International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Steganography K.Yugala CSE Department,KLUniversity Vaddeswaram,Guntur Dt K.Venkata Rao Professor,CSE,KLUniversity C. Water Marking: Through the use of advanced computer Abstract-Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. INTRODUCTION As commercially available computational resources grow in power, so does their ability to “break” encryption schemes. To provide new ways to ensure security of internet communications, researchers are developing alternative techniques. To human eyes, data usually contains known forms like images,e-mail,sounds and text. Most Internet data naturally includes gratuitous headers, too. Take a moment to read the previous paragraph.If you think it is a vague and awkward,then I have succeeded in using a very simple form of steganography.By taking the first letter of the every word of the previous paragraph we will discover a message that says :The duck flies at mid-night. D. Finger Printing: Hiding serial numbers or a set of characteristics that distinguishes an object from a similar object is known as fingerprinting. E. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. F. Perhaps when you were a child, you used lemon juice to write text on paper, then let the paper dry. Your writing would miraculously reappear on the apparently blank sheet of paper when you heated it. Or perhaps when you were older, and were introduced to money, you noticed the image, or watermark, that would appear on bank notes when they were held up to the light. Both these types of situations are examples of steganography, the art of secret writing. G. Although related to cryptography, they are not the same. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. H. More precisely, as Kuhn puts it: I. ``the goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present.'' DEFINITIONS: A. Steganography: Steganography is a means of storing B. software, authors of images, music and software can place a hidden ``trademark'' in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. information in such a way that it hides private information and even the existence of the information with in the other medium. INTRODUCTION TO TERMS USED Now, it is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. The adjectives cover, embedded and stego were defined at the Information Hiding Workshop held in Cambridge, England. The term ``cover'' is used to describe the original, innocent message, data, audio, still, video and so on. When referring to audio signal steganography, the cover signal is ISSN: 2231-5381 In the field of steganography, some terminology has developed. http://www.ijettjournal.org Page 1629 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 sometimes called the ``host'' signal. The information to be hidden in the cover data is known as the ``embedded'' data. The ``stego'' data is the data containing both the cover signal and the ``embedded'' information. Logically, the processing of putting the hidden, or embedded data, into the cover data, is sometimes known as embedding. Occasionally, especially when referring to image steganography, the cover image is known as the container. designing a new steganographic system. Later, Les Filigranes, written by Charle Briquet in 1907, was a historical dictionary of watermarks. STEGANOGRAPHY UNDER VARIOUS MEDIA In the following three sections we will try to show how steganography can and is being used through the media of text, images, and audio. HISTORY Our earliest records of steganography were recorded by the Greek historian Herodotus and date back to Greek times. When the Greek tyrant Histiaeus was held as a prisoner by king Darius in Susa during the 5th century BCE, he had to send a secret message to his son-in-law Aristagoras in Miletus. Histiaeus shaved the head of a slave and tattooed a message on his scalp. When the slave's hair had grown long enough he was dispatched to Miletus. Invisible inks have always been a popular method of steganography. Ancient Romans used to write between lines using invisible inks based on readilyavailable substances such as fruit juices, urine and milk. When heated, the invisible inks would darken, and become legible. Invisible inks were used as recently as World War II. An early researcher in steganography and cryptography was Johannes Trithemius (1462-1526), a German monk. His first work on steganography, Steganographia, described systems of magic and prophecy, but also contained a complex system of cryptography. It was only published posthumously, as Trithemius had feared the reaction of the authorities if it was published. The earliest actual book on steganography was a four hundred page work written by Gaspari Schotti in 1665 and called Steganographica. But it was during the twentieth century that steganography truly flowered. For example, the following message was sent by a German spy during WWII: Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Decoding