An Examination on Information Hiding Tools for Steganography

An Examination on Information Hiding Tools for Steganography

INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE İ. Karadoğan, R. Daş, Vol. 3, No.3 An Examination on Information Hiding Tools for Steganography İsmail Karadoğan*, Resul Daş** *Kahramanmaraş Sütçü İmam Univ., Elbistan Vocational School, Department of Computer Technologies, Kahramanmaraş, Turkey. e-mail: [email protected] **Fırat University, Technology Faculty, Department of Software Engineering, Elazığ, Turkey. e-mail: [email protected] Abstract— In this paper, information about the steganographic methods and tools that are used to hide important data in digital media are presented. At the same time, different aspects of these tools such as used methods, types of hidden data and cover media are examined. Keywords- Information security; information hiding; steganography; steganography tools. 1. Introduction Since the dawn of written communication people have been concerned with both obscuring the contents of communication (Cryptography) and obscuring the fact that communication is taking place (Steganography). As a result of the digitization of communication, new stegonagraphic approaches, protocols and Figure 1. The data hiding diagram as a simple form applications have been developed. Conforming to the principle of ‘Defense in Steganography is the art and science of hiding Depth’ it is standard practice to employ secret messages or information within innocent cryptography, compression, and steganography looking media. Because the sender and intended when hiding data. Even if the existence of covert recipient want to communicate securely, the communication can be determined by unwanted carrier medium in which the hidden message is third parties, the encoding or the obfuscation of embedded should not arouse the suspicion of third data complicates the retrieval of data, typically parties’ concerning the existence of the hidden requiring access to keys. Fig. 2 shows a data message. While cryptography encodes the hiding diagram with encryption generally. message and makes it computationally impractical to decrypt, steganography hides the existence of sensitive communication. Fig. 1 shows a diagram of the simplest form of data hiding. Revealing of the hidden data is the reversal of this process. Figure 2. The data hiding diagram with encryption 200 INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE İ. Karadoğan, R. Daş, Vol. 3, No.3 The recipient party does the inverse of the limited except as a baseline for more up-to-date process of hiding data using the stego key, thus analysis. reveals the hidden data from the stego object. In Johnson and Katzenbeisser [3] a In the digital world, hiding the secret classification of steganographic methods was information is possible via various methods. proposed including aspects of the embedding Image-video based, audio based, text based, processes as substitution systems, transform network based, file structure based, and document domain techniques, spread spectrum techniques, based methods are the most well known methods. statistical methods, distortion techniques and cover The most widely used media types are image and generation methods. audio file types because of their large size and Michaud provided a review and an analysis of frequency of use. several freeware steganographic tools [4]. Steganalysis is the science (and art) of detecting Michaud gave information on data hiding in text, whether a media file contains a covert message, image, and audio files and examined SNOW and extracting that covert message, and determining its Steghide applications and documented how these content. applications are used. Many tools, applications, and techniques have Cheddad et al., provided a state-of-the-art and been developed for steganography and comprehensive review and analysis of the different steganalysis. In this paper, we will introduce and methods of steganography [5]. They focused on discuss some of data hiding tools that are image steganography techniques such as image developed and used in steganography, in spatial domain, image frequency domain, and particular, open source projects. masking. In the second section of this paper, some of the Zax and Adelstein presented valuable results in related works about steganographic tools and a study of trace detection artifacts (such as files, methods are identified. In the third section we directories, registry keys) left behind after using examine well-known steganographic methods. In several freeware steganographic tools [6]. the fourth section some of the obtainable current Dunbar focused on the steganographic tools used for steganography are investigated. techniques in terms of the cover media [7]. He Finally we offer conclusions and suggestions for provided a detailed look about these techniques, further work. the secret message encoding into text, image and audio formats. 2. Related Works Hayati et al., surveyed and examined different steganographic and steganalytic tools including There is a significant body of work related to freeware, shareware, and commercial applications the conceptual, mathematical and procedural [8]. They provided technical specifications of development of stegonagraphic techniques. Less typical cover media including image attention has been paid to the analysis of steganography, text, audio, video, and file system steganographic implementations and much of the steganography etc. In each of these sections, the work related to such analysis is dated. provided tools were compared. In the last section Ming et al., focused on the methods of the of that study, a number of steganalytic tools were steganography, and partitioned its into five compared. categories [1]. These categories are spatial Mathkour et al., provided a detailed domain based, transform domain based, document investigation and comparison of a variety of image based, file structured based and other categories steganography techniques and tools[9]. They such as video compression, encoding, and spread spectrum techniques. proposed evaluation criteria of the techniques and tools. In addition they proposed more robust In [2], a number of steganographic tools were examined with respect to pricing, methodology, steganographic techniques that takes advantage of the strengths and avoids the limitations of current etc. While perhaps transiently useful this systems. information is now 10 years old rendering its value 201 INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE İ. Karadoğan, R. Daş, Vol. 3, No.3 In [10], more than a hundred steganographic President's Embargo Ruling Should Have Immediate tools were listed and introduced briefly. Also, Notice. Grave Situation Affecting International Law. there are links to the websites of many provided Statement Foreshadows Ruin Of Many Neutrals. Yellow tools. Journals Unifying National Excitement Immensely. The initial letters give the secret message: 3. Steganographic Techniques Pershing sails from N.Y. June 1. Hostiorically, steganography focused on Figure 3. The simplest approach to text steganography manipulating the physical environment. With the development of technology, steganographic methods have changed depending on type of B. Image, Audio and Video Steganography covert message and type of the utilizable digital With the advent of electronic communication media. modern approaches to stegonagraphy focus on In this section, we discuss and group the embedding covert information within relatively steganographic methods in terms of the carrier large cover media such as images, audio and video media and the user’s perspective rather than the files. The covert information embedded in the used techniques, algorithms and the embedding cover medium can be text, image or another file or process. data type. The primary restriction involved in the selection of an appropriate medium is the relative A. Ancient and Physical Steganography size of the cover medium and the covert message. Steganography has been widely used in In image and audio steganography, the simplest historical times. In ancient Greece, people wrote and most widely used techniques are variants on messages on the wood or slate, then covered it spatial domain techniques such as Least with wax upon which an innocent covering Significant Bit (LSB) Replacement and LSB message was written. Also in ancient Greece, an Matching. another method, a message that tattooed on the LSB Replacement is a process in which the shaved head of a slave, hidden by the hair that least significant bit of each pixel or byte of the afterwards grew over it, and exposed by shaving cover medium is replaced by the bits of the covert the slave’s head again. In the years following the message. LSB Replacement is relatively easy to invention of the printing press, different typefaces implement but can be easily detected through on the printed page commonly were mixed due to analysis of pixel or byte asymmetry. LSB a lack of sufficient copies of some letters enabling Matching differs from LSB Replacement by a message embedding through the judicious use two small change. LSB Matching avoids the different typefaces. Other tecniques include assymmetry in LSB Replacement by messages written in Morse code on knitting yarn compensating for pixel asymmetry utilizing paired and then knitted into a piece of clothing worn by a pixels, one of which carries the covert message, courier. During captivity by the North Vitenamese the other providing a negative adjustment. As a Jeremiah Denton repeatedly blinked his eyes in result LSB Matching is much harder to detect. [13] Morse Code during a

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us