Steganography Techniques and Applications
VerifiedAdded on  2020/04/13
|15
|3715
|46
AI Summary
The assignment delves into the realm of steganography, examining diverse techniques employed for concealing secret information within multimedia content. It provides a comprehensive analysis of different methods, including contourlet-based steganography, HTTP/2 steganography, and JPEG double compression. The discussion highlights the advantages and limitations of each technique, showcasing their real-world applications in secure communication. Moreover, the assignment touches upon the ethical considerations surrounding steganography and its potential misuse.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Surname 1
Student’s Name:
Professor’s Name:
Course Title:
Date:
Student’s Name:
Professor’s Name:
Course Title:
Date:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Surname 2
Table of Contents
1.Introduction..................................................................................................................................................................3
1.1 Definition..............................................................................................................................................................3
1.2 Hidden Data..........................................................................................................................................................3
1.3 Covert Channels...................................................................................................................................................3
1.4 Terminologies.......................................................................................................................................................4
2.Concepts of Steganography.........................................................................................................................................4
2.1 Principles of steganography.................................................................................................................................4
2.2 A Generic Stenographic System...........................................................................................................................4
2.3 Types of Steganography.......................................................................................................................................5
2.3.1 Injection........................................................................................................................................................6
2.3.2 Substitution...................................................................................................................................................6
2.3.3 Generation.....................................................................................................................................................6
2.4 Techniques of Embedding Messages...................................................................................................................6
2.4.1 LSB Modification.........................................................................................................................................6
2.4.2 JPEG Algorithms..........................................................................................................................................7
2.4.3 Patchwork......................................................................................................................................................8
2.5 Steganographic Attacks........................................................................................................................................8
3.File Transmission.........................................................................................................................................................9
3.1 Categories of Network Stego Techniques............................................................................................................9
3.1.1 In an Attachment...........................................................................................................................................9
3.1.2 In a Transmission..........................................................................................................................................9
3.1.3 In Network Headers......................................................................................................................................9
3.1.4 Over Protocol..............................................................................................................................................10
4. Stego Detection Techniques.....................................................................................................................................10
4.1 Detection Programs............................................................................................................................................10
4.2 Steganalysis........................................................................................................................................................10
5. Advancing Steganography........................................................................................................................................10
5.1 Future Techniques..............................................................................................................................................10
5.1.1 Improved Resistance to Analysis................................................................................................................11
5.1.2 Amount of Hidden Data..............................................................................................................................11
5.1.3 Improved Attack Tools...............................................................................................................................11
5.1.4 Security.......................................................................................................................................................11
Conclusion....................................................................................................................................................................11
Works Cited..................................................................................................................................................................13
Table of Contents
1.Introduction..................................................................................................................................................................3
1.1 Definition..............................................................................................................................................................3
1.2 Hidden Data..........................................................................................................................................................3
1.3 Covert Channels...................................................................................................................................................3
1.4 Terminologies.......................................................................................................................................................4
2.Concepts of Steganography.........................................................................................................................................4
2.1 Principles of steganography.................................................................................................................................4
2.2 A Generic Stenographic System...........................................................................................................................4
2.3 Types of Steganography.......................................................................................................................................5
2.3.1 Injection........................................................................................................................................................6
2.3.2 Substitution...................................................................................................................................................6
2.3.3 Generation.....................................................................................................................................................6
2.4 Techniques of Embedding Messages...................................................................................................................6
2.4.1 LSB Modification.........................................................................................................................................6
2.4.2 JPEG Algorithms..........................................................................................................................................7
2.4.3 Patchwork......................................................................................................................................................8
2.5 Steganographic Attacks........................................................................................................................................8
3.File Transmission.........................................................................................................................................................9
3.1 Categories of Network Stego Techniques............................................................................................................9
3.1.1 In an Attachment...........................................................................................................................................9
3.1.2 In a Transmission..........................................................................................................................................9
3.1.3 In Network Headers......................................................................................................................................9
3.1.4 Over Protocol..............................................................................................................................................10
4. Stego Detection Techniques.....................................................................................................................................10
4.1 Detection Programs............................................................................................................................................10
4.2 Steganalysis........................................................................................................................................................10
5. Advancing Steganography........................................................................................................................................10
5.1 Future Techniques..............................................................................................................................................10
5.1.1 Improved Resistance to Analysis................................................................................................................11
5.1.2 Amount of Hidden Data..............................................................................................................................11
5.1.3 Improved Attack Tools...............................................................................................................................11
5.1.4 Security.......................................................................................................................................................11
Conclusion....................................................................................................................................................................11
Works Cited..................................................................................................................................................................13
Surname 3
Surname 4
SPREAD SPECTRUM COMMUNICATION
1.Introduction
1.1 Definition
Steganography refers to abstracted data either it consists copyrighted information masked
in an audio content or invisible ink on paper. As such, it is mostly affiliated with information
camouflaged with other electronic data. To get the original file, one has to look for that
redundant or the least essential bit and replace it. Comparatively, steganography hides a message
while cryptography scrambles it. Technology evolution has sparked a lot of interest in the field
of steganography, although it has been there for centuries. For instance, to enhance privacy, the
media platform has displayed a lot of interest in steganography (Chittimalli and Ghansah, 34). It
has also been circulated that even the terrorists are using steganography to pass messages to their
sympathizers and pass orders to their operatives over the internet. All digital or electronic data
types can be utilized in abstracting information. However, this paper focuses more on covert
wireless communication shadow network using steganography.
