final docu (1) (1) (1)-mml
-
Upload
soumyajit-das -
Category
Documents
-
view
227 -
download
0
Transcript of final docu (1) (1) (1)-mml
-
7/30/2019 final docu (1) (1) (1)-mml
1/36
DATA HIDING THROUGH IMAGE
STEGANOGRAPHY[B.Tech Project Report]
A Project ByMd Rameez Akhtar
Ishita ChelKushal Kannungo
Somyojit Das
Project GuideProf. Anjan Payra
Dr Suchir Chandra Sur Degree Engineering College
[Computer Science and Engineering Dept]
West Bengal University of Technology(2009-2013)
-
7/30/2019 final docu (1) (1) (1)-mml
2/36
DATA HIDING THROUGH IMAGESTEGANOGRAPHY
Project Report Submitted in Partial Fulfillment ofthe Requirements for the
Degree of Bachelor of Technology in
Computer Science and Engineeringby
Md Rameez Akhtar (09255001001)
Ishita Chel(09255001013)
Kushal Kannungo(092550010xx)
Somyojit Das(092550010xx)
Project Guide
Prof. Anjan Payra
Dr Suchir Chandra Sur Degree Engineering College
Computer Science and Engineering Dept
[Affiliated to WBUT]
West Bengal
2009-2013
-
7/30/2019 final docu (1) (1) (1)-mml
3/36
[Affiliated to WBUT]
West Bengal2009-2013
Certificate
This is to certify that this project report entitled DATA HIDING
THROUGH IMAGE STEGANOGRAPHY by Md Rameez Akhtar (Roll
No. 09255001001), Ishita Chel (Roll No. 09255001001), Kushal Kannungo
(Roll No. 092550010xx) and Somyojit Das (Roll No. 092550010xx)
submitted in partial fulfilment of the requirements for the degree of Bachelor
of Technology in Electronics and Communication Engineering of the WestBengal University Of Technology, West Bengal, during the academic year
2012-13,is a bonafide record of work carried out under our guidance and
supervision.
The results embodied in this report have not been submitted to any other
University or Institution for the award of any degree or diploma.
(Guide) (Head of Dept)
Prof. Anjan Payra Prof. Samir Kundu
Acknowledgement
-
7/30/2019 final docu (1) (1) (1)-mml
4/36
It is our privilege to express our sincerest regards to our project
coordinator, Prof. Anjan Payra, for his valuable inputs, able guidance,
encouragement, whole-hearted cooperation and constructive criticism
throughout the duration of our project. We deeply express our sincere
thanks to our Head of Department Prof. S Kundu for encouraging and
allowing us to present the project on the topic Data Hiding Through
Image Steganography at our department premises for the partial
fulfillment of the requirements leading to the award of B-Tech degree.
We take this opportunity to thank all our lecturers who have directly or
indirectly helped our project. We pay our respects and love to our parents
and all other family members and friends for their love and
encouragement throughout our career. Last but not the least we express
our thanks to our friends for their cooperation and support.
-
7/30/2019 final docu (1) (1) (1)-mml
5/36
ABSTRACT
The Internet as a whole does not use secure links, thus information in
transit may be vulnerable to interception as well. The important of reducing a
chance of the information being detected during the transmission is being an
issue now days. Some solution to be discussed is how to passing information in
a manner that the very existence of the message is unknown in order to repel
attention of the potential attacker. Besides hiding data for confidentiality, thisapproach of information hiding can be extended to copyright protection for
digital media. In this research, we clarify what steganography is, the definition,
the importance as well as the technique used in implementing steganography.
We focus on the Least Significant Bit (LSB) technique in hiding messages in an
image. The system enhanced the LSB technique by randomly dispersing the bits
of the message in the image and thus making it harder for unauthorized people
to extract the original message.
Keyword: Steganography, information hiding
-
7/30/2019 final docu (1) (1) (1)-mml
6/36
Introduction
Steganography brings science to the art of hiding information. The
purpose of steganography is to convey a message inside of a conduit of
misinterpretation such that the existence of the message is both hidden and
difficult to recover when discovered. Basically the information hiding process in
a Steganoraphic system starts by identifying a cover mediums redundant bits.
