digital stegano by sushma

download digital stegano by sushma

of 17

Transcript of digital stegano by sushma

  • 8/7/2019 digital stegano by sushma

    1/17

    STAGANOGRAPHY

    Hiding Data WithinData

    Talha fatima,

    ECE , IV year,

    SPMVV.

    ABSTRACT

    For years, people have devised different techniques for encrypting

    data while others have attempted to break these encrypted codes. For our

    project we decided to put our wealth of DSP knowledge to use in the art of

    steganography.

    Steganography is a technique that allows one to hide binary data

    within an image while adding few noticeable changes. Technologicaladvancements over the past decade or so have brought terms like mp3,

    jpeg, and mpeg into our everyday vocabulary. These lossy compression

    techniques lend themselves perfectly for hiding data. We have chosen this

    project because it gives a chance to study several various aspects of DSP.

    First, we devised our own compression technique which we loosely based

    off jpeg. There have been many steganographic techniques created so far,

    which compelled us to create two of our own strategies for hiding data in the

    images we compress.

    Our first method, zero hiding, adds the binary data into the DCTcoefficients dropped in compression. Our other method, which we called bit-

    o-steg, uses a key to change the values of coefficients that remain after

    compression. Finally, we had to find ways to analyze the success of our data

    hiding strategies, so through our research we found both DSP and statistical

    methods to qualitatively measure our work.

  • 8/7/2019 digital stegano by sushma

    2/17

    STAGANOGRAPHY

    Hiding Data WithinData

    Talha fatima,

    ECE , IV year,

    SPMVV.

    INTRODUCTION

    Cryptography the science of writing in secret codes addresses all ofthe elements necessary for secure communication over an insecure

    channel, namely privacy, confidentiality, key exchange, authentication,

    and non-repudiation. But cryptography does not always providesafe

    communication.

    Consider an environment where the very use of encrypted messages

    causes suspicion. If a nefarious government or Internet service provider

    (ISP) is looking for encrypted messages, they can easily find them.

    Consider the following text file; what else is it likely to be if notencrypted?

    qANQR1DBwU4D/TlT68XXuiUQCADfj2o4b4aFYBcWumA7hR1Wvz9rbv2BR6WbEUsy

    ZBIEFtjyqCd96qF38sp9IQiJIKlNaZfx2GLRWikPZwchUXxB+AA5+lqsG/ELBvRa

    c9XefaYpbbAZ6z6LkOQ+eE0XASe7aEEPfdxvZZT37dVyiyxuBBRYNLN8Bphdr2zv

    z/9Ak4/OLnLiJRk05/2UNE5Z0a+3lcvITMmfGajvRhkXqocavPOKiin3hv7+Vx88

    uLLem2/fQHZhGcQvkqZVqXx8SmNw5gzuvwjV1WHj9muDGBY0MkjiZIRI7azWnoU9

    3KCnmpR60VO4rDRAS5uGl9fioSvze+q8XqxubaNsgdKkoD+tB/4u4c4tznLfw1L2

    YBS+dzFDw5desMFSo7JkecAS4NB9jAu9K+f7PTAsesCBNETDd49BTOFFTWWavAfE

    gLYcPrcn4s3EriUgvL3OzPR4P1chNu6sa3ZJkTBbriDoA3VpnqG3hxqfNyOlqAka

  • 8/7/2019 digital stegano by sushma

    3/17

    mJJuQ53Ob9ThaFH8YcE/VqUFdw+bQtrAJ6NpjIxi/x0FfOInhC/bBw7pDLXBFNaX

    HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9HPTZXFG6iRIT0wa47

    AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXecWvxFsjR32ebz76U8aLpAK87GZEyTzBx

    dV+lH0hwyT/y1cZQ/E5USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53Y

    WIebvdiCqsOoabK3jEfdGExce63zDI0=

    =MpRf

    The message above is a sentence in English that is encrypted using PrettyGood Privacy (PGP), probably the most commonly used e-mail encryptionmessage appear more-or-less at random and do not adhere to the relative

    frequency counts that one would expect in a non-encrypted message.