1.2 Hidden Data
Audio files and graphics can be altered slightly to hide a message and the viewer or
listener cannot notice the interference. To hide data in sound files, one has to use bits contained
in the audio file and cannot be heard by the human ear. On the other hand, if you want to use
graphic images to send hidden data over the network, repeated color bits can be removed to pass
a particular message to target audience and the picture will still remain intact when one looks at
It. Stego is a program that is used to masked data and it utilizes algorithm to bury audio or image
file, and parole to enable one to extract information (Delp, 172). Today, steganography has
emerged on the internet on its own. Used for masking trademarks in music and images (digital
watermarking), and data transmission.
1.3 Covert Channels
Two parties communicating normally in a covert way, are typically using covert seven
model of communication. The objective is to utilize normal data objects but slightly alter them so
as to transmit information in a hidden manner (Desoky, 92). However, object alteration should
not make it unusual when being transmitted over a network.
SPREAD SPECTRUM COMMUNICATION
1.Introduction
1.1 Definition
Steganography refers to abstracted data either it consists copyrighted information masked
in an audio content or invisible ink on paper. As such, it is mostly affiliated with information
camouflaged with other electronic data. To get the original file, one has to look for that
redundant or the least essential bit and replace it. Comparatively, steganography hides a message
while cryptography scrambles it. Technology evolution has sparked a lot of interest in the field
of steganography, although it has been there for centuries. For instance, to enhance privacy, the
media platform has displayed a lot of interest in steganography (Chittimalli and Ghansah, 34). It
has also been circulated that even the terrorists are using steganography to pass messages to their
sympathizers and pass orders to their operatives over the internet. All digital or electronic data
types can be utilized in abstracting information. However, this paper focuses more on covert
wireless communication shadow network using steganography.
1.2 Hidden Data
Audio files and graphics can be altered slightly to hide a message and the viewer or
listener cannot notice the interference. To hide data in sound files, one has to use bits contained
in the audio file and cannot be heard by the human ear. On the other hand, if you want to use
graphic images to send hidden data over the network, repeated color bits can be removed to pass
a particular message to target audience and the picture will still remain intact when one looks at
It. Stego is a program that is used to masked data and it utilizes algorithm to bury audio or image
file, and parole to enable one to extract information (Delp, 172). Today, steganography has
emerged on the internet on its own. Used for masking trademarks in music and images (digital
watermarking), and data transmission.
1.3 Covert Channels
Two parties communicating normally in a covert way, are typically using covert seven
model of communication. The objective is to utilize normal data objects but slightly alter them so
as to transmit information in a hidden manner (Desoky, 92). However, object alteration should
not make it unusual when being transmitted over a network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Surname 5
1.4 Terminologies
Steganalysis- process of identifying abstracted data within a file.
Carrier File – file containing the hidden data.
Stego-Medium – the tool used to hide information.
Redundant Bits – data inside a file that can be modified without damaging the file.
Payload – data to be concealed.
2.Concepts of Steganography
2.1 Principles of steganography
There exist three principles that are used to gauge efficiency of a given method
(Dimitrova and Mileva 107) . They include, data volume, detection difficulties and removal
difficulties.
Principle of data volume asserts that if one can hide large amount of data then the method is
better.
Detection difficulties principle states that the harder it is to detect a hidden message the better the
technique.
Removal difficulties suggests that anyone who is trying to intercept the hidden message should
not be able to extract the hidden information.
2.2 A Generic Stenographic System
The information to be hidden is embedded in the cover data by applying sinking
algorithms. Stego data is produced by embedding algorithm. A typical generic steganography
system is represented in the diagram below.
1.4 Terminologies
Steganalysis- process of identifying abstracted data within a file.
Carrier File – file containing the hidden data.
Stego-Medium – the tool used to hide information.
Redundant Bits – data inside a file that can be modified without damaging the file.
Payload – data to be concealed.
2.Concepts of Steganography
2.1 Principles of steganography
There exist three principles that are used to gauge efficiency of a given method
(Dimitrova and Mileva 107) . They include, data volume, detection difficulties and removal
difficulties.
