final docu (1) (1) (1)-mml

download final docu (1) (1) (1)-mml

of 36

Transcript of final docu (1) (1) (1)-mml

  • 7/30/2019 final docu (1) (1) (1)-mml

    1/36

    DATA HIDING THROUGH IMAGE

    STEGANOGRAPHY[B.Tech Project Report]

    A Project ByMd Rameez Akhtar

    Ishita ChelKushal Kannungo

    Somyojit Das

    Project GuideProf. Anjan Payra

    Dr Suchir Chandra Sur Degree Engineering College

    [Computer Science and Engineering Dept]

    West Bengal University of Technology(2009-2013)

  • 7/30/2019 final docu (1) (1) (1)-mml

    2/36

    DATA HIDING THROUGH IMAGESTEGANOGRAPHY

    Project Report Submitted in Partial Fulfillment ofthe Requirements for the

    Degree of Bachelor of Technology in

    Computer Science and Engineeringby

    Md Rameez Akhtar (09255001001)

    Ishita Chel(09255001013)

    Kushal Kannungo(092550010xx)

    Somyojit Das(092550010xx)

    Project Guide

    Prof. Anjan Payra

    Dr Suchir Chandra Sur Degree Engineering College

    Computer Science and Engineering Dept

    [Affiliated to WBUT]

    West Bengal

    2009-2013

  • 7/30/2019 final docu (1) (1) (1)-mml

    3/36

    [Affiliated to WBUT]

    West Bengal2009-2013

    Certificate

    This is to certify that this project report entitled DATA HIDING

    THROUGH IMAGE STEGANOGRAPHY by Md Rameez Akhtar (Roll

    No. 09255001001), Ishita Chel (Roll No. 09255001001), Kushal Kannungo

    (Roll No. 092550010xx) and Somyojit Das (Roll No. 092550010xx)

    submitted in partial fulfilment of the requirements for the degree of Bachelor

    of Technology in Electronics and Communication Engineering of the WestBengal University Of Technology, West Bengal, during the academic year

    2012-13,is a bonafide record of work carried out under our guidance and

    supervision.

    The results embodied in this report have not been submitted to any other

    University or Institution for the award of any degree or diploma.

    (Guide) (Head of Dept)

    Prof. Anjan Payra Prof. Samir Kundu

    Acknowledgement

  • 7/30/2019 final docu (1) (1) (1)-mml

    4/36

    It is our privilege to express our sincerest regards to our project

    coordinator, Prof. Anjan Payra, for his valuable inputs, able guidance,

    encouragement, whole-hearted cooperation and constructive criticism

    throughout the duration of our project. We deeply express our sincere

    thanks to our Head of Department Prof. S Kundu for encouraging and

    allowing us to present the project on the topic Data Hiding Through

    Image Steganography at our department premises for the partial

    fulfillment of the requirements leading to the award of B-Tech degree.

    We take this opportunity to thank all our lecturers who have directly or

    indirectly helped our project. We pay our respects and love to our parents

    and all other family members and friends for their love and

    encouragement throughout our career. Last but not the least we express

    our thanks to our friends for their cooperation and support.

  • 7/30/2019 final docu (1) (1) (1)-mml

    5/36

    ABSTRACT

    The Internet as a whole does not use secure links, thus information in

    transit may be vulnerable to interception as well. The important of reducing a

    chance of the information being detected during the transmission is being an

    issue now days. Some solution to be discussed is how to passing information in

    a manner that the very existence of the message is unknown in order to repel

    attention of the potential attacker. Besides hiding data for confidentiality, thisapproach of information hiding can be extended to copyright protection for

    digital media. In this research, we clarify what steganography is, the definition,

    the importance as well as the technique used in implementing steganography.

    We focus on the Least Significant Bit (LSB) technique in hiding messages in an

    image. The system enhanced the LSB technique by randomly dispersing the bits

    of the message in the image and thus making it harder for unauthorized people

    to extract the original message.

    Keyword: Steganography, information hiding

  • 7/30/2019 final docu (1) (1) (1)-mml

    6/36

    Introduction

    Steganography brings science to the art of hiding information. The

    purpose of steganography is to convey a message inside of a conduit of

    misinterpretation such that the existence of the message is both hidden and

    difficult to recover when discovered. Basically the information hiding process in

    a Steganoraphic system starts by identifying a cover mediums redundant bits.