    Encrypted data sticks out like a sore thumb.

    Over the past couple of years, steganography has been the source of a lot of

    discussion, particularly as it was suspected that terrorists connected with the

    September 11 attacks might have used it for covert communications. While no

    such connection has been proven, the concern points out the effectiveness of

    steganography as a means of obscuring data. Indeed, along with encryption,

    steganography is one of the fundamental ways by which data can be keptconfidential. This article will offer a brief introductory discussion ofsteganography: what it is, how it can be used, and the true implications it can have

    on information security.

    What is Steganography?

    While we are discussing it in terms of computer security, steganography is reallynothing new, as it has been around since the times of ancient Rome. For example,

    in ancient Rome and Greece, text was traditionally written on wax that was

    poured on top of stone tablets. If the sender of the information wanted to obscure

    the message - for purposes of military intelligence, for instance - they would usesteganography: the wax would be scraped off and the message would be inscribed

    or written directly on the tablet, wax would then be poured on top of the message,

    thereby obscuring not just its meaning but its very existence.

  • 8/7/2019 digital stegano by sushma

    4/17

    According to Dictionary.com, steganography (also known as "steg" or "stego") is

    "the art of writing in cipher, or in characters, which are not intelligible except to

    persons who have the key; cryptography". In computer terms, steganography hasevolved into the practice of hiding a message within a larger one in such a way

    that others cannot discern the presence or contents of the hidden message. In

    contemporary terms, steganography has evolved into a digital strategy of hiding afile in some form of multimedia, such as an image, an audio file (like a .wav or

    mp3) or even a video file.

    Therefore, Steganography is the science ofhidinginformation. Whereas

    the goal of cryptography is to make data unreadable by a third party, the

    goal of steganography is to hide the data from a third party.

    A Brief History of Steganography

    Steganography, or hidden writing can be traced back to 440 BC

    in ancient Greece. Often they would write a message on a wooden panel,cover it in wax, and then write a message on the wax. These wax tablets

    were already used as writing utensils, so the hiding of a message in a

    commonly used device draws very little suspicion. In addition to use bythe Greeks, the practice of steganography was utilized by spies in World

    War II. There were even rumors that terrorists made use of steganography

    early in 2001 to plan the attacks of September 11

    STEGANOGRAPHY

    There are a large number of steganographic methods that most of us are

    familiar with (especially if you watch a lot of spy movies!), ranging from

    invisible ink and microdots to secreting a hidden message in the secondletter of each word of a large body of text and spread spectrum radio

    communication. With computers and networks, there are many other ways

    of hiding information, such as:

    Covert channels (e.g., Loki and some distributed denial-of-service tools use the Internet Control Message Protocol, or ICMP,

    as the communications channel between the "bad guy" and a

    compromised system) Hidden text within Web pages Hiding files in "plain sight" (e.g., what better place to

    "hide" a file than with an important sounding name in thec:\winnt\system32 directory?)

    Null ciphers (e.g., using the first letter of each word to form

    a hidden message in an otherwise innocuous text)

    What is Steganography Used for?

    http://dictionary.reference.com/search?q=steganographyhttp://dictionary.reference.com/search?q=steganography
  • 8/7/2019 digital stegano by sushma

    5/17

    Like many security tools, steganography can be used for a variety of

    reasons, some good, some not so good. Legitimate purposes can include

    things like

    Digital watermarking: Watermarking images for reasonssuch as copyright protection. A digital watermark can accomplish

    the same function; a graphic artist, for example, might post sample

    images on her Web site complete with an embedded signature sothat she can later prove her ownership in case others attempt to

    portray her work as their own

    To maintain the confidentiality of valuable information, toprotect the data from possible sabotage, theft, or unauthorized

    viewing

    Stego can also be used to allow communication within anunderground community. There are several reports, for example, of

    persecuted religious minorities using steganography to embed

    messages for the group within images that are posted to known

    Web sites.

