Steganography

What to protect

Level What to protect Method
3 Existence of message Steganography
2 Metadata of message Privacy-enhancing technologies
1 Content of message Encryption
0 Nothing None

Steganography and information hiding

  • Steganography, derived from “covered writing” in Greek
  • It includes the methods of secure communications that conceal the very existence of the message

Digital watermarking

  • aim is to embed an amount of information that could not be removed or altered without making the cover object entirely unusable
  • adds additional requirement of robustness as compared with steganography
  • Can be used for copyright protection

Texts as cover objects

  • Apparently neutral’s protest is thoroughly discounted
  • and ignored. Isman hard hit. Blockade issue affects
  • pretext for embargo on by products, ejecting suets
  • and vegetable oils.

Taking the second letter in each word gives the message: Pershing sails from NY June 1

./images/images as cover objects

  • Least significant bits(LSB) used to store characteristics of particular pixels of an ./images/image (cover object) are modified to store a message
  • Colours and lightness of pixels of obtained ./images/image may differ slightly from original cover ./images/image, but both ./images/images looks identically to human eye.
  • Easy to implement, but not too robust methods
  • Transformations of ./images/images may easily destroy the message (watermark)

Advantages and disadvantages of LSB

Advantages of LSB

  • easy to implement
  • has high capacity

Disadvantages of LSB

  • is not robust
  • message is easy to detect
    • A message insertion introduces distortion to the statistical properties of ./images/image which never naturally appear.

Stochastic modulation method

  • Simple variant:

    • Before embedding a message a randomly chosen pixels are altered by changing their intensities (= a number between 0 and 255) by +1 or –1;
  • For a parameter p in [0;1] a pixel intensity is increased/decreased by 1 with probability p; it is left unchanged with probability 1-2p;

  • Then LSB method is used

  • Provide more protection against detection of the message

  • Improved method (J.Fridrich, M.Goljan):

    • take a cover ./images/image and add a “noise” modulated by a message bits
    • “noise” actually means pseudo-noise here , that is a sequence of pseudo-random values, which can be generated deterministically given a secret initial value (key)
    • If initial value (key) is known then generation of pseudo- noise can be repeated (used for extraction of the message)

Stochastic modulation

  • Simple implementation;
  • High capacity;
  • Low embedding and extraction complexity
  • Embedding noise can have arbitrary characteristics and may approximate the noise of a given device => high security

Transform space algorithms

  • Jsteg algorithm (D.Upham) uses specifics of JPEG ./images/image format
  • For each colour component JPEG ./images/image format uses discrete cosine transform (DCT)
  • JPEG: after quantization DCT coefficients are stored; • Jsteg algorithm:
    • Replace sequentially the least-significant bit of discrete cosine transform coefficients with the message data
  • Gives better protection (as many others TS algorithms) against visual attacks

Audio (video) files as cover objects

  • LBS can be used, but it introduces a significant noise to audio data ;
  • A message may be encoded in audio signal phase, replacing original phase with a reference phase representing a hidden message;more difficult to implement;
  • Spread spectrum method: encoded data spread across the maximum range of frequencies; difficult to detect hidden message;
  • Video objects (files, streams) can be used for hiding information as well;

Network packets as cover objects

  • Steganography within TCP/IP:
    • Insert data within TCP and IP protocol headers
    • IP identifier, TCP initial sequence number, least significant bit of TCP timestamp, IP flags.
    • Relatively easy to detect naive embedding by anomaly detection in TCP/IP fields
  • One can prevent easy detection by taking into account the properties of concrete implementations of TCP/IP (Murdoch, Lewis, 2005)
  • HTML steganography ( Iman Sedeeq, PhD project 2015- 2018)

Redundancy

  • Steganography is applicable to any data objects that contain redundancy;
  • Redundancy is used to hide the presence of the embedded message
  • On the other hand redundancy may be removed during data compression
  • One may combine data compression and message embedding: MP3stego by F.Petitcolas