    The embedding process creates a stego medium by replacing these redundant

    bits with data from the hidden message. The basic purpose to make

    communication unintelligible to those who do not possess the right keys.

    The first step is steganography is that to embed and hiding information

    is to pass both the secret message and the cover message in to the encoder,

    inside the encoder, one or several protocols will be implemented to embed the

    secret information into the cover message.

    A key is needed in the embedding process. By using the key we can reduce the

    chance of third party attackers getting hold of the stego object and decoding itto find out the secret information. In general the embedding process inserts a

    mark X, in an object Y, a key K, usually produced by a random number

    generator is used in the embedding process and the resulting marked object Y

    is generated by mapping X x Y x K Y

    Having passed through the encoder a stego object will be produced. A

    stego object is the original cover object with the secret information

    embedded inside. This object should look almost identical to the cover object as

    otherwise a third party attacker can see embedded information. Having

    produced the stego object, It will be sentoff via some communication channel.

    At the receiving end the stego object is fed into the system the public or

    private key that can decodethe original key that is used inside the encoding

    process is also needed to detect the secret information.

    One of the reasons that intruders can be successful is that most of the

    information they acquire from a system is in a form that they can read and

  • 7/30/2019 final docu (1) (1) (1)-mml

    7/36

    comprehend. Intruders may reveal the information to others, modify it to

    misrepresent an individual or organization, or use it to launch an attack. One

    solution to this problem is, through the use of steganography. Steganography is

    a technique of hiding information in digital media. In contrast to cryptography,

    it is not to keep others from knowing the hidden information but it is to keep

    others from thinking that the information even exists.

  • 7/30/2019 final docu (1) (1) (1)-mml

    8/36

    1.2 Background of the ProblemSteganography become more important as more people join the

    cyberspace revolution. Steganography is the art of concealing information in

    ways that prevent the detection of hidden messages. Steganography include an

    array of secret communication methods that hide the message from being seen

    or discovered.

    The goal of steganography is to avoid drawing suspicion to the existence

    of a hidden message. This approach of information hiding technique has

    recently become important in a number of application areas. Digital audio,

    video, and pictures are increasingly furnished with distinguishing butimperceptible marks, which may contain a hiddin copyright notice or serial

    number or even help to preventunauthorized copying directly.

    Military communications system make increasing use of traffic security

    technique which, rather than merely concealing the content of a message using

    encryption, seek to conceal its sender, its receiver or its very existence. Similar

    techniques are used in some mobile phone systems and schemes proposed for

    digital elections.

    Some of the techniques used in steganography are domain tools or

    simple system such as least significant bit (LSB) insertion and noise

    manipulation, and transform domain that involve manipulation algorithms and

    image transformation such as discrete cosine transformation and wavelet

    transformation. However there are technique that share the characteristic of

    both of the image and domain tools such as patchwork, pattern block encoding,

    spread spectrum methods and masking.

    1.3 Objective

    This project comprehends the following objectives:

    (i) To produce security tool based on steganographic techniques.(ii) To explore techniques of hiding data using steganography.

  • 7/30/2019 final docu (1) (1) (1)-mml

    9/36

    Results obtained hiding the message 111 in the pixel10101000-10101000-10101000 with the LSB method

  • 7/30/2019 final docu (1) (1) (1)-mml

    10/36

    The Scope Of Steganography

    With the boost in computer power, the internetand with the development ofdigital signalprocessing (DSP), information theory and codingtheory, steganography

    has gone digital. In therealm of this digital world, steganography hascreated an

    atmosphere of corporate vigilance thathas spawned various interesting

    applications,thus its continuing evolution is guaranteed.Cyber-crime is believed to

    benefit from thisdigital revolution. Hence an immediate concernis to find out best

    possible attacks to carry outsteganalysis, and simultaneously, finding outtechniques to

    strengthen existing stegnographytechniques against popular attacks likesteganalysis.

    Cryptography

    Cryptography encodes information in such a way that nobody can read it, except the

    person who holds the key. More advanced crypto techniques ensure that the

    information being transmitted has not been modified in transit. There is some

    difference in cryptography and steganography, in cryptography the hidden message is

    always visible, because information is in plain text form but in steganography hidden

    message is invisible.