    Unfortunately, steganography can also be used forIllegitimate reasons

    If someone was trying to steal data, they could conceal it in another file or

    files and send it out in an innocent looking email or file transfer

    In the concern for terroristic purposes, it can be used as a means of covert

    communication.

    Steganography Tools

    There are a vast number of tools that are available for steganography. An

    important distinction that should be made among the tools available today is thedifference between tools that do steganography, and tools that do steganalysis,

    which is the method of detecting steganography and destroying the original

    message. Steganalysis focuses on this aspect, as opposed to simply discoveringand decrypting the message, because this can be difficult to do unless the

    encryption keys are known.There are many good places to find steganography

    tools on the Net.

  • 8/7/2019 digital stegano by sushma

    6/17

    Steganography Tools: Hide data inside other data

    Steganography is the art and science of writing hidden messages in such a waythat no one apart from the intended recipient knows of the existence of the

    message; this is in contrast to cryptography, where the existence of the message

    itself is not disguised, but the content is obscured. (Wikipedia)

    In computing terms, this generally means hiding text or files inside other files(generally an image or MP3). We have reviewed one piece of software whichdoes this before, but Ive decided its worth writing about a few more.

    Hide in Picture

    The piece of steganography software weve already reviewed is called Hide in

    Picture. Unfortunately, their website is no longer accessible and the only way todownload it is now through SourceForge. This piece of software allows you to

    hide any file inside a GIF or BMP (which is a little restrictive). Also, a password

    is required to encode/decode.Hide in Picture can be used through what looks like

    a GTK GUI or through command prompt. Unfortunately, it is for Windows andMS-DOS only.

    wbStego

    wbStego is software which allows you to hide files, and copyright information, inside

    bitmaps, PDFs, HTMlL files and text documents. Unfortunately, it doesnt support JPG

    or GIF, and according to their FAQ page JPG or GIF support isnt coming anytime soon.view.

    http://joeanderson.co.uk/blog/2006/11/13/free-steganography-tools-hide-data-inside-other-data/http://en.wikipedia.org/wiki/Steganographyhttp://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://sourceforge.net/projects/hide-in-picturehttp://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://sourceforge.net/projects/hide-in-picture/http://sourceforge.net/projects/hide-in-picture/http://wbstego.wbailer.com/http://joeanderson.co.uk/blog/2006/11/13/free-steganography-tools-hide-data-inside-other-data/http://en.wikipedia.org/wiki/Steganographyhttp://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://sourceforge.net/projects/hide-in-picturehttp://joeanderson.co.uk/blog/2005/08/04/hiding-files-inside-images-it-works/http://sourceforge.net/projects/hide-in-picture/http://wbstego.wbailer.com/
  • 8/7/2019 digital stegano by sushma

    7/17

    StegoMagic

    StegoMagic allows you to hide any file or message inside text, Wave and Bitmap files.

    The restriction of the software is that the file to be hidden can be a maximum of 1/8 ofthe size as the file its to be hidden in. The software is operated through a simple GUI andit also requires passwords. (Windows only)

    mp3stego

    mp3stego is a piece of software which allows to hide files inside MP3s. This isunfortunately Windows only, and no GUI is provided (although one is downloadable).

    This software also supports passwords. Also, mp3stego is only inproof of conceptstage.

    http://www.programmersheaven.com/download/38361/download.aspxhttp://www.petitcolas.net/fabien/steganography/mp3stego/http://www.programmersheaven.com/download/38361/download.aspxhttp://www.petitcolas.net/fabien/steganography/mp3stego/
  • 8/7/2019 digital stegano by sushma

    8/17

    STEGANOGRAPHIC METHODS

    The following formula provides a very generic description of the pieces of

    the steganographic process:

    cover_medium + hidden_data + stego_key = stego_medium

    In this context, the cover_medium is the file in which we will hide thehidden_data, which may also be encrypted using thestego_key. The

    resultant file is thestego_medium (which will, of course. be the same type

    of file as the cover_medium). The cover_medium (and, thus, thestego_medium) are typically image or audio files. In this article, we will

    focus on image files and will, therefore, refer to the cover_image andstego_image.

