1 introduction

advertisement
1 INTRODUCTION
Steganography is derived from Greek words: steganos meaning covered/secret
and graphy meaning writing. So, it is defined as the art and science of hiding
information by embedding messages within seemingly harmless messages. It also
refers to the “Invisible” communication. The power of Steganography is in hiding
the secret message by obscurity, hiding its existence in a non-secret file.
Steganography works by replacing bits of useless or unused data in regular
computer files. It leaves behind detectable traces in the stego objects and modifies
the statistical properties. This hidden information can be plaintext or ciphertext
and even images.
In an image Steganography, it uses some reliable Steganography algorithms or
secret keys to transform or encrypt secret images into ciphered images. Only the
authorized users can decrypt secret images from the ciphered images. The
ciphered images are meaningless and non-recognizable for any unauthorized users
who grab them without knowing the decryption algorithms.
In our project, we aim to develop an application for police department or secret
service like organizations where the communication needs to be confidential in
order to prevent information leaks about their ongoing investigation on cases, task
assignment, working strategy etc. It provides a user friendly environment for the
secret service personnel to type their message, encrypt the written text and save
the encrypted text in a .txt file which can then be used to hide inside an image file
using steganographic technique. On the other hand the receiver can use the
application to retrieve the .txt file hidden inside the image and hence decrypt the
actual message from the retrieved file containing encrypted message. It allows the
use of webcam for taking snapshots of the criminals. For encryption of the
original message, AES (Advanced Encryption Standard) is used and for hiding the
txt file inside the image SDSA (Spatially Desynchronized Steganography
Algorithm) is chosen.
1
2 OBJECTIVES
The chief objectives of the project are:
i)
To encrypt the message to be transmitted
ii)
To use image steganography in police department
iii)
To keep confidential details hidden during information exchange
iv)
To securely communicate important messages
v)
To practically implement image processing knowledge
2
3 FEATURES
The major features of the project are listed below:
i)
Encryption and Decryption of text files
ii)
Web-cam function for image capture
iii)
Hide encrypted confidential details within the image
iv)
Use of Spatially Desynchronized Steganography Algorithm(SDSA) and
Advanced Encryption Standard(AES)
v)
Secure information exchange for police and security service like sector
3
4 LITERATUREREVIEW
Invisible ink, a form of steganography, has been used for centuries. George
Washington used it to spy against the British during the American Revolution and
it was extensively used during World War II. It continues to be used today not
only by spies but for commercial purposes, e.g. marking dice, chips and gaming
equipment to protect against counterfeiting. The organizations that work in crime
and security sectors such as police, army, secret services, FBI, CIA etc. have been
following various techniques to communicate like emails, telephone which are
more prone to attacks by the eavesdroppers and call tappers. Sometimes, the
message to be transferred is even encrypted so that even if the outsiders succeed to
receive the message they become unable to read the original content. Still, the fact
is not hidden that the ciphertext contains some confidential information. Now,
they have been driving their attention towards steganography whereby they can
easily hide secret informations inside other cover objects which can be anything in
today’s digital world such as image, audio, video etc. Keeping this in mind, we
have been doing this project in order to hide confidential messages forwarded
from one place to another encrypted and hidden inside image file so that no
information leaks occurs. Despite the fact that cryptography and steganography
are basically not the same, we apply the combination of both these techniques in
order to achieve better results for security.
Basically, the model for steganography for encrypted file can be represented as:
Original
text
Cover-object,
C
F(X,M,K)
Message,file
M
Encrypted
Stego Object, Z
Stego-key, K
Fig 4.1: Steganography combined with encryption
Original text is the data that the sender wishes to remain it confidential. It can be
encrypted using any encryption techniques, particularly we follow Advanced
4
Encryption Stantard (AES) to convert to ciphertext that can be embedded in a bit
stream. Password is known as stego-key, which ensures that only recipient who
know the corresponding decoding key will be able to extract the message from a
cover-object which is an image file in case of image steganography. The coverobject with the secretly embedded message is then called the Stego-object. Image
Steganography has been done using various algorithms such as least significant bit
(LSB) modification, masking and filtering etc. But our project will follow
Spatially Desynchronized Steganography Algorithm (SDSA) and so far it has not
been used in police department to hide any police details.
5
5 SYSTEM REQUIREMENTS
5.1 Hardware Requirements