  • 7/30/2019 final docu (1) (1) (1)-mml

    11/36

    Steganography Versus Cryptography

    The comparison and contrast between steganography and cryptography is illustratedfrom the following table .

    S.no. Context Steganography Cryptography

    1 Host

    FilesImage, Audio,

    Text, etc.Mostly Text

    Files2 Hidden

    FilesImage, Audio,

    Text, etc.Mostly Text

    Files

    3 Result Stego File Cipher Text

    4 Type of

    AttackSteganalysis:

    Analysis of a

    file with a

    objective of

    finding

    whether it is

    stego file or not

    Cryptanalysis

    Table Comparison and contrast between steganography and cryptography.

  • 7/30/2019 final docu (1) (1) (1)-mml

    12/36

    Steganalysis

    Steganalysis is a relatively new research discipline with few articles appearing beforethe late-1990s. Steganalysis is "the process of detecting steganography by looking at

    variances between bit patterns and unusually large file sizes" . It is the art of

    discovering and rendering useless covert messages. The goal of steganalysis is to

    identify suspected information streams, determine whether or not they have hidden

    messages encoded into them, and, if possible, recover the hidden information.

    The challenge of steganalysis is that:

    1. The suspect information stream, such as a signal or a file, may or may not have

    hidden

    data encoded into them.

    2. The hidden data, if any, may have been encrypted before being inserted into the

    signal or file.

    3. Some of the suspect signal or file may have noise or irrelevant data encoded into

    them

    (which can make analysis very time consuming).

    4. Unless it is possible to fully recover, decrypt and inspect the hidden data, often one

    has

    only a suspect information stream and

    cannot be sure that it is being used for transporting secret information.

    Modern Terminology and Framework

    Secret

    Message

  • 7/30/2019 final docu (1) (1) (1)-mml

    13/36

    no

    yes

    Histogram

    Cover

    Message

    Secret

    Key

    Embedding

    Algorithm

    Stego

    Message

    Is Stego

    Message

    Suppress

    Message

    Message Retrieval

    Algorithm

    Secret

    Message

    Secret

    Key

  • 7/30/2019 final docu (1) (1) (1)-mml

    14/36

    A histogram is one of the basic quality tools. It is used to graphically

    summarize and display the distribution and variation of a process data set. A

    frequency distribution shows how often each different value in a set of data occurs.

    The main purpose of a histogram is to clarify the presentation of data. You canpresent the same information in a table; however, the graphic presentation format

    usually makes it easier to see relationships. It is a useful tool for breaking out process

    data into regions or bins for determining frequencies of certain events or categories

    of data. These charts can help show the most frequent.

    Typical applications of histograms in root cause analysis include:

    Presenting data to determine which causes dominate

    Understanding the distribution of occurrences of different problems, causes,

    consequences, etc.

    A histogram can typically help you answer the following questions:

    What is the most common system response?

    What distribution (center, variation and shape) does the data have?

    Does the data look symmetric or is it skewed to the left or right?

    A histogramis a specialized type of bar chart. Individual data points are grouped

    together in classes, so that you can get an idea of how frequently data in each class

    occur in the data set. High bars indicate more points in a

    class, and low bars indicate less points.

  • 7/30/2019 final docu (1) (1) (1)-mml

    15/36

    Original image

    Fig. 1 grayscale image

  • 7/30/2019 final docu (1) (1) (1)-mml

    16/36

    Histogram of Fig. 1

    Least Significant Bit SubstitutionIn LSB steganography, the least significant bits of the cover medias digital data are

    used to conceal the message. The simplest of the LSB steganography techniques is LSB

    replacement. LSB replacement steganography flips the last bit of each of the data

    values to reflect the message that needs to be hidden. Consider an 8-bit grayscale

    bitmap image where each pixel is stored as a byte representing a grayscale value.Suppose the first eight pixels of the original image have the following grayscale values:

    11010010

    0100101010010111

  • 7/30/2019 final docu (1) (1) (1)-mml

    17/36

    10001100

    00010101

    01010111

    0010011001000011

    To hide the letter C whose binary value is 10000011, we would replace the LSBs of

    these pixels to have the following new grayscale values:

    11010011

    01001010

    10010110

    10001100

    00010100

    01010110

    00100111

    01000011.

