Вы находитесь на странице: 1из 43

STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME

FIELD OF NAMES CREATED BY MICROSOFT WORD

A Seminar report submitted to


Jawaharlal Nehru Technological University Kakinada, Kakinada
In partial fulfillment of the award of degree of

Bachelor of Technology
In
Electronics and Communication Engineering

Submitted
by

B.BHANU PRAKASH REDDY


(16X91A0412)

Under the esteemed guidance of


Mr.C.LAXMANA SUDHEER, M.Tech.,
Assistant Professor

DEPARTMENT OF ELECTRONICS AND COMMUNICARION ENGINEERING

SRI SATYANARAYANA ENGINEERING COLLEGE::ONGOLE


(An ISO 9001:2008 Certified Institution)
(Approved by AICTE, Affiliated to J.T.U.K, KAKINADA)
Ongole-523001,A.P.

2016-2020
SRI SATYANARAYANA ENGINEERING COLLEGE::ONGOLE
(An ISO 9001:2008 Certified Institution)
(Approved by AICTE, Affiliated to J.T.U.K, KAKINADA)
Ongole-523001,A.P.

DEPARTMENT OF ELECTRONICS AND COMMUNICARION ENGINEERING

CERTIFICATE

This is to certify that the seminar report titled “STEGANOGRAPHY

METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES

CREATED BY MICROSOFT WORD” is the bonafied work carried out by

B.BHANU PRAKASHREDDY

(16X91A0412)

Of B.tech in partial fulfillment of the requirements for the award of

Bachelor of Technology in Electronics and Communication Engineering

by J.N.T.U.K, Kakinada during the academic year2019-2020

Seminar Guide Seminar Co-ordinator H.O.D

C.L.SUDHEER C.L.SUDHEER D.JAYANAIDU


M.Tech., M.Tech., M.E.,(Phd).,
Assistant professor. Assistant professor. Professor.
ABSTRACT

Steganography is the art and science of writing hidden messages in

such a way that no one, apart from the sender and intended recipient,

suspects the existence of the message, a form of security through

obscurity. Steganography comes from the Greek and literally means,

"Covered writing". It is one of various data hiding techniques, which aims

at transmitting a message on a channel where some other kind of

information is already being transmitted. This distinguishes

steganography from covert channel techniques, which instead of trying to

transmit data between two entities that were unconnected before.

i
ACKNOWLEDGEMENT

I would like to express my profound sense of gratitude and indebtedness to my


seminar guide Mr.C.L.SUDHEER M.Tech., Assistant professor of ECE department, SSN
Engineering College, Ongole for the valuable guidance and inspiration rendered by him for
seminar presentation. Mere words would not be sufficient to place on record the erudite
guidance, sustained encouragement constructive comments and inspiring discussions with
him for seminar presentations.

I am highly grateful and indebted to Mr.D.JAYANAIDU M.E.,(Phd)., professor and


Head of the Department of ECE, SSN Engineering College, Ongole for his support and
valuable suggestions for completing this seminar presentation.

I would like to express my deep sense of gratitude to all staff members of


Electronics and Communication Engineering Department, SSN Engineering College,
ssOngole for their support in various aspects in completing this seminar presentation.

I would like to place on record the valuable support academic given by our
principal Dr.C.VEERESH NAYAK M.Tech.,Phd., for completion of my course .

I express my sincere gratitude and thanks to the honorable Secretary and


Correspondent Sri. Y.RAMAKRISHNA REDDY for providing us good faculty and
infrastructure and his moral support throughout the course.

I would like to convey gratitude to my parents whose prayers and blessings are
always with me.

In this regard I would like to thank my friends and others who helped us directly or
indirectly for successful completion of the seminar presentation.

B.BHANU PRAKASHREDDY
(16X91A0412)

ii
LIST OF ABBRIVATIONS
WAV Windows Audio Visual

AIFF Audio Interchange File Format

DSSS Direct Sequence Speed Spectrum

DNS Domain Name Service

JPEG Joint Photographic Experts Group

LSB Least Significant Bit

DBMS Database Management System

ASCII American Standard Code for Information Interchange

iii
TABLE OF CONTENTS
CHAPTER TITLE PAGE
ABSTRACT i
ACKNOWLEDGEMENT ii
LIST OF ABBREVIATIONS iii
1 INTRODUCTION 1

1.1 Introduction to terms used 2

2 STEGANOGRAPHY UNDER VARIOUS MEDIA 3


2.1 Steganography in text 4

2.1.1 Line shift coding 5


2.1.2 Word shift coding 5
2.1.3 Feature coding 6
2.1.4 Alternate methods 7
2.2 Steganography in images 8
2.2.1 Some guidelines to Image Steganography 8
2.2.2 Image compression 9
2.2.3 Image Encoding Technique 10
2.2.4 Least significant Bit Insertion 10
2.2.5 Masking and Filtering 11
2.2.6 Algorithm and Transformations 12
2.2.7 Image Downgrading problem 14
2.3 Steganography in Audio 14
2.3.1 Audio Environments 14
2.3.2 Digital Representation 14
2.3.3 Transmission medium 15
2.3.4 Methods of Audio Data Hiding 16
2.3.4.1 Low Bit Encoding 16
2.3.4.2 Phase Coding 17
2.3.4.3 Spread Spectrum 17
2.3.4.4 Echo Data Hiding 17
2.4 Steganography in File System and TCP/IP Packets 18
3. STEGANALYSIS 20
3.1 Detecting Hidden Information 20

3.2 Disabling Steganography 22


4. APPLICATIONS 24

4.1Confidential Communication and Secret Data Storing 24

4.2Protection of Data Alteration 24


4.3Access Control System for Digital Content Distribution 25
4.4Media Database System 25
4.5Usage in Modern Printers 26
4.6Example from Modern Practice 27
4.7Alleged used by Terrorists 27

5 ADVANTAGES 31
6 FUTURE SCOPE 32
7 CONCLUSION 33
REFRENCES 35
STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 1

INTRODUCTION

Steganography, from the Greek, means covered or secret writing, and is a


long-practiced form of hiding information. Although related to cryptography, they are
not the same. Steganography intent is to hide the existence of the message, while
cryptography scrambles a message so that it cannot be understood. More precisely,

“the goal of steganography is to hide messages inside other harmless


messages in a way that does not allow any enemy to even detect that there is a second
secret message present.''

Steganography includes a vast array of techniques for hiding messages in a


variety of media. Among these methods are invisible inks, microdots, digital
signatures, covert channels and spread-spectrum communications. Today, thanks to
modern technology, steganography is used on text, images, sound, signals, and more.

The advantage of steganography is that it can be used to secretly transmit


messages without the fact of the transmission being discovered. Often, using
encryption might identify the sender or receiver as somebody with something to hide.
For example, that picture of your cat could conceal the plans for your company's latest
technical innovation.

