Professional Documents
Culture Documents
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopa
A STUDY OF THE EMERGING
sdfghjklzxcvbnmqwertyuiopasdf
TRENDS IN STEGANOGRAPHY
ghjklzxcvbnmqwertyuiopasdfghj
RESEARCH PAPER
klzxcvbnmqwertyuiopasdfghjklz
xcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyu
iopasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd SUBMITTED BY
DS GUIDE
fghjklzxcvbnmqwertyuiopasdfgh
Dr (Mrs) Seema Keshariya Maj Gaurav Sharma
SOATE-36.
jklzxcvbnmqwertyuiopasdfghjklz
FCE,MCTE.
xcvbnmrtyuiopasdfghjklzxcvbn
A STUDY OF THE EMERGING TRENDS IN STEGANOGRAPHY
by
INTRODUCTION
STEGANOGRAPHY TECHNIQUES
(b) Audio Steganography. Like text files, sound files may be modified in
such a way that they contain hidden information. Such techniques embed
data in sound files using the properties of the Human Auditory System (HAS).
Examples of audio steganography techniques include least significant bit,
phase coding and echo Hiding.
4. The various techniques described in brief above are just to acquaint us with the
basic type of Stegnography types. However, in this message hiding technology
has come a long way over the years and has maintained its pace to utilize the
loopholes existing in the contemporary data transfer technologies.
3
5. A new method of real-time steganography[1] that does not need a cover media.
This method is based on real-time steganography on output images displayed by
the instrument. In order to extract information, first the displayed image should be
recorded by photography, filming or another method and then the information be
extracted with the help of the relevant program. This method can be used for
announcing confidential messages in public places. For example, one can hide
information in electronic advertisement billboards, video conferencing and digital
cinemas.
6. The main goal of this method is to hide information on the output image of the
instrument (such as image displayed by an electronic advertising billboard). This
method can be used for announcing a secret message in a public place. In
general, this method is a kind of steganography, but it is done in real time on the
output of a device such as electronic billboard. To this end, we consider each
frame that is shown by the machine at any moment, irrespectively of whether it is
photo, text, or else, as an image. Then we divide the image into small blocks. If
the pixel colors of the blocks are similar, we change the color characteristics of a
number of these pixels to a certain extent. So information is hidden in the image.
Because of showing many frames at a second by the instrument and, on the
other hand, in order to provide the possibility of photographing the image for
extracting information, hide the text recurrently in a large number of frames (e.g.
all the frames displayed for 2 seconds). Also put a sequence number for each
part of information. By using this sequence number one can detect missing parts
of information in case of such event like not making pictures at the proper
interval. In addition, for steganography, we divide the image into two upper and
lower blocks while hiding similar information in each block. In such a case, even if
the camera cannot photograph part of the image, information can still be
extracted from the image. For implementing this method on an electronic
billboard, a special device is added to the billboard. This device gets the
information from the main office, and hides it on the output of the billboard. This
device can be a small computer that receives information from the main office via
regular communication systems and hides them on the billboard screen.
Advantages
(a) In this method, there is no need to cover media. Therefore, there is no
cover media containing hidden information to be stolen.
(b) Hidden information is in real-time form.
(c) This method is capable of hiding a large volume of information without
need of any space.
(d) In the usual methods of steganography, information is hidden in cover
media on the server side and then sent to the client. However, in this method,
information is hidden in the displayed output screen on the client side, thus
increasing information security.
Disadvantages
(a) If one cannot take the frame in the intended moment in a certain time,
the hidden information will be lost.
(b) The imaged frame is sensitive to the environmental effects.
(c) If using a camera for taking photographs of the output frame, it needs
an advanced camera.
(d) There is a variety of systems which have a different screen size. So
we should define a definite screen resolution for each system.
5
10. The Proposed Technique. The idea behind this technique[2] is very simple.
We can set foreground color for invisible characters as like as any other visible
characters. But the color attribute is not noticed by the users where the font color is
very much likely to be noticed by the user. So we can hide secret information in
invisible characters in form of RGB values without any risk of exposure. For
example consider the following stream
101010110101110101100011010100110011101001001110
01010011100101010110001010 Here we divide the secret bit stream of groups of 8
bits.Groups are represented by alteration of italic and bold fonts.
101011010111010110001101010011001110100100111001010011100101010110
001010 The RGB values of the first three invisible characters of a document should
be {173, 117, 141}, {76, 233, 57}, {78, 85, 138}
11. With the development of Computer and its expansion, and use in different
areas of life and work, the issue of securing information has gained special
significance. The advantage to prefer Text Steganography over other media is its
smaller memory occupation and simpler communication. Different Languages
and their structures make differences in the preferred Steganographic system.
Normally no single technique is to be used for all languages.