    How images are stored :

    An image file is merely a binary file containing a binaryrepresentation of the color or light intensity of each picture element (pixel)

    comprising the image.

    Images typically use either 8-bit or 24-bit color. When using 8-bit color,

    there is a definition of up to 256 colors forming a palette for this image,

    each color denoted by an 8-bit value. A 24-bit color scheme, as the termsuggests, uses 24 bits per pixel and provides a much better set of colors. In

    this case, each pix is represented by three bytes, each byte representing theintensity of the three primary colors red, green, and blue (RGB),

    respectively. The Hypertext Markup Language (HTML) format for

    indicating colors in a Web page often uses a 24-bit format employing sixhexadecimal digits, each pair representing the amount of red, blue, and

    green, respectively. The colororange, for example, would be displayed

    with red set to 100% (decimal 255, hex FF), green set to 50% (decimal

  • 8/7/2019 digital stegano by sushma

    9/17

    127, hex 7F), and no blue (0), so we would use "#FF7F00" in the HTML

    code.

    The size of an image file, then, is directly related to the number of pixelsand the granularity of the color definition. A typical 640x480 pix image

    using a palette of 256 colors would require a file about 307 KB in size(640 480 bytes), whereas a 1024x768 pix high-resolution 24-bit colorimage would result in a 2.36 MB file (1024 768 3 bytes).

    To avoid sending files of this enormous size, a number of compression

    schemes have been developed over time, notably Bitmap (BMP), Graphic

    Interchange Format (GIF), and Joint Photographic Experts Group (JPEG)file types. Not all are equally suited to steganography, however.

    GIF and 8-bit BMP files employ what is known as lossless compression, a

    scheme that allows the software to exactly reconstruct the original image.

    JPEG, on the other hand, uses lossy compression, which means that theexpanded image is very nearly the same as the original but not an exact

    duplicate. While both methods allow computers to save storage space,

    lossless compression is much better suited to applications where theintegrity of the original information must be maintained, such as

    steganography. While JPEG can be used for stego applications, it is more

    common to embed data in GIF or BMP files.

    The simplest approach to hiding data within an image file is called least

    significant bit (LSB) insertion. In this method, we can take the binary

    representation of the hidden_data and overwrite the LSB of each byte

    within the cover_image. If we are using 24-bit color, the amount of changewill be minimal and indiscernible to the human eye. As an example,suppose that we have three adjacent pixels (nine bytes) with the following

    RGB encoding:

    10010101 00001101 11001001

    10010110 00001111 11001010

    10011111 00010000 11001011

    Now suppose we want to "hide" the following 9 bits of data (the hiddendata is usually compressed prior to being hidden): 101101101. If we

    overlay these 9 bits over the LSB of the 9 bytes above, we get thefollowing (where bits in bold have been changed):

    10010101 00001100 11001001

    10010111 00001110 11001011

    10011111 00010000 11001011

  • 8/7/2019 digital stegano by sushma

    10/17

    Note that we have successfully hidden 9 bits but at a cost of only changing

    4, or roughly 50%, of the LSBs.

    This description is meant only as a high-level overview. Similar methods

    can be applied to 8-bit color but the changes, as the reader might imagine,are more dramatic. Gray-scale images, too, are very useful for

    steganographic purposes. One potential problem with any of these

    methods is that they can be found by an adversary who is looking. Inaddition, there are other methods besides LSB insertion with which to

    insert hidden information.