However, steganography has a number of disadvantages as well. Unlike


encryption, it generally requires a lot of overhead to hide a relatively few bits of
information. However, there are ways around this. Also, once a steganographic system
is discovered, it is rendered useless. This problem, too, can be overcome if the hidden
data depends on some sort of key for its insertion and extraction.

In fact, it is common practice to encrypt the hidden message before placing it


in the cover message. However, it should be noted that the hidden message does not
need to be encrypted to qualify as steganography. The message itself can be in plain
English and still be a hidden message. However, most steganographers like the extra

Dept. of E.C.E., SSN Engineering College 1


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

layer of protection that encryption provides. If your hidden message is found, and then
at least make it as protected as possible.

This seminar aims to outline a general introduction to steganography - what it


is, and where it comes from. Methods for hiding data in three varied media (text,
image, and audio) will be described, and some guidelines for users of steganography
will be provided where necessary. In addition, we will take a brief look at
steganalysis, the science of detecting steganography, and destroying it.

1.1 Introduction to Terms used

In the field of steganography, some terminology has developed. The adjectives


cover, embedded and stego were defined at the Information Hiding Workshop held in
Cambridge, England. The term ``cover'' is used to describe the original, innocent
message, data, audio, still, video and so on. When referring to audio signal
steganography, the cover signal is sometimes called the ``host'' signal.

The information to be hidden in the cover data is known as the ``embedded''


data. The ``stego'' data is the data containing both the cover signal and the
``embedded'' information. Logically, the processing of putting the hidden or embedded
data, into the cover data, is sometimes known as embedding. Occasionally, especially
when referring to image steganography, the cover image is known as the

Container.

Dept. of E.C.E., SSN Engineering College 2


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 2

STEGANOGRAPHY UNDER VARIOUS MEDIA

In the following three sections we will try to show how steganography can and
is being used through the media of text, images, and audio.

Often, although it is not necessary, the hidden messages will be encrypted.


This meets a requirement posed by the ``Kerckhoff principle'' in cryptography. This
principle states that the security of the system has to be based on the assumption that
the enemy has full knowledge of the design and implementation details of the
steganographic system. The only missing information for the enemy is a short, easily
exchangeable random number sequence, the secret key. Without this secret key, the
enemy should not have the chance to even suspect that on an observed communication
channel, hidden communication is taking place. Most of the software that we will
discuss later meets this principle.

When embedding data, it is important to remember the following restrictions and


features:

The cover data should not be significantly degraded by the embedded data,
and the embedded data should be as imperceptible as possible. (This does not
mean the embedded data needs to be invisible; it is possible for the data to be
hidden while it remains in plain sight.)
The embedded data should be directly encoded into the media, rather than into
a header or wrapper, to maintain data consistency across formats.
The embedded data should be as immune as possible to modifications from
intelligent attacks or anticipated manipulations such as filtering and
resampling.
Some distortion or degradation of the embedded data can be expected when
the cover data is modified. To minimize this, error correcting codes should be
used.
The embedded data should be self-clocking or arbitrarily re-entrant. This
ensures that the embedded data can still be extracted when only portions of the

Dept. of E.C.E., SSN Engineering College 3


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

cover data are available. For example, if only a part of image is available, the
embedded data should still be recoverable.

2.1 Steganography in text

The illegal distribution of documents through modern electronic means, such


as electronic mail, means such as this allow infringers to make identical copies of
documents without paying royalties or revenues to the original author. To counteract
this possible wide-scale piracy, a method of marking printable documents with a
unique codeword that is indiscernible to readers, but can be used to identify the
intended recipient of a document just by examination of a recovered document.

The techniques they propose are intended to be used in conjunction with


standard security measures. For example, documents should still be encrypted prior to
transmission across a network. Primarily, their techniques are intended for use after a
document has been decrypted, once it is readable to all.

An added advantage of their system is that it is not prone to distortion by


methods such as photocopying, and can thus be used to trace paper copies back to
their source.

An additional application of text steganography suggested by Bender, et al. is


annotation, that is, checking that a document has not been tampered with. Hidden data
in text could even by used by mail servers to check whether documents should be
posted or not.

The marking techniques described are to be applied to either an image


representation of a document or to a document format file, such as PostScript or
Textiles. The idea is that a codeword (such as a binary number, for example) is
embedded in the document by altering particular textual features. By applying each bit
of the codeword to a particular document feature, we can encode the codeword. It is
the type of feature that identifies a particular encoding method. Three features are
described in the following subsections:

Dept. of E.C.E., SSN Engineering College 4


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

2.1.1 Line-Shift Coding

In this method, text lines are vertically shifted to encode the document uniquely.
Encoding and decoding can generally be applied either to the format file of a
document, or the bitmap of a page image.

By moving every second line of document either 1/300 of an inch up or down,


it was found that line-shift coding worked particularly well, and documents could still
be completely decoded, even after the tenth photocopy.

However, this method is probably the most visible text coding technique to the
reader. Also, line-shift encoding can be defeated by manual or automatic measurement
of the number of pixels between text baselines. Random or uniform respacing of the
lines can damage any attempts to decode the codeword.

However, if a document is marked with line-shift coding, it is particularly


difficult to remove the encoding if the document is in paper format. Each page will
need to be rescanned, altered, and reprinted. This is complicated even further if the
printed document is a photocopy, as it will then suffer from effects such as blurring,
and salt-and-pepper noise.

2.1.2 Word-Shift Coding

In word-shift coding, codewords are coded into a document by shifting the


horizontal locations of words within text lines, while maintaining a natural spacing
appearance. This encoding can also be applied to either the format file or the page
image bitmap. The method, of course, is only applicable to documents with variable
spacing between adjacent words, such as in documents that have been text-justified.
As a result of this variable spacing, it is necessary to have the original image, or to at
least know the spacing between words in the unencoded document.

The following is a simple example of how word-shifting might work. For each
text-line, the largest and smallest spaces between words are found. To code a line, the
largest spacing is reduced by a certain amount, and the smallest is extended by the
same amount. This maintains the line length, and produces little visible change to the
text.

Dept. of E.C.E., SSN Engineering College 5


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Word-shift coding should be less visible to the reader than line-shift coding,
since the spacing between adjacent words on a line is often shifted to support text
justification.

However, word-shifting can also be detected and defeated, in either of two


ways.

If one knows the algorithm used by the formatter for text justification, actual
spaces between words could then be measured and compared to the formatter's
expected spacing. The differences in spacing would reveal encoded data.

A second method is to take two or more distinctly encoded, uncorrupted


documents and perform page by page pixel-wise difference operations on the page
images. One could then quickly pick up word shifts and the size of the word
displacement.

By respacing the shifted words back to the original spacing produced under
the formatter, or merely applying random horizontal shifts to all words in the
document not found at column edges, an attacker could eliminate the encoding.
However, it is felt that these methods would be time-consuming and painstaking.