Personal Computer

Webcam
5.2 Software Requirements

C#, .NET Framework

Database: MsSQL 2008

Microsoft Visual Studio

Microsoft SQL Server
6
6 METHODOLOGY
Our application is basically a desktop application that is specially designed for
police department where the department head has the full authority to all the
services since he is the administrator of the application. After login verification
for admin, he can write some information, encrypt the secret information thus
forming ciphertext and then hiding the ciphertext containing file in the image of
any kind. Other officers working in the same police station if get forwarded the
stego-image, only that particular message can be decrypted by the same officer
and if the image has been forwarded to any other station head, he can not only
unhide and decrypt the file but also reply for the message in the same way hiding
encrypted file in image. The staff in the station can use the webcam to capture
criminals photograph for criminal records and also keep police officers’ records in
database so that the information can be retrieved easily whenever required.
The staff responsible for such data entries can have access only to database stuffs
like adding, editing, deleting records and nothing others such as encryption and
hiding inside image.
6.1 Algorithms
6.1.1 Spatially Desynchronized Steganography Algorithm (SDSA)
Domain separation (or randomization) is a technique which is used for hiding the
embedding domain from the attacker. It is observed that existing domain
randomization techniques cannot provide enough randomization such that they are
easily be detected by recent steganalysis techniques. SDSA algorithm is less
detectable against the calibration based blind as well as targeted steganalytic
attacks than the existing JPEG domain steganographic schemes. The SDSA uses
blocks of 8x8(m x n) to embed the document in the carrier image in specific stego
chunks which are returned back to the image. SDSA is based on spatial block
desynchronization to disturb the successful prediction of cover image statistics
from the stego image.
7
Fig 6.1.1.1: Spatial block desynchronization
6.1.2 Advanced Encryption Standard (AES)
AES is a specification for the encryption of electronic data established by the U.S.
National Institute of Standards and Technology (NIST) in 2001. It is based on the
Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and
Vincent Rijmen. AES is a symmetric block cipher that is intended to replace DES
as the approved standard for a wide range of applications. For AES, NIST selected
three members of the Rijndael family, each with a block size of 128 bits, but three
different key lengths: 128, 192 and 256 bits. The key size used for an AES cipher
specifies the number of repetitions of transformation rounds that convert the input,
called the plaintext, into the final output, called the ciphertext. The number of
cycles of repetition are as follows:

10 cycles of repetition for 128-bit keys.

12 cycles of repetition for 192-bit keys.

14 cycles of repetition for 256-bit keys.
Four different stages are used, one of permutation and three of substitution:

Substitute bytes: Uses an S-box to perform a byte-by-byte substitution of
the block
8

ShiftRows: A simple permutation

MixColumns: A substitution that makes use of arithmetic over GF(28)

AddRoundKey: A simple bitwise XOR of the current block with a portion
of the expanded key
Fig 6.1.2.1: AES algorithm
9
6.2 Software Development Life Cycle (Rapid Application
Development- RAD)
Rapid application development (RAD) is a software development methodology
that uses minimal planning in favor of rapid prototyping. The "planning" of
software developed using RAD is interleaved with writing the software itself.
RAD involves iterative development and the construction of prototypes. The four
phases of RAD are:

Requirements Planning phase – It combines elements of the system planning
and systems analysis phases of the Systems Development Life Cycle (SDLC).
It ends when the team agrees on the key issues and obtains management
authorization to continue.

User design phase – During this phase, users interact with systems analysts
and develop models and prototypes that represent all system processes, inputs,
and outputs. User Design allows users to understand, modify, and eventually
approve a working model of the system that meets their needs.

Construction phase –In RAD, users continue to participate and can still
suggest changes or improvements as actual screens or reports are developed.
Its tasks are programming and application development, coding, unitintegration and system testing.