    Users can simply hide information behind an image by following the

    procedure,

    Inputting the ,bmp file on the window,

    Then dragging the data file that is being hidden .At this point the

    program prompts the user for a pass phrase.

    A STEGANOGRAPHY EXAMPLE

    You can see, by the before and after pictures below, it is very hard to tell

    them apart whether which one is embedded and which one is not.

    Figure 2: .bmp file with embedded text Figure 1: .bmp file without embedded text

    S-tools :

    S-Tools allows users to hide information into BMP, GIF, or WAV

    files. The basic scheme of the program is straight-forward; you drag an

  • 8/7/2019 digital stegano by sushma

    11/17

    image or audio file into the S-Tools active window to act as the

    cover_medium, drag the hidden_data file onto the cover_medium, and

    then provide a stego_key for encryption. The result is the stego_medium.

    1. Highlight the GIF image file 5th wave.gifand drag it to theS-Tools active window. Note that S-Tools reports that up to

    138,547 bytes can be hidden in this image file.

    2. Next highlight a 14 KB text file calledvirusdetectioninfo.txtand dragged it onto the image file in S-Tools.

    3. A dialog box pops up telling that 6,019 bytes of data is

    being hidden and asks for apassphrase with which to encryptthe hidden text; the default secret key crypto scheme used by S-

    Tools is the International Data Encryption Algorithm (IDEA).

    Steganalysis

    Without going into any detail, it is worth mentioningsteganalysis,the art of detecting and breaking steganography. One form of this analysis

    is to examine the color palette of a graphical image. In most images, therewill be a unique binary encoding of each individual color. If the image

    contains hidden data, however, many colors in the palette will haveduplicate binary encodings since, for all practical purposes, we can't count

    the LSB. If the analysis of the color palette of a given file yields many

    duplicates, we might safely conclude that the file has hidden information.

    But what files would you analyze? Suppose for example someone decides

    to post a hidden message by hiding it in an image file that is to be posted

    at an auction site on the Internet and the item to be auctioned is real. So a

    lot of people may access the site and download the file; only a few people

    know that the image has special information that only they can read.

    Now for the above image to be atganalysed :

    Once the image file has been received,

    Drag the file to S-Tools and right-click over the image,

    Specify the Reveal option.

    Give a passphrase when a dialog box pops-up requesting the

    passphrase.

    Now a pop-up shows the text file.

    Save the text file which now shows the information about thehidden archive file, and allows the user to open the file.

    Steganography and Security

    As mentioned previously, steganography is an effective means of hiding

    data, thereby protecting the data from unauthorized or unwanted viewing. But

    stego is simply one of many ways to protect the confidentiality of data. It is

    probably best used in conjunction with another data-hiding method. When used in

  • 8/7/2019 digital stegano by sushma

    12/17

    combination, these methods can all be a part of a layered security approach. Some

    good complementary methods include:

    Encryption

    Encryption is the process of passing data or plaintext through a series of

    mathematical operations that generate an alternate form of the original data

    known as ciphertext. The encrypted data can only be read by parties who havebeen given the necessary key to decrypt the ciphertext back into its original

    plaintext form. Encryption doesn't hide data, but it does make it hard to read!

    Hidden directories (Windows)

    Windows offers this feature, which allows users to hide files. Using thisfeature is as easy as changing the properties of a directory to "hidden", and hoping

    that no one displays all types of files in their explorer.

    Hiding directories (Unix)

    In existing directories that have a lot of files, such as in the /dev directoryon a Unix implementation, or making a directory that starts with three dots (...)

    versus the normal single or double dot.

    Covert channels

    Some tools can be used to transmit valuable data in seemingly normal

    network traffic. One such tool is Loki. Loki is a tool that hides data in ICMP

    traffic (like ping).

    Protecting Against Malicious Steganography

    Unfortunately, all of the methods mentioned above can also be used to

    hide illicit, unauthorized or unwanted activity. What can you do to prevent or

    detect issues with stego? There is no easy answer. If someone has decided to hide

    their data, they will probably be able to do so fairly easily. The only way to detect

    steganography is to be actively looking for in specific files, or to get very lucky.