    Note that, on average, only half the LSBs need to change. The difference between the

    cover (i.e. original) image and the stego image will be hardly noticeable to the human

    eye. Figure

    (a), (b) that show a cover image and a stego image (with data is embedded); there is

    no

    visible difference between the two images.

  • 7/30/2019 final docu (1) (1) (1)-mml

    18/36

    Fig. a Cover image

    Fig. b Stego image

    LSB steganography, as described above, replaces the LSBs of data values to match bitsof the message. It can equally alter the data value by a small amount, ensuring the a

  • 7/30/2019 final docu (1) (1) (1)-mml

    19/36

    legal range of data values is preserved. The difference being that the choice of

    whether to add or subtract one from the cover image pixel is random.This will havethe same effect as LSB replacement in terms of not being able to perceive the

    existence of the hidden message. This steganographic technique is called LSBmatching. Both LSB replacement and LSB matching leave the LSB unchanged if the

    message bit matches the LSB. When the message bit does not match the LSB, LSB

    replacement replaces the LSB with the message bit; LSB matching randomly

    increments or decrements the data value by one. LSB matching is also known as 1

    embedding.

    In the case of still grayscale images of type bitmap, every pixel is represented

    using 8 bits, with 11111111 (=255) representing white and 00000000 (=0) representing

    black. Thus, there are 256 different grayscale shades between black and white which

    are used in grayscale bitmap images. In LSB stegonography, the LSBs of the cover

    image is to be changed. As the message bit to be substituted in the LSB position of

    the cover image is either 0 or 1, one can state without any loss of generality that the

    LSB's of about 50 percent pixel changes.

  • 7/30/2019 final docu (1) (1) (1)-mml

    20/36

    There are three possibilities:

    1. Intensity value of any pixel remains unchanged.

    2. Even value can change to next higherodd value.

    3. Odd Value change to previous lower even value.

  • 7/30/2019 final docu (1) (1) (1)-mml

    21/36

    MATERIALS AND METHODS

    First Component Alteration TechniqueFor Image Steganography

    In the technique, a new imagesteganography scheme based on firstcomponenet

    Alteration technique is introduced.In a computer, images are represented as arraysof

    values. These values represent the intensities of the three colors R (Red), G (Green)

    and B(Blue), where a value for each of three colorsdescribes a pixel. Each pixel is

    combination ofthree components(R,G and B).

    In this scheme, the bits of firstcomponent (blue component) of pixels of image have

    been replaced with data bits, which areapplied only when valid key is used.

    Bluechannel is selected because a research wasconducted by Hecht, which reveals that

    thevisual perception of intensely blue objects is lessdistinct that the perception of

    objects of red andgreen.

    For example, suppose one can hide a message in

    three pixels of an image (24-bit colors). Suppose

    the original 3 pixels are:

    (0010011111101001 11001000) (001001111100100011101001)

    (11001000 00100111 11101001)

    A steganographic program could hide the letter"A" which has a position 65 into

    ASCIIcharacter set and have a binary representation"01000001", by altering the blue

    channel bits ofpixels.

    (0100000111101001 11001000) (001001111100100011101000)

    (11001000 00100111 11101001)

    A. Embedding phaseThe embedding process is as follows.

    Inputs: Image file and the text file

  • 7/30/2019 final docu (1) (1) (1)-mml

    22/36

    Output: Text embedded image

    Procedure:

    Step 1: Extract all the pixels in the given imageand store it in the array called Pixel-

    array.

    Step 2: Extract all the characters in the given textfile and store it in the array called

    Characterarray.

    Step 3: Extract all the characters from the Stegokey and store it in the array called

    Key- array.

    Step 4: Choose first pixel and pick charactersfrom Key- array and place it in first

    componentof pixel. If there are more characters in Keyarray,then place rest in the

    firstcomponent of next pixels, otherwise follow Step(e).

    Step 5: Place some terminating symbol toindicate end of the key. 0 has been used as

    aterminating symbol in this algorithm.

    Step 6: Place characters of Character- Array in each first component (blue channel)

    of nextpixels by replacing it.

    Step 7: Repeat step 6 till all the characters hasbeen embedded.

