Modern Steganography



Similar documents
AN OVERVIEW OF IMAGE STEGANOGRAPHY

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

CHAPTER 1 INTRODUCTION

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

International ejournals

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

An Application of Visual Cryptography To Financial Documents

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Steganography Detection for Digital Forensics

Triple Security of Information Using Stegnography and Cryptography

Image Information Hiding: An Survey

CPSC 467b: Cryptography and Computer Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Steganography- A Data Hiding Technique

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Safer data transmission using Steganography

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Paillier Threshold Encryption Toolbox

Computer Security: Principles and Practice

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Practical Internet Steganography: Data Hiding in IP

Online Voting System Using Three Factor Authentication

Image Authentication Scheme using Digital Signature and Digital Watermarking

IT Networks & Security CERT Luncheon Series: Cryptography

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A Concept of Digital Picture Envelope for Internet Communication

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Introduction to Encryption

Victor Shoup Avi Rubin. Abstract

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

The application of prime numbers to RSA encryption

CS 758: Cryptography / Network Security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A comprehensive survey on various ETC techniques for secure Data transmission

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Multi-factor Authentication in Banking Sector

Lecture 17: Re-encryption

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Compter Networks Chapter 9: Network Security

encoding compression encryption

Course Title: Computer Forensic Specialist: Data and Image Files

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Multimedia Document Authentication using On-line Signatures as Watermarks

Steganography and Visual Cryptography in Computer Forensics

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Lecture 6 - Cryptography

Security and protection of digital images by using watermarking methods

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Strong Encryption for Public Key Management through SSL

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

An Introduction to Cryptography and Digital Signatures

Modeling and verification of security protocols

EECS 588: Computer and Network Security. Introduction

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

Nicholas J. Hopper. Thesis title: Toward A Computational Theory of Steganography

Data Masking: A New Approach for Steganography?

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

Secure Large-Scale Bingo

Software Puzzle Counterstrike for Denial of Service Attack

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Cryptography & Network Security

Simple Encryption/Decryption Application

Cyber Security Workshop Encryption Reference Manual

Steganography is the art of hiding information

Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

CRYPTOGRAPHY IN NETWORK SECURITY

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Hydan: Hiding Information in Program Binaries

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

SecureDoc Disk Encryption Cryptographic Engine

PORs: Proofs of Retrievability for Large Files

Image Compression through DCT and Huffman Coding Technique

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Chapter 17. Transport-Level Security

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

A Novel Security Scheme for Secret Data using Cryptography and Steganography

Transcription:

Modern Steganography Miroslav Dobšíček Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University in Prague, Karlovo náměstí 13, 121 35 Prague 2, Czech Republic dobsicm@fel.cvut.cz Key words: steganography, traffic security, watermarking Introduction In this paper, we will introduce what steganography is and what kind of applications can be expected. Steganography is an art and science of hidding information within other information. The word itself comes from Greek and means hidden writting. First complex book covering steganography was written by Johannes Trithemius in 1499. The book Steganographia itself was published later in 1606 and immediately placed on the Index Librorum Prohibitorum. In recent years cryptography become very popular science. As steganography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about concealing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganography goes a step further and makes the ciphertext invisible to unauthorized users. Hereby we can define steganography as cryptography with the additional property that its output looks unobtrusively. Secret data [k>>4]*2^k*257/8,s[j]=k^(k&k*2&34) 2 k%8^8,a=0,c=26;for(s[y] =16; c;j*=2)a=a*2^i& c=c>y)c+=y=i^i/8^i>>4^i>>12,i=i>>8^y<<17 Unobtrusive media Encrypted data 0101 1001 10 1 01 1 01 01 1 01 01 10 01 1 1 01 0 1 1 10 0 0 1 1 0 01 1 10 10 01 1 0 1 01 01 10 10 0 1 0011 1 1 11 01 1 1 01 11 1 001 11 001 1 0 1 1 1 01 One can ask what is it good for. Well, image the common situation when you encrypt your important business data. Suddenly robbers capture and torture you into revealing cryptographics keys. As well police