2.1.3 Feature Coding

A third method of coding data into text is known as feature coding. This is
applied either to the bitmap image of a document, or to a format file. In feature
coding, certain text features are altered, or not altered, depending on the codeword.
For example, one could encode bits into text by extending or shortening the upward,
vertical endlines of letters such as b, d, h, etc. Generally, before encoding, feature
randomization takes place. That is, character endline lengths would be randomly
lengthened or shortened, then altered again to encode the specific data. This removes
the possibility of visual decoding, as the original endline lengths would not be known.
Of course, to decode, one requires the original image, or at least a specification of the
change in pixels at a feature.

Due to the frequently high number of features in documents that can be


altered, feature coding supports a high amount of data encoding. Also, feature

Dept. of E.C.E., SSN Engineering College 6


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

encoding is largely indiscernible to the reader. Finally, feature encoding can be


applied directly to image files, which leaves out the need for a format file.

When trying to attack a feature-coded document, it is interesting that a purely


random adjustment of endline lengths is not a particularly strong attack on this coding
method. Feature coding can be defeated by adjusting each endline length to a fixed
value. This can be done manually, but would be painstaking. Although this process
can be automated, it can be made more challenging by varying the particular feature to
be encoded. To even further complicate the issue, word shifting might be used in
conjunction with feature coding, for example. Efforts such as this can place enough
impediments in the attacker's way to make his job difficult and time-consuming.

2.1.4 Alternative Methods

Alternative, interesting, major three text-coding methods of encoding data are:

Open space methods, similar to the ones given


Syntactic methods, that utilize punctuation and contractions
Semantic methods, that encode using manipulation of the words themselves

The syntactic and semantic methods are particularly interesting. In syntactic


methods, multiple methods of punctuation are harnessed to encode data. For example,
the two phrases below are both considered correct, although the first line has an extra
comma:

bread, butter, and milk

bread, butter and milk

Alternation between these two forms of listing can be used to represent binary
data. Other methods of syntactic encoding include the controlled use of contractions
and abbreviations. Although such syntactic encoding is very possible in the English
language, the amount of data that could be encoded would be very low, somewhere in
the order of a several bits per kilobyte of text.

The final category of data hiding suggested by Bender, et al. is semantic


methods. By assigning values to synonyms, data could be encoded into the actual

Dept. of E.C.E., SSN Engineering College 7


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

words of the text. For example, the word big might be given a value of one, the word
large a value of zero. Then, when the word big is encountered in the coded text, a
value of one can be decoded. Further synonyms can mean greater bit encoding.
However, these methods can sometimes interfere with the nuances of meaning.

2.2 Steganography in images

In this section we deal with data encoding in still digital images. In essence,
image steganography is about exploiting the limited powers of the human visual
system (HVS). Within reason, any plain text, ciphertext, other images, or anything that
can be embedded in a bit stream can be hidden in an image. Image steganography has
come quite far in recent years with the development of fast, powerful graphical
computers, and steganographic software is now readily available over the Internet for
everyday users.

2.2.1 Some Guidelines to Image Steganography

Before proceeding further, some explanation of image files is necessary. To a


computer, an image is an array of numbers that represent light intensities at various
points, or pixels. These pixels make up the image's raster data. An image size of 640
by 480 pixels, utilizing 256 colors (8 bits per pixel) is fairly common. Such an image
would contain around 300 kilobits of data.

Digital images are typically stored in either 24-bit or 8-bit per pixel files. 24-
bit images are sometimes known as true color images. Obviously, a 24-bit image
provides more space for hiding information; however, 24-bit images are generally
large and not that common. A 24-bit image 1024 pixels wide by 768 pixels high would
have a size in excess of 2 megabytes. As such large files would attract attention were
they to be transmitted across a network or the Internet, image compression is
desirable. However, compression brings with it other problems, as will explain shortly.

Alternatively, 8-bit color images can be used to hide information. In 8-bit color
images, (such as GIF files), each pixel is represented as a single byte. Each pixel
merely points to a color index table, or palette, with 256 possible colors. The pixel's

Dept. of E.C.E., SSN Engineering College 8


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

value, then, is between 0 and 255. The image software merely needs to paint the
indicated color on the screen at the selected pixel position.

If using an 8-bit image as the cover-image, many steganography experts


recommend using images featuring 256 shades of grey as the palette, for reasons that
will become apparent. Grey-scale images are preferred because the shades change
very gradually between palette entries. This increases the image's ability to hide
information.

When dealing with 8-bit images, the steganographer will need to consider the
image as well as the palette. Obviously, an image with large areas of solid color is a
poor choice, as variances created by embedded data might be noticeable. Once a
suitable cover image has been selected, an image encoding technique needs to be
chosen.

2.2.2 Image Compression

Image compression offers a solution to large image files. Two kinds of image
compression are lossless and lossy compression. Both methods save storage space but
have differing effects on any uncompressed hidden data in the image.

Lossy compression, as typified by JPEG (Joint Photographic Experts Group)


format files, offers high compression, but may not maintain the original image's
integrity. This can impact negatively on any hidden data in the image. This is due to
the lossy compression algorithm, which may ``lose'' unnecessary image data,
providing a close approximation to high-quality digital images, but not an exact
duplicate. Hence, the term ``lossy'' compression. Lossy compression is frequently
used on true-color images, as it offers high compression rates.

Lossless compression maintains the original image data exactly; hence it is


preferred when the original information must remain intact. It is thus more favored by
steganographic techniques. Unfortunately, lossless compression does not offer such
high compression rates as lossy compression. Typical examples of lossless
compression formats are CompuServe’s GIF (Graphics Interchange Format) and
Microsoft's BMP (Bitmap) format.

Dept. of E.C.E., SSN Engineering College 9


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

2.2.3 Image Encoding Techniques

Information can be hidden many different ways in images. Straight message


insertion can be done, which will simply encode every bit of information in the image.
More complex encoding can be done to embed the message only in ``noisy'' areas of
the image, that will attract less attention. The message may also be scattered randomly
throughout the cover image.

The most common approaches to information hiding in images are:

Least significant bit (LSB) insertion


Masking and filtering techniques
Algorithms and transformations

Each of these can be applied to various images, with varying degrees of success.
Each of them suffers to varying degrees from operations performed on images, such as
cropping, or resolution decrementing, or decreases in the color depth.

2.2.4 Least Significant bit insertion

The least significant bit insertion method is probably the most well known
image steganography technique. It is a common, simple approach to embedding
information in a graphical image file. Unfortunately, it is extremely vulnerable to
attacks, such as image manipulation. A simple conversion from a GIF or BMP format
to a lossy compression format such as JPEG can destroy the hidden information in the
image.

