computer in recording accounting…

    58 Pages 1 - 5 Chapters 12,557 Words DOC/PDF Format Instant Download UPN62254

  • Techniques for writing the “University Management Information System” Project

    INTRODUCTION In common with other public sector institutions, Higher Education Institutions (HEIs) are seeking to maintain the three „Es‟ of efficiency, effectiveness and economy, by adopting private sector managerial techniques. Business Process Re- Engineering is currently been used as a change management strategy in a number of UK Higher Education Institutions. A number of interrelated pressures have created the need for change in p […]

    78 Pages 1 - 5 Chapters 2,125 Words DOC/PDF Format Instant Download UPN63056

  • To develop a project on Survey Of The Use Of Books For Bibliotherapy By Library And Information Science Students, follow these approaches: The importance of bibliotherapy in survey use of book for library and information science student cannot be emphasized. So the purpose of this study is to find out what bibliotherapy is all about and the extent student at library and information science is making use of it. In this study the main…

    54 Pages 1 - 5 Chapters 6,430 Words DOC/PDF Format Instant Download UPN63469

Live Chat