Steganalysis Detecting Steganography

download Steganalysis Detecting Steganography

of 12

Transcript of Steganalysis Detecting Steganography

  • 8/12/2019 Steganalysis Detecting Steganography

    1/12

    PAPER PRESENTATION ON

    IMPROVED TECHNIQUES FOR

    STEGANOGRAPHY

    AND

    STEGANALYSIS

    SUBMITTED BY:

    SHUBHI JAIN

    ELECTRONICS AND COMMUNICATION

    GYAN GANGA INSTITUTE OF TECHNOLOGY AND SCIENCES

    JABALPUR

  • 8/12/2019 Steganalysis Detecting Steganography

    2/12

    MADHYA PRADESH

    CONTENTS:

    1. INTRODUCTION

    2. HISTORY

    3. TERMINOLOGY

    4. TYPES OF STEGANOGRAPHY

    5. IMPLEMENTATION OF STEGANOGRAPHY

    6. STEGANALYSIS

    7. LIMITATIONS OF STEGANOGRAPHY

    8. APPLICATIONS OF STEGANOGRAPHY

    9. CONCLUSION

  • 8/12/2019 Steganalysis Detecting Steganography

    3/12

    INTRODUCTION

    Have you ever a!"e# "o $%#e &o'e"$%!( )ro' your )r%e!#&* )a'%+y or

    (over!'e!", I) "$e a!&er %& ye&* "$e! you !ee# "o +ear! a-ou" STEGANOGRAPHY.S"e(a!o(ra/$y* 0o'%!( )ro' "$e Gree1 or#& &"e(o&* 'ea!%!( roo) or 0overe# a!#

    (ra/$%a $%0$ 'ea!& r%"%!(* %& "$e ar" a!# &0%e!0e o) $%#%!( "$e )a0" "$a" 0o''u!%0a"%o! %&"a1%!( /+a0e. To (%ve a 'ore )or'a+ #e)%!%"%o!* "$e Merr%a' 2e-&"er D%0"%o!ary #e)%!e&&"e(a!o(ra/$y a&: T$e Ar" or /ra0"%0e o) 0o!0ea+%!( a 'e&&a(e* %'a(e* or )%+e.

    S"e(a!o(ra/$y a!# 0ry/"o(ra/$y are 0+o&e+y re+a"e#. Cry/"o(ra/$y&0ra'-+e& 'e&&a(e& &o "$ey 0a!!o" -e u!#er&"oo#. S"e(a!o(ra/$y o! "$e o"$er $a!#* %++$%#e "$e 'e&&a(e &o "$a" "$ey 0a!!o" -e &ee!.U&%!( &"e(a!o(ra/$y* you 0a! e'-e# a

    &e0re" 'e&&a(e %!&%#e a /%e0e o) u!&u&/%0%ou& %!)or'a"%o! a!# &e!# %" %"$ou" a!yo!e1!o%!( o) "$e e3%&"e!0e o) "$e &e0re" 'e&&a(e.

    A& "$e )%e+# o) &"e(o!a(ra/$y $a& /ro(re&&e#* /eo/+e $ave -e0o'e

    %!0rea&%!(+y %!"ere&"e# %! -e%!( a-+e "o #e"e0" "$e&e $%##e! 'e&&a(e& %!&%#e 'e#%a. T$e

    )%e+# o) &"e(a!a+y&%& $a& e'er(e# "o 'ee" "$%& !ee#. S"e(a!a+y&%& 0a! -e #e)%!e# a&* 4"$e

    ar" a!# &0%e!0e o) #e"e0"%!( &"e(a!o(ra/$y.5T$e 'a%! (oa+& o) &"e(a!a+y&%& are "o #e"e0"

    &"e(o!a(ra/$y a!# "o #e"e0" $a" 'e"$o# 6or /%e0e o) &o)"are7 a& u&e# "o $%#e "$e

    %!)or'a"%o!.

