I NFORMATION H IDING :
I NTRODUCTION ( PART 2)
Dr. Shahriar Bijani
Shahed University
Sep 2014
S LIDES R EFERENCES
Sanjay Goel, Watermarking &
Steganography, University at Albany, State
University of New York.
Steganography, University of Virginia.
Anastasios Tefas , Information Hiding
Content Verification, Dept. of Informatics,
Aristotle University of Thessaloniki.
CS 4953, The Hidden Art of Steganography,
University of Texas at St Antonio, 2005.
2
I NFORMATION H IDING S UB DISCIPLINES
Information Hiding employs technologies from numerous science disciplines:
Digital Signal Processing (Images, Audio, Video)
Cryptography
Information Theory\Coding Theory
Data Compression
Human Visual/Auditory perception
Information Hiding can be classified into 4 primary sub-disciplines of Information Hiding
Steganography
Watermarking
Covert Channels
Anonymity
C OVERT C HANNELS
Covert channels are communication paths that were neither designed nor intended to transfer information
E.g. the telephone was designed to allow voice communication
information could be conveyed by letting it ring a certain number of times
The time differences between successive phone calls could be used
You could use a mobile phone and call from different locations
– the street names convey the message
Unused bits in the TCP/IP protocol headers can be used to carry information
(Hiding data in an image, then sending that image to someone else could also be considered a covert channel)
A NONYMITY
Anonymity is about concealing the sender and receiver of messages
This is the least studied sub-discipline of information hiding
S TEGANOGRAPHY
The art and science of communicating in a way that hides the existence of a message in some other data
Methods of transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded messages is undetectable
Carriers can be audio, video, text, or any other digitally represented code or transmission
The hidden message may be plaintext, ciphertext, or anything that can be represented as a bit stream
6
T ERMINOLOGY
The data to be hidden:
Plaintext (from cryptography)
Secret message
Stego-message
Embedded data
The data which will have a stego-message embedded in it:
Covertext
Cover-Object
Cover-Medium
Cover-Image\Cover-Audio\Cover-Video
Target file
T ERMINOLOGY
The key used to make the stego-message secure
Stego-Key
Secret Key
Key
The file with the steganography-message embedded
Stegotext (ciphertext in cryptography)
Stego-Object
Stego-Medium
Stego-Image\Stego-Audio\Stego-Video
T ERMINOLOGY
Alice and Bob
Classical names given to the parties wishing to communicate
Eve, an adversary, can listen to but not modify or forge a message
passive eavesdropping
Wendy the Warden, another adversary, can monitor, modify, or forge a message
A passive warden simply listens (like Eve)
An active warden may modify a message
A malicious warden may forge a fake message
I NFORMATION H IDING T AXONOMY
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999
I NFORMATION H IDING T AXONOMY
Digital
Methods
T AXONOMY uses scientific methods to hide a message, e.g. the use of invisible ink or microdots and other size-reduction methods.
Linguistic steganography hides the message in the carrier in some nonobvious ways
Semagrams hide information by the use of symbols or signs.
Visual semagram uses innocent-looking or everyday physical objects to convey a message, e.g. drawings or the positioning of items on a desk or
Website.
Text semagram hides a message by modifying the appearance of the carrier text, e.g. delicate changes in font size or type, adding extra spaces, or different flourishes in letters or handwritten text.
T AXONOMY
Open codes hide a message in a legitimate carrier message in ways that are not obvious to an unsuspecting observer.
The carrier message: overt communication, the hidden message: covert communication.
Jargon code uses language that is understood by a group of people but is meaningless to others. includes warchalking (symbols used to indicate the presence and type of wireless network signal underground terminology, or an innocent conversation that conveys special meaning because of facts known only to the speakers.)
A subset of jargon codes is cue codes, where certain prearranged phrases convey meaning.
T AXONOMY
Covered or concealment ciphers hide a message openly in the carrier medium so that it can be recovered by anyone who knows the secret for how it was concealed.
Grille cipher : employs a template that is used to cover the carrier message.
E.g. The words that appear in the openings of the template are the hidden message.
Null cipher: hides the message according to some prearranged set of rules, such as "read every fifth word" or
"look at the third character in every word."
A SPECTS OF INFORMATION HIDING
Three different aspects in information-hiding systems struggle with each other:
Capacity refers to the amount of information that can be hidden in the cover medium
Security refers to an eavesdropper’s inability to detect hidden information
Robustness refers to the amount of modification the stego medium can withstand before an adversary can destroy hidden information.
15