    Sometimes an actively enforced security policy can provide the answer: thiswould require the implementation of company-wide acceptable use policies that

    restrict the installation of unauthorized programs on company computers.

    Using the tools that you already have to detect movement and behavior of traffic

    on your network may also be helpful. Network intrusion detection systems can

    help administrators to gain an understanding of normal traffic in and around your

    network and can thus assist in detecting any type of anomaly, especially with any

    changes in the behavior of increased movement of large images around your

    http://www.securityfocus.com/infocus/1181http://www.securityfocus.com/infocus/1181
  • 8/7/2019 digital stegano by sushma

    13/17

    network. If the administrator is aware of this sort of anomalous activity, it may

    warrant further investigation. Host-based intrusion detection systems deployed on

    computers may also help to identify anomalous storage of image and/or video

    files.

    SIDEBAR

    Other forms of staganography

    While much of the steganography employed today is quite high-

    tech, steganography itself can make use of many low-tech methods. The

    goal of stego is merely to hide the presence of a message; remember howwell the critical missive was hidden in plain sight in Poe's "The Purloined

    Letter"?

    One common, almost obvious, form of steganography is called a null

    cipher. In this type of stego, the hidden message is formed by taking thefirst (or other fixed) letter of each word in the cover message. Consider

    this cablegram that might have been sent by a journalist/spy from the U.S.

    to Europe during World War I:

    PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE.

    GRAVE

    SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS

    RUIN

    OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL

    EXCITEMENTIMMENSELY.

    The first letters of each word form the character string:

    PERSHINGSAILSFROMNYJUNEI. A little imagination and some spaces yields

    the real message:

    PERSHING SAILS FROM NY JUNE I.

    Another form of steganography uses a template (e.g., a piece ofpaper with holes cut in it) or a set of preselected locations on the page to

    hide a message. In this case, obviously, the sender and receiver must usethe same template or rules.

    Consider this note:

  • 8/7/2019 digital stegano by sushma

    14/17

    THE MOST COMMON WORK ANIMAL IS THE HORSE. THEY CAN BE USED

    TO FERRY EQUIPMENT TO AND FROM WORKERS OR TO PULL A PLOW.

    BE CAREFUL, THOUGH, BECAUSE SOME HAVE SANK UP TO THEIR

    KNEES IN MUD OR SAND, SUCH AS AN INCIDENT AT THE BURLINGTON

    FACTORY LAST YEAR. BUT HORSES REMAIN A SIGNIFICANT FIND. ON

    A FARM, AN ALTERNATE WORK ANIMAL MIGHT BE A BURRO BUT THEY

    ARE NOT AS COMFORTABLE AS A TRANSPORT ANIMAL.

    Applying a template or rule as to which words to read to this messagemight yield the following:

    HORSE

    FERRY

    SANK

    IN BURLINGTON

    FIND

    ALTERNATE

    TRANSPORT

    There are other alternatives to the template method such as:

    Pinpricks in maps to use as an overlay for relevant letters in

    messages

    Deliberate misspelling to mark words in the message

    Use of small changes in spacing to indicate significant letters or

    words in a hidden message

    Use of a slightly different font in a typeset message to indicate the

    hidden letters (e.g., the difference between Courier and Courier New is

    barely noticeable unless you are looking for it)

    Steganography doesn't just apply to written forms of

    communication. Radio and TV messages, from World War II to today, canbe used to hide coded or hidden messages. Some government sources

    suspect that Osama bin Laden's pre-recorded videos that are re-played on

    TV stations around the world contain hidden messages.

    Some argue that the U.S. Marine Corps Navaho code talkers of WWIIrepresent a form of steganography. The messages themselves weren't

    encrypted; the plaintext was right there in the open, just in a language that

    was unknown by the Japanese. Disappearing ink and microdots are other

    ways in which messages can be hidden from the casual observer.