    HISTORY

    T$rou($ou" $%&"ory* /eo/+e a+ay& $ave a&/%re# "o 'ore /r%va0y a!#&e0ur%"y )or "$e%r 0o''u!%0a"%o!&. O!e o) "$e )%r&" #o0u'e!"& #e&0r%-%!( S"e(a!o(ra/$y0o'e& )ro' Histories -y Hero#o"u&* "$e Fa"$er o) H%&"ory. T$e )%r&" 1!o! a//+%0a"%o! #a"e&-a01 "o "$e a!0%e!" Gree1 "%'e&* $e! 'e&&e!(er& "a""ooe# 'e&&a(e& o! "$e%r &$ave#$ea#& a!# "$e! +e" "$e%r $a%r (ro &o "$e 'e&&a(e re'a%!e# u!&ee!. A #%))ere!" 'e"$o#)ro' "$a" "%'e u&e# a3 "a-+e& a& a 0over &our0e. Te3" a& r%""e! o! "$e u!#er+y%!( oo#

    a!# "$e 'e&&a(e a& 0overe# %"$ a !e a3 +ayer. T$e "a-+e"& a//eare# "o -e -+a!1 &o"$ey /a&&e# %!&/e0"%o! %"$ou" 8ue&"%o! u!"%+ a o'a! !a'e# Gor(o (ue&&e# "$a" 'ay-e"$e a3 a& $%#%!( &o'e"$%!(. S$e re'ove# "$e a3 a!# -e0a'e "$e )%r&" o'a!0ry/"a!a+y&" %! H%&"ory.

    T$e Ger'a!& #eve+o/e# '%0ro#o" "e0$!o+o(y #ur%!( 2or+# 2ar II

    $%0$ a& re)erre# "o a& 9"$e e!e'y& 'a&"er/%e0e o) e&/%o!a(e. M%0ro#o"& are

    /$o"o(ra/$&* "$e &%;e o) a /r%!"e# /er%o# $av%!( "$e 0+ar%"y o) &"a!#ar#

  • 8/12/2019 Steganalysis Detecting Steganography

    4/12

    $%##e! 'e&&a(e. 2e 0a! u&e a stego key "o 0o!"ro+ "$e e'-e##%!( /ro0e&&* &o e 0a!a+&o re&"r%0" #e"e0"%o! a!#>or re0overy o) "$e e'-e##e# #a"a "o o"$er /ar"%e& %"$ "$ea//ro/r%a"e /er'%&&%o!& "o a00e&& "$%& #a"a.

    2$e! #e&%(!%!( %!)or'a"%o! $%#%!( "e0$!%8ue&* e $ave "o 0o!&%#er"$ree 0o'/e"%!( a&/e0"&: 0a/a0%"y* &e0ur%"y* a!# ro-u&"!e&&. Capacity re)er& "o "$e a'ou!"o) %!)or'a"%o! e 0a! e'-e# %! a 0over o-?e0". Security re+a"e& "o a! eavero//er&%!a-%+%"y "o #e"e0" "$e $%##e! %!)or'a"%o!. Robustness re)er& "o "$e a'ou!" o) 'o#%)%0a"%o!"$e &"e(o

  • 8/12/2019 Steganalysis Detecting Steganography

    5/12

    Ta1%!( "$e &e0o!# +e""er %! ea0$ or# "$e )o++o%!( 'e&&a(e e'er(e&:Per&$%!( &a%+& )ro' NY Ju!e @.

    METHOD OF STEGANOGRAPHY IN TE&T

    S%!0e everyo!e 0a! rea#* e!0o#%!( "e3" %! !eu"ra+ &e!"e!0e& %ou-")u++y e))e0"%ve. Bu" "a1%!( "$e )%r&" +e""er o) ea0$ or# o) "$e /rev%ou& &e!"e!0e* you %++

    &ee "$a" %" %& /o&&%-+e a!# !o" very #%))%0u+". H%#%!( %!)or'a"%o! %! /+a%! "e3" 0a! -e #o!e %!

