Documente Academic
Documente Profesional
Documente Cultură
ON
BY
S215202014
SUPERVISED BY
ADELANI S.A
1
SECTION ONE
INTRODUCTION
electronically stored and transmitted. Consequently, the security of information has become an
underlying concern as well as a threat to all and sundry. The rate of migration to this platform is
at constant increase. The growing possibilities of modern communications need the special
means of security especially on computer network. The network security is becoming more
important as the number of data being exchanged on the internet increases. Therefore, the
confidentiality and data integrity are required to protect against unauthorized access and use
(Artz, 2001). This has resulted in an explosive growth of the field of information security. The
use of image to hide information is one of such security techniques which is known as image
steganography. This work looks at how information within institutions can be secured as they
information from a user, it disguises the information as an image thus distracting the intruder
Steganography is the art of hiding the fact that communication is taking place, by hiding
information within something that appears to be nothing out to the usual. (Silman, 2001)
Steganography is often confused with cryptology because the two are similar in the way that they
both are used to protect important information. The difference between two is that steganography
persons views the object that the information is hidden inside of he or she will have no idea that
2
there is any hidden information, therefore the person will not attempt to decrypt the information.
watermarking applications for instance, the message contains information such as owner
identification and a digital time stamp, which usually applied for copyright protection.
"Regarding fingerprint, the owner of the data set embeds a serial number that uniquely identifies
the user of the data set. This adds to copyright information to make it possible to trace any
unauthorized use of the data set back to the user." (Dunbar, 2002).
Moerland (2001) has it that, the message or encrypted message is embedded in a digital host
before passing it through the network, thus the existence of the message is unknown. Besides
hiding data for confidentiality, this approach of information hiding can be extended to copyright
Steganography becomes more important as more people join the cyberspace revolution. Silman
(2001) states that, "steganography is the art of concealing information in ways that prevents the
methods that hide the message from being seen or discovered." Steganography secreted the
confidential message within the host data set and presence subtle and is to be reliably
communicated to a receiver. The host data set is purposely corrupted, but in a covert way,
What steganography essentially does is exploit human perception, human senses are not trained
to look for files that have information inside of them, although this software is available that can
3
do what is called Steganography. The most common use of steganography is to hide a file inside
another file. The word steganography comes from the Greek Seganos, which mean covered or
secret and graphy mean writing or drawing. Therefore, steganography mean, literally,
covered writing. It is the art and science of hiding information such its presence cannot be
that the very existence of the information is concealed. Paired with existing communication
methods, steganography can be used to carry out hidden exchanges. The basic model of
steganography consists of Carrier, Message and password. Carrier is also known as cover-object,
which the message is embedded and serves to hide the presence of the message.
1.2 Motivation
steganography system is that the hider message carried by stego-media should not be sensible to
human beings. To avoid drawing suspicion to the existence of a hidden message. This approach
of information hiding technique has recently became important in a number of application area.
Steganography sometimes is used when encryption is not permitted. Or, more commonly,
steganography is used to supplement encryption. An encrypted file may still hide information
using steganography, so even if the encrypted file is deciphered, the hidden message is not seen
The former consists of linguistic or language forms of hidden writing. The later, such as invisible
ink, try of hide messages physically. One disadvantage of linguistic steganography is that users
must equip themselves to have a good knowledge of linguistry. In recent years, everything is
trending toward digitization. And with the development of the internet technology, digital media
can be transmitted conveniently over the network. Therefore, messages can be secretly carried by
4
digital media by using the steganography techniques, and then be transmitted through the internet
rapidly. Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are more
complex than others and all of them have respective strong and weak points. This project would
therefore develop and implement an application to make the information hiding more simple and
user friendly.
To create program this can be used to conceal vital business information at a low cost.
To design a user friendly and distinct security system that enhances information security.
5
SECTION TWO
LITERATURE REVIEW
One of the latest techniques that have been used in this area by researchers at the Mount Sinai
School in New York in 1999, as they managed to hide the secret texts in Chromosome Strand
human DNA by using a technique called genetic system coverage (Genomic Steganography),
and by placing signs resolution to be agreed upon in the nuclei chromosomes and then integrate
these with millions sentences and sent to the other end. To extract the secret message is soaking
get special distinction sentences used on the other and then placed under the microscope to
extract the required text (Ahiawe, 2014). The oldest Authentications on Steganography taken
from the legendary stories Greeks Herodotus and then back to the fifth century BC, these sources
indicate that they felt they fly head of the Messenger and then write the secret letter in the head,
leaving hair to grow then be sent to the required which is a re-extraction letter. (Ahaiwe, 2014).
Authentications and other writing secret messages on the wood panels and then covered wax and
will be hid those writing panels appear free of anything. And they were killing their animals as
rabbit example corner confidential letter inside it. Other means that the common use since the
first century AD, invisible inks Invisible Inks, which was able to write a confidential letter with
any other nonvalue-confidential and usually write between lines, for example those rabbis some
fruit juices Fruit Juices, milk, urine, vinegar, and all these species become dark and visible when
Then these kinds of inks evolved with the evolution of science chemical was used vehicles
carrying chemical characteristics of the same old species with a more accurate and efficient have
been used during the First and Second World Wars in the military secrecy of correspondence.
6
Other technical been used during World War II is sending a message hidden within another
message is not relevant, and based on the idea of a nomination letters every word of the letter
(Ahiawe, 2014)
Modern steganographic techniques have far more powerful tools that attract many giants
commercial companies whose wish are to safeguard their information from piracy and imitation.
information protection. There are many on-going researches aimed at unveiling the most efficient
manipulation of whitespaces between words and paragraph which offers dynamic generated
stego-text and generate a cover-text dynamically by offering six options for user according to
Yun and Clark (2010), Present a method for checking the acceptability of paraphrases in context
by using the Google n-gram data and a CCG parser to certify the paraphrasing grammaticality
and fluency, which automatically generated paraphrases as a new and useful source of
domain independent, requiring only a paraphrase dictionary and a Google n-gram corpus.
Por and Delina (2008) also presents an overview of steganography on GIF image format in order
to explore the potential of GIF in information hiding research. He explored the enhancement of
the Least Significant Bits (LSB) insertion techniques from the most basic and conventional 1 bit
7
to the LSB colour cycle method and integrate three algorithms in one steganography system it
systems.
Nasir, Kumar, Sur and Nandi (2011) present a steganographic technique that sends secret data in
the length of the network packets the length of UDP datagram is modified to embed the secret
data on a UDP based chat application and obtained the length pattern, which follows the normal
Cui-ling; Yi-lin; YuZhu (2011) present a steganographic technique based on JPEG digital images,
1616 pixels is used and a quantization table is constructed, the DCT coefficients are quantized
Banoci, Bugar and Levicky (2011) also present a steganographic technique using transform
appropriate manner which do not require original image for successful extraction of the secret
information.
All the related work on the steganographic techniques reviewed in this research was seen to be
experimentally tested and the proofs of the performances were at the testing level. What I did
compare to the above related works is testing some techniques at the implementation level in
8
SECTION THREE
Cover-object, C
F(X,M,K)
Stego-key, K
Message is the data that the sender wishes to remain it confidential. It can
be plain text, ciphertext, other image, or anything that can be embedded in
a bit stream such as a copyright mark, a covert communication, or a serial
number. Password is known as stego-key, which ensures that only recipient
who know the corresponding decoding key will be able to extract the
message from a cover-object. The cover-object with the secretly embedded
message is then called the Stego-object.
File and Disk that can hides and append files by using the slack
space
9
Text such as null characters, just alike morse code including html
and java
Images file such as bmp, gif and jpg, where they can be both
color and gray-scale.
The algorithm used for Encryption and Decryption in this application provides using several
layers lieu of using only LSB layer of image. Writing data starts from last layer (8st or LSB
layer); because significant of this layer is least and every upper layer has doubled significant
from its down layer. So every step we go to upper layer image quality decreases and image
retouching transpires.
Inputs: - Text file, cover image 1, cover image 2 and secret key.
Begin
1. Select a text file, convert it into binary form and calculate the number of bits in it.
10
2. Select a carrier image (cover image 1) for hiding purpose, find the number of pixels,
Else
Sub iteration 2
Replace necessary bits as defined by the compression ratio in immediate component of each
pixel. Store the information about bits embedded in a binary address file.
End
2. Choose the folder in which you want to extract the hidden file.
End
Based on the proposed algorithm, I will develop a system in C# that implements the algorithm.
1. Simple to use.
2. Trustworthy in nature.
3. Purely object oriented.
4. Lots of information available online.
System we have developed basically comprises of two main interfaces, one for embedding
12
SECTION FOUR
This section describes how the implementation and evaluation of the proposed steganography
i. survey will be involve on the test of the image before and after hidden
data
In order to realize this project, the following software and hardware components will be used
A. Hardware Requirement
In the cost of the design, the software developed needed the following hardware for an effective
13
iv. Dot Net Framework 3.5
14
SECTION FIVE
The new system is designed to solve problems affecting the reliability and security. It is design
for analyzing, encryption and decryption of information within images. The new stego image can
then be used by the user to send it via internet or email to other parties without revealing the
secret data inside the image.
I have been able to identify the common methods that are applied in computer by using
Multimedia files like text, images and sound. Then the limitations and disadvantages of these
methods, strength and weakness factors of Steganography, and attacking techniques on hidden
information, also countermeasures against attacks in order to increase the systems efficiency.
Also, I have proposed an algorithm to hide information and increase the efficiency of hiding in
the image files by making use of Human Visible System (HVS) characteristics.
15
REFERENCES
Ahaiwe J. (2014). Document Security within Institutions Using Image Steganography Technique.
International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014
Artz, D. (2001). Digital Steganography: Hiding Data within Data. IEEE Internet Computing
Journal, (June).
Banoci, V.; Bugar, G.; Levicky, D. (2011). A novel method of image steganography in DWT
domain;21st International Conference on Radioelektronika (RADIOELEKTRONIKA),
2011 10.1109/RADIOELEK.2011.5936455 2011 , Page(s): 1 4
Chandramouli, R., Kharrazi, M. & Memon, N.(2003). Image steganography and steganalysis:
Concepts and Practice. Proceedings of the 2nd International Workshop on Digital
Watermarking, October.
Ching-Yun C. and Clark S. (2010). Linguistic Steganography Using Automatically Generated
Paraphrases Proceedings of the Annual Meeting of the North American Association for
Computational Linguistics (NAACL-HLT-10), pp. 591-599, Los Angeles, 2010
Cui-ling J; Yi-lin P; YuZhu, Y. (2011); A steganographic method based on the JPEG digital
images 3rd International Conference on Computer Research and Development
(ICCRD),2011Volume:3 10.1109/ICCRD.2011.5764240 2011 , Page(s): 35 38.
Dunbar, B. (2002). Steganographic techniques and their use in an Open-Systems environment.
SANS Institute, January.
Lee, Y.K. & Chen, L.H. (2000). High capacity image steganographic model. Visual Image
Signal Processing, 147(03), June.
Moerland, T.(2001). Steganography and Steganalysis. Leiden Institute of Advanced Computing
Science. Accessed March 12, 2017. Available from www.liacs.nl/home/
tmoerl/privtech.pdf
Nasir A. S., Kumar A., Sur A., and Nandi. S. (2011), Length Based Network Steganography
using UDP protocol. 3rd International Conference on Communication Software and Networks.
(ICCSN), 2011 IEEE 10.1109/ 726 730.
Por L. Y. and Delina B (2008). Information Hiding: A New Approach in Text Steganography 7th
WSEAS Int. Conf. on Applied Computer & Applied Computational Science (ACACOS
'08), Hangzhou, China, April 6-8, 2008
Silman, J.,(2001). Steganography and Steganalysis: An Overview. SANS Institute.
16