    One of the oldest stego schemes was to shave the head of a messenger and

    tattoo a message on the messenger's head. After the hair grows back, the

    messenger can be sent to the intended recipient, where the messenger'shead can be shaved and the message recovered. This method is decidingly

    clever, patient, and very low-tech, and goes right to the heart of

    steganography's literal meaning of "covered writing."

  • 8/7/2019 digital stegano by sushma

    15/17

    Research papers

    A research paper by Stefan Hetzel cites two methods of attacking

    steganography, which really are also methods of detecting it. They are the visual

    attack (actually seeing the differences in the files that are encoded) and the

    statistical attack: "The idea of the statistical attack is to compare the frequency

    distribution of the colors of a potential stego file with the theoretically expected

    frequency distribution for a stego file." It might not be the quickest method ofprotection, but if you suspect this type of activity, it might be the most effective.

    For JPEG files specifically, a tool calledStegdetect, which looks for signs of

    steganography in JPEG files, can be employed. Stegbreak, a companion tool to

    Stegdetect, works to decrypt possible messages encoded in a suspected

    steganographic file, should that be the path you wish to take once the

    CONCLUSION

    Steganography is a fascinating and effective method of hiding data that

    has been used throughout history. It is a really interesting subject and

    outside of the mainstream cryptography and system administration that

    most of us deal with day after day. But it is also quite real; this is not justsomething that's used in the lab or an arcane subject of study in academia.

    Stego may, in fact, be all too real there have been several reports that

    the terrorist organization behind the September 11 attacks in New YorkCity, Washington, D.C., and outside of Pittsburgh used steganography as

    one of their means of communication.

    http://www.outguess.org/detection.phphttp://www.outguess.org/detection.phphttp://www.outguess.org/detection.php
  • 8/7/2019 digital stegano by sushma

    16/17

    Methods that can be employed to uncover such devious tactics, but the

    first step are awareness that such methods even exist. There are many

    good reasons as well to use this type of data hiding, includingwatermarking or a more secure central storage method for such things as

    passwords, or key processes. Regardless, the technology is easy to use and

    difficult to detect. The more that you know about its features andfunctionality, the more ahead you will be in the game.

    software today. Besides being nonsensical to a casual reader, the other

    indication that this is encrypted is that the characters comprising the

    Rescent books:

    Information Hiding: Steganography and Watermarking - Attacks

    and Countermeasures by N.F. Johnson, Z. Duric, and S. Jajodia (KluwerAcademic Publishers, 2000)

  • 8/7/2019 digital stegano by sushma

    17/17

    Information Hiding Techniques for Steganography and DigitalWatermarking, edited by S. Katzenbeisser and F.A.P. Petitcolas (Artech HouseBooks, 2000).

    REFERENCES

    [1] Steganography, by Neil F. Johnson, George Mason University,http://www.jjtc.com/stegdoc/sec202.html

    [2] http://dictionary.reference.com/search?q=steganography

    [3] The Free On-line Dictionary of Computing, 1993-2001 Denis Howe

    http://www.nightflight.com/foldoc/index.html

    [4] Applied Cryptography, Bruce Schneier, John Wiley and Sons Inc., 1996

    [5] Steganography: Hidden Data, by Deborah Radcliff, June 10, 2002,

    http://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.ht

    ml

    http://www.jjtc.com/stegdoc/sec202.htmlhttp://dictionary.reference.com/search?q=steganographyhttp://www.nightflight.com/foldoc/index.htmlhttp://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.htmlhttp://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.htmlhttp://www.jjtc.com/stegdoc/sec202.htmlhttp://dictionary.reference.com/search?q=steganographyhttp://www.nightflight.com/foldoc/index.htmlhttp://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.htmlhttp://www.computerworld.com/securitytopics/security/story/0,10801,71726,00.html