Details

STEGANOGRAPHY (THE ART OF HIDING INFORMATION)

Megha Goyal

Doaba Institute of Engineering and Technology, Kharar

Maninder Kaur

Doaba Institute of Engineering and Technology, Kharar

1-11

Vol: 4, Issue: 2, 2014

Receiving Date: 2014-02-08 Acceptance Date:

2014-03-05

Publication Date:

2014-04-04

Download PDF

Abstract

Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The initial aim of this study was to investigate steganography and how it is implemented. Based on this work a number of common methods of steganography could then be implemented and evaluated. The strengths and weaknesses of the chosen methods can then be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Seven steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit or parity patterns, which correspond to the message being hidden.

Keywords: .Introduction, Steganography Vs Cryptography, Uses of Steganography, Steganography under various Media, Steganalysis, Conclusion, References.

References

  1. Cachin, “An Information-Theoretic Model for Steganography”, in proceeding 2nd Information Hiding Workshop, vol. 1525.
  2. D. Artz, “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing, pp. 75-80, May-Jun 2001.
  3. E.T. Lin and E.J. Delp, 'A Review of Data Hiding in Digital Images,' in Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS '99, Ed., Apr. 1999.
  4. Anderson R.J. and Petitcolas F.A.P., “On the Limits of steganography,” J. Selected Areas in Comm., vol. 16, no.4, 1998.
  5. Bailey, K. and Curran, K. “An evaluation of image-based steganography methods”. International Journal of Digital Evidence, Fall 2003.
  6. Information Hiding: Steganography and Watermarking Attacks and Countermeasures (Advances in Information Security, Volume 1) Johnson, Neil F. / Doric, Zoran / Jajodia.
  7. L. Zheng and I. Cox, JPEG based conditional entropy coding for correlated steganography, in: Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, China, 2-5 July 2007.
  8. Information hiding, watermarking and steganography, Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland, 28th April 2009.
  9. M. J. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg,“Natural language watermarking and tamperproofing,” in Information Hiding: Fifth International Workshop, F. A. P. Petitcolas, ed., Lecture Notes in Computer Science 2578, pp. 196–212, Springer,October 2002.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.