    Step 8: Again place some terminating symbol toindicate end of data.

    Step 9: Obtained image will hide all thecharacters that input.

  • 7/30/2019 final docu (1) (1) (1)-mml

    23/36

  • 7/30/2019 final docu (1) (1) (1)-mml

    24/36

    B. Extraction phaseInputs: Embedded image file

    Output: Secret text message

    Procedure:Step 1: Consider three arrays. Let they beCharacter-Array, Key-array and Pixel-array.

    Step 2: Extract all the pixels in the given imageand store it in the array called Pixel-

    array.

    Step 3: Now, start scanning pixels from firstpixel and extract key characters from first

    (blue)component of the pixels and place it in Keyarray.Follow Step3 up to terminating

    symbol,otherwise follow step 4.

    Step 4: If this extracted key matches with the keyentered by the receiver, then follow

    Step 5,otherwise terminate the program by displayingmessage Key is not matching.

    Step 5: If the key is valid, then again startscanning next pixels and extract secret

    messagecharacters from first (blue) component of nextpixels and place it in Character

    array. FollowStep 5 till up to terminating symbol, otherwise

    follow step 6.

    Step 6: Extract secret message from Character array. The primary motivation of the

    current work is to increase PSNR. For this purpose we employ the approach

    whichhide secret image in to cover image with the help of logic gates.

    Algorithm:

    Step1:Read the image to be embedded

    Step 2: Read the image inside which message isembed

  • 7/30/2019 final docu (1) (1) (1)-mml

    25/36

    Step 3:set numSignificantBits = n ; where n=1,28

    Step 4: size1 = size(secret); and size2 =size(coverImage);

    Step 5: set the "numSignificantBits"n significantbits of each byte of cover image to

    zero by usingbit by AND operation on cover and size1 matrix

    Step 6: embedd the "numSignificantBits" mostsignificant bits of secret image to

    create the stegoimage by using stego= (cover zero+ secret)/28-n

    Step 7: recover the embedded image, by using bitby shift operation

    Step 8: Display Figure of cover image, Image tobe hidden, stego image and recover

    image

    Step 9: End

    Note :- as the value of n will be increase thequality of stego and recover image will

    bedegraded.

    The proposed method is applicable for both 24bit color and 8 bit gray image. So the

    conversion of 24 bit color image to 8 bit grayscale image isdone as follow:

    Conversion Of Color Image Into Greyscale ImageConversion of a color image tograyscale can be done using several approaches.

    Different weighting of the primary colorseffectively represent the effect of

    obtainingblack-and-white image with color images. Acommon strategy is to match the

    luminance ofthe grayscale image to the luminance of the color

    Image.

    The proposed method is baled both 24 bit colorand 8 bit gray image

  • 7/30/2019 final docu (1) (1) (1)-mml

    26/36

    To convert any color to a grayscalerepresentation of its luminance, first onemust

    obtain the values of its red, green, and blue(RGB) primaries in linear intensity

    encoding, bygamma expansion. Then, add together 30% ofthe red value, 59% of thegreen value, and 11%of the blue value(these weights depend on theexact choice of the

    RGB primaries, but aretypical). Regardless of the scale employed (0.0 to1.0, 0 to 255,

    0% to 100%, etc.), the resultantnumber is the desired linear luminance value;

    ittypically needs to be gamma compressed to getback to a conventional grayscale

    representation. a conventional grayscale representation.

    To convert a gray intensity value toRGB, simply set all the three primary color

    components red, green and blue to the grayvalue, correcting to a different gamma

    ifnecessary. The method adopted in current workfor experimental evaluation is to

    obtain the RGBvalues of individual pixels and to take the average to be normalized to

    fit in the scale 0 to 255.

    RESULTS AND DISCUSSIONS

  • 7/30/2019 final docu (1) (1) (1)-mml

    27/36

  • 7/30/2019 final docu (1) (1) (1)-mml

    28/36

  • 7/30/2019 final docu (1) (1) (1)-mml

    29/36

    The method is applicable for both grayscale (8 bit) or color image(24 bit). We categorized images with respect to their JPEG quality factor, and observed

    the effect on the performance of the steganalyzers. But other than the JPEG

    quality factor, image properties such as image texture could be used to

    categorize the images. There are many approaches to quantify the texture of an

    image. A crude measure of image texture would be the mean variance of JPEG

    blocks. This measure is simple and can be efficiently computed, even with our

    large data set.