    'a!y #%))ere!" ay&. T$e )%r&"

  • 8/12/2019 Steganalysis Detecting Steganography

    6/12

    6@@@1 @@@1 @@@@@(76@@@@( @@@1 @@(76@@@@( @@@@( @@@@7

    T$e -o+# 0$ara0"er& are "$e e'-e##e# #a"aK u!#er+%!e# 0$ara0"er&are -%"& "$a" a0"ua++y $a# "o -e &%"0$e#. I! "$%& e3a'/+e o!+y -%"& $a# "o -e a+"ere#*'%!%'%;%!( "$e e))e0" o! %'a(e. O!e o) "$e !%0e /ro/er"%e& o) %!&er"%!( #a"a %!"o "$e LSB o)va+ue %& "$a" &"a"%&"%0a++y o!+y o!e $a+) o) -%"& %++ !ee# "o -e 0$a!(e#* a!# "$e )eer0$a!(e& "o "$e %'a(e "$e -e""er. T$%& &"e(a!o(ra/$%0 'e"$o# %& a very &%'/+e a!# &"ra%($")orar#e3a'/+e* 'a1%!( %" o!e o) "$e ea&%er 'e"$o#& "o #e"e0" a!# "$ar". C$a!(%!( "$e LSB&+eave& -e$%!# &"a"%&"%0a+ 0$a!(e& "$a" a &'ar" /ro(ra' 0ou+# #e"e0". T$e %!&er"%o! o) -%"& %!a +%!ear )a&$%o! %& /ar"%0u+ar+y vu+!era-+e. So'e 'e"$o#& %'/rove u/o! %" -y u&%!( a/&eu#ora!#o' !u'-er (e!era"or "o ra!#o'+y /%01 /%3e+ +o0a"%o!& "o %!&er" #a"a* a+"$ou($"$%& re#u0e& "$e a'ou!" o) #a"a "$a" 0a! -e $%##e!. A!o"$er #%&a#va!"a(e "o "$%& 'e"$o# %&"$a" %" re8u%re& +o&&+e&& %'a(e&* $%0$ are!" a& 0o''o!+y &$are# a& +o&&y o!e&. A+&o* %! a+o&&y /%0"ure &'a++ %rre(u+a"%o!& 0ou+# -e e3/+a%!e# aay a& !o%&e* a &0a/e(oa" "$a" "$%&'e"$o# +a01&.

    LS' INSERTION IN )PEG FILE

    A! %'/rove'e!" u/o! "$e /rev%ou& 'e"$o# %& a &%'%+ar "a0"%0 a//+%e#"o JPEG %'a(e&. Ra"$er "$a! e'-e##%!( "$e #a"a %! "$e LSB o) "$e RGB va+ue& o) /%3e+* %"%& $%##e! %! "$e LSB o) "$e 0oe))%0%e!"& o) "$e D%&0re"e 0o&%!e "ra!&)or'a"%o!& 6DCT7 )or a! 3 'a0ro -+o01. J/e( %& a +o&&y 0o'/re&&%o!K &o'e re&o+u"%o! %& +o&" -y &u-

  • 8/12/2019 Steganalysis Detecting Steganography

    7/12

    Au#%o &"e(a!o(ra/$y %& "$e a//+%0a"%o! o) &"e(a!o(ra/$%0 "e0$!%8ue&

    "o e!0o#e $%##e! 'e&&a(e& %! au#%o )%+e&. Ge!era++y* au#%o &"e(a!o(ra/$y %& 0o!&%#ere#

    'ore #%))%0u+" "$a! &"e(a!o(ra/$y %! a! %'a(e or v%#eo. T$%& %& e&/e0%a++y "rue )or

    0o'/re&&e# )%+e )or'a"& &u0$ a& '/. O!e 0urre!" a//+%0a"%o! o) au#%o &"e(a!o(ra/$y %&

    "$e e'-e##%!( o) a"er'ar1& %! /ur0$a&e# 'u&%0 )%+e&* a++o%!( "$e' "o -e "ra01e# -a01 "o

    "$e &our0e %) u!+a)u++y #%&"r%-u"e#.A !u'-er o) "e0$!%8ue& are u&e# "o e'-e# 'e&&a(e& %! au#%o )%+e&.