When applying LSB techniques to each byte of a 24-bit image, three bits can
be encoded into each pixel. (As each pixel is represented by three bytes) Any changes
in the pixel bits will be indiscernible to the human eye. For example, the letter A can
be hidden in three pixels. Assume the original three pixels are represented by the three
24-bit words below:

(00100111 11101001 11001000)

(00100111 11001000 11101001)

Dept. of E.C.E., SSN Engineering College 10


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

(11001000 00100111 11101001)

The binary value for the letter A is (10000011). Inserting the binary value of A
into the three pixels, starting from the top left byte, would result in:

(00100111 11101000 11001000)

(00100110 11001000 11101000)

(11001000 00100111 11101001)

The emphasized bits are the only bits that actually changed. The main
advantage of LSB insertion is that data can be hidden in the least and second to least
bits and still the human eye would be unable to notice it.

When using LSB techniques on 8-bit images, more care needs to be taken, as
8-bit formats are not as forgiving to data changes as 24-bit formats are. Care needs to
be taken in the selection of the cover image, so that changes to the data will not be
visible in the stego-image. Commonly known images, (such as famous paintings, like
the Mona Lisa) should be avoided. In fact, a simple picture of your dog would be
quite sufficient.

When modifying the LSB bits in 8-bit images, the pointers to entries in the
palette are changed. It is important to remember that a change of even one bit could
mean the difference between a shade of red and a shade of blue. Such a change would
be immediately noticeable on the displayed image, and is thus unacceptable. For this
reason, data-hiding experts recommend using grey-scale palettes, where the
differences between shades are not as pronounced. Alternatively, images consisting
mostly of one color, such as the so-called Renoir palette, named because it comes
from a 256 color version of Renoir's ``Le Moulin de la Galette''.

2.2.5 Masking and Filtering

Masking and filtering techniques hide information by marking an image in a


manner similar to paper watermarks. Because watermarking techniques are more
integrated into the image, they may be applied without fear of image destruction from
lossy compression. By covering, or masking a faint but perceptible signal with

Dept. of E.C.E., SSN Engineering College 11


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

another to make the first non-perceptible, we exploit the fact that the human visual
system cannot detect slight changes in certain temporal domains of the image.

Technically, watermarking is not a steganographic form. Strictly,


steganography conceals data in the image; watermarking extends the image
information and becomes an attribute of the cover image, providing license,
ownership or copyright details.

Masking techniques are more suitable for use in lossy JPEG images than LSB
insertion because of their relative immunity to image operations such as compression
and cropping.

2.2.6 Algorithms and transformations

Because they are high quality color images with good compression, it is
desirable to use JPEG images across networks such as the Internet. Indeed, JPEG
images are becoming abundant on the Internet.

JPEG images use the discrete cosine transform (DCT) to achieve compression.
DCT is a lossy compression transform, because the cosine values cannot be calculated
precisely, and rounding errors may be introduced. Variances between the original data
and the recovered data depend on the values and methods used to calculate the DCT.

Images can also be processed using fast Fourier transformation and wavelet
transformation. Other properties such as luminance can also be utilized. The HVS has
a very low sensitivity to small changes in luminance, being able to discern changes of
no less than one part in thirty for random patterns. This figure goes up to one part in
240 for uniform regions of an image.

Modern steganographic systems use spread-spectrum communications to


transmit a narrowband signal over a much larger bandwidth so that the spectral
density of the signal in the channel looks like noise.

The two different spread-spectrum techniques these tools employ are called
direct-sequence and frequency hopping. The former hides information by phase-
modulating the data signal (carrier) with a pseudorandom number sequence that both

Dept. of E.C.E., SSN Engineering College 12


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

the sender and the receiver know. The latter divides the available bandwidth into
multiple channels and hops between these channels (also triggered by a
pseudorandom number sequence).

The Patchwork method is based on a pseudorandom, statistical process that


takes advantage of the human weaknesses to luminance variation. Using redundant
pattern encoding to repeatedly scatter hidden information throughout the cover image,
like a patchwork, Patchwork can hide a reasonably small message many times in a
image. In the Patchwork method, n pairs of image points (a, b) are randomly chosen.
The brightness of a is decreased by one and the brightness of b is increased by one.
For a labeled image, the expected value of the sum of the differences of the n pairs of
points is then 2n. Bender shows that after JPEG compression, with the quality factor
set to 75, the message can still be decoded with an 85

This algorithm is more robust to image processing such as cropping and


rotating, but at the cost of message size. Techniques such as Patchwork are ideal for
watermarking of images. Even if the image is cropped, there is a good probability that
the watermark will still be readable.

Other methods also attempt to mark labels into the images by altering the
brightness of pixel blocks of the image by a selected value k. This value k is
dependent on a lower quality JPEG compressed version of the labeled block. This
method is fairly resistant to JPEG compression, depending on the size of the pixel
blocks used, and offers low visibility of the label. Unfortunately, it is not very suitable
to real-time applications.

Other techniques encrypt and scatter the hidden throughout the image in some
pre-determined manner. It is assumed that even if the message bits are extracted, they
will be useless without the algorithm and stego-key to decode them. Although such
techniques do help protect against hidden message extraction, they are not immune to
destruction of the hidden message through image manipulation.

Dept. of E.C.E., SSN Engineering College 13


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

2.2.7 Image Downgrading Problem

In multilevel security systems, such as the ones used by the army, it


sometimes becomes necessary to declassify some information from a high level of
access to a lower level. Unfortunately, downgrading of images can present a
problem.
Information could be covertly hidden in a ``top secret'' image for later retrieval
when the image is declassified.

2.3 Steganography in Audio

Because of the range of the human auditory system (HAS), data hiding in
audio signals is especially challenging. The HAS perceives over a range of power
greater than one billion to one and range of frequencies greater than one thousand to
one. Also, the auditory system is very sensitive to additive random noise. Any
disturbances in a sound file can be detected as low as one part in ten million (80dB
below ambient level). However, while the HAS has a large dynamic range, it has a
fairly small differential range - large sounds tend to drown quiet sounds.

When performing data hiding on audio, one must exploit the weaknesses of the
HAS, while at the same time being aware of the extreme sensitivity of the human
auditory system.

2.3.1 Audio Environments

When working with transmitted audio signals, one should bear in mind two
main considerations. First, the means of audio storage, or digital representation of the
audio, and second, the transmission medium the signal might take.

2.3.2 Digital representation

Digital audio files generally have two primary characteristics:

Sample quantization method: The most popular format for representing


samples of high-quality digital audio is a 16-bit linear quantization, such as
that used by WAV (Windows Audio-Visual) and AIFF (Audio Interchange File
Format). Some signal distortion is introduced by this format.
Dept. of E.C.E., SSN Engineering College 14
STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Temporal sampling rate: The most popular temporal sampling rates for audio
include 8 kHz (kilohertz, 9.6 kHz, 10 kHz, 12 kHz, 16 kHz, 22.05 kHz and
44.1 kHz). Sampling rate puts an upper bound on the usable portion of the
frequency range. Generally, usable data space increases at least linearly with
increased sampling rate.