The embedding process creates a stego medium by replacing these redundant
bits with data from the hidden message. The basic purpose to make
communication unintelligible to those who do not possess the right keys.
The first step is steganography is that to embed and hiding information
is to pass both the secret message and the cover message in to the encoder,
inside the encoder, one or several protocols will be implemented to embed the
secret information into the cover message.
A key is needed in the embedding process. By using the key we can reduce the
chance of third party attackers getting hold of the stego object and decoding itto find out the secret information. In general the embedding process inserts a
mark X, in an object Y, a key K, usually produced by a random number
generator is used in the embedding process and the resulting marked object Y
is generated by mapping X x Y x K Y
Having passed through the encoder a stego object will be produced. A
stego object is the original cover object with the secret information
embedded inside. This object should look almost identical to the cover object as
otherwise a third party attacker can see embedded information. Having
produced the stego object, It will be sentoff via some communication channel.
At the receiving end the stego object is fed into the system the public or
private key that can decodethe original key that is used inside the encoding
process is also needed to detect the secret information.
One of the reasons that intruders can be successful is that most of the
information they acquire from a system is in a form that they can read and
-
7/30/2019 final docu (1) (1) (1)-mml
7/36
comprehend. Intruders may reveal the information to others, modify it to
misrepresent an individual or organization, or use it to launch an attack. One
solution to this problem is, through the use of steganography. Steganography is
a technique of hiding information in digital media. In contrast to cryptography,
it is not to keep others from knowing the hidden information but it is to keep
others from thinking that the information even exists.
-
7/30/2019 final docu (1) (1) (1)-mml
8/36
1.2 Background of the ProblemSteganography become more important as more people join the
cyberspace revolution. Steganography is the art of concealing information in
ways that prevent the detection of hidden messages. Steganography include an
array of secret communication methods that hide the message from being seen
or discovered.
The goal of steganography is to avoid drawing suspicion to the existence
of a hidden message. This approach of information hiding technique has
recently become important in a number of application areas. Digital audio,
video, and pictures are increasingly furnished with distinguishing butimperceptible marks, which may contain a hiddin copyright notice or serial
number or even help to preventunauthorized copying directly.
Military communications system make increasing use of traffic security
technique which, rather than merely concealing the content of a message using
encryption, seek to conceal its sender, its receiver or its very existence. Similar
techniques are used in some mobile phone systems and schemes proposed for
digital elections.
Some of the techniques used in steganography are domain tools or
simple system such as least significant bit (LSB) insertion and noise
manipulation, and transform domain that involve manipulation algorithms and
image transformation such as discrete cosine transformation and wavelet
transformation. However there are technique that share the characteristic of
both of the image and domain tools such as patchwork, pattern block encoding,
spread spectrum methods and masking.
1.3 Objective
This project comprehends the following objectives:
(i) To produce security tool based on steganographic techniques.(ii) To explore techniques of hiding data using steganography.
-
7/30/2019 final docu (1) (1) (1)-mml
9/36
Results obtained hiding the message 111 in the pixel10101000-10101000-10101000 with the LSB method
-
7/30/2019 final docu (1) (1) (1)-mml
10/36
The Scope Of Steganography
With the boost in computer power, the internetand with the development ofdigital signalprocessing (DSP), information theory and codingtheory, steganography
has gone digital. In therealm of this digital world, steganography hascreated an
atmosphere of corporate vigilance thathas spawned various interesting
applications,thus its continuing evolution is guaranteed.Cyber-crime is believed to
benefit from thisdigital revolution. Hence an immediate concernis to find out best
possible attacks to carry outsteganalysis, and simultaneously, finding outtechniques to
strengthen existing stegnographytechniques against popular attacks likesteganalysis.
Cryptography
Cryptography encodes information in such a way that nobody can read it, except the
person who holds the key. More advanced crypto techniques ensure that the
information being transmitted has not been modified in transit. There is some
difference in cryptography and steganography, in cryptography the hidden message is
always visible, because information is in plain text form but in steganography hidden
message is invisible.