    T$e a&/e0" "$ey a++ $ave %! 0o''o! %& "$a" "$e 'e&&a(e 'u&" -e $%##e! %! a ay "$a" %&

    %!au#%-+e "o &o'eo!e /+ay%!( -a01 "$e &ou!# )%+e. A! u!0o'/re&&e# &ou!# )or'a" &u0$ a&

    2AV Co!"a%!& /+e!"y o) $%($ )re8ue!0%e& "$a" are %!au#%-+e "o $u'a!&* a!# "$ere)ore $a&

    /+e!"y o) roo' "o $%#e a $%##e! 'e&&a(e. Co'/re&&e# Au#%o )or'a"&* &u0$ a& '/*

    a""e'/" "o re'ove a& 'u0$ %!au#%-+e #a"a a& /o&&%-+e u&%!( 'a"$e'a"%0a+ a!#

    /&y0$oa0ou&"%0 "e0$!%8ue&. Au#%o Co'/re&&%o! %& #%re0"+y a" o##& %"$ au#%o

    &"e(a!o(ra/$y: "$e 'ore 4u!!e0e&&ary5 I!au#%-+e #a"a %& re'ove#* "$e +e&& &/a0e "$ere %&

    "o $%#e a 'e&&a(e a!# !o" #%&"ur- "$e au#%o.

    'ASIC TECHNI*UE

    T$e &%'/+e&" ay "o $%#e a 'e&&a(e %! a! au#%o )%+e %& "o u&e a 1ey

    &"rea' "o e!0o#e &o'e #a"a %! "$e +ea&" &%(!%)%0a!" -%"& o) "$e &a'/+e# au#%o. E&&e!"%a++y*

    "$%& a##& a +o

  • 8/12/2019 Steganalysis Detecting Steganography

    8/12

    I! a-ove e3a'/+e* LSB& are u&e# "o e!0o#e "$e #a"a 4@@@@5 %! a@

  • 8/12/2019 Steganalysis Detecting Steganography

    9/12

    re0o(!%;a-+e %'a(e. S%!0e "$%& %& "$e 0a&e* %" 0a! -e 0o!0+u#e# "$a" "$e LSB are !o"

    ra!#o' a" a++* -u" a0"ua++y 0o!"a%! %!)or'a"%o! a-ou" "$e $o+e %'a(e. 2$e! %!&er"%!( a

    $%##e! 'e&&a(e %!"o a! %'a(e* "$%& /ro/er"y 0$a!(e&. E&/e0%a++y %"$ e!0ry/"e# #a"a*

    $%0$ $a& very $%($ e!"ro/y* "$e LSB o) "$e 0over %'a(e %++ !o +o!(er 0o!"a%! %!)or'a"%o!

    a-ou" "$e or%(%!a+* -u" -e0au&e o) "$e 'o#%)%0a"%o!& "$ey %++ !o -e 'ore or +e&& ra!#o'.

    2%"$ a &"a"%&"%0a+ a!a+y&%& o! "$e LSB* "$e #%))ere!0e -e"ee!ra!#o' va+ue& a!# rea+ %'a(e va+ue& 0a! ea&%+y -e #e"e0"e#. U&%!( "$%& "e0$!%8ue* %" %&

    a+&o /o&&%-+e "o #e"e0" 'e&&a(e& $%##e! %!&%#e JPEG )%+e& %"$ "$e DCT 'e"$o#* &%!0e "$%&

    a+&o %!vo+ve& LSB 'o#%)%0a"%o!&* eve! "$ou($ "$e&e "a1e /+a0e %! "$e )re8ue!0y #o'a%!.

    For $%($er or#er &"a"%&"%0a+ a!a+y&%& %'a(e 'a"r%0e& 'e"$o# %& u&e#.