    Text Steganography

  • 7/30/2019 final docu (1) (1) (1)-mml

    30/36

    Cover image Text File

    Stego image

  • 7/30/2019 final docu (1) (1) (1)-mml

    31/36

    Future Scope

    Why steganography? Who needs steganography? What are the uses for

    steganography? Where can one use steganography?

    According to Richard E. Smith (a data security expert), he doesnt see

    many practical uses for steganography because it only works as long as nobody

    expects you to use it. The author respectfully takes exception to this statement.

    Initially after reading this statement, the myth that Charles H. Duell, Commissioner of

    Patents in 1899 had declared that the Patent Office should be closed because

    everything that could possibly be invented had already been invented came to mind.

    Perhaps the computer security community should give up on endless patches, security

    applications, etc because they only work if nobody expects that they are in use. To

    quote Dale Carnegie, Most of the important things in the world have been

    accomplished by people who have kept on trying when there seemed to be no hope at

    all. There are ongoing studies to harden steganographic images from steganalysis. In

    his paper, Defending Against Statistical Steganalysis, Provos presents new methods

    which would allow one to select a file in which a message might be safely hidden and

    resistant to standard statistical analysis.

  • 7/30/2019 final docu (1) (1) (1)-mml

    32/36

    How we propose to extent our projectThis project on steganography has the potential to be scaled up to higher

    standards. We have only brushed the surface of the research on data security through

    steganography. Its only limited to our imagination what we can do in future to modify

    and scale up this projects to new standards. Some of our ideas are discussed below.

    The first idea that we have is to develop a multi bit image steganography

    method that is much more efficient in hiding large volumes of data in a single image

    file. In this manner we will uncover a steganographic technique which will enable

    hassle free transmission of large volumes of secure data over the network from

    sender to a destined receiver.

    Furthermore another radical idea is that we can train this proposed software

    through the help of technologies like neural network to determine and distinguish a

    normal image with a stego image. In this manner this software will get trained to

    understand a stego image and therby can autonomously perform steganalytic

    operations without human intervention.

    There are many such ideas and we will always work on them to improve this

    work for a long time. There are multiple possibilities of improving the current

    techniques and careful work may reveal many of the possibilities in the field of

    steganography.

  • 7/30/2019 final docu (1) (1) (1)-mml

    33/36

    ACRONYMSLSB-Least significant Bit. In computing, the least significant bit (lsb) isthe bit position in a binary integer giving the units value, that is, determining whether

    the number is even or odd. The lsb is sometimes referred to as the right-most bit, due

    to the convention inpositional notation of writing less significant digits further to the

    right.

    RGB-Red Green Blue Colour model. The RGB color model is an additive colormodel in which red, green, and blue light are added together in various ways to

    reproduce a broad array of colours.

    PSNR- Peak Signal-to-Noise Ratio. PSNR is one of metrics to determine thedegradation in the embedded image with respect to the host image..Values over 36 dB in PSNR are acceptable in terms of degradation, which means nosignificant degradation is observed by human eye.

    ASCII-The American Standard Code for Information Interchange is a character-encoding scheme originally based on the English alphabet. ASCII codesrepresent text in computers, communications equipment, and other devices that usetext.

    DSP- Digital signal processing is the mathematical manipulation of an informationsignal to modify or improve it in some way. It is characterized by the representation

    of discrete time, discrete frequency, or other discrete domain signals by a sequence of

    numbers or symbols and the processing of these signals.

  • 7/30/2019 final docu (1) (1) (1)-mml

    34/36

    CONCLUSION

    Steganography can be used for hidden communication. We have explored the

    limits of steganography theory and practice. We pointed out the enhancement of the

    image steganographic system using LSB approach to provide a means of secure

    communication. A stego-keyhas been applied to the system during embedment of the

    message into the cover-image. In our proposed approach, the message bits are

    embedded randomly into the cover-image pixels instead of sequentially. Finally, we

    have shown that steganography that uses a key has a better security than non-key

    steganography. This is so because without the knowledge of the valid key, it is difficult

    for a third party or malicious people to recover the embedded message. However

    there are still some issues need to be tackled to implement LSB on a digital image as a

    cover-objectusing random pixels.

