Steganography a Data Hiding Technique Naga Ranijth Kumar Kesa [email protected]

Steganography a Data Hiding Technique Naga Ranijth Kumar Kesa Nkkesa@Stcloudstate.Edu

St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 12-2018 Steganography A Data Hiding Technique Naga Ranijth Kumar Kesa [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Kesa, Naga Ranijth Kumar, "Steganography A Data Hiding Technique" (2018). Culminating Projects in Information Assurance. 75. https://repository.stcloudstate.edu/msia_etds/75 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Steganography–A Data Hiding Technique by Naga Ranjith Kumar Kesa A Starred Paper Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance December, 2018 Starred Paper Committee: Mark B. Schmidt, Chairperson Lynn A. Collen Balasubramanian Kasi 2 Abstract Steganography implements an encryption technique in which communication takes place by hiding information. A hidden message is the combination of a secret message with the carrier message. This technique can be used to hide the message in an image, a video file, an audio file or in a file system. There are large variety of steganography techniques that will be used for hiding secret information in images. The final output image is called as a stego-image which consists of a secret message or information. Imperceptibility, payload, and robustness are three most important parameters for audio steganography. For a more secure approach, encryption can be used, which will encrypt the secret message using a secret key and then sent to the receiver. The receiver after receiving the message then decrypts the secret message to obtain the original one. In this paper, compared steganography with cryptography, which is an encrypting technique and explained how steganography provides better security in terms of hiding the secret message. In this paper, the various techniques are illustrated, which are used in steganography and studying the implementation of those techniques. Also, demonstrated the implementation process of one of the steganography techniques. A comparative analysis is performed between various steganographic tools by using the sample test images and test data. The quality metrics such as PSNR and SSIM are calculated for the final output images which are used for rating the tools. This paper also discusses about the Steganalysis which is known as the process of identifying the use of steganography. Keywords: Steganography, Cryptography, Steganalysis, Stego-image, PSNR, SSIM. 3 Table of Contents Page List of Tables ........................................................................................................................ 5 List of Figures ....................................................................................................................... 6 Chapter I. Introduction ............................................................................................................... 9 Introduction ......................................................................................................... 9 Problem Statement .............................................................................................. 10 Nature and Significance of the Problem ............................................................. 11 Objective of the Study ........................................................................................ 11 Study Questions/Hypotheses .............................................................................. 11 Summary ............................................................................................................. 11 II. Background and Review of Literature ...................................................................... 13 Introduction ......................................................................................................... 13 Background Related to the Problem ................................................................... 15 Literature Related to the Problem ....................................................................... 27 Literature Related to the Methodology ............................................................... 29 Summary ............................................................................................................. 30 III. Methodology ............................................................................................................. 31 Introduction ......................................................................................................... 31 Design of the Study ............................................................................................. 34 Data Collection ................................................................................................... 35 4 Chapter Page Data Analysis ...................................................................................................... 35 Summary ............................................................................................................. 49 IV. Analysis of Results ................................................................................................... 51 Introduction ......................................................................................................... 51 Data Presentation ................................................................................................ 52 Results ................................................................................................................. 85 Summary ............................................................................................................. 86 V. Conclusions and Future Work .................................................................................. 87 Introduction ......................................................................................................... 87 Conclusions ......................................................................................................... 87 Future Work ........................................................................................................ 88 References ............................................................................................................................. 89 5 List of Tables Table Page 1. Image Analysis .......................................................................................................... 53 2. Comparison of Software Tools of Steganography .................................................... 58 3. Features of Software Tools of Steganography .......................................................... 59 4. PSNR Values by Different Steganography Tools ..................................................... 85 5. SSIM Values by Different Steganography Tools ..................................................... 86 6 List of Figures Figures Page 1. Steganography process .............................................................................................. 16 2. Types of steganography ............................................................................................ 15 3. Image steganography techniques .............................................................................. 19 4. DCT regions .............................................................................................................. 23 5. Video steganography process ................................................................................... 27 6. LSB process .............................................................................................................. 33 7. Different types of steganoalysis approaches ............................................................. 42 8. The process of a universal steganalytic method ....................................................... 45 9. Test image 1 and image 2 ......................................................................................... 52 10. Secret image and text ................................................................................................ 52 11. Hide N Send software ............................................................................................... 54 12. CryptaPix software .................................................................................................... 55 13. QuickStego software ................................................................................................. 56 14. VSL software ............................................................................................................ 56 15. Steg software ............................................................................................................. 57 16. Hiding data using Steg .............................................................................................. 60 17. Saving the final output image with hidden date in Steg software ............................. 61 18. Opening the image with hidden data to extract in Steg software ............................. 62 19. Saving the extracted secret message from stego image in Steg software ................. 63 20. Final

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    91 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us