Principle of data volume asserts that if one can hide large amount of data then the method is
better.
Detection difficulties principle states that the harder it is to detect a hidden message the better the
technique.
Removal difficulties suggests that anyone who is trying to intercept the hidden message should
not be able to extract the hidden information.
2.2 A Generic Stenographic System
The information to be hidden is embedded in the cover data by applying sinking
algorithms. Stego data is produced by embedding algorithm. A typical generic steganography
system is represented in the diagram below.
Embedding
Algorithm
Key
Secret
Message
Surname 6
Figure 1: An overview of a generic steganography system.
Embedding algorithms should be able to meet some set of standard requirements, as
much as it may be represented in several modes (Fridrich 87). Firstly, effects on the cover data
should be as minimal as possible, that is, imperceptible. Secondly, no segment of the stego
information should be put in the header. The information must be contained in the cover data and
should be able to withstand network attacks such as filtering and re-sampling. A good algorithm
should also possess codes for correcting errors so that in case the hidden data is destroyed, it can
still be recovered. Finally, it is important that eavesdroppers never get to have the original cover
data or used twice. An eavesdropper can recover a secret message if he/she is in possession of
stego files that uses the same cover data.
2.3 Types of Steganography
Figure 2: Types of steganography
Algorithm
Key
Secret
Message
Surname 6
Figure 1: An overview of a generic steganography system.
Embedding algorithms should be able to meet some set of standard requirements, as
much as it may be represented in several modes (Fridrich 87). Firstly, effects on the cover data
should be as minimal as possible, that is, imperceptible. Secondly, no segment of the stego
information should be put in the header. The information must be contained in the cover data and
should be able to withstand network attacks such as filtering and re-sampling. A good algorithm
should also possess codes for correcting errors so that in case the hidden data is destroyed, it can
still be recovered. Finally, it is important that eavesdroppers never get to have the original cover
data or used twice. An eavesdropper can recover a secret message if he/she is in possession of
stego files that uses the same cover data.
2.3 Types of Steganography
Figure 2: Types of steganography
Surname 7
2.3.1 Injection
The model of steganography looks for those parts of a file that are likely to be ignored
and places the secret message in those parts. An application playing an audio, will stop when it
approaches end of file (EOF) and injects the secrets message after EOF, and thus, it does not
affect the sound effects of the file.
2.3.2 Substitution
It looks for the least meaningful least significant data in the cover file and substitutes it
with covert data. For instance, with audio files, if one alters the insignificant bit, the sound file
will be modified slightly that the difference cannot be detected by the human ear.
2.3.3 Generation
This type of steganography makes a new covert file depending on the details that the
covert message contains. For instance, one generation method will use the covert file to make an
image that looks like a modern painting.
The diagram below explains the process of steganography.
Figure 3: Process of Steganography
2.4 Techniques of Embedding Messages
2.4.1 LSB Modification
It is the most common technique to that is used to install information into cover file. LSB
modification works by altering the insignificant bit of the values of RGB of a pixel data. The
2.3.1 Injection
The model of steganography looks for those parts of a file that are likely to be ignored
and places the secret message in those parts. An application playing an audio, will stop when it
approaches end of file (EOF) and injects the secrets message after EOF, and thus, it does not
affect the sound effects of the file.
2.3.2 Substitution
It looks for the least meaningful least significant data in the cover file and substitutes it
with covert data. For instance, with audio files, if one alters the insignificant bit, the sound file
will be modified slightly that the difference cannot be detected by the human ear.
2.3.3 Generation
This type of steganography makes a new covert file depending on the details that the
covert message contains. For instance, one generation method will use the covert file to make an
image that looks like a modern painting.
The diagram below explains the process of steganography.
Figure 3: Process of Steganography
2.4 Techniques of Embedding Messages
2.4.1 LSB Modification
It is the most common technique to that is used to install information into cover file. LSB
modification works by altering the insignificant bit of the values of RGB of a pixel data. The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Surname 8
hidden information is then distributed pseudo-randomly across the picture. Comparatively, the
technique is similar to spread spectrum communication method of frequency hopping (Hashemi
Pour and Payandeh 206). The approach is works well against the human eye detecting the LSB
modified pixel. Furthermore, any alterations done can be associated with noise that the image
has. Images generated by computer applications such as macromedia flash or adobe illustrator do
not have a lot of noise thus, it would make a poor selection as cover file.
Figure 4: LSB modified color tone comparison.
The technique makes it possible to use 8-bit color index data types as much as the best
suited format is 24-bit true color RGB. However, it can be challenging due to much smaller
palette and may lead to greater variations n pixel luminescence and therefore, can be detected
easily. As such, it is recommended to do LSB modification with monochromatic or grayscale
color image. Nevertheless, the technique has some disadvantages like, it only operates on raw
image data, and the secret message may be damaged if lossy compression algorithm is used to
compress stego data.