Cutover phase – It resembles the final tasks in the SDLC implementation
phase, including data conversion, testing, changeover to the new system and
user training.
Fig 6.2.1: RAD model
10
7 USECASE DIAGRAM
Fig 7.1: Usecase Diagram
11
8 DEVELOPMENT STATUS
8 .1 Work Accomplished
At this moment we have completed the basic layout of our project. We have
created entry form for storing the officer and criminal records. Database design
for keeping the records of login details, officer and criminal information, file sent
details etc. has been accomplished. More importantly, encryption of typed text,
writing ciphertext to txt files and decryption of the file contents have been
completed. Since our major task is to encrypt information and then hide the file in
cover image, it adds 35-40% of the work accomplished.
8.2 Work Remaining
About 60% of work is still remaining. The main objective of our project is to use
steganography in order to hide the information i.e to make the secure
communication amongst the department members. We now are working and
researching in this topic. The core part of the project is hence left untouched. Also
we tend to develop a working and complete application for police department
which is still in ongoing development phase.
8.3 Problems Encountered
The main problem encountered is to decide an application area where we can use
image steganography. As the project is being done in C# and .NET programming
language which is new for us, we have to study it well. So, different problems
were encountered during the project development. Making the concept vivid and
deciding how to develop the system was the most time consuming part. Also it
was time consuming to decide which algorithm to use for cryptography and
steganography. Since these topics are quite new for us, we find it difficult how the
chosen algorithm actually works.
12
9 PROJECT SCHEDULE
Fig9.1: Gantt Chart
13
10 CONCLUSION
Steganography means hiding message inside a cover message. Steganography and
cryptography are closely related but their goals are different. In cryptography, the
data is encypted and unreadable but the existence of data is not hidden whereas
steganography leaves no evidence of the existence of data. Steganography and
cryptography can be used together to produce better protection. In a digital world,
both Steganography and cryptography are intended to protect information from
unwanted parties.
Basically, digital images are well-known to be used as a cover object to hide a
secret message. The proposed project is the application of image steganography in
police department to hide confidential police details inside image file. Various
techniques are widely used for this purpose but we are attempting to use Spatially
Desynchronized Steganography Algorithm (SDSA). It causes slight loss in cover
message but is not detectable to human eye. What is important is the preservation
of the hidden message. The stego-image is decrypted using stego-key generated
by the same algorithm to separate and securely extract the embedded files. Also
AES algorithm encrypts and decrypts the contents of text files using same key
since the algorithm is symmetric.
Steganography can be used to hide important data inside another file so that only
the authorized person intended to get the message even knows a secret message
exists .It is better technique for information hiding in the digital images with the
encrypted form. To conclude, our application would be user friendly and wellfunctioning to produce ciphertext from the actual information and hide besides a
cover image and it would definitely be practically applicable in several sectors
where secret message transfer is required. Also this technique can be applicable
to deliver required confidential matter even through social networking sites where
people will not even think that the image could hold something else.
14
REFERENCE

J. J. Eggers, R. Bauml, and B. Girod, “A communications approach to image
steganography”, in Proc. SPIE Security and Watermarking of Multimedia
Contents IV.

J. Fridrich, M. Goljan, and D. Hogea,“Steganalysis of JPEG Images: Breaking
the F5 Algorithm”, in Proc. 5th International Workshop on Information
Hiding, Noordwijkerhout, The Netherlands.

J. Fridrich, T. Pevny, and J. Kodovsky, “Statistically Undetectable JPEG
Steganography: Dead Ends, Challenges, and Opportunities”, in Proc. ACM
Multimedia and Security Workshop, Dallas, TX.

Ã, A. C., Condell, J., Curran, K., & Kevitt, P. M. (2010). Digital image
steganography : Survey and analysis of current methods. Signal Processing,
90(3), 727–752. doi:10.1016/j.sigpro.

Westlund, Harold B. (2002). "NIST reports measurable success of Advanced
Encryption Standard". Journal of Research of the National Institute of
Standards and Technology.

Westlund, Harold B. (2002). "NIST reports measurable success of Advanced
Encryption Standard". Journal of Research of the National Institute of
Standards and Technology.
15
Download