12. We all know that every Language has its own characteristics. Mostly all Indian
Languages are built with similar Vowels and Consonant structures. The method
what has been proposed for Hindi Language[3], as well suits with the other
Indian Languages perfectly. Normally information is transferred in the form of bit
streams. We are introducing a new algorithm which encodes the bit 0 with vowel
and consonant letters. In the same way letter diacritics and compound letters
encode with bit 1. To implement this method, all we need is a message for
example, a word like “Steganography”. This word consists of 13 English
Characters. By encoding in ASCII we get 104 bits. Replace each bit in the bit
stream i.e., a ‘0’ bit by a Letter and a ‘1’ bit by Letter diacritic. The resulted text
consists of 104 Hindi letters with some meaningful information. Now we transfer
this Hindi Text to our counterparts in other place, so that they can decode this
message by applying the algorithm in the reverse way. This is very tedious and it
takes a lot of time to decode because he gets perplexed with this type of
irrelevant text, which is transferred on the network. Nevertheless to decode the
information one should have a full command on the respective Language and its
structure. Here, there is an example, which works on the above principle.
Figure
13. Furthermore to strengthen this algorithm, at the first stage we can apply any
cryptographic algorithm like DES to get the corresponding Cipher Text and we
can apply the above algorithm on this Cipher Text.
15. Bold font letters are not taking part in coding scheme. In the following
example we take the word “Steganography”, and here we are showing the result
for the few bits in the word i.e, Steganog.
16. Generally each Letter represents 8-bit binary value. But according to the
proposed Hindi Numerical Code, each Letter represents four bit binary value. We
encode each four-bit stream with the starting letter of the word. This resembles
like the word ATTACK from 1. All the Temples are centrally knowledge.
Steganography in MMS
17. Steganography can be used in the context of MMS[4] because image is more
common for sending in MMS messages and also image sizes in MMS can be up
to 100kB and therefore can hide more data, so usually the steganography in
MMS messages are only applied to images. The MMS messages can be
combined of different media such as images, text, and audio. Many MMS
messages, in addition to image, containing a text message. Therefore here we
use the MMS messages which are containing both image and text for hiding data.
In our method the data is broken into two parts with the proper sizes and the
parts are hidden in the image and text part of MMS message. It is common to
hide data only in the image part of MMS, but here aim is to hide the data in two
media, text and image.
9
18. The Proposed Method. First the data is broken into two parts. Each part
size is
proportionate to the capacity of the text and the image for hiding data. For example if
the text has 10 bits capacity and the image has more than 200 bits capacity for
hiding data, and the data which we want to hide is 60 bits, then we hide the data as
follows:
(a) First we save the size of information which is stored in the MMS in the
image, because knowing the size of the information is necessary for decoding
correctly the information. Then we hide the first bit in the text. After that we
hide 5 next bits in the image. Then we hide the 7th bit in the text. After that we
hide 5 next bits in the image again. We do this loop until reach the end of
data.
(b) For hiding data in the text part of MMS message, the text
steganography method is used; and for hiding the data in image part of MMS
message, the image steganography method is used. Both of these methods
are written by J2ME (Java 2 Micro Edition) programming language. J2ME is a
version of Java programming language specially developed for small devices
such as pocket PCs, PDAs (Personal Digital Assistance) and mobile phones.
Therefore this method is written by J2ME language. It is seen that an MMS
message contains an image and a text. In this MMS a data, which is broken
into two parts, is hidden in both image and text part of MMS. It is common to
hide data only in the image part of MMS, but here we hide the data in two
media, text and image; so this method is more resistant. Also text
steganography is not very common and therefore there are less attacks to it.
(c) Since in this method the data are hidden in two parts, but the order of
hidden data is not continuous, therefore the possibility of breaking this method
is low. Because at first there is need to know the data are hidden in both parts
and then there is need to know the patterns of breaking data into two
parts.Hence,this steganography method is very robust. This method also can
be implemented using other steganography methods. For example instead of
PNG image, the data can be hidden in a JPEG image using F5 algorithm.
10
Limitations
CONCLUSION
20. The purpose of steganography is not to keep others from knowing the hidden
information it is to keep others from thinking that the information even exists. If a
steganography method causes someone to suspect the carrier medium, then the
method has failed. Steganography’s success thus relies heavily on the naïveté of
human beings; for example, when did you last check your e-mail headers for
hidden messages? Encryption and steganography achieve separate goals.
Encryption encodes data such that an unintended recipient cannot determine its
intended meaning. Steganography, in contrast, does not alter data to make it
unusable to an unintended recipient. Instead, the steganographer attempts to
prevent an unintended recipient from suspecting that the data is there. Those
who seek the ultimate in private communication can combine encryption and
steganography. Encrypted data is more difficult to differentiate from naturally
occurring phenomena than plain text is in the carrier medium. Several existing
steganography tools can encrypt data before hiding it in the chosen medium.
What has been discussed in this paper just talks about the emerging trends in
last two years, however, the list is unending as development of steganography
methods in various fields has occurred few years down the line, which is also
very interesting and it would be difficult to cover each and every technique in
detail.
REFERNCES
[2] A Novel Text Steganography System Using Font Color of the Invisible
Characters in Microsoft Word Documents, by Md. Khairullah, Department of
Computer Science and Engineering Shahjalal University of Science and Technology,
Sylhet, Bangladesh.