2.4.2 JPEG Algorithms
While manipulation of JPEG files is uneasy as compared to uncompressed images, it can
still be used as cover file. The essential factor is to identify where to mask the data. JPEG
algorithm operates by breaking down the image in to various 8 x 8 pixel matrices. Calculation of
discrete cosine transformation (DCT) coefficients for each matrix is then done (Jing-Ming Guo
and Thanh-Nam Le 881). The output is then culminated to the nearest integer. The culminated
digits are the compressed further and the output stored. The DCT files forms the place to hide the
data. Slightly modifying a group of the biggest DCT coefficients forms a typical approach. The
bigger values have significant energy enough to make the minimum amount of effects on the
image. To avoid perception, selecting DCT coefficients that fall into a specific range can be
another approach. F5 and JSteg are the common steganography algorithms which utilizes DCT
hidden information is then distributed pseudo-randomly across the picture. Comparatively, the
technique is similar to spread spectrum communication method of frequency hopping (Hashemi
Pour and Payandeh 206). The approach is works well against the human eye detecting the LSB
modified pixel. Furthermore, any alterations done can be associated with noise that the image
has. Images generated by computer applications such as macromedia flash or adobe illustrator do
not have a lot of noise thus, it would make a poor selection as cover file.
Figure 4: LSB modified color tone comparison.
The technique makes it possible to use 8-bit color index data types as much as the best
suited format is 24-bit true color RGB. However, it can be challenging due to much smaller
palette and may lead to greater variations n pixel luminescence and therefore, can be detected
easily. As such, it is recommended to do LSB modification with monochromatic or grayscale
color image. Nevertheless, the technique has some disadvantages like, it only operates on raw
image data, and the secret message may be damaged if lossy compression algorithm is used to
compress stego data.
2.4.2 JPEG Algorithms
While manipulation of JPEG files is uneasy as compared to uncompressed images, it can
still be used as cover file. The essential factor is to identify where to mask the data. JPEG
algorithm operates by breaking down the image in to various 8 x 8 pixel matrices. Calculation of
discrete cosine transformation (DCT) coefficients for each matrix is then done (Jing-Ming Guo
and Thanh-Nam Le 881). The output is then culminated to the nearest integer. The culminated
digits are the compressed further and the output stored. The DCT files forms the place to hide the
data. Slightly modifying a group of the biggest DCT coefficients forms a typical approach. The
bigger values have significant energy enough to make the minimum amount of effects on the
image. To avoid perception, selecting DCT coefficients that fall into a specific range can be
another approach. F5 and JSteg are the common steganography algorithms which utilizes DCT
Surname 9
alteration to embed information. They can be detected by statistical analysis as much as it
escapes human detection.
2.4.3 Patchwork
The earliest steganographic algorithm. Operates by using pairs of pixels located in
various parts of the image to hide the secret message (Johnson, Duric and Jajodia 117). Below is
a sketch describing patchwork algorithm;
Make a pseudo-random stream of bits to select pixel pairs from the cover data.
Note, d, to be the variation between the two pixels.
Embed a bit of data into the pair. 0 represented by d<0 and 1 be, d>0. Switch pixels if they are in
the wrong order.
The pair is disregarded if it is beyond the set threshold or is equal to zero.
A notable amount of image distortion could occur because the algorithm includes switching
pixels. This algorithm is, therefore, recommended for hiding small amount of data.
2.5 Steganographic Attacks
A summary of steganographic attacks is as follows:
Traffic analysis – if, for instance, Alice and Amos are communicating and the attacker has
suspected so, an easy attack would be to observe the information they share with one another
Detection – statistical or visual attacks can be used to detect Stego data. Statistical attacks
operate comparing frequencies of the original cover data against that of the potential stego file.
can be detected through visual or statistical attacks. On the other hand, visual attacks check if
there are noticeable variations in the stego data (Lubacz, Mazurczyk and Szczypiorski 228).
With statistical attacks, the secret message may not be recovered as much as it is quite effective
in determining stego. Visual attacks work if the embedding algorithm causes noticeable
artifacts in the stego data.
alteration to embed information. They can be detected by statistical analysis as much as it
escapes human detection.
2.4.3 Patchwork
The earliest steganographic algorithm. Operates by using pairs of pixels located in
various parts of the image to hide the secret message (Johnson, Duric and Jajodia 117). Below is
a sketch describing patchwork algorithm;
Make a pseudo-random stream of bits to select pixel pairs from the cover data.
Note, d, to be the variation between the two pixels.
Embed a bit of data into the pair. 0 represented by d<0 and 1 be, d>0. Switch pixels if they are in
the wrong order.