-
7/30/2019 final docu (1) (1) (1)-mml
11/36
Steganography Versus Cryptography
The comparison and contrast between steganography and cryptography is illustratedfrom the following table .
S.no. Context Steganography Cryptography
1 Host
FilesImage, Audio,
Text, etc.Mostly Text
Files2 Hidden
FilesImage, Audio,
Text, etc.Mostly Text
Files
3 Result Stego File Cipher Text
4 Type of
AttackSteganalysis:
Analysis of a
file with a
objective of
finding
whether it is
stego file or not
Cryptanalysis
Table Comparison and contrast between steganography and cryptography.
-
7/30/2019 final docu (1) (1) (1)-mml
12/36
Steganalysis
Steganalysis is a relatively new research discipline with few articles appearing beforethe late-1990s. Steganalysis is "the process of detecting steganography by looking at
variances between bit patterns and unusually large file sizes" . It is the art of
discovering and rendering useless covert messages. The goal of steganalysis is to
identify suspected information streams, determine whether or not they have hidden
messages encoded into them, and, if possible, recover the hidden information.
The challenge of steganalysis is that:
1. The suspect information stream, such as a signal or a file, may or may not have
hidden
data encoded into them.
2. The hidden data, if any, may have been encrypted before being inserted into the
signal or file.
3. Some of the suspect signal or file may have noise or irrelevant data encoded into
them
(which can make analysis very time consuming).
4. Unless it is possible to fully recover, decrypt and inspect the hidden data, often one
has
only a suspect information stream and
cannot be sure that it is being used for transporting secret information.
Modern Terminology and Framework
Secret
Message
-
7/30/2019 final docu (1) (1) (1)-mml
13/36
no
yes
Histogram
Cover
Message
Secret
Key
Embedding
Algorithm
Stego
Message
Is Stego
Message
Suppress
Message
Message Retrieval
Algorithm
Secret
Message
Secret
Key
-
7/30/2019 final docu (1) (1) (1)-mml
14/36
A histogram is one of the basic quality tools. It is used to graphically
summarize and display the distribution and variation of a process data set. A
frequency distribution shows how often each different value in a set of data occurs.
The main purpose of a histogram is to clarify the presentation of data. You canpresent the same information in a table; however, the graphic presentation format
usually makes it easier to see relationships. It is a useful tool for breaking out process
data into regions or bins for determining frequencies of certain events or categories
of data. These charts can help show the most frequent.
Typical applications of histograms in root cause analysis include:
Presenting data to determine which causes dominate
Understanding the distribution of occurrences of different problems, causes,
consequences, etc.
A histogram can typically help you answer the following questions:
What is the most common system response?
What distribution (center, variation and shape) does the data have?
Does the data look symmetric or is it skewed to the left or right?
A histogramis a specialized type of bar chart. Individual data points are grouped
together in classes, so that you can get an idea of how frequently data in each class
occur in the data set. High bars indicate more points in a
class, and low bars indicate less points.
-
7/30/2019 final docu (1) (1) (1)-mml
15/36
Original image
Fig. 1 grayscale image
-
7/30/2019 final docu (1) (1) (1)-mml
16/36
Histogram of Fig. 1
Least Significant Bit SubstitutionIn LSB steganography, the least significant bits of the cover medias digital data are
used to conceal the message. The simplest of the LSB steganography techniques is LSB
replacement. LSB replacement steganography flips the last bit of each of the data
values to reflect the message that needs to be hidden. Consider an 8-bit grayscale
bitmap image where each pixel is stored as a byte representing a grayscale value.Suppose the first eight pixels of the original image have the following grayscale values:
11010010
0100101010010111
-
7/30/2019 final docu (1) (1) (1)-mml
17/36
10001100
00010101
01010111
0010011001000011
To hide the letter C whose binary value is 10000011, we would replace the LSBs of
these pixels to have the following new grayscale values:
11010011
01001010
10010110
10001100
00010100
01010110
00100111
01000011.