power may be abused. They ask you to give them the private keys or you are highly suspicious of committing crime. Next, what if the police is bribed. Would not it be better, if you can plausibly deny the existence of important data? A famous example of steganography is Simmons Prisoners problem, see [1]. Bob and Alice are in a jail and wish to escape. Their cells are far apart from each other and the only allowed communication is sending messages via prison officer. If warden detects any sign of conspiracy, he will secure their cells even more. Bob and Alice are well aware of these facts. Happily, before they got arrested, they have agreed a stegosystem. Stegosystem describes the way the secret message is embedded into a covertext (seemingly innocent message). According to the standard terminology of information hidding a covertext with hidden information is called stegotext. Examples of historical stegosystems can be secret inks, wax tablets or microdots used during WWII. In modern era these methods can invoke smile on face, but image their power, when they were not widely known. Nowadays methods still hold the same simplicity, just exploit advantages of digital media and communications. We can distinguish between stegosystems with passive warder and active warder. Passive warder just monitors the communication channel. He can pass the covertexts throught several statistical tests, but do not modify them. It is the same situation as when the network packets go throught Intrusion Detect System. Applications from this field are often refered to as traffic security. On the other side, active warden manipulates covertexts in order to preclude the possibility of hidden communication. Bob and Alice have to use very sophisticated embedding algorithm. Hidden information must withstand various recoding of covering medium, the use of error correction codes is recommended. Typical real-life application is watermarking and fingerprinting. Watermark is a small piece of embedded information which can proof copyrighted material. Fingerprint is very similar, but is intended to track the concrete copy of copyrighted data.

Embedding process Data which hold effective information often has some redundancy. End users usually tend to think that redundancy is evil which cost extra money, as more disk space or network bandwidth is needed. Well, they are partially right, but optimal compression hardly ever exists. Moreover common compress ratio is mostly question of efficience. Anderson [2] pointed out one interesting conclusion in case we have optimal compression. Image an algorithm A, which can each wav file optimally compress. Algorithm B then does the decompression. Here, steganography is either imposible or trivial. We cannot add anything to the compressed file, otherwise the decompression will fail. On the other hand, we can take our secret information and algorithm B will trivialy convert it to some fine familiar sound. Now we know, there are almost always few bytes, one can play with, without destroying carried information. Least Significant Byte (LSB) substitution is well known and widely used method. Take for example a True-Color BMP image file format. A color of pixel is coded in 3 byte array of indices to RGB palete. If you change only LSB bit in each color element, then the picture will seem still the same, but is not. It carries hidden information. A picture with size 120x100 pixels can hold approximately up to 4500B of hidden data, if this method is used. We would like to embed number 7 to this pixel, precisely to its LSB bits. RGB: 05 A7 6E 0110 1110 change 1010 0111 hold 0000 0101 hold binary representation 0110 1111 1010 0111 0000 0101 To secure out our algorithm at least a bit, we can with advantage use some conventional pseudo-random number generator. Supplied password will serve as initial seed. Generated numbers will specify which pixel to use for encoding next 3 bits of embedded data. The adversary, even with the complete knowledge of stegosystem, cannot extract the

hidden message without the password. This system is secure in a sense of Keckhoffs assumption, that everything is known except the password. Similar procedures can be successfully applied to wide variety of multimedia formats. Only instead of the color indices we slightly modify the Discrete Cosine Transformation (DCT) or Fourier Transformation (FT) coefficients. These changes have usually projection to specific statistical properties of common multimedia data. For few formats these properties have been already discovered, for many not yet. The main problem is that these tests are still quite fragile. They tend to fail, if only a small amount of hidden information is embedded or algorithm is modified. Moreover, recent research of Niels Provos [3] has shown, how to balance statistical properties after the embedding process. Next to multimedia format we can even modify binary executables files without breaking their functionality. Hydan programme by Rakan El-Khalil [4] exploits redudancy in Intel x86 instruction set. Instruction addl $20,%eax can be altered to subl $-20,%eax and vice versa. Then let the add means logical 1, sub means logical 0 and a solid base for stegosystem has born. Possibilities how to add hidden information to existing data are almost endless. Even in a very secure operating system, programms can still communicate by meassuring CPU load or memory usage, and so on. Information theoretic scientists try to seek for the limits of steganography, see [2, 5]. Currently we know two mathematical frameworks. The first one is informatic-theoretic model by Cachin [6] and the latter is complex-theoretic view from von Ahn and Hopper [7]. New scopes There are many real-life applications of steganography. Secure transmition of sensitive data and watermarking are quite obvious. Let us take a look at something really new. Steganography can be used to design a steganographic file system, where an adversary cannot deduce existence of any file. Surely, raw disk looks suspicious, but one can only guess if there are any files inside and what their names are.