this message by taking the second letter in each word reveals the following secret message: Pershing sails from NY June 1. As an interesting example of steganography of this era, many scholars suspect the authorship of the Shakespearean plays can be attributed to Francis Bacon, the noted Elizabethan statesman and writer. They back this up with the discovery of several hidden texts - steganographies - in the plays, which contain the name of Bacon. These ciphers, together with some interesting background information on Shakespeare and Bacon, makes for a convincing argument. Penn Leary, in his book ``The Second Cryptographic Shakespeare'' discusses this in detail. Further development in the field occurred in 1883, with the publication of Auguste Kerckhoffs' Cryptographie militaire. Although this work was mostly about cryptography, it describes some principles that are worth keeping in mind when ISSN: 2231-5381 1 Embedding Data: The goal of steganography is to conceal data. There are a few features and restrictions to successfully hide data. “The goal is for the data to remain “hidden.” . The word “hidden” has two meanings here, (1) the data can be “hidden” and not visible to the human eye (2) the data can be visible and still not visible to the human eye. If the focus is deterred from the data, the data will not be seen, which means that it is “hidden”. The following guidelines represent a few features and restrictions when embedding data. Often, although it is not necessary, the hidden messages will be encrypted. This meets a requirement posed by the ``Kerckhoff principle'' in cryptography. This principle states that the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key. Without this secret key, the enemy should not have the chance to even suspect that on an observed communication channel, hidden communication is taking place. Most of the software that we will discuss later meets this principle. When embedding data, Bender et al. reminds us that it is important to remember the following restrictions and features: The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. (This does not mean the embedded data needs to be invisible; it is possible for the data to be hidden while it remains in plain sight.) The embedded data should be directly encoded into the media, rather than into a header or wrapper, to maintain data consistency across formats. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations such as filtering and resampling. Some distortion or degradation of the embedded data can be expected when the cover data is modified. To minimize this, error correcting codes should be used. The embedded data should be self-clocking or arbitrarily re-entrant. This ensures that the embedded data can still be extracted when only portions of the cover data is available. For example, if only a part of http://www.ijettjournal.org Page 1630 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 image is available, the embedded data should still be recoverable. COVER MEDIA Secret Message (To be StegoMedia (Carrier With Hidden Steganogra phy Steganographic Process: In the above figure cover media is the carrier medium - such as text ,image ,audio, video and even the network packet. The secret message is the private message that is to be hidden in the cover media. Image as carrier: Images are a good medium for hiding the data. The more detailed an image ,the fewer constraints there are on how much data it can hide before it becomes suspect. Digital images are a preferred media for hiding information due to their high capacity and low impact on visibility. If you want to transfer an image file and a text file, you have to store the text inside the image file by using text-on-image algorithm. TEXT-ON-IMAGE ALGORITHM Inputs: Image file and the text file Output: Text embedded image Procedure: Step 1: Extract all the pixels in the given image and store it in the array called Pixel-Array Step 2: Extract all the characters in the given text file and store it in the array called Character-Array Step 3: Repeat for every pixel in the Pixel-Array a) If the index of the Pixel-Array is lessthan the size of the text file: (i) Store the current character value of the Character-Array in the Alpha field of the current pixel in the Pixel-Array. b) Else (i) Store the value 0 in the alpha field of the current pixel in the Pixel-Array c) Increment the index of both the arrays(Character-Array and Pixel-Array) The above algorithm works only if the size of the text file is less than the size of the image file. This algorithm changes only the Alpha field in every pixel. The change is not visible by the human eyes. Thus the image and the text files can be transferred in the same time it takes to transfer the image file. On the receiving side reverse of the algorithm is used to get the actual message. PIXEL REPRESENTATION IN RGB The matrix of pixels represents every image. According to the basic RGB color model, every pixel is represented by the four bytes namely alpha, red ,green, blue. Their significance is as follows: TEXT_ON_I IMAGE FILE Alpha: Gives the degree of transparency for a pixel Red: Gives the intensity of red color in that pixel Green: Gives the intensity of green color in that pixel Blue: Gives the intensity of blue color in that pixel IMAGE Therefore we can store one byte of information in the alpha field of FILE1 every pixel ,because it doesn't effect color value of the pixel. This way we can store the secret messages inside the image and send this message to the destination. At the receiving end, we extract the characters from the pixels and reconstruct the message from the image. Bandwidth Reduced File Transfer: Let’s say the image file takes six minutes to transfer and the text file takes three minutes to transfer from a machine A to B. If you transfer the image and text file separately, the transfer will take a total of nine minutes. With the reduced file transfer technique, you can transfer both the text and image file within six minutes. Simultaneous image and text file transfer: ISSN: 2231-5381 MAGE TEXT EMBEDDE D TEXT FILE IMAGE_ON_I MAGE IMAGE EMBEDDED IMAGE IMAGE Simultaneous transfer of two image files: If you want to transfer two image files, you have to store the second image inside the first image file by using image-on-image algorithm. IMAGE-ON-IMAGE ALGORITHM Inputs: Two image files http://www.ijettjournal.org Page 1631 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Output: Image embedded image procedure: Step 1: Extract all the pixels in the given first image and store it in the array called Pixel-Array1 Step 2: Extract all the pixels in the given second image and store it in the array called Pixel-Array Step 3: Repeat for every pixel in the Pixel-Array1 1) If the index of Pixel-Array2 is less than the size of the first image: (i) Store the Red value of the current pixel in the pixel-Array2 to the Alpha field of the current pixel in the Pixel-Array1 (ii) Increment the index value of the pixelArray-1 (iii)Store the Green value of the current pixel in the pixel-Array2 to the Alpha field of the current pixel in the Pixel-Array1 (iv)Increment the index value of the pixelArray-1 (v)Store the Blue value of the current pixel in the pixel-Array2 to the Alpha field of the current pixel in the Pixel-Array1 (vi)Increment the index value of the pixel- Array1 2) Else (i) Store the value 0 to the Alpha field of the current pixel in the Pixel-Array1 (ii)Increment the index value of the Pixel-Array1 (iii) Store the value 0 to the Alpha field of the current pixel in the Pixel-Arraay-1 (iv)Increment the index value of the Pixel- Array1 (v) Store the value 0 to the Alpha field of the current pixel in the Pixel-Array1 3) Increment the index value of the Pixel-Array2 The above algorithm works only if the size of the second image file is one-third the size of the first image file. Because you need three pixels of the first image to store the red, green, blue values of a single pixel of the second image. On the receiving side reverse of the algorithm is used to get the actual message. FUTURE ENHANCEMENTS The bandwidth reduced file transfer technique has been worked out in a LAN network using Java as implementing language. This technique is particularly efficient and useful when implemented on the Internet. And it can be used as an alternative to the compression and decompression techniques in file transfer. A CLASS OF STEGANOGRAPHIC PROTOCOLS INTRODUCTION Steganography is the art of hiding one message in another. In this note, the host message is defined as a block of random data - available to both sender and receiver. This, arguably, also classifies the following schemes as varieties of stream cipher. One use of this class could be to foil traffic analysis - the sender can automatically queue messages, randomise the apparent message rate and adjust the actual message rate accordingly. This assumes sufficient bandwidth to cope with messaging requirements. These comments apply to a group of protocols that embed a message, one bit at a time, in a block of (pseudo)random data. Implicit in these schemes is that both the sender and receiver have copies of, or can synthesize, the random data stream. The message should be compressed and then ciphered using standard techniques before the steganography is applied. The more random the message appears, the more difficult the attack will be. The requirement for message randomness may be fulfilled by a relatively weak cipher in this context. It is also assumed that the ratio of message to random data is quite low ie less than 1:10. GENERAL The more protocol information embedded in a stegotext the more danger there is of a compromise of the message. The sender must be able to vary certain parameters of the stegotext such as the message to random data ratio. This imposes limits on any implied protocols. Factors effecting these parameters could be message randomness, the randomness of the 'random data', storage capacity, transmission channel capacity, the time taken for transmission and maintaining constant or confusing levels of traffic. If the random data source is not random ie it is a distinct message such as a picture or a sound file, then the requirement would be to only modify certain bits in the file. An implicit protocol may use (say) the least significant bit of a 24-bit graphics file. This bit is probably a 'noise' bit anyway, but the protocol would have to use every least significant bit. The protocols described here allow the sender to randomly determine which bits are used. Where there is a high random data to message ratio, the random data is totally exposed to analysis. Thus cryptographically very strong pseudorandom generators must be used. The apparent randomness of the stegotext is probably the most important overall factor. PROTOCOLS In the following descriptions, it is assumed that there is an independent process that randomly moves a pointer along the random data to select the next protocol event ie where the next message bit is to be insinuated. If the selected point is not suitable, then the pointer will be moved along incrementally until conditions are suitable. The algorithm for moving the pointer is constrained by the needs of the message to random data ratio.The following examples attempt to explore some possibilities and are presented in an evolutionary order ie that of increasing complexity. Bit Inversion : SCOPE ISSN: 2231-5381 http://www.ijettjournal.org Page 1632 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 In this technique, a bit of particular value in the random data is chosen and then inverted. Ie a message bit of '1' is implied if a '0' is turned into a '1' and vice versa: 1: R1, R2, 0, R4, R5 -> R1, R2, 1, R4, R5 0: R1, R2, 1, R4, R5 -> R1, R2, 0, R4, R5 ^ ^ The message is easily extracted by comparing the random data with the stegotext and noting every bit that is different plus its value. Bit Insertion : Here, the bit at the insertion point is chosen to be of opposite value to the message bit. The message bit is inserted just prior to the selected bit: R1, R2, R3, T1, T2, T3, R7, R8 -> ^ ^ ^ ^ R1, R2, ~R3, T1, T2, T3, R7, R8 ^ ^ ^ ^ 0: T1, T2, T3 = 000, 100, 010 or 001 1: T1, T2, T3 = 110, 101, 011 or 111 LOOK-UP TABLE In similar vein to the threshold scheme, the parity of, or any other n:1 bit function of a number of bits in the random data stream could determine the message bit. However, as a generalisation, a table look-up system could be used to determine the message bit from a group of random data bits. If n bits were used, then there would be a 2n by one bit look-up table. Dynamic Look-Up Table: 1: 0: R1, R2, 0, R4, R5 -> R1, R2, 1, 0, R4, R5 R1, R2, 1, R4, R5 -> R1, R2, 0, 1, R4, R5 ^ ^ ^ Again, the message is easily extracted by comparing the random data with the stegotext and noting where a bit is different plus its value. The stegotext is then shifted by one bit to regain alignment and the comparison is continued to find the next bit. Leading on from 4.6, the look-up table could be dynamically modified each time it was used. This would probably be accomplished by swapping the entry that had just been used with one chosen at random. It should be noted that although bit inversion has been used to indicate the protocol event, bit insertion and bit deletion schemes can be used just as well. Bit Deletion : Implied Dynamic Look-Up Table: The bits at the deletion point are chosen to be either a '01' or a '10' pair, depending on the value of the message bit. In the case of a '1', a '10' pair is chosen and the '1' of the pair is deleted: 1: R1, R2, 1, 0, R5, R6 -> R1, R2, 0, R5, R6 0: R1, R2, 0, 1, R5, R6 -> R1, R2, 1, R5, R6 ^ ^ ^ The message is easily extracted by comparing the random data with the stegotext and noting where a bit is different plus its value. The stegotext is then shifted by one bit to regain alignment and the comparison is continued to find the next bit. Flag Bit : Here, the selected bit is inverted, but with the proviso that the following bit coincides with the message bit: 1: R1, R2, R3, 1, R5 -> R1, R2, ~R3, 1, R5 0: R1, R2, R3, 0, R5 -> R1, R2, ~R3, 0, R5 ^ ^ ^ ^ Where ~ denotes inversion. To extract the message, compare the random data with the stegotext and note the bit after each comparison failure. As the receiver already has the table index, there is no reason why it should be transmitted, thus reducing bandwidth. In this case, the table is positioned after the inversion flag and, during transmissi -on, the table bits are omitted: R1, R2, R3, T1, T2, T3, R7, R8 -> R1, R2, ~R3, R7, R8 ^ ^ ^ ^ ^ where T1, T2 and T3 are used for the address of an eight entry dynamic look-up table that determines the message bit. For completeness, it should be noted that there could also be an Implied Look-Up Table scheme. PROTOCOL CONTROL