Note that, on average, only half the LSBs need to change. The difference between the
cover (i.e. original) image and the stego image will be hardly noticeable to the human
eye. Figure
(a), (b) that show a cover image and a stego image (with data is embedded); there is
no
visible difference between the two images.
-
7/30/2019 final docu (1) (1) (1)-mml
18/36
Fig. a Cover image
Fig. b Stego image
LSB steganography, as described above, replaces the LSBs of data values to match bitsof the message. It can equally alter the data value by a small amount, ensuring the a
-
7/30/2019 final docu (1) (1) (1)-mml
19/36
legal range of data values is preserved. The difference being that the choice of
whether to add or subtract one from the cover image pixel is random.This will havethe same effect as LSB replacement in terms of not being able to perceive the
existence of the hidden message. This steganographic technique is called LSBmatching. Both LSB replacement and LSB matching leave the LSB unchanged if the
message bit matches the LSB. When the message bit does not match the LSB, LSB
replacement replaces the LSB with the message bit; LSB matching randomly
increments or decrements the data value by one. LSB matching is also known as 1
embedding.
In the case of still grayscale images of type bitmap, every pixel is represented
using 8 bits, with 11111111 (=255) representing white and 00000000 (=0) representing
black. Thus, there are 256 different grayscale shades between black and white which
are used in grayscale bitmap images. In LSB stegonography, the LSBs of the cover
image is to be changed. As the message bit to be substituted in the LSB position of
the cover image is either 0 or 1, one can state without any loss of generality that the
LSB's of about 50 percent pixel changes.
-
7/30/2019 final docu (1) (1) (1)-mml
20/36
There are three possibilities:
1. Intensity value of any pixel remains unchanged.
2. Even value can change to next higherodd value.
3. Odd Value change to previous lower even value.
-
7/30/2019 final docu (1) (1) (1)-mml
21/36
MATERIALS AND METHODS
First Component Alteration TechniqueFor Image Steganography
In the technique, a new imagesteganography scheme based on firstcomponenet
Alteration technique is introduced.In a computer, images are represented as arraysof
values. These values represent the intensities of the three colors R (Red), G (Green)
and B(Blue), where a value for each of three colorsdescribes a pixel. Each pixel is
combination ofthree components(R,G and B).
In this scheme, the bits of firstcomponent (blue component) of pixels of image have
been replaced with data bits, which areapplied only when valid key is used.
Bluechannel is selected because a research wasconducted by Hecht, which reveals that
thevisual perception of intensely blue objects is lessdistinct that the perception of
objects of red andgreen.
For example, suppose one can hide a message in
three pixels of an image (24-bit colors). Suppose
the original 3 pixels are:
(0010011111101001 11001000) (001001111100100011101001)
(11001000 00100111 11101001)
A steganographic program could hide the letter"A" which has a position 65 into
ASCIIcharacter set and have a binary representation"01000001", by altering the blue
channel bits ofpixels.
(0100000111101001 11001000) (001001111100100011101000)
(11001000 00100111 11101001)
A. Embedding phaseThe embedding process is as follows.
Inputs: Image file and the text file
-
7/30/2019 final docu (1) (1) (1)-mml
22/36
Output: Text embedded image
Procedure:
Step 1: Extract all the pixels in the given imageand store it in the array called Pixel-
array.
Step 2: Extract all the characters in the given textfile and store it in the array called
Characterarray.
Step 3: Extract all the characters from the Stegokey and store it in the array called
Key- array.
Step 4: Choose first pixel and pick charactersfrom Key- array and place it in first
componentof pixel. If there are more characters in Keyarray,then place rest in the
firstcomponent of next pixels, otherwise follow Step(e).
Step 5: Place some terminating symbol toindicate end of the key. 0 has been used as
aterminating symbol in this algorithm.
Step 6: Place characters of Character- Array in each first component (blue channel)
of nextpixels by replacing it.
Step 7: Repeat step 6 till all the characters hasbeen embedded.
Step 8: Again place some terminating symbol toindicate end of data.