Another digital representation that should be considered is the ISO MPEG-Audio


format, a perceptual encoding standard. This format drastically changes the statistics
of the signal by encoding only the parts the listener perceives, thus maintaining the
sound, but changing the signal.

2.3.3 Transmission medium

The transmission medium, or transmission environment, of an audio signal


refers to the environments the signal might go through on its way from encoder to
decoder.

Bender in identifies four possible transmission environments:

Digital end-to-end environment: If a sound file is copied directly from


machine to machine, but never modified, then it will go through this
environment. As a result, the sampling will be exactly the same between the
encoder and decoder. Very little constraints are put on data-hiding in this
environment.
Increased/decreased resampling environment: In this environment, signals is
resampled to a higher or lower sampling rate, but remains digital throughout.
Although the absolute magnitude and phase of most of the signal are
preserved, the temporal characteristics of the signal are changed.
Analog transmission and resampling: This occurs when a signal is converted
to an analog state, played on a relatively clean analog line, and resampled.
Absolute signal magnitude, sample quantization and temporal sampling rate
are not preserved. In general, phase will be preserved.
''Over the air'' environment: This occurs when the signal is ``played into the
air'' and ``resampled with a microphone''. The signal will be subjected to

Dept. of E.C.E., SSN Engineering College 15


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

possible unknown nonlinear modifications causing phase changes, amplitude


changes, drifting of different frequency components, echoes, etc.

The signal representation and transmission environment both need to be


considered when choosing a data-hiding method.

2.3.4 Methods of Audio Data Hiding

Some methods of audio data-hiding are,

2.3.4.1 Low-bit encoding

Similarly to how data was stored in the least-significant bit of images, binary
data can be stored in the least-significant bit of audio files. Ideally the channel
capacity is 1kb per second per kilohertz; so for example, the channel capacity would
be 44kbps in a 44kHz sampled sequence. Unfortunately, this introduces audible noise.
Of course, the primary disadvantage of this method is its poor immunity to
manipulation. Factors such as channel noise and resampling can easily destroy the
hidden signal.

A particularly robust implementation of such a method results in a slight


amplitude modification of each sample in a way that does not produce any perceptual
difference. Their implementation offers high robustness to MPEG compression plus
other forms of signal manipulation, such as filtering, resampling and requantization.

2.3.4.2 Phase coding

The phase coding method works by substituting the phase of an initial audio
segment with a reference phase that represents the data. The procedure for phase
coding is as follows:

The original sound sequence is broken into a series of N short segments.


A discrete Fourier transform (DFT) is applied to each segment, to break create
a matrix of the phase and magnitude.
The phase difference between each adjacent segment is calculated.
For segment S0, the first segment, an artificial absolute phase p0 is created.

Dept. of E.C.E., SSN Engineering College 16


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

For all other segments, new phase frames are created.


The new phase and original magnitude are combined to get a new segment,
Sn.
Finally, the new segments are concatenated to create the encoded output.

For the decoding process, the synchronization of the sequence is done before the
decoding. The length of the segment, the DFT points, and the data interval must be
known at the receiver. The value of the underlying phase of the first segment is
detected as 0 or 1, which represents the coded binary string.

2.3.4.3 Spread spectrum

Most communication channels try to concentrate audio data in as narrow a


region of the frequency spectrum as possible in order to conserve bandwidth and
power. When using a spread spectrum technique, however, the encoded data is spread
across as much of the frequency spectrum as possible.

One particular method, Direct Sequence Spread Spectrum (DSSS) encoding,


spreads the signal by multiplying it by a certain maximal length pseudorandom
sequence, known as a chip. The sampling rate of the host signal is used as the chip
rate for coding. The calculation of the start and end quanta for phase locking purposes
is taken care of by the discrete, sampled nature of the host signal. As a result, a higher
chip rate and therefore a higher associated data rate, is possible.

However, unlike phase coding, DSSS does introduce additive random noise to
the sound.

2.3.4.4 Echo data hiding

Echo data hiding embeds data into a host signal by introducing an echo. The
data are hidden by varying three parameters of the echo: initial amplitude, decay rate,
and offset, or delay. As the offset between the original and the echo decreases, the two
signals blend. At a certain point, the human ear cannot distinguish between the two
signals, and the echo is merely heard as added resonance. This point depends on
factors such as the quality of the original recording, the type of sound, and the listener.

Dept. of E.C.E., SSN Engineering College 17


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

By using two different delay times, both below the human ear's perceptual
level, we can encode a binary one or zero. The decay rate and initial amplitude can
also be adjusted below the audible threshold of the ear, to ensure that the information
is not perceivable. To encode more than one bit, the original signal is divided into
smaller portions, each of which can be echoed to encode the desired bit. The final
encoded signal is then just the recombination of all independently encoded signal
portions.

As a binary one is represented by a certain delay y, and a binary zero is


represented by a certain delay x, detection of the embedded signal then just involves
the detection of spacing between the echoes.

Echo hiding was found to work exceptionally well on sound files where there
is no additional degradation, such as from line noise or lossy encoding, and where
there is no gaps of silence. Work to eliminate these drawbacks is being done.

2.4 Steganography in file systems and TCP/IP packets

The way operating systems store files typically results in unused space that
appears to be allocated to a file. For example, under Windows 95 operating system,
drives formatted as FAT16 (MS-DOS compatible) without compression use cluster
sizes of around 32 kilobytes (K). What this means is that the minimum space allocated
to a file is 32K. If a file is 1K in size, then an additional 31K is "wasted" due to the
way storage space is allocated. This "extra" space can be used to hide information
without showing up in the directory.

Another method of hiding information in file systems is to create a hidden


partition. These partitions are not seen if the system is started normally. However, in
many cases, running a disk configuration utility (such as DOS's FDISK) exposes the
hidden partition. These concepts have been expanded and a novel proposal of a
steganographic file system. If the user knows the file name and password, then an
access is granted to the file; otherwise, no evidence of the file exists in the system.

Protocols in the OSI network model have vulnerabilities that can be used to hide
information. TCP/IP packets used to transport information across the Internet have
unused space in the packet headers. The TCP packet header has six unused (reserved)

Dept. of E.C.E., SSN Engineering College 18


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

bits and the IP packet header has two reserved bits. Thousands of packets are
transmitted with each communication channel, which provides an excellent covert
communication channel if unchecked.

The ease in use and abundant availability of steganography tools has law
enforcement concerned in trafficking of illicit material via web page images, audio,
and other files being transmitted through the Internet. Methods of message detection
and understanding the thresholds of current technology are necessary to uncover such
activities.