The pair is disregarded if it is beyond the set threshold or is equal to zero.
A notable amount of image distortion could occur because the algorithm includes switching
pixels. This algorithm is, therefore, recommended for hiding small amount of data.
2.5 Steganographic Attacks
A summary of steganographic attacks is as follows:
Traffic analysis – if, for instance, Alice and Amos are communicating and the attacker has
suspected so, an easy attack would be to observe the information they share with one another
Detection – statistical or visual attacks can be used to detect Stego data. Statistical attacks
operate comparing frequencies of the original cover data against that of the potential stego file.
can be detected through visual or statistical attacks. On the other hand, visual attacks check if
there are noticeable variations in the stego data (Lubacz, Mazurczyk and Szczypiorski 228).
With statistical attacks, the secret message may not be recovered as much as it is quite effective
in determining stego. Visual attacks work if the embedding algorithm causes noticeable
artifacts in the stego data.
Surname 10
Brute force – some stego data has already been received by the attacker and is trying to extract
the message. This attack can be difficult if the attacker has a copy of the cover data or the sender
has used the cover data twice.
Manipulation – the message may be destroyed by the attacker by modifying the stego data
either by cropping, lossy compression, scaling, or rotating. Digital watermarking is typically
beaten by this attack.
3.File Transmission
Stego techniques can be used in transmission of viruses, to hide files or mask the trail when one
is browsing.
3.1 Categories of Network Stego Techniques
They include; Hiding in in an attachment, transmission, network headers, and an overt channel.
3.1.1 In an Attachment
The most common way to transmit stego files over a network from sender to receiver is
by hiding them in an attachment. The common means utilized include file transfer such as ftp,
posting file on website, or by email.
3.1.2 In a Transmission
Technically sender needs one program to attach a stego file and another one to transmit it.
Moreover, when data is masked in a transmission, one will just need one program to embed the
data into the cover file and send.
3.1.3 In Network Headers
Network headers such as TCP and IP can be used to hide data. IP has the information that
will be used to route information to its destination. When you want to hide data in the IP
information, an individual will need to look for those insignificant parts that would not affect
communication between the two communicating hosts (Pan 103). A field that can be modified in
the IP header is IP identification number. Normally the ID is increased by one for every packet
that is transmitted, however, any value can be used and the protocol can still operate normally.
The capability to modify and not affect the functionality creates an ideal ability to hide stego.
Acknowledgement and sequence number field found in TCP can be used to mask data. Values
Brute force – some stego data has already been received by the attacker and is trying to extract
the message. This attack can be difficult if the attacker has a copy of the cover data or the sender
has used the cover data twice.
Manipulation – the message may be destroyed by the attacker by modifying the stego data
either by cropping, lossy compression, scaling, or rotating. Digital watermarking is typically
beaten by this attack.
3.File Transmission
Stego techniques can be used in transmission of viruses, to hide files or mask the trail when one
is browsing.
3.1 Categories of Network Stego Techniques
They include; Hiding in in an attachment, transmission, network headers, and an overt channel.
3.1.1 In an Attachment
The most common way to transmit stego files over a network from sender to receiver is
by hiding them in an attachment. The common means utilized include file transfer such as ftp,
posting file on website, or by email.
3.1.2 In a Transmission
Technically sender needs one program to attach a stego file and another one to transmit it.
Moreover, when data is masked in a transmission, one will just need one program to embed the
data into the cover file and send.
3.1.3 In Network Headers
Network headers such as TCP and IP can be used to hide data. IP has the information that
will be used to route information to its destination. When you want to hide data in the IP
information, an individual will need to look for those insignificant parts that would not affect
communication between the two communicating hosts (Pan 103). A field that can be modified in
the IP header is IP identification number. Normally the ID is increased by one for every packet
that is transmitted, however, any value can be used and the protocol can still operate normally.
The capability to modify and not affect the functionality creates an ideal ability to hide stego.
Acknowledgement and sequence number field found in TCP can be used to mask data. Values
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Surname 11
are picked and generated randomly by the communicating parties. Thus, the first signal that is
transmitted can have hidden information in those fields that have the least importance.
3.1.4 Over Protocol
Typically, this is referred to as data camouflaging, where data is made to resemble a
different entity altogether. With this method, data is placed on the normal network traffic, ad
changed in such a manner that it looks resembles overt protocol (SAJEDI and JAMZAD 166).
4. Stego Detection Techniques
4.1 Detection Programs
The sole purpose of these programs is to find random data. The simplest means to
identify randomized data is to create a histogram the bits across a file. Histogram for files that
don’t have random data contains valleys and peak where some marks appear more frequently and
others are displayed infrequently (Vijayarajeswari, Rajivkannan and Santhosh 1347). On the
contrast, histogram with random data appear flat because each mark has equal frequency.
Detection program will flag a file if it has a flat histogram. The program also observes the header
and identifies if the file Is compressed, encrypted or a JPEG image.
4.2 Steganalysis
Steganalysis is the act of identifying and extracting steganographic data. Steganalyst is a
term used to refer to an individual who attempts to break stego methods (Yaw 213). As much as
a cryptanalyst and steganalyst are the same, their responsibilities vary. Cryptanalyst attempts to
decrypt an encrypted message so as to gain access of the content while a steganalyst tries to
determine if a message has been hidden in a file. Once the steganalyst has identified hidden
information in a file, it is extracted, and if it is found to be encrypted the cryptanalyst comes in to
decrypt it so as to get a meaning of the message.
5. Advancing Steganography
5.1 Future Techniques
Future technology will lead to enhancement and introduction of new methods frequently.
Technology is one of the fields that is evolving at a high rate. New stego attacks are being
are picked and generated randomly by the communicating parties. Thus, the first signal that is
transmitted can have hidden information in those fields that have the least importance.
3.1.4 Over Protocol
Typically, this is referred to as data camouflaging, where data is made to resemble a
different entity altogether. With this method, data is placed on the normal network traffic, ad
changed in such a manner that it looks resembles overt protocol (SAJEDI and JAMZAD 166).
4. Stego Detection Techniques
4.1 Detection Programs
The sole purpose of these programs is to find random data. The simplest means to
identify randomized data is to create a histogram the bits across a file. Histogram for files that
don’t have random data contains valleys and peak where some marks appear more frequently and
others are displayed infrequently (Vijayarajeswari, Rajivkannan and Santhosh 1347). On the
contrast, histogram with random data appear flat because each mark has equal frequency.
Detection program will flag a file if it has a flat histogram. The program also observes the header
and identifies if the file Is compressed, encrypted or a JPEG image.
4.2 Steganalysis
Steganalysis is the act of identifying and extracting steganographic data. Steganalyst is a
term used to refer to an individual who attempts to break stego methods (Yaw 213). As much as
a cryptanalyst and steganalyst are the same, their responsibilities vary. Cryptanalyst attempts to
decrypt an encrypted message so as to gain access of the content while a steganalyst tries to
determine if a message has been hidden in a file. Once the steganalyst has identified hidden
information in a file, it is extracted, and if it is found to be encrypted the cryptanalyst comes in to
decrypt it so as to get a meaning of the message.
5. Advancing Steganography
5.1 Future Techniques
Future technology will lead to enhancement and introduction of new methods frequently.
Technology is one of the fields that is evolving at a high rate. New stego attacks are being
Surname 12
created every day and thus needs speed to develop new and advanced technique to counter them
(Wayner 142).
5.1.1 Improved Resistance to Analysis
The more sophistication of stego gets the more it will be for attackers to detect or analyze
it. Current stego technology makes it relatively easy to detect hidden messages in a file being
transmitted. Once it has been detected, it can be extracted and the only security remaining to
access the message is the level of encryption used. Future advancement will ensure that stego
will remain undetected and irretrievable by attacker and will only be identified by the intended
recipient. One of the intriguing scenario in future would be the capability to manipulate
information, pint out a hard copy, rescan it, and also having the capacity to extract the secret
message.
5.1.2 Amount of Hidden Data
The future methods will facilitate hiding of larger volumes of data in a file as compared
to current techniques where it limits the bits embedded in a file to a point where it will be easy to
know that stego Is being utilized. Criminals are using stego in instances such as industrial
espionage.
5.1.3 Improved Attack Tools
In the field of steganography, a lot of efforts has been made to break the various methods,
however, as much as there are several tools for hiding data, little effort has been put to determine
the overall capability of the different techniques. In future, more techniques that combines both
cryptography and steganography will be used in order to enhance data security when it is being
transmitted.
5.1.4 Security
One future objective is a concept known as personal net. The concept explains the
possibility of people managing their own information, security and communication. Reliance on
public internet to share and transmit personal data will be a past experience due to security lax
and danger. Browser technology will add features for permitting and filtering embedded
information. Attacks on crypto ad stego will be the will form standard security measures in
business entities, governments and even at personal level.
created every day and thus needs speed to develop new and advanced technique to counter them
(Wayner 142).
5.1.1 Improved Resistance to Analysis
The more sophistication of stego gets the more it will be for attackers to detect or analyze
it. Current stego technology makes it relatively easy to detect hidden messages in a file being
transmitted. Once it has been detected, it can be extracted and the only security remaining to
access the message is the level of encryption used. Future advancement will ensure that stego
will remain undetected and irretrievable by attacker and will only be identified by the intended
recipient. One of the intriguing scenario in future would be the capability to manipulate
information, pint out a hard copy, rescan it, and also having the capacity to extract the secret
message.
5.1.2 Amount of Hidden Data
The future methods will facilitate hiding of larger volumes of data in a file as compared
to current techniques where it limits the bits embedded in a file to a point where it will be easy to
know that stego Is being utilized. Criminals are using stego in instances such as industrial
espionage.
5.1.3 Improved Attack Tools
In the field of steganography, a lot of efforts has been made to break the various methods,
however, as much as there are several tools for hiding data, little effort has been put to determine
the overall capability of the different techniques. In future, more techniques that combines both
cryptography and steganography will be used in order to enhance data security when it is being
transmitted.
5.1.4 Security
One future objective is a concept known as personal net. The concept explains the
possibility of people managing their own information, security and communication. Reliance on
public internet to share and transmit personal data will be a past experience due to security lax
and danger. Browser technology will add features for permitting and filtering embedded
information. Attacks on crypto ad stego will be the will form standard security measures in
business entities, governments and even at personal level.
Surname 13
Conclusion
Steganography is an effective and fascinating technique of hiding data that has been
utilized for a very long time. Methodologies can be implemented to determine the existence of
these devious tactics, but, firstly, it is important to acknowledge that such techniques exist.
Steganography has several gives several valid reasons to adopt it, including, digital
watermarking, or a central storage that is more secure for storing key processes or passwords.
Additionally, technology is simple to learn, understand, use, and also hard to detect. There exist
three principles that are used to gauge efficiency of a given method. They include, data volume,
detection difficulties and removal difficulties. Stego techniques can be used in transmission of
viruses, to hide files or mask the trail when one is browsing.
Although the field of steganography is very fascinating and interesting, it has some
disadvantages. Current steganographic algorithms are inadequate for digital watermarking, the
hidden message can be damaged due to attacks. Moreover, stogosystems that rely on images can
be easily identified through statistical analysis. Hopefully, in future, a more sophisticated,
unalterable and undetectable stegosystem will be developed.
Conclusion
Steganography is an effective and fascinating technique of hiding data that has been
utilized for a very long time. Methodologies can be implemented to determine the existence of
these devious tactics, but, firstly, it is important to acknowledge that such techniques exist.
Steganography has several gives several valid reasons to adopt it, including, digital
watermarking, or a central storage that is more secure for storing key processes or passwords.
Additionally, technology is simple to learn, understand, use, and also hard to detect. There exist
three principles that are used to gauge efficiency of a given method. They include, data volume,
detection difficulties and removal difficulties. Stego techniques can be used in transmission of
viruses, to hide files or mask the trail when one is browsing.
Although the field of steganography is very fascinating and interesting, it has some
disadvantages. Current steganographic algorithms are inadequate for digital watermarking, the
hidden message can be damaged due to attacks. Moreover, stogosystems that rely on images can
be easily identified through statistical analysis. Hopefully, in future, a more sophisticated,
unalterable and undetectable stegosystem will be developed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Surname 14
Works Cited
Desoky, Abdelrahman. Noiseless Steganography: The Key To Covert Communications. Boca
Raton, CRC Press, 2012,.
Fridrich, Jessica. Steganography In Digital Media. Cambridge, Cambridge University Press,
2010,.
Chittimalli, Vijaya Lakshmi, and Isaac Ghansah. Keeping Secrets Secret. Boston, Springer,
2009,.
Johnson, Neil F et al. Information Hiding. New York, Springer Science+Business Media, 2013,.
Delp, Edward J. Security, Forensics, Steganography, And Watermarking Of Multimedia
Contents X. Bellingham, Wash., SPIE, 2008,.
Pan, Jeng-Shyang. Intelligent Multimedia Data Hiding. Berlin, Springer, 2012,.
Yaw, Choon Kit. Steganography. Kuantan, Pahang, UMP, 2013,.
SAJEDI, Hedieh, and Mansour JAMZAD. "Contsteg: Contourlet-Based Steganography
Method." Wireless Sensor Network, vol 01, no. 03, 2009, pp. 163-170. Scientific
Research Publishing, Inc,, doi:10.4236/wsn.2009.13022.
Dimitrova, Biljana, and Aleksandra Mileva. "Steganography Of Hypertext Transfer Protocol
Version 2 (HTTP/2)." Journal Of Computer And Communications, vol 05, no. 05, 2017,
pp. 98-111. Scientific Research Publishing, Inc,, doi:10.4236/jcc.2017.55008.
Lubacz, Jozef et al. "Principles And Overview Of Network Steganography." IEEE
Communications Magazine, vol 52, no. 5, 2014, pp. 225-229. Institute Of Electrical And
Electronics Engineers (IEEE), doi:10.1109/mcom.2014.6815916.