Step 9: Obtained image will hide all thecharacters that input.
-
7/30/2019 final docu (1) (1) (1)-mml
23/36
-
7/30/2019 final docu (1) (1) (1)-mml
24/36
B. Extraction phaseInputs: Embedded image file
Output: Secret text message
Procedure:Step 1: Consider three arrays. Let they beCharacter-Array, Key-array and Pixel-array.
Step 2: Extract all the pixels in the given imageand store it in the array called Pixel-
array.
Step 3: Now, start scanning pixels from firstpixel and extract key characters from first
(blue)component of the pixels and place it in Keyarray.Follow Step3 up to terminating
symbol,otherwise follow step 4.
Step 4: If this extracted key matches with the keyentered by the receiver, then follow
Step 5,otherwise terminate the program by displayingmessage Key is not matching.
Step 5: If the key is valid, then again startscanning next pixels and extract secret
messagecharacters from first (blue) component of nextpixels and place it in Character
array. FollowStep 5 till up to terminating symbol, otherwise
follow step 6.
Step 6: Extract secret message from Character array. The primary motivation of the
current work is to increase PSNR. For this purpose we employ the approach
whichhide secret image in to cover image with the help of logic gates.
Algorithm:
Step1:Read the image to be embedded
Step 2: Read the image inside which message isembed
-
7/30/2019 final docu (1) (1) (1)-mml
25/36
Step 3:set numSignificantBits = n ; where n=1,28
Step 4: size1 = size(secret); and size2 =size(coverImage);
Step 5: set the "numSignificantBits"n significantbits of each byte of cover image to
zero by usingbit by AND operation on cover and size1 matrix
Step 6: embedd the "numSignificantBits" mostsignificant bits of secret image to
create the stegoimage by using stego= (cover zero+ secret)/28-n
Step 7: recover the embedded image, by using bitby shift operation
Step 8: Display Figure of cover image, Image tobe hidden, stego image and recover
image
Step 9: End
Note :- as the value of n will be increase thequality of stego and recover image will
bedegraded.
The proposed method is applicable for both 24bit color and 8 bit gray image. So the
conversion of 24 bit color image to 8 bit grayscale image isdone as follow:
Conversion Of Color Image Into Greyscale ImageConversion of a color image tograyscale can be done using several approaches.
Different weighting of the primary colorseffectively represent the effect of
obtainingblack-and-white image with color images. Acommon strategy is to match the
luminance ofthe grayscale image to the luminance of the color
Image.
The proposed method is baled both 24 bit colorand 8 bit gray image
-
7/30/2019 final docu (1) (1) (1)-mml
26/36
To convert any color to a grayscalerepresentation of its luminance, first onemust
obtain the values of its red, green, and blue(RGB) primaries in linear intensity
encoding, bygamma expansion. Then, add together 30% ofthe red value, 59% of thegreen value, and 11%of the blue value(these weights depend on theexact choice of the
RGB primaries, but aretypical). Regardless of the scale employed (0.0 to1.0, 0 to 255,
0% to 100%, etc.), the resultantnumber is the desired linear luminance value;
ittypically needs to be gamma compressed to getback to a conventional grayscale
representation. a conventional grayscale representation.
To convert a gray intensity value toRGB, simply set all the three primary color
components red, green and blue to the grayvalue, correcting to a different gamma
ifnecessary. The method adopted in current workfor experimental evaluation is to
obtain the RGBvalues of individual pixels and to take the average to be normalized to
fit in the scale 0 to 255.
RESULTS AND DISCUSSIONS
-
7/30/2019 final docu (1) (1) (1)-mml
27/36
-
7/30/2019 final docu (1) (1) (1)-mml
28/36
-
7/30/2019 final docu (1) (1) (1)-mml
29/36
The method is applicable for both grayscale (8 bit) or color image(24 bit). We categorized images with respect to their JPEG quality factor, and observed
the effect on the performance of the steganalyzers. But other than the JPEG
quality factor, image properties such as image texture could be used to
categorize the images. There are many approaches to quantify the texture of an
image. A crude measure of image texture would be the mean variance of JPEG
blocks. This measure is simple and can be efficiently computed, even with our
large data set.