Dept. of E.C.E., SSN Engineering College 19


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 3

STEGANALYSIS

Whereas the goal of steganography is the avoidance of suspicion to hidden


messages in other data, steganalysis aims to discover and render useless such covert
messages.

Hiding information within electronic media requires alterations of the media


properties that may introduce some form of degradation or unusual characteristics.
These characteristics may act as signatures that broadcast the existence of the
embedded message, thus defeating the purpose of steganography.

Attacks and analysis on hidden information may take several forms: detecting,
extracting, and disabling or destroying hidden information. An attacker may also
embed counter-information over the existing hidden information. Here two methods
are looked into: detecting messages or their transmission and disabling embedded
information. These approaches (attacks) vary depending upon the methods used to
embed the information in to the cover media

Some amount of distortion and degradation may occur to carriers of hidden


messages even though such distortions cannot be detected easily by the human
perceptible system. This distortion may be anomalous to the "normal" carrier that
when discovered may point to the existence of hidden information. Steganography
tools vary in their approaches for hiding information. Without knowing which tool is
used and which, if any, stegokey is used; detecting the hidden information may
become quite complex. However, some of the steganographic approaches have
characteristics that act as signatures for the method or tool used.

3.1 Detecting Hidden Information

Unusual patterns stand out and expose the possibility of hidden information. In
text, small shifts in word and line spacing may be somewhat difficult to detect by the
casual observer. However, appended spaces and "invisible" characters can be easily
revealed by opening the file with a common word processor. The text may look

Dept. of E.C.E., SSN Engineering College 20


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

"normal" if typed out on the screen, but if the file is opened in a word processor, the
spaces, tabs, and other characters distort the text's presentation.

Images too may display distortions from hidden information. Selecting the proper
combination of steganography tools and carriers is the key to successful information
hiding. Some images may become grossly degraded with even small amounts of
embedded information. This “visible noise” will give away the existence of hidden
information.

The same is true with audio. Echoes and shadow signals reduce the chance of
audible noise, but they can be detected with little processing. Only after evaluating
many original images and stegoimages as to color composition, luminance, and pixel
relationships do anomalies point to characteristics that are not "normal" in other
images.

Patterns become visible when evaluating many images used for applying
steganography. Such patterns are unusual sorting of color palettes, relationships
between colors in color indexes, exaggerated "noise" An approach used to identify
such patterns is to compare the original cover-images with the stego-images and note
visible differences (known-cover attack). Minute changes are readily noticeable when
comparing the cover and stego-images. In making these comparisons with numerous
images, patterns begin to emerge as possible signatures of steganography software.
Some of these signatures may be exploited automatically to identify the existence of
hidden messages and even the tools used in embedding the messages. With this
knowledge-base, if the cover images are not available for comparison, the derived
known signatures are enough to imply the existence of a message and identify the tool
used to embed the message. However, in some cases recurring, predictable patterns
are not readily apparent even if distortion between the cover and stego-images is
noticeable.

A number of disk analysis utilities are available that can report and filter on hidden
information in unused clusters or partitions of storage devices. A steganographic file
system may also be vulnerable to detection through analysis of the systems partition
information.

Dept. of E.C.E., SSN Engineering College 21


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Filters can also be applied to capture TCP/IP packets that contain hidden or invalid
information in the packet headers. Internet firewalls are becoming more sophisticated
and allow for much customization. Just as filters can be set to determine if packets
originate from within the firewall's domain and the validity of the SYN and ACK bits,
so to can the filters be configured to catch packets that have information in supposed
unused or reserved space.

3.2 Disabling Steganography

Detecting the existence of hidden information defeats the steganography's goal of


imperceptibility. Methods exist, that produce results which are far more difficult to
detect without the original image for comparison. At times the existence of hidden
information may be known so detecting it is not always necessary. Disabling and
rendering it useless seems to be the next best alternative. With each method of hiding
information there is a trade off between the sizes of the payload (amount of hidden
information) that can be embedded and the survivability or robustness of that
information to manipulation.

The distortions in text noted by appended spaces and "invisible" characters can be
easily revealed by opening the file with a word processor. Extra spaces and characters
can be quickly stripped from text documents. The disabling or removal of hidden
information in images comes down to image processing techniques.

For LSB methods of inserting data, simply using a lossy compression technique,
such as JPEG, is enough to render the embedded message useless. Images compressed
with such a method are still pleasing to the human eye but no longer contain the
hidden information.

Tools exist to test the robustness of information hiding techniques in images.


These tools automate image processing techniques such as warping, cropping,
rotating, and blurring. Such tools and techniques should be used by those considering
making the investment of watermarking to provide a sense of security of copyright
and licensing just as password cracking tools are used by system administrators to test
the strength of user and system passwords. If the password fails, the administrator
should notify the password owner that the password is not secure.

Dept. of E.C.E., SSN Engineering College 22


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Hidden information may also be overwritten. If information is added to some


media such that the added information cannot be detected, then there exists some
amount of additional information that may be added or removed within the same
threshold which will overwrite or remove the embedded covert information.

Audio and video are vulnerable to the same methods of disabling as with images.
Manipulation of the signals will alter embedded signals in the noise level (LSB) which
may be enough to overwrite or destroy the embedded message. Filters can be used in
an attempt to cancel out echoes or subtle signals but becomes this may not be as
successful as expected.

Caution must be used in hiding information in unused space in files or file


systems. File headers and reserved spaces are common places to look for “out of
place” information. In file systems, unless the steganographic areas are in some way
protected (as in a partition), the operating system may freely overwrite the hidden data
since the clusters are thought to be free. This is a particular annoyance of operating
systems that do a lot of caching and creating of temporary files. Utilities are also
available which "clean" or wipe unused storage areas. In wiping, clusters are
overwritten several times to ensure any data has been removed. Even in this extreme
case, utilities exist that may recover portions of the overwritten information.

As with unused or reserved space in file headers, TCP/IP packet headers can also
be reviewed easily. Just as firewall filters are set to test the validity of the source and
destination IP addresses, the SYN and ACK bits, so to can the filters be configured to
catch packets that have information in supposed unused or reserved space. If IP
addresses are altered or spoofed to pass covert information, a reverse lookup in a
domain name service (DNS) can verify the address. If the IP address is false, the
packet can be terminated. Using this technique to hide information is risky as TCP/IP
headers may get overwritten in the routing process. Reserved bits can be overwritten
and passed along without impacting the routing of the packet.

Dept. of E.C.E., SSN Engineering College 23


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 4

APPLICATIONS

Steganography is applicable to, but not limited to, the following areas.

1) Confidential communication and secret data storing

2) Protection of data alteration

3) Access control system for digital content distribution

4) Media Database systems

The area differs in what feature of the steganography is utilized in each system.

4.1 Confidential communication and secret data storing

The "secrecy" of the embedded data is essential in this area.

Historically, steganography have been approached in this area. Steganography


provides us with:

Potential capability to hide the existence of confidential data


Hardness of detecting the hidden (i.e., embedded) data
Strengthening of the secrecy of the encrypted data
In practice, when you use some steganography, you must first select a vessel data
according to the size of the embedding data. The vessel should be innocuous. Then,
you embed the confidential data by using an embedding program (which is one
component of the steganography software) together with some key. When extracting,
you (or your party) use an extracting program (another component) to recover the
embedded data by the same key ( "common key" in terms of cryptography). In this
case you need a "key negotiation" before you start communication.

Attaching a stego file to an e-mail message is the simplest example in this application
area. But you and your party must do a "sending-and-receiving" action that could be
noticed by a third party. So, e-mailing is not a completely secret communication
method.There is an easy method that has no key-negotiation. There is some other

Dept. of E.C.E., SSN Engineering College 24


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

communication method that uses the Internet Webpage. In this method you don't need
to send anything to your party, and no one can detect your communication.

Each secrecy based application needs an embedding process which leaves the smallest
embedding evidence. You may follow the following.

Choose a large vessel, larger the better, compared with the embedding data.
Discard the original vessel after embedding.
4.2 Protection of data alteration

We take advantage of the fragility of the embedded data in this application


area. "the embedded data can rather be fragile than be very robust." Actually,
embedded data are fragile in most steganography programs. However, this fragility
opens a new direction toward an information-alteration protective system such as a
"Digital Certificate Document System." The most novel point among others is that
"no authentication bureau is needed." If it is implemented, people can send their
"digital certificate data" to any place in the world through Internet. No one can forge,
alter, nor tamper such certificate data. If forged, altered, or tampered, it is easily
detected by the extraction program.

4.3 Access control system for digital content distribution

In this area embedded data is "hidden", but is "explained" to publicize the content.

Today, digital contents are getting more and more commonly distributed by Internet
than ever before. For example, music companies release new albums on their
Webpage in a free or charged manner. However, in this case, all the contents are
equally distributed to the people who accessed the page. So, an ordinary Web
distribution scheme is not suited for a "case-by-case" and "selective" distribution. Of
course it is always possible to attach digital content to e-mail messages and send to
the customers. But it will takes a lot of cost in time and labor.

If you have some valuable content, which you think it is okay to provide others if
they really need it, and if it is possible to upload such content on the Web in some covert
manner. And if you can issue a special "access key" to extract the content selectively,
you will be very happy about it. A steganographic scheme can help realize a this type

Dept. of E.C.E., SSN Engineering College 25


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

of system.We have developed a prototype of an "Access Control System" for digital


content distribution through Internet. The following steps explain the scheme.

A content owner classify his/her digital contents in a folder-by-folder manner,


and embed the whole folders in some large vessel according to a
steganographic method using folder access keys, and upload the embedded
vessel (stego data) on his/her own Webpage.
On that Webpage the owner explains the contents in depth and publicize
worldwide. The contact information to the owner (post mail address, e-mail
address, phone number, etc.) will be posted there.
The owner may receive an access-request from a customer who watched that
Webpage. In that case, the owner may (or may not) creates an access key and
provide it to the customer (free or charged). In this mechanism the most
important point is, a "selective extraction" is possible or not.
4.4 Media Database systems

In this application area of steganography secrecy is not important, but


unifying two types of data into one is the most important.

Media data (photo picture, movie, music, etc.) have some association with other
information. A photo picture, for instance, may have the following.

The title of the picture and some physical object information


The date and the time when the picture was taken
The camera and the photographer's information
Formerly, these are annotated beside the each picture in the album.

Recently, almost all cameras are digitalized. They are cheap in price, easy to use,
quick to shoot. They eventually made people feel reluctant to work on annotating each
picture. Now, most home PC's are stuck with the huge amount of photo files. In this
situation it is very hard to find a specific shot in the piles of pictures. A "photo album
software" may help a little. You can sort the pictures and put a couple of annotation
words to each photo. When you want to find a specific picture, you can make a search
by keywords for the target picture. However, the annotation data in such software are
not unified with the target pictures. Each annotation only has a link to the picture.

Dept. of E.C.E., SSN Engineering College 26


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Therefore, when you transfer the pictures to a different album software, all the
annotation data are lost.

This problem is technically referred to as "Metadata (e.g., annotation data) in a media


database system (a photo album software) are separated from the media data (photo
data) in the database managing system (DBMS)." This is a big problem.

Steganography can solve this problem because a steganography program unifies two
types of data into one by way of embedding operation. So, metadata can easily be
transferred from one system to another without hitch. Specifically, you can embed all
your good/bad memory (of your sight-seeing trip) in each snap shot of the digital
photo. You can either send the embedded picture to your friend to extract your
memory on his/her PC, or you may keep it silent in your own PC to enjoy extracting
the memory ten years after.

If a "motion picture steganography system" has been developed in the near future, a
keyword based movie-scene retrieving system will be implemented. It will be a step
to a "semantic movie retrieval system."

4.5 Usage in modern printers

Steganography is used by some modern printers, including HP and Xerox brand color
laser printers. Tiny yellow dots are added to each page. The dots are barely visible
and contain encoded printer serial numbers, as well as date and time stamps.

4.6 Example from modern practice

The larger the cover message is (in data content terms—number of bits) relative
to the hidden message, the easier it is to hide the latter. For this reason, digital pictures
(which contain large amounts of data) are used to hide messages on the Internet and
on other communication media. It is not clear how commonly this is actually done.

For example: a 24-bit bitmap will have 8 bits representing each of the three
color values (red, green, and blue) at each pixel. If we consider just the blue there will
8
be 2 different values of blue. The difference between 11111111 and 11111110 in the
value for blue intensity is likely to be undetectable by the human eye. Therefore, the
least significant bit can be used (more or less undetectably) for something else other
Dept. of E.C.E., SSN Engineering College 27
STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

than color information. If we do it with the green and the red as well we can get one
letter of ASCII text for every three pixels.

Stated somewhat more formally, the objective for making steganographic encoding
difficult to detect is to ensure that the changes to the carrier (the original signal) due to
the injection of the payload (the signal to covertly embed) are visually (and ideally,
statistically) negligible; that is to say, the changes are indistinguishable from the noise
floor of the carrier. Any medium can be a carrier, but media with a large amount of
redundant or compressible information are better suited.

From an information theoretical point of view, this means that the channel must
have more capacity than the "surface" signal requires; that is, there must be
redundancy.
For a digital image, this may be noise from the imaging element; for digital audio,
it may be noise from recording techniques or amplification equipment. In general,
electronics that digitize an analog signal suffer from several noise sources such as
thermal noise, flicker noise, and shot noise. This noise provides enough variation in
the captured digital information that it can be exploited as a noise cover for hidden
data. In addition, lossy compression schemes (such as JPEG) always introduce some
error into the decompressed data; it is possible to exploit this for steganographic use
as well.