CHANNEL In these schemes there is a need for data other than message data to be transmitted. Examples might be messages to indicate that the size of look-up table or the encoding scheme is about to change. This can be accomplished by setting certain parameters outside of their normal bounds. If, say, there is a minimum limit set for the number of random bits that are transmitted between protocol events, then breaking this rule can be used as a message in itself or indicate that a larger message is immanent. Threshold Bits Indirect Dynamic Look-up Table : This method is similar to the flag method. However, instead of taking the value of just one bit after the inversion flag, a threshold decision is made on the subsequent n random data bits where n is an odd number. Thus if n = 3, the message bit is '0' if only one or none of the 3 bits is a '1'. Two or three random bits set to '1' would indicate a message bit of value '1': ISSN: 2231-5381 So far in these schemes, either all or part of the random data has been transmitted. In the case where a pseudorandom generator is used, if sufficient data is captured, an evesdropper may be able to guess the structure and state of the generator. This can be made http://www.ijettjournal.org Page 1633 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 much more difficult by sending a series of numbers that represent the distances between protocol events. This approach and the Implied Dynamic Look-up Table scheme reduce the amount of data transmitted and thus the capability of these schemes to defeat traffic analysis. In fact, it may be better to improve their efficiency and define them as a class of lossy cipher combiners. Event Span : I am indebted to Bruce Christianson for this suggestion. The span or distance between protocol events is used as an index into a dynamic look-up table: R1, R2, R3, R4, R5, R6 -> R1, R2, ~R3, R4, ~R5, R6 ^ ^ ^ ^ Here the indicated events are two bits apart and the number two can then be used with a dynamic look-up table to produce the next message bit . DETECTING STEGANOGRAPHY Attempts to detect the presence of steganographic messages are referred to as “attacks”. Usually attacks are either passive or active. In a passive attack, theinterceptor is able to intercept the data. In an active attack the interceptor is ableto manipulate the data. Whether the attack is passive or active the steganographer must use caution when choosing certain data hiding techniquesso that unusual patterns do not stand out to expose the possibility of hidden information.Shifts in word and line spacing may be difficult to detect hidden information in text. Opening the text with a word processor can easily reveal appended spaces and "invisible" characters.Images can appear to have distortions. The steganographer needs to ensure that the “picture taken” is the “picture seen”. The original image and the stego-image should not have detectable variations in color composition, luminance, and pixel relationships. Steganographers need to avoid well-known images for this reason. A checksum can be embedded into a stegoimage to be used as a tampering detector. The drawback here is that there is no way to tell how much the information has been tampered with. Audio can be detected with “visible noise”. Echoes and shadow signals reduce the chance of audible noise but can be detected with little processing. White Noise Storm and S-Tools allow a paranoid sender to embed messages in digitized information, typically audio, video or still image files, that are sent to a recipient. It has been noted that the Abul Nidal organization and Bin Laden’s al Qa’ida organization were using computerized Internet files by methods of e-mail, steganography, and encryption to communicate to their operations. It has been reported that the alleged hijackers in the September 11th attacks had Internet email accounts and were using them to communicate with each other. Mohammed Atta, one of the alleged hijackers was repeatedly seen in a Florida library downloading pictures of children and Middle Eastern scenes which authorities suspect he used as secret method of communication. ADVANTAGES Why use steganography? The advantage of using steganography is to conceal information The transmission of messages is transparent to any given viewer. Messages can be concealed in different formats that are undetectable and unreadable to the human eye. Steganographic technologies are very important in Internet privacy today. With the use of steganography and encryption, corporations, governments, and law enforcement agencies can communicate secretly. Encryption protects data and can be detected; the only thing missing is the secret key for decryption. Steganography is harder to detect under traditional traffic pattern analysis . Steganography enhances the privacy of personal communication. Since encryption can be detected and some governments prohibit the use of encryption, steganography can be used to supplement encryption . Additional layers of security are a benefit to secrecy. If a steganogrphic message is detected, there still is the need for the encryption key. A hidden message need not be encrypted to qualify as steganography. The method of encrypting a message and then using steganography is most widely used by steganographers. DISADVANTAGES BIN LADEN: STEGANOGRAPHY MASTER? If there's one thing the FBI hates more than Osama bin Laden, it's when Osama bin Laden starts using the Internet. So it should be no surprise that the feds are getting unusually jittery about what they claim is evidence that bin Laden and his terrorist allies are using message-scrambling techniques to evade law enforcement.USA Today reported on Tuesday that bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say." Modern steganographers have far-more-powerful tools. Software like ISSN: 2231-5381 However, there are disadvantages to mention. One of the biggest disadvantages is that quite frequently the size of a stagnated image is usually larger that the original image. There can be color changes, especially evident if well-know images are chosen as the steganographic cover. Images can be degraded when trying to analyze them. Another issue to mention, text messages are limited in size for the hiding of data. They need redundant data to replace a secret message. Changing the type of the format or replacing the readable text can alter text messages. Through the use of new technology, some Internet firewalls can detect steganographic messages. As this technology evolves detecting steganographic messages can be a drawback because an important message may be deleted http://www.ijettjournal.org Page 1634 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 or quarantined and this message may be the one that will save a country. [3] Zollner, Federrath, Klimant, Pfitzmann, Piotraschke, Westfeld, Wicke, Wolf,“Modelling the security of steganographic systems” Paper presented at the 2ndWorkshop on Information Hiding. [4] Cole, Eric. “Book Excerpt: Hiding in Plain Sight” Published on COMPUTERWORLD AUGUST 4 TH 2003. CONCLUSION : Steganography tools are becoming abundant and very easy to use. Many Internet sites offer free downloadable software. Often, although it is not necessary, the hidden messages will be encrypted. Encryption paired with steganography creates an extra layer of privacy. The security of the system depends upon the assumption that the enemy has full knowledge of the design and details of the steganography. The missing information is the secret key. The success of steganography is dependent upon selecting the proper cover mechanism. Law enforcement agents are becoming very concerned about the use of steganography in criminal activity today. In the future, steganography will be more widely used and become a threat to corporations, law enforcement, and governments. Terrorists in the world will continue to communicate through the use of steganography. These messages will be not be easily detected. Unpopular web pages may hold images that contain hidden messages of the next terrorist attack. As the economy continues to slump and the job markets decline, fearful employees of job loss may pass confidential corporate information to competitors for payoffs or a new job proposal. Insider trading and stock tips can be passed securely without interception from the SEC. Drug and gambling activity has moved off the streets and onto the Internet, making it easier to communicate worldwide. Most data-hiding systems take advantage of human perceptual weaknesses, but have weaknesses of their own. We conclude that for now, it seems that no system of data-hiding is totally immune to attack. However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking and fingerprinting, for use in detection of unauthorised, illegally copied material, is continually being realised and developed. Also, in places where standard cryptography and encryption is outlawed, steganography can be used for covert data transmission. Steganography, formerly just an interest of the military, is now gaining popularity among the masses. Soon, any computer user will be able to put his own watermark on his artistic creations. We know that technology ideas and methods have room for improvement. Steganography methods will be examined and new ideas of "how to" will emerge. Transmission methods will be perfected to ensure data integrity and transfer. New media will be discovered to hide information. Better detection methods will be discovered. Steganography today is just the "ice cap" of what steganography will be in the future. [5] A RESEARCH PAPER SUBMITTED AT SANS INSTITUTE IN 2003 AS PART OF GIAC PRACTICAL REPOSITORY. . REFERENCES [1] Kipper, Greg “Investigator’s Guide to Steganography” Auerbach Publications, 2004 [2] Fridrich, Goljan, Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images” ISSN: 2231-5381 http://www.ijettjournal.org Page 1635