    IMAGE *UALITY MATRICESI'a(e 8ua+%"y 'e"r%0& are o)"e! u&e# )or 0o#%!( ar"%)a0" eva+ua"%o!*

    /er)or'a!0e /re#%0"%o! o) v%&%o! a+(or%"$'&* 8ua+%"y +o&& #ue "o &e!&or %!a#e8ua0y* e"0.S"e(a!o(ra/$%0 &0$e'e&* $e"$er -y &/rea#

  • 8/12/2019 Steganalysis Detecting Steganography

    10/12

    'e&&a(e &$ou+# -e $%##e! %"$ou" a!y 'a?or 0$a!(e& "o "$e o-?e0" %" %& -e%!( e'-e##e#

    %!. T$%& +eave& +%'%"e# roo' "o e'-e# a 'e&&a(e %"$ou" !o"%0ea-+y 0$a!(%!( "$e or%(%!a+

    o-?e0". T$%& %& 'o&" o-v%ou& %! 0o'/re&&e# )%+e& $ere 'a!y o) "$e o-v%ou& 0a!#%#a"e& )or

    e'-e##%!( #a"a are +o&".

    U!)or"u!a"e+y* a++ o) "$e 'e"$o#& 'e!"%o!e# a-ove 0a! a+&o -e u&e#

    "o $%#e %++%0%"* u!au"$or%;e# or u!a!"e# a0"%v%"y. 2$a" 0a! -e #o!e "o /reve!" or #e"e0"%&&ue& %"$ &"e(a!o(ra/$y, O"$er u&e& )or &"e(a!o(ra/$y ra!(e )ro' "$e "r%v%a+ "o "$e

    a-$orre!"* %!0+u#%!( Cr%'%!a+ 0o''u!%0a"%o!&* Frau#* Ha01%!(* E+e0"ro!%0 /ay'e!"&*

    Ga'-+%!(* /or!o(ra/$y* Hara&&'e!"* I!"e++e0"ua+ /ro/er"y o))e!&e&* v%ru&e&*/e#o/$%+%a.

    APPLICATIONS : IMPROED TECHNOLOGY OF STEGNOGRAPHY

    I! "$%& &e0"%o!* e &$o "$a" "$ere are 'a!y a//+%0a"%o!& )or I!)or'a"%o! H%#%!(. A"!% "-" /-#+!-+#%/. 2e 0a! #ev%&e #a"a &"ru0"ure& "o 0o!0ea+ u!/+a!!e#%!)or'a"%o! %"$ou" -rea1%!( 0o'/a"%-%+%"y %"$ o+# &o)"are. Fur"$er'ore* e 0a! #ev%&e

    a#va!0e# #a"a &"ru0"ure& "$a" e!a-+e u& "o u&e &'a++ /%e0e& o) our $ar# #%&1& "o &e0re"+y0o!0ea+ %'/or"a!" %!)or'a"%o! M%$!", $"%#. Ho&/%"a+& a!# 0+%!%0a+ #o0"or& 0a! /u" "o(e"$er /a"%e!"& e3a'&*%'a(ery* a!# "$e%r %!)or'a"%o!. 2$e! a #o0"or a!a+y;e& a ra#%o+o(%0a+ e3a'* "$e /a"%e!"&%!)or'a"%o! %& e'-e##e# %! "$e %'a(e* re#u0%!( "$e /o&&%-%+%"y o) ro!( #%a(!o&%& a!#>or)rau#. Me#%0a+

  • 8/12/2019 Steganalysis Detecting Steganography

    11/12

    &"e(a!o(ra/$y 'e"$o#& re#u0e& "$e 0$a!0e o) a 'e&&a(e -e%!( #e"e0"e#. I! a!# o) %"&e+)*

    &"e(a!o(ra/$y %& !o" a (oo# &o+u"%o! "o &e0re0y* -u" !e%"$er %& &%'/+e &u-&"%"u"%o! a!#

    &$or" -+o01 /er'u"a"%o! )or e!0ry/"%o!. Bu" %) "$e&e 'e"$o#& are 0o'-%!e#* you $ave 'u0$

    &"ro!(er e!0ry/"%o! rou"%!e&. L%1e a!y "oo+* &"e(a!o(ra/$y %& !e%"$er %!$ere!"+y (oo# !or

    ev%+* %" %& "$e 'a!!er %! $%0$ %" %& u&e# $%0$ %++ #e"er'%!e $e"$er %" %& a -e!e)%" or a

    #e"r%'e!" "o our &o0%e"y.REFERENCES:

    1. A! I!"ro#u0"%o! "o S"e(a!o(ra/$y* S"e(a!a+y&%&* a!# D%(%"a+ 2a"er'ar1%!( =%icah

    &osli"Clinthiteside" Chris Shult(" )rin Sulli*an.2. S"e(a!o(ra/$y a!# S"e(a!a+y&%&< +.R. ,renn

    3. S"e(a!o(ra/$y a!# S"e(a!a+y&%& %! D%(%"a+ Mu+"%'e#%a< A!#er&o! Ro0$a* S%o'e

    Go+#e!&"e%!@

    . S"e(a!a+y&%& Ge"& Pa&" "$e Hy/e* G. Go"$.5. $""/:>>#%%".&our0e)or(e.!e"

    6. .&"u#e!"yo(%.0o'

    7. $""/:>>.&a!&.or(>rea#%!(Wroo'>$%"e/a/er&>&"e!(a!o(ra/$y>

    8. $""/:>>.&+%#eor+#.0o'

    . .au"$or &"rea'.0o'

    http://diit.sourceforge.net/http://diit.sourceforge.net/http://www.studentyogi.com/http://www.sans.org/reading_room/whitepapers/stenganography/http://www.slideworld.com/http://diit.sourceforge.net/http://www.studentyogi.com/http://www.sans.org/reading_room/whitepapers/stenganography/http://www.slideworld.com/
  • 8/12/2019 Steganalysis Detecting Steganography

    12/12

    SUMMARY

    -he Right to pri*acyis the most comprehensi*e of rights and the right

    most *alued by ci*ili(ed man$.

    / +ustice &ouis Brandies" 0S Supreme

    Court" 1234.

    S"e(a!o(ra/$y $a& -ee! u&e# %! var%ou& )or'& )or year&.

    S"e(a!o(ra/$y %& "$e ar" a!# &0%e!0e o) $$ $#"-$ -y e'-e##%!( 'e&&a(e&

    %"$%! o"$er* &ee'%!(+y $ar'+e&& 'e&&a(e&. I" $a& )ou!# u&e %! var%ou&+y %! '%+%"ary*

    #%/+o'a"%0* /er&o!a+ a!# %!"e++e0"ua+ /ro/er"y a//+%0a"%o!&. Br%e)+y &"a"e#* &"e(a!o(ra/$y %&

    "$e "er' a//+%e# "o a!y !u'-er o) /ro0e&&e& "$a" %++ $%#e a 'e&&a(e %"$%! a! o-?e0"*

    $ere "$e $%##e! 'e&&a(e %++ !o" -e a//are!" "o a! o-&erver. T$%& /a/er %++ e3/+ore

    &"e(a!o(ra/$y )ro' %"& ear+%e&" %!&"a!0e& "$rou($ /o"e!"%a+ )u"ure a//+%0a"%o!.

    Pa/er 0o!"a%!& "e0$!%8ue& )or &"e(a!a+y&%& o) %'a(e& "$a" $ave -ee!

    /o"e!"%a++y &u-?e0"e# "o &"e(a!o(ra/$%0 a+(or%"$'&* -o"$ %"$%! "$e /a&&%ve ar#e! a!#

    a0"%ve ar#e! )ra'eor1&. I" #e&0r%-e& -r%e)+y a-ou" var%ou& &"e(a!a+y&%& a""a01&. Our

    $y/o"$e&%& %& "$a" &"e(a!o(ra/$%0 &0$e'e& +eave &"a"%&"%0a+ ev%#e!0e "$a" 0a! -e e3/+o%"e#

    )or #e"e0"%o! %"$ "$e a%# o) %'a(e 8ua+%"y )ea"ure& a!# 'u+"%var%a"e re(re&&%o! a!a+y&%&. To

    "$%& e))e0" %'a(e 8ua+%"y 'e"r%0& $ave -ee! %#e!"%)%e# -a&e# o! "$e a!a+y&%& o) var%a!0e

    6ANOVA7 "e0$!%8ue a& )ea"ure &e"& "o #%&"%!(u%&$ -e"ee! 0over