Steganography can be used for digital watermarking, where a message (being


simply an identifier) is hidden in an image so that its source can be tracked or
verified (for example, Coded Anti-Piracy), or even just to identify an image (as in
the EURion constellation)

4.7 Alleged use by terrorists

When one considers that messages could be encrypted steganographically in e-


mail messages, particularly e-mail spam, the notion of junk e-mail takes on a whole
new light. Coupled with the "chaffing and winnowing" technique, a sender could
get messages out and cover their tracks all at once.

Dept. of E.C.E., SSN Engineering College 28


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

An example showing how terrorists may use forum avatars to send


hidden messages. This avatar contains the message "Boss said that we should blow up
the bridge at midnight." encrypted with http://mozaiq.org/encrypt using "växjö" as
password.

Rumors about terrorists using steganography started first in the daily newspaper
USA Today on February 5, 2001 in two articles titled "Terrorist instructions hidden
online" and "Terror groups hide behind Web encryption". In July the same year, an
article was titled even more precisely: "Militants wire Web with links to jihad". A
citation from the article: "Lately, al-Qaeda operatives have been sending hundreds of
encrypted messages that have been hidden in files on digital photographs on the
auction site eBay.com". Other media worldwide cited these rumors many times,
especially after the terrorist attack of 9/11, without ever showing proof. The Italian
newspaper Corriere della Sera reported that an Al Qaeda cell which had been
captured at the Via Quaranta mosque in Milan had pornographic images on their
computers, and that these images had been used to hide secret messages (although no
other Italian paper ever covered the story). The USA Today articles were written by
veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations
emerged that he had fabricated stories and sources.

In October 2001, the New York Times published an article claiming that al-Qaeda
had used steganography to encode messages into images, and then transported these
via e- mail and possibly via USENET to prepare and execute the September 11, 2001
Terrorist Attack. The Federal Plan for Cyber Security and Information Assurance
Research and Development, published in April 2006 makes the following statements:

"...immediate concerns also include the use of cyberspace for covert


communications, particularly by terrorists but also by foreign intelligence
services; espionage against sensitive but poorly defended data in government
and industry systems; subversion by insiders, including vendors and
contractors; criminal activity, primarily involving fraud and theft of financial
or identity information, by hackers and organized crime groups..."

Dept. of E.C.E., SSN Engineering College 29


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

"International interest in R&D for steganography technologies and their


commercialization and application has exploded in recent years. These
technologies pose a potential threat to national security. Because
steganography secretly embeds additional, and nearly undetectable,
information content in digital products, the potential for covert dissemination
of malicious software, mobile code, or information is great."

"The threat posed by steganography has been documented in numerous


intelligence reports."

Moreover, an online "terrorist training manual", the "Technical Mujahid, a


Training Manual for Jihadis" contained a section entitled "Covert Communications
and Hiding Secrets Inside Images."

Despite this, there are no known instances of terrorists using computer


steganography. Al Qaeda's use of steganography is somewhat simpler: In 2008 a
British Muslim, Rangzieb Ahmed, was alleged to have a contact book with Al-Qaeda
telephone numbers, written in invisible ink. He was convicted of terrorism.

Dept. of E.C.E., SSN Engineering College 30


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 5

ADVANTAGES

1. It can be used for safeguarding data, such as in the field of media where copywriting ensures
authenticity.
2. It can be used by intelligence agencies for sending their secret data.
3. Safe Emails.
4. Network surveillance and monitoring systems will not flag message or files that contain
steganography data.
5. Securely strongly and sensitive data, such as hiding system passwords or keys within other
files.
6. Difficult to detect.

Dept. of E.C.E., SSN Engineering College 31


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 6

FUTURE SCOPE

As a part of security, the pixels of the cover image are filtered both according to
their position and the threshold limit. Because of this, the space availability of data insertion
could become very less. Therefore, the embedding information should be small for successful
embedding. New ideas could be developed on increase the space availability in the cover image
to insert as much data as possible.

Dept. of E.C.E., SSN Engineering College 32


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

CHAPTER 5

CONCLUSION

This seminar provides an overview of steganalysis and introduced some


characteristics of steganographic software that point signs of information hiding. This
work is but a fraction of the steganalysis approach. To date general detection
techniques as applied to steganography have not been devised and methods beyond
visual analysis are being explored. Too many images exist to be reviewed manually
for hidden messages so development of a tool to automate the process will be
beneficial to analysts. The ease in use and abundant availability of steganography
tools has law enforcement concerned in trafficking of illicit material via web page
images, audio, and other transmissions over the Internet.

Methods of message detection and understanding the thresholds of current


technology are under investigation. Success in steganographic secrecy results from
selecting the proper mechanisms. However, a stegomedium which seems innocent
enough may, upon further investigation, actually broadcast the existence of embedded
information.

Development in the area of covert communications and steganography will


continue. Research in building more robust methods that can survive image
manipulation and attacks continues to grow. The more information is placed in the
public's reach on the Internet, the more owners of such information need to protect
themselves from theft and false representation. Systems to recover seemingly
destroyed information and steganalysis techniques will be useful to law enforcement
authorities in computer forensics and digital traffic analysis.

Most data-hiding systems take advantage of human perceptual weaknesses, but


have weaknesses of their own. For now, it seems that no system of data-hiding is
totally immune to attack.

However, steganography has its place in security. It in no way can replace


cryptography, but is intended to supplement it. Its application in watermarking and
fingerprinting, for use in detection of unauthorized, illegally copied material, is
continually being realized and developed.

Dept. of E.C.E., SSN Engineering College 33


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Also, in places where standard cryptography and encryption is outlawed,


steganography can be used for covert data transmission. Steganography, formerly just
an interest of the military, is now gaining popularity among the masses. Soon, any
computer user will be able to put his own watermark on his artistic creations.

Dept. of E.C.E., SSN Engineering College 34


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

REFERENCES

1. “Cryptography and Network Security” by William Stallings

2. http://en.wikipedia.org/wiki/Steganography

3. http://www.jjtc.com/ihws98/jjgmu.html

4. http://www.tifr.res.in/~sanyal/papers/Soumyendu_Steganography_Steganalysi

s_different_approaches.pdf

5. http://www.darkreading.com/insiderthreat/security/encryption/showArticle.jht

ml?articleID=225701866&queryText=steganography

6. http://www.darkreading.com/vulnerability_management/security/app-

security/showArticle.jhtml?articleID=224600236&queryText=steganography

7. http://www.ise.gmu.edu/~njohnson/Steganography/toolmatrix.htm

Dept. of E.C.E., SSN Engineering College 35


STEGANOGRAPHY METHOD FOR HIDING THE DATA IN THE NAME FIELD OF NAMES CREATED BY MICROSOFT WORD

Dept. of E.C.E., SSN Engineering College 36

Вам также может понравиться