There have been few proposals in recent years. Anderson in [8] introduced two ideas. User have to supply a file name and associated password to access the desired file in both schemes. The first scheme initializes the file system with several randomly generated cover files. Newly created object is embedded as the exclusive-or of a subset of cover files. The subset is selected by the password and file name. The second construction fill the whole disk with random bits. Then the blocks of new objects are written to absolute disk addresses given by some pseudorandom process. Other construction used HweeHwa Pang [9]. His scheme supports plain and hidden files at the same time. By hash value obtained from a file name and password a position of header of hidden file is located. The header contains a link to an inode table that indexes all the data blocks in the hidden file. Additionaly the header is encrypted. Then there are various blocks whose type and location confuse an advesary. Next interesting application of steganography is developing a scheme, where the content is encrypted with one key and can be decrypted with several other keys. The relative entropy between encrypt and one specific decrypt key coresponds to the amount of information, which can be used to fingerprint the obtained data. Such fingerprinted data can be later easily tracked. This idea [10] together with partial extraction was presented at FEE CTU Poster 2004. Conclusion This paper was a short introduction to the world of steganography. We have shown how the simplest methods work and how they can be explored. We have ommited public-key steganography as this subject requires advanced knowledge in mathematics, but research in this field has already begun. Relevant information can be found at [5, 7, 11]. Next to public-key steganography, one of the most active field of research are mass detection tools for hidden contents. The problems are really big. At first, known statistical tests are fragile and for many embedding schemes we still do not know which properties to test. At second, the today traffic in public networks is so overwhelming, that is too hard to rigorously check each file.

References 1. G. J. Simmons. The prisoner s problem and the subliminal channel. In Advances in Cryptology CRYPTO 83, 1983. 2. R. Anderson and F. Petitcolas. On the limits of stehanography. IEEE Journal of Selected Areas in Communications, 16(4):474 481, May 1998. Special issue on copyright & privacy protection. 3. Niels Provos. Defending against statistical steganalysis. 2001. 4. Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding information in program binaries. Technical report, Department of Computer Science, Columbia University, 2004. 5. Imre Csiszár. The method of types. IEEE TIT: IEEE Transactions on Information Theory, 44, 1998. 6. Christian Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306 318, 1998. 7. Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Lecture Notes in Computer Science, volume 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pages 323 341. Springer-Verlag Heidelberg, 2004. 8. R. Anderson, R. Needham, and A. Shamir. The steganographic file system. In IWIH: International Workshop on Information Hiding, 1998. 9. HweeHwa Pang, Kian-Lee Tan, and Xuan Zhou. Steganographic schemes for file system and b-tree. IEEE Transactions on Knowledge and Data Engineering, 16(6):701 713, June 2004. 10. Miroslav Dobšíček. Extended steganographic system. In 8th International Student Conference on Electrical Engineering. FEE CTU, 2004. 11. Luis von Ahn, Nicholas J. Hopper, and John Langford. Provably secure steganography. 2002. Errata included. Miroslav Dobšíček was born in Ústí nad Orlicí, on October 1978. He received M.S. degree in computer science and engineering from FEE CTU in Prague 2003. He is currently Ph.D. student at FEE CTU in Prague at the department of Computer Science and Engineering. His research focuses on security and privacy related issues concerning to steganography and cryptography.