Steganography

Summary

Generallyspeaking,steganographicinformationlookslikesomethingelse,suchasashoppinglist,anarticle,apictureorother"disguise"(cover)Message.

Thesteganographicinformationisusuallyencryptedbysometraditionalmethods,andthena"covertext"ismodifiedinsomewaytoincludetheencryptedmessage,formingtheso-called"secrettext""(Stegotext).Forexample,thesize,spacing,font,orothercharacteristicsofthecovertextcanbemodifiedtoincludehiddeninformation.Onlywhentherecipientknowsthehidingtechnologyusedcantheinformationberecoveredandthendecrypted.

Steganographyandelectronicwatermarking

Firstofall,intheoverviewofsteganography,wemustmentionitscloserelative,watermarking.Watermarkingisusedtoidentifytheauthenticityofitems(suchas:ThefaintlyvisibleportraitofMaoZedongontheplumblossomandtherenminbicanbeseenontheflipoftheNewTaiwandollar),eitherasamarkofcopyrightdeclaration,oraddingworkattributeinformation.Thesimilaritybetweenelectronicwatermarkingandsteganographyisthatbothofthemsteganographicallywriteonefileintoanother,andthedifferencebetweenthetwoliesinthepurposeofuseandtheprocessingalgorithm.Electronicsteganographyfocusesonhidingsecretfiles,whileelectronicwatermarkingpaysmoreattentiontothedeclarationandmaintenanceofcopyright,preventingmultimediaworksfrombeingillegallycopied,andsoon.Oncetheelectronicsteganographyisdiscovered,thesecretfileisveryeasytoberead.Onthecontrary,theelectronicwatermarkdoesnothidetheconcealmentofthesteganographicfile,butcaresaboutstrengthening(Robustness)toremovetheattackofthealgorithm.

ModernSteganography

Thelargerthecoverfilesize(referringtothedatacontent,measuredinbits)ofthecoverfile,theeasieritistohidethelatter.

Forthisreason,digitalimages(containinglargeamountsofdata)arewidelyusedtohidemessagesontheInternetandothermedia.Theextenttowhichthismethodisusedisunclear.Forexample:thethreecolorcomponents(red,greenandblue)ofeachpixelina24-bitbitmaparerepresentedby8bitseach.Ifweonlyconsiderblue,itmeansthattherearetwodifferentvalues​​torepresentdifferentshadesofblue.Thebluerepresentedbythetwovalues​​like11111111and11111110isalmostindistinguishablebythehumaneye.Therefore,thisleastsignificantbitcanbeusedtostoreinformationotherthancolor,andtosomeextentitisalmostundetectable.Ifthesameoperationisperformedonredandgreen,onebyteofinformationcanbestoredinalmostthreepixels.

Toputitmoreformally,whatmakessteganographicinformationdifficulttodetectistoensurethatthe"payload"(thesignalthatneedstobeconcealed)modulatesthe"carrier"(theoriginalsignal)tothecarrier.Theimpactofsigmaseemstobenegligible(ideallyandevenstatistically).Thismeansthatthischangeshouldbeindistinguishablefromthenoiseinthecarrier.

(Fromthepointofviewofinformationtheory,thismeansthatthecapacityofthechannelmustbegreaterthantheneedtotransmitthe"superficial"signal.Thisiscalledchannelredundancy.Foradigitalimage,thisredundancyTherestmaybethenoiseoftheimagingunit;fordigitalaudio,itmaybethenoisegeneratedbytherecordingoramplificationequipment.Anysystemwithananalogamplificationstagewillhavetheso-calledthermalnoise(or"1/f"noise),whichcanbeusedInaddition,lossycompressiontechnology(suchasJPEG)willintroducesomeerrorsinthedecompresseddata,anditispossibletousetheseerrorsforsteganographypurposes.)

SteganographycanalsobeusedAsadigitalwatermark,amessage(oftenjustanidentifier)​​ishiddeninanimage,sothatitssourcecanbetrackedorverified.Steganographyusingcomputerfontdesign.

Usage

Inrecentyears,thefieldofsteganographyhasbecomethefocusofinformationsecurity.BecauseeveryWebsitereliesonmultimedia,suchasaudio,video,andimages.Steganographyisatechnologythatcanembedsecretinformationintodigitalmediawithoutdamagingthequalityofitscarrier.Thethirdpartyisneitherawareoftheexistenceofsecretinformation,norawareoftheexistenceofsecretinformation.Therefore,keys,digitalsignatures,andprivateinformationcanallbesafelytransmittedinanopenenvironment(suchastheInternetorIntranet).Mainlyintroducethebasicprinciplesofsteganographyandvariousapplications.

Tools

Manysteganographyalgorithmshavebeendevelopedintosteganographytools.Johnsonsortedandcollectedthesesoftwareandlistedmorethan100software.Thetablelistssomecommonsteganographysoftwarethatusesimagesascarriers.

Serialnumber

Tools

Author

Mainmethod

Imageformat

1

BMPSecrets

-

Spacereplacementmethod

JPEG,GIF,BMP,etc.

2

DCT-Steg(DCT-Jpeg)

StefanKatzenbeisser

DCTcoefficientmodification

JPEG

3

EzStego

RomanaMachado

LSBmethod

GIF

4

F5vF0.9

AndreasWachado

ModifythequantizedDCTcoefficient

JPEG,GIF,BMP

5

HideandSeek95v1.1

ColinMoroney

AirspaceLSBmethod

BMP

6

JPHideandSeek

AllanLatham

ModifythequantizedDCTcoefficient

JPEG

7

JPHSWin

AllanLatham

EditDCTcoefficientafterquantization

JPEG

8

JStegShell

JohnKorejwa

ModifyquantizationAfterDCTcoefficient

OutputJPEG

9

JSteg-Jpeg

DerekUpham

EditQuantizedDCTcoefficient

outputJPEG

10

OutGuess

NielsProvos

ModifyquantizationAfterDCTcoefficient

JPEG,PNM

Related Articles
TOP