Hashemi Pour, Amin, and Ali Payandeh. "A New Steganography Method Based On The
Complex Pixels." Journal Of Information Security, vol 03, no. 03, 2012, pp. 202-
208. Scientific Research Publishing, Inc,, doi:10.4236/jis.2012.33025.
Works Cited
Desoky, Abdelrahman. Noiseless Steganography: The Key To Covert Communications. Boca
Raton, CRC Press, 2012,.
Fridrich, Jessica. Steganography In Digital Media. Cambridge, Cambridge University Press,
2010,.
Chittimalli, Vijaya Lakshmi, and Isaac Ghansah. Keeping Secrets Secret. Boston, Springer,
2009,.
Johnson, Neil F et al. Information Hiding. New York, Springer Science+Business Media, 2013,.
Delp, Edward J. Security, Forensics, Steganography, And Watermarking Of Multimedia
Contents X. Bellingham, Wash., SPIE, 2008,.
Pan, Jeng-Shyang. Intelligent Multimedia Data Hiding. Berlin, Springer, 2012,.
Yaw, Choon Kit. Steganography. Kuantan, Pahang, UMP, 2013,.
SAJEDI, Hedieh, and Mansour JAMZAD. "Contsteg: Contourlet-Based Steganography
Method." Wireless Sensor Network, vol 01, no. 03, 2009, pp. 163-170. Scientific
Research Publishing, Inc,, doi:10.4236/wsn.2009.13022.
Dimitrova, Biljana, and Aleksandra Mileva. "Steganography Of Hypertext Transfer Protocol
Version 2 (HTTP/2)." Journal Of Computer And Communications, vol 05, no. 05, 2017,
pp. 98-111. Scientific Research Publishing, Inc,, doi:10.4236/jcc.2017.55008.
Lubacz, Jozef et al. "Principles And Overview Of Network Steganography." IEEE
Communications Magazine, vol 52, no. 5, 2014, pp. 225-229. Institute Of Electrical And
Electronics Engineers (IEEE), doi:10.1109/mcom.2014.6815916.
Hashemi Pour, Amin, and Ali Payandeh. "A New Steganography Method Based On The
Complex Pixels." Journal Of Information Security, vol 03, no. 03, 2012, pp. 202-
208. Scientific Research Publishing, Inc,, doi:10.4236/jis.2012.33025.
Surname 15
Vijayarajeswari, R. et al. "A Simple Steganography Algorithm Based On Lossless Compression
Technique In WSN." Circuits And Systems, vol 07, no. 08, 2016, pp. 1341-
1351. Scientific Research Publishing, Inc,, doi:10.4236/cs.2016.78117.
Jing-Ming Guo, and Thanh-Nam Le. "Secret Communication Using JPEG Double
Compression." IEEE Signal Processing Letters, vol 17, no. 10, 2010, pp. 879-
882. Institute Of Electrical And Electronics Engineers (IEEE),
doi:10.1109/lsp.2010.2066110.
Bhattacharyya, Siddhartha et al. Intelligent Analysis of Multimedia Information. Hershey,
Pennsylvania, IGI Global, 2017,.
Garain, Utpal, and Faisal Shafait. Computational Forensics. Cham, Springer, 2015,.
Wayner, Peter. Disappearing Cryptography. Amsterdam ; Boston, Morgan Kaufmann
Publishers, 2013,.
Pan, Jeng-Shyang. Intelligent Multimedia Data Hiding. Berlin, Springer, 2016,.
Cole, Eric. Hiding in Plain Sight. New York, Wiley, 2012,.
Vijayarajeswari, R. et al. "A Simple Steganography Algorithm Based On Lossless Compression
Technique In WSN." Circuits And Systems, vol 07, no. 08, 2016, pp. 1341-
1351. Scientific Research Publishing, Inc,, doi:10.4236/cs.2016.78117.
Jing-Ming Guo, and Thanh-Nam Le. "Secret Communication Using JPEG Double
Compression." IEEE Signal Processing Letters, vol 17, no. 10, 2010, pp. 879-
882. Institute Of Electrical And Electronics Engineers (IEEE),
doi:10.1109/lsp.2010.2066110.
Bhattacharyya, Siddhartha et al. Intelligent Analysis of Multimedia Information. Hershey,
Pennsylvania, IGI Global, 2017,.
Garain, Utpal, and Faisal Shafait. Computational Forensics. Cham, Springer, 2015,.
Wayner, Peter. Disappearing Cryptography. Amsterdam ; Boston, Morgan Kaufmann
Publishers, 2013,.
Pan, Jeng-Shyang. Intelligent Multimedia Data Hiding. Berlin, Springer, 2016,.
Cole, Eric. Hiding in Plain Sight. New York, Wiley, 2012,.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.