Text Steganography
-
7/30/2019 final docu (1) (1) (1)-mml
30/36
Cover image Text File
Stego image
-
7/30/2019 final docu (1) (1) (1)-mml
31/36
Future Scope
Why steganography? Who needs steganography? What are the uses for
steganography? Where can one use steganography?
According to Richard E. Smith (a data security expert), he doesnt see
many practical uses for steganography because it only works as long as nobody
expects you to use it. The author respectfully takes exception to this statement.
Initially after reading this statement, the myth that Charles H. Duell, Commissioner of
Patents in 1899 had declared that the Patent Office should be closed because
everything that could possibly be invented had already been invented came to mind.
Perhaps the computer security community should give up on endless patches, security
applications, etc because they only work if nobody expects that they are in use. To
quote Dale Carnegie, Most of the important things in the world have been
accomplished by people who have kept on trying when there seemed to be no hope at
all. There are ongoing studies to harden steganographic images from steganalysis. In
his paper, Defending Against Statistical Steganalysis, Provos presents new methods
which would allow one to select a file in which a message might be safely hidden and
resistant to standard statistical analysis.
-
7/30/2019 final docu (1) (1) (1)-mml
32/36
How we propose to extent our projectThis project on steganography has the potential to be scaled up to higher
standards. We have only brushed the surface of the research on data security through
steganography. Its only limited to our imagination what we can do in future to modify
and scale up this projects to new standards. Some of our ideas are discussed below.
The first idea that we have is to develop a multi bit image steganography
method that is much more efficient in hiding large volumes of data in a single image
file. In this manner we will uncover a steganographic technique which will enable
hassle free transmission of large volumes of secure data over the network from
sender to a destined receiver.
Furthermore another radical idea is that we can train this proposed software
through the help of technologies like neural network to determine and distinguish a
normal image with a stego image. In this manner this software will get trained to
understand a stego image and therby can autonomously perform steganalytic
operations without human intervention.
There are many such ideas and we will always work on them to improve this
work for a long time. There are multiple possibilities of improving the current
techniques and careful work may reveal many of the possibilities in the field of
steganography.
-
7/30/2019 final docu (1) (1) (1)-mml
33/36
ACRONYMSLSB-Least significant Bit. In computing, the least significant bit (lsb) isthe bit position in a binary integer giving the units value, that is, determining whether
the number is even or odd. The lsb is sometimes referred to as the right-most bit, due
to the convention inpositional notation of writing less significant digits further to the
right.
RGB-Red Green Blue Colour model. The RGB color model is an additive colormodel in which red, green, and blue light are added together in various ways to
reproduce a broad array of colours.
PSNR- Peak Signal-to-Noise Ratio. PSNR is one of metrics to determine thedegradation in the embedded image with respect to the host image..Values over 36 dB in PSNR are acceptable in terms of degradation, which means nosignificant degradation is observed by human eye.
ASCII-The American Standard Code for Information Interchange is a character-encoding scheme originally based on the English alphabet. ASCII codesrepresent text in computers, communications equipment, and other devices that usetext.
DSP- Digital signal processing is the mathematical manipulation of an informationsignal to modify or improve it in some way. It is characterized by the representation
of discrete time, discrete frequency, or other discrete domain signals by a sequence of
numbers or symbols and the processing of these signals.
-
7/30/2019 final docu (1) (1) (1)-mml
34/36
CONCLUSION
Steganography can be used for hidden communication. We have explored the
limits of steganography theory and practice. We pointed out the enhancement of the
image steganographic system using LSB approach to provide a means of secure
communication. A stego-keyhas been applied to the system during embedment of the
message into the cover-image. In our proposed approach, the message bits are
embedded randomly into the cover-image pixels instead of sequentially. Finally, we
have shown that steganography that uses a key has a better security than non-key
steganography. This is so because without the knowledge of the valid key, it is difficult
for a third party or malicious people to recover the embedded message. However
there are still some issues need to be tackled to implement LSB on a digital image as a
cover-objectusing random pixels.