  • 7/30/2019 final docu (1) (1) (1)-mml

    35/36

    References

    [1] Kurak, C. and McHugh, J.: A Cautionary Note on Image Downgrading. Proc. IEEE 8

    th

    AnnualComputer Security Applications Conference. San Antonio, USA, Nov./Dec. 1992, pp. 153-155.

    [2] Moskowitz, I., Longdon G. and Chang, L.: A New Paradigm Hidden in Steganography. Proc. 2000

    Workshop on new security paradigms, Ballycotton, Country Cork, Ireland, 2000. ACM Press, New

    York, pp. 41-50.

    [3] Sharp, T.: An implementation of key-based digital signal steganography. Proc. 4th

    International

    Workshop on Information Hiding, Pittsburgh, USA, April 25, 2001. Springer LNCS, vol. 2137.

    [4] Kawaguchi, E. and Eason, R.: Principle and applications of BPCS-Steganography. Proc. Multimedia

    Systems and Applications Conference, Boston, MA, USA, November 2, 1998. SPIE series, vol. 3528,

    pp. 464-473.

    [5] Bender, W., Gruhl, D., Morimoto, N. and Lu, A.: Techniques for data hiding. IBM Systems Journal,

    vol. 35, nos. 3&4, 1996.

    [6] Moskowitz, I., Johnson, N. and Jacobs, M.: A detection study of an NRL steganographic method.

    NRL Memorandum Report NRL/MR/5540{02-8635, Naval Research Laboratory, Code 5540,

    Washington, 2002.

    [7] Noto, M.: MP3Stego: Hiding text in MP3 files. Sans Institute, 2003.

    [8] Sharp, T.: An implementation of key-based digital signal steganography. Proc. 4th

    International

    Workshop on Information Hiding. Springer LNCS, vol. 2137, pp.13-26, 2001.

    [9] Katzenbeisser, S. and Petitcolas, F.: Information hiding techniques for steganography and digital

    watermarking. Artech House Books, 1999.

    [10] Hempstalk, K.: Hiding behind corners: using edges in images for better steganography.

    Computing Womens Congress Conference, Hamilton, New Zealand, 2006.

  • 7/30/2019 final docu (1) (1) (1)-mml

    36/36

    [11] Fridrich, J., Goljan, M. and Du, R.: Reliable detection of LSB steganography in color and grayscale

    images. Proc. ACM Workshop on Multimedia and Security, Ottawa, ON, Canada, Oct. 5, 2001, pp.

    27-30.

    [12] Dumitrescu, S., Wu, X. and Wang, Z.: Detection of LSB steganography via sample pairs analysis.

    5th

    International Workshop on Information Hiding. Noordwijkerhout, Pays-Bas, 7/10/2002. Springer

    LNCS, vol. 2578, pp. 355-372, 2003.

    [13] Ker, A.: Improved detection of LSB steganography in grayscale images. Proc. 6th

    Information

    Hiding Workshop. Springer LNCS, vol. 3200, pp. 97-115, 2004.

    [14] Van Dijk, M. and Willems, F.: Embedding information in grayscale images. Proc. 22nd

    Symposium

    on Information and Communication Theory in the Benelux, pp. 147-154, Enschede, The Netherlands,

    May 15-16, 2001.

    [15] Goljan, M. and Holotyak, T.: New blind steganalysis and its implications. Proc. SPIE Security,

    Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.

    [16] Thyssen, J. & Zimmerman, H., Contraband 9g, 1999-01-01 (consultation date 2009-07-07).

    Available in http://www.jthz.com/puter/.

    [17] Bernard Electronics, Data Privacy Tools 3.5, last update 2008-10-03 (consultation date 2009-07-

    07). Available in http://www.xs4all.nl/~bernard/home_e.html

    [18] Hempstalk, K., Digital Invisible Ink Toolkit 1.5, last update 2006-06-09 (consultation date 2009-

    07-07). Available in http://diit.sourceforge.net

    19 Alpha Tec Ltd, EikonaMark 4.7, last update 2005-01-01 (consultation date 2009-07-07).

    Available inhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamark.

    http://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamarkhttp://www.alphatecltd.com/watermarking/eikonamark/eikonamark