-
7/30/2019 final docu (1) (1) (1)-mml
35/36
References
[1] Kurak, C. and McHugh, J.: A Cautionary Note on Image Downgrading. Proc. IEEE 8
th
AnnualComputer Security Applications Conference. San Antonio, USA, Nov./Dec. 1992, pp. 153-155.
[2] Moskowitz, I., Longdon G. and Chang, L.: A New Paradigm Hidden in Steganography. Proc. 2000
Workshop on new security paradigms, Ballycotton, Country Cork, Ireland, 2000. ACM Press, New
York, pp. 41-50.
[3] Sharp, T.: An implementation of key-based digital signal steganography. Proc. 4th
International
Workshop on Information Hiding, Pittsburgh, USA, April 25, 2001. Springer LNCS, vol. 2137.
[4] Kawaguchi, E. and Eason, R.: Principle and applications of BPCS-Steganography. Proc. Multimedia
Systems and Applications Conference, Boston, MA, USA, November 2, 1998. SPIE series, vol. 3528,
pp. 464-473.
[5] Bender, W., Gruhl, D., Morimoto, N. and Lu, A.: Techniques for data hiding. IBM Systems Journal,
vol. 35, nos. 3&4, 1996.
[6] Moskowitz, I., Johnson, N. and Jacobs, M.: A detection study of an NRL steganographic method.
NRL Memorandum Report NRL/MR/5540{02-8635, Naval Research Laboratory, Code 5540,
Washington, 2002.
[7] Noto, M.: MP3Stego: Hiding text in MP3 files. Sans Institute, 2003.
[8] Sharp, T.: An implementation of key-based digital signal steganography. Proc. 4th
International
Workshop on Information Hiding. Springer LNCS, vol. 2137, pp.13-26, 2001.
[9] Katzenbeisser, S. and Petitcolas, F.: Information hiding techniques for steganography and digital
watermarking. Artech House Books, 1999.
[10] Hempstalk, K.: Hiding behind corners: using edges in images for better steganography.
Computing Womens Congress Conference, Hamilton, New Zealand, 2006.
-
7/30/2019 final docu (1) (1) (1)-mml
36/36
[11] Fridrich, J., Goljan, M. and Du, R.: Reliable detection of LSB steganography in color and grayscale
images. Proc. ACM Workshop on Multimedia and Security, Ottawa, ON, Canada, Oct. 5, 2001, pp.
27-30.
[12] Dumitrescu, S., Wu, X. and Wang, Z.: Detection of LSB steganography via sample pairs analysis.
5th
International Workshop on Information Hiding. Noordwijkerhout, Pays-Bas, 7/10/2002. Springer
LNCS, vol. 2578, pp. 355-372, 2003.
[13] Ker, A.: Improved detection of LSB steganography in grayscale images. Proc. 6th
Information
Hiding Workshop. Springer LNCS, vol. 3200, pp. 97-115, 2004.
[14] Van Dijk, M. and Willems, F.: Embedding information in grayscale images. Proc. 22nd
Symposium
on Information and Communication Theory in the Benelux, pp. 147-154, Enschede, The Netherlands,
May 15-16, 2001.
[15] Goljan, M. and Holotyak, T.: New blind steganalysis and its implications. Proc. SPIE Security,
Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.
[16] Thyssen, J. & Zimmerman, H., Contraband 9g, 1999-01-01 (consultation date 2009-07-07).
Available in http://www.jthz.com/puter/.
[17] Bernard Electronics, Data Privacy Tools 3.5, last update 2008-10-03 (consultation date 2009-07-
07). Available in http://www.xs4all.nl/~bernard/home_e.html
[18] Hempstalk, K., Digital Invisible Ink Toolkit 1.5, last update 2006-06-09 (consultation date 2009-
07-07). Available in http://diit.sourceforge.net
19 Alpha Tec Ltd, EikonaMark 4.7, last update 2005-01-01 (consultation date 2009-07-07).
Available inhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamark.
http://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamark