Contents 1. Definitions......................................................................................................... 12 History .................................................................................................................. 12 Physical .............................................................................................................. 13 Digitad ............................................................................................................... 14 Network ............................................................................................................. 15 Printed ................................................................................................................ 16 Digital Text ........................................................................................................ 16 Using Sudoku puzzles ....................................................................................... 17 Additional terminology ........................................................................................ 17 Countermeasures and detection ............................................................................ 18 Applications .......................................................................................................... 18 2. Methods of computer steganography ................................................................ 23 3. Algorithms for digital steganography................................................................ 25 4. The advertising market overview of steganography software .......................... 47 5. Statement of the problem of detection of hidden messages .............................. 49 ROUGH PROGRAM for the discipline «Steganography in CAD/CAM/PLM». 1. Goals and objectives of the discipline: Familiarize students with various methods of steganography, used for hiding the project documentation in CAD/CAM/PLM during the data exchange within secure channels of communication and on peripheral storage devices. Main group of methods to be studied consists of the following methods: • Classical steganography • Computer steganography - the branch of the classical steganography based on the characteristics of computing platform.( hiding data in unused fields of file formats, the substitution of characters in file names etc) • Digital steganography - the branch of the computer steganography, based on the data hiding within digital objects of the analog origin, i.e. multimedia objects (image, video stream, etc) • Hiding data on various storage devices and in different channels of communication. • steganalysis Steganography in CAD/CAM/PLM. Content. Page 1 2. The study of this discipline is based on the following knowledge: - Mathematical analysis. (Fourier series and integrals, discrete spectral transforms, the theory of functions of complex variable theory of differential equations, special functions, - Linear Algebra. (The algebra of logic, algebra, fuzzy logic) - Probability theory (the theory of stochastic processes) 1. - Requirements for the results of the development of disciplines: 3. As a result, the discipline the student must: to know: • Elements of the theoretical foundations of classical steganography. • Elements of the theoretical foundations of computer steganography - hiding data in unused fields of file formats, the substitution of characters in file names, textsteganography, the transmission of data within secure channels, etc. • Elements of the theoretical foundations of digital steganography - hiding data in digital objects with the analog nature, that is, the multimedia objects (images, videos, sounds). To be able to: • study new methods of embedding of the stego message into different containers on their own. • Assess the reliability of different implementations of steganography techniques possess: • Skills of the assessment of the subsystem’s ability to protect a data from an unauthorized access in various communication channels. • Skills of development of the software and the hardware complexes to protect the external storage devices from the unauthorized access and copying. 4. The volume of disciplines and types of training activities Type of school work Class work (total) Total hours of 52 Including: lectures 34 Workshops (as part of the complex) 18 Home work (total) Summary*) Type of certification (test, exam) 92 The total labor output ratio hours 92 test Note: Seminars are held in the conjunction with lectures. Lectures and seminars form complexes. *) The student must defend his summary during the colloquium. Steganography in CAD/CAM/PLM. Content. Page 2 5. Contents of discipline. The content of the complexes of discipline The name of the complex The theoretical foundations of computer steganography. Сontent of the complex Volume (per hour) 10 The methods of the data and signals concealing at the physical level. Special types of signal modulation. Special encoders and decoders. Scrambling in the channels of communication. Steg’s preparation Methods of optical, acoustic and radio holography. Formulation and solution of inverse problems in optics, acoustics, and radio. Theoretical Theoretical Foundations of digital Foundations of digital steganography methods based on steganography the data hiding within digital objects of the analog nature. Theoretical Foundations Mathematical methods for detection and of Steganalysis identification of stego into different containers 6. The content of the workshop (held in parallel with the lectures) 20 12 10 The discipline complex Software implementation of the spatial signal processing techniques. Software implementation of methods for solving the inverse problem. Software implementation of simulation methods of the messages embedding into different containers in computer steganography Software implementation of simulation methods of the messages embedding into different containers in digital steganography Software implementation of methods for steganalysis 7. Dining assignments for seminars means MathCAD 1. Workshop number 1. Determination of functions and definition of derivatives Dining assignments 1-20. I). Find function values at x = 1. II). Find the derivatives of the function. 3 5 1 2 e x sin x 1. а) f ( x) x ; 7 ; б) f ( x) 5 2 x 4 4 x3 cos x x в) f ( x ) 4 2. а) f ( x) x 2 ln x . 2 3 1 5 x 9 6 ; б) f ( x) 1 x 2 tgx 3x ; 5 3 3 3x x Steganography in CAD/CAM/PLM. Content. Page 3 в) f ( x) e sin 5 x 3 . 3. а) f ( x) lnx tgx 4 5 1 7 ; x 6 2 ; б) f ( x) x 7 3 5 7 5 6x x в) f ( x) x5 sin 5 x . 5 x ln x 1 3 4. а) f ( x) 3x ; 1 ; б) f ( x) cos x 3 7 x7 3 x 2 2 в) f ( x) arcsin 5 x 1 . 3 sin x cos x 7 3 f ( x ) ; б) ; 2 3x ln x 4 x4 3 x2 5. а) f ( x) 4 x 5 в) f ( x) cos 2 x 3 . 2 5 в) f ( x) e 4 2 3 ; б) f ( x) x 2 3 sin x 5 x ; 5 5x x 6. а) f ( x) 2 x sin 7 x 3 . 5 6 3x cos x 7. а) f ( x) 6 x 3 ; 2 ; б) f ( x) 4 3 3x ln x x x 5 в) f ( x) arctg x 1 . 2 8. а) f ( x) 3x 4 5 2 x ; б) f ( x) e tgx ln x 2 ; 6 6x x3 в) f ( x) tg 3 5 . x 9. а) f ( x) 5 x 3 в) f ( x) e 2x 3 6 x cos x 5 3 7 x 2 f ( x ) ; б) ; 3 4 x4 tgx x 3x tg2x . 3 2 10. а) f ( x) 4 x 3 1 ; б) f ( x) ln x tgx 5 3 x 5 x x ex ; в) f ( x) tg3x . 5 Steganography in CAD/CAM/PLM. Content. Page 4 tgx x 2 7 1 5 ; x 4 3 ; б) f ( x) x 7 3 sin x 4x 3 x 11. а) f ( x) в) f ( x) ln x e 2 . 3 x 2 в) f ( x) e tg( x 2 5) 3 6 x ln x e x ; ; б) f ( x) sin x 2 3 3 4 5x x 12. а) f ( x) 4 x . 2 5 3 ln x e x 3 6 x 4 ; б) f ( x) 13. а) f ( x) x ; 5 ctgx cos x 4 x4 в) f ( x) arcsin 3 x 14. а) f ( x) 5 3 2 1 x ; б) f ( x) 2 x ctgx e ; x 6 3 3x x в) f ( x) 3 ln x x 15. а) f ( x) 2 . x 2 . 7 9 4 ctgx 3 x 3 5 5 x3 1 ; б) f ( x) x ; 9 3x 5 x в) f ( x) ln lnx sin x . 16. а) f ( x) 2 3 3 7 ; б) f ( x) ln x 5 tgx x ; x 5 3 5x x в) f ( x) ln e x x 3 . 2 5 3 7 x5 e x 17. а) f ( x) x 8 ; 1 ; б) f ( x) 3 5 arctgx x 4x x в) f ( x) ln x sin 3 x . 5 18. а) f ( x) 2 5 3 4 ; б) f ( x) (ln x 2) x 2 4 7 5 2x x в) f ( x) 3 sin x x x 3e x ; . 7 e x tgx 1 4 19. а) f ( x) 2 x 5 ; 3 ; б) f ( x) x 4 7 sin x 2 5x x 3 Steganography in CAD/CAM/PLM. Content. Page 5 в) f ( x) arccos 5 1 . x 20. а) f ( x) x ctgx 3 8 2 7 ; x 4 7 5 ; б) f ( x) 4 sin x 3x x x в) f ( x) ln x tgx . 3 Steganography in CAD/CAM/PLM. Content. Page 6 2. Workshop number 2. definition of the integrals Dining assignments 1-20. Find the integrals of these functions. 1. f ( x) x 9 x 24 x 15 . 3 2 2. f ( x) x 12 x 45 x 51. 3 2 3. f ( x ) x 3 x 2 . 3 4. f ( x) x 9 x 24 x 21 . 3 2 5. f ( x) x 3 x 2 . 3 2 6. f ( x ) x 3 x 1 . 3 2 7. f ( x) x 9 x 24 x 12 . 3 2 8. f ( x) x 9 x 24 x 15 . 3 2 9. f ( x) x 12 x 45 x 45 . 3 2 10. f ( x) x 3 x 7 . 3 11. f ( x) x 6 x 9 x 3 . 3 2 12. f ( x) x 9 x 24 x 18 . 3 2 13. f ( x) x 3 x 9 . 3 2 14. f ( x) x 6 x 9 x 6 . 3 2 15. f ( x) x 6 x 9 x 2 . 3 2 16. f ( x) x 18 x 105 x 193 . 3 2 17. f ( x) x 6 x 9 x 6 . 3 2 18. f ( x) x 15 x 72 x 107 . 3 2 19. f ( x) x 12 x 45 x 51 . 3 2 20. f ( x) x 3 x 6 . 3 2 3. Workshop number 3. Solution of linear equations Dining assignments 1-20. Steganography in CAD/CAM/PLM. Content. Page 7 Solve the system of linear equations and make check. x 2 y z 5, 2 x 3 y 5 z 1, 1. 2 x y 5 z 7, 2. 3 x 4 y 3 z 2, 5 x y 2 z 4. x 3 y 7 z 5. 7 x 3 y z 5, 3. x 2 y z 4, 3x y z 3. 5 x y 6 z 3, 5 x 3 y z 3, 4. 4 x 3 y z 2, 5. 3 x y 2 z 1, x 2 y 5 z 3. x 5 y z 1. 8 x 2 y 7 z 3, 6. x 3 y 5 z 3, 5 x 2 y 4 z 7. 3x 4 y z 5, 7 x y 2 z 5, 7. 2 x y 3z 1, 8. 2 x y 3 z 7, x 5 y z 3. x 5 y z 7. x 4 y z 3, 9. 3 x 7 y z 1, 2 x 3 y z 4. x y z 3, x 5 y z 1, 3 x 4 y 7 z 1, 10. 3 x 2 y z 2, 11. 3 x y 2 z 7, 12. x 7 y 2 z 0, 5 x 2 y 7 z 0. 2 x 7 y z 0. 2 x 3 y z 3. 5 x 3 y z 9, x 2 y 5 z 1, x y 7 z 3, 13. 3 x 7 y 6 z 0, 14. 5 x y 3 z 5, 15. 2 x y 5 z 0, x 2 y z 1. 7 x 4 y 3z 5. 3 x 2 y 5 z 1. x y 2 z 3, 2 x 3 y z 4, x 2 y z 3, 16. 2 x 3 y 7 z 1, 17. x y 5 z 1, 18. 3 x y 2 z 4, 5 x 3 y 4 z 7. 3x y 3z 1. 5 x 3 y z 7. 2 x 3 y z 1, x 5 y 2 z 9, 19. x 3 y 4 z 1, 20. 3 x y z 3, 3x 2 y 5 z 8. 7 x y z 3. Steganography in CAD/CAM/PLM. Content. Page 8 4. Workshop number 4. Pot assay Dining assignments 1-20. Construct a graph of the function on the interval x - 10 to 10. 1. f ( x) x 9 x 24 x 15 . 3 2 2. f ( x) x 12 x 45 x 51. 3 2 3. f ( x ) x 3 x 2 . 3 4. f ( x) x 9 x 24 x 21 . 3 2 5. f ( x) x 3 x 2 . 3 2 6. f ( x ) x 3 x 1 . 3 2 7. f ( x) x 9 x 24 x 12 . 3 2 8. f ( x) x 9 x 24 x 15 . 3 2 9. f ( x) x 12 x 45 x 45 . 3 2 10. f ( x) x 3 x 7 . 3 11. f ( x) x 6 x 9 x 3 . 3 2 12. f ( x) x 9 x 24 x 18 . 3 2 13. f ( x) x 3 x 9 . 3 2 14. f ( x) x 6 x 9 x 6 . 3 2 15. f ( x) x 6 x 9 x 2 . 3 2 16. f ( x) x 18 x 105 x 193 . 3 2 17. f ( x) x 6 x 9 x 6 . 3 2 18. f ( x) x 15 x 72 x 107 . 3 2 19. f ( x) x 12 x 45 x 51 . 3 2 20. f ( x) x 3 x 6 . 3 2 Assignments for seminars on MathCAD. Steganography in CAD/CAM/PLM. Content. Page 9 Features work means MathCAD I). Learn the guidelines to work means MathCAD II). According to your means MathCAD embodiment perform laboratory work number 1 - 5 (see annex p.18 -23) . 1. Workshop number 1. Determination of functions and definition of derivatives 2 . Workshop number 2 . definition of the integrals 3 . Workshop number 3 . Solution of linear equations 4 . Workshop number 4 . plot assay 5 . Workshop number 5 . Working with matrices : type 2 matrix (eg 3x3 matrix ) , get their product , the sum of the determinant of a matrix transpose of the inverse matrix. 8. Educational-methodical and informational support disciplines: a) the basic literature http://www.cl.cam.ac.uk/~fapp2/steganography/ http://www.demcom.com/english/steganos/ http://eprint.iacr.org/2005/305 http://www.topreferats.ru/comp/6636.html http://www.signumtech.com b) further Reading 1. Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems, 1999. P. 5. 2. Lin Ch-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Print-and Scan Process. International Symposium on Multimedia Information Processing, 1999. P. 10. 3. Lin Ch-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia, 1999. 4. Pereira S., Thierry P. Fine Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image Processing, 1999. - P. 12. 5. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing Laboratory, 1998. P. 10. 6. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing Laboratory, 1997. P. 9. Steganography in CAD/CAM/PLM. Content. Page 10 7. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images. International Workshop on Information Hiding, 1998. P. 22. 8. Anderson R., Needham R., Shamir A. The Steganographic File System // Proceedings of the Second International Workshop on Information Hiding. "— Springer-Verlag, 1998. "— Pp. 73–82. 9. McDonald A., Kuhn M. StegFS: A Steganographic File System for Linux // In Information Hiding. "— 1999. "— Pp. 462–477. 10. Varun S., Shibin K. Magikfs – The Steganographic Filesystem On Linux // http://magikfs.sourceforge.net. 11. Chetan G. Dissecting NTFS Hidden Streams // http://www.forensicfocus.com/dissecting-ntfs-hidden-streams. 12. Guillaume T. A few thoughts about steganography // http://www.guillermito2.net/stegano/ideas.html. 13. FIPS publication 197 Advanced Encryption Standard. "— Federal Information Processing Standards Publ., 2001. 14. Fruhwirth C. New Methods in Hard Disk Encryption // http://clemens.endorphin.org/nmihde/nmihde-A4-os.pdf. Steganography in CAD/CAM/PLM. Content. Page 11 1. Definitions. Steganography is the science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form ofsecurity through obscurity. The word steganography is of Greek origin and means "concealed writing." It combines the Greek words steganos (στεγανός), meaning "covered or protected," and graphei(γραφή) meaning "writing." The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages will appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible inkbetween the visible lines of a private letter. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—will arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. History when Herodotus mentions two examples in his Histories. Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. In his work Polygraphiae Johannes Trithemius developed his so-called "Ave-Maria-Cipher" with which one can hide information in a Latin praise of God. "Auctor Sapientissimus Conseruans Angelica Deferat Nobis Charitas Potentissimi Creatoris" Steganography in CAD/CAM/PLM. Content. Page 12 Physical Steganography has been widely used, including in recent historical times and the present day. Known examples include: Hidden messages within wax tablets — in ancient Greece, people wrote messages on the wood, then covered it with wax upon which an innocent covering message was written. Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece about Persian invasion plans. This method has obvious drawbacks, such as delayed transmission while waiting for the slave's hair to grow, and the restrictions on the number and size of messages that can be encoded on one person's scalp. In the early days of the printing press, it was common to mix different typefaces on a printed page due to the printer not having enough copies of some letters otherwise. Because of this, a message could be hidden using 2 (or more) different typefaces, such as normal or italic. During World War II, the French Resistance sent some messages written on the backs of couriers using invisible ink. Hidden messages on paper written in secret inks, under other messages or on the blank parts of other messages. Messages written in Morse code on knitting yarn and then knitted into a piece of clothing worn by a courier. Jeremiah Denton repeatedly blinked his eyes in Morse Code during the 1966 televised press conference that he was forced into as an American POW by his North Vietnamese captors, spelling out the word, "T-O-R-T-U-R-E". This confirmed for the first time to the U.S. Military (naval intelligence) and Americans that American POWs were being tortured in North Vietnam. Messages written on envelopes in the area covered by postage stamps. During and after World War II, espionage agents used photographically produced microdots to send information back and forth. Microdots were typically minute, approximately less than the size of theperiod produced by a typewriter. World War II microdots needed to be embedded in the paper and covered with an adhesive, such as collodion. This was reflective and thus detectable by viewing against glancing light. Alternative techniques included inserting microdots into slits cut into the edge of post cards. During WWII, Velvalee Dickinson, a spy for Japan in New York City, sent information to accommodation addresses in neutral South America. She was a dealer in dolls, and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders, while the Steganography in CAD/CAM/PLM. Content. Page 13 concealed "plaintext" was itself encoded and gave information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman. Cold War counter-propaganda. In 1968, crew members of the USS Pueblo intelligence ship held as prisoners by North Korea, communicated in sign language during staged photo opportunities, informing the United States they were not defectors, but were captives of the North Koreans. In other photos presented to the US, crew members gave "the finger" to the unsuspecting North Koreans, in an attempt to discredit photos that showed them smiling and comfortable. Digitad Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequentnormalization. The hidden image is shown below. Image of a cat extracted from the tree image above. Modern steganography entered the world in 1985 with the advent of the personal computers being applied to classical steganography problems. Development following that was very slow, but has since taken off, going by the large number of steganography software available: Concealing messages within the lowest bits of noisy images or sound files. Concealing data within encrypted data or within random data. The data to be concealed are first encrypted before being used to overwrite part of a much larger block of encrypted data or a Steganography in CAD/CAM/PLM. Content. Page 14 block of random data (an unbreakable cipher like the one-time pad generates ciphertexts that look perfectly random if one does not have the private key). Chaffing and winnowing. Mimic functions convert one file to have the statistical profile of another. This can thwart statistical methods that help brute-force attacks identify the right solution in a ciphertext-only attack. Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set. Pictures embedded in video material (optionally played at slower or faster speed). Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications (telnet or remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data. Changing the order of elements in a set. Content-Aware Steganography hides information in the semantics a human user assigns to a datagram. These systems offer security against a non-human adversary/warden. Blog-Steganography. Messages are fractionalized and the (encrypted) pieces are added as comments of orphaned web-logs (or pin boards on social network platforms). In this case the selection of blogs is the symmetric key that sender and recipient are using; the carrier of the hidden message is the whole blogosphere. Modifying the echo of a sound file (Echo Steganography). Secure Steganography for Audio Signals. Image bit-plane complexity segmentation steganography Including data in ignored sections of a file, such as after the logical end of the carrier file. Making text the same color as the background in word processor documents, e-mails, and forum posts. Network All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003. Contrary to the typical steganographic methods which utilize digital media (images, audio and video files) as a cover for hidden data, network steganography utilizes communication protocols' control elements and their basic intrinsic functionality. As a result, such methods are harder to detect and eliminate. Steganography in CAD/CAM/PLM. Content. Page 15 Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can be applied to the PDU (Protocol Data Unit), to the time relations between the exchanged PDUs, or both (hybrid methods). Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol steganography. Network steganography covers a broad spectrum of techniques, which include, among others: Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields. WLAN Steganography – the utilization of methods that may be exercised to transmit steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks) Printed Digital steganography output may be in the form of printed documents. A message, the plaintext, may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous covertext is modified in some way so as to contain the ciphertext, resulting in the stegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a technique. The ciphertext produced by most digital steganography methods, however, is not printable. Traditional digital methods rely on perturbing noise in the channel file to hide the message, as such, the channel file must be transmitted to the recipient with no additional noise from the transmission. Printing introduces much noise in the ciphertext, generally rendering the message unrecoverable. There are techniques that address this limitation, one notable example is ASCII Art Steganography.[17] Digital Text Unicode steganography uses lookalike characters of the usual ASCII set to look normal, while really carrying extra bits of information. If the text is displayed correctly, there should be no visual difference from ordinary text. Some systems, however, may display the fonts differently, and the extra information would be easily spotted. Steganography in CAD/CAM/PLM. Content. Page 16 Alternately, hidden (e.g., control) characters, and redundant use of markup (e.g., empty bold, underline or italics) can add embedded within a body of text to hide information that wouldn't be visually apparent when displayed, but can be discovered by examining the document source. HTML pages can contain code for extra blank spaces and tabs at the end of lines, as well as different colours, fonts and sizes, which will not be visible when displayed. A more trivial example is white text on a white background, which can be revealed by "selecting". One such method is based on the non-printing Unicode characters Zero-Width Joiner (ZWJ) and Zero-Width Non-Joiner (ZWNJ). These characters are used for joining and disjoining letters in Arabic, but can be used in Roman alphabets for hiding information because they have no meaning in Roman alphabets, and because they are "zero-width" and thus not displayed. The embedding of ZWJ in the cover-text represents “1” and the embedding of ZWNJ represents “0”. Groups of characters can be used to represent the letters A (giving it the code “0”, and thus represented by ZWNJ) to Z (giving it the code “1011”, and thus represented by ZWJ,ZWNJ,ZWJ,ZWJ). These character groups can be inserted between each character of the cover-text, thereby hiding a message. Using Sudoku puzzles This is the art of concealing data in an image using Sudoku which is used like a key to hide the data within an image. Steganography using sudoku puzzles has as many keys as there are possible solutions of a Sudoku puzzle, which is 6.71×1021. This is equivalent to around 70 bits, making it much stronger than the DES method which uses a 56 bit key. Additional terminology In general, terminology analogous to (and consistent with) more conventional radio and communications technology is used; however, a brief description of some terms which show up in software specifically, and are easily confused, is appropriate. These are most relevant to digital steganographic systems. The payload is the data to be covertly communicated. The carrier is the signal, stream, or data file into which the payload is hidden; which differs from the "channel" (typically used to refer to the type of input, such as "a JPEG image"). The resulting signal, stream, or data file which has the payload encoded into it is sometimes referred to as the package, stego file, or covert message. The percentage of bytes, samples, or other signal elements which are modified to encode the payload is referred to as the encoding density and is typically expressed as a number between 0 and 1. Steganography in CAD/CAM/PLM. Content. Page 17 In a set of files, those files considered likely to contain a payload are called suspects. If the suspect was identified through some type of statistical analysis, it might be referred to as a candidate. Countermeasures and detection Detection of physical steganography requires careful physical examination, including the use of magnification, developer chemicals and ultraviolet light. It is a time-consuming process with obvious resource implications, even in countries where large numbers of people are employed to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During World War II, a technology used to ease monitoring of POW mail was specially treated paper that would reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a hidden message the special paper would render it visible. At least two US patents were granted related to this technology, one to Mr. Kantrowitz, U.S. Patent 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof", U.S. Patent 2,445,586, patented July 20, 1948. A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that "runs" when in contact with a water-based invisible ink. In computing, detection of steganographically encoded packages is called steganalysis. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. In general, using extremely high compression rate makes steganography difficult, but not impossible. While compression errors provide a hiding place for data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in extreme cases, even by casual observation). Applications Usage in modern printers Main article: Printer steganography Steganography in CAD/CAM/PLM. Content. Page 18 Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. Example from modern practice The larger the cover message is (in data content terms—number of bits) relative to the hidden message, the easier it is to hide the latter. For this reason, digital pictures (which contain large amounts of data) are used to hide messages on the Internet and on other communication media. It is not clear how commonly this is actually done. For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something else other than color information. If we do it with the green and the red as well we can get one letter of ASCII text for every three pixels. Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, the changes are indistinguishable from the noise floor of the carrier. Any medium can be a carrier, but media with a large amount of redundant or compressible information are better suited. From an information theoretical point of view, this means that the channel must have more capacity than the "surface" signal requires; that is, there must be redundancy. For a digital image, this may benoise from the imaging element; for digital audio, it may be noise from recording techniques or amplification equipment. In general, electronics that digitize an analog signal suffer from several noise sources such as thermal noise, flicker noise, and shot noise. This noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition,lossy compression schemes (such as JPEG) always introduce some error into the decompressed data; it is possible to exploit this for steganographic use as well. Steganography can be used for digital watermarking, where a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified (for example, Coded Anti-Piracy), or even just to identify an image (as in the EURion constellation). Use by terrorists Steganography in CAD/CAM/PLM. Content. Page 19 When one considers that messages could be encrypted steganographically in e-mail messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the "chaffing and winnowing" technique, a sender could get messages out and cover their tracks all at once. An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with mozaiq using "växjö" as password. Rumors about terrorists using steganography started first in the daily newspaper USA Today on February 5, 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web with links to jihad". A citation from the article: "Lately, alQaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com". Other media worldwide cited these rumors many times, especially after the terrorist attack of 9/11, without ever showing proof. The Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The USA Today articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and sources. In October 2001, the New York Times published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, published in April 2006 makes the following statements: "...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." (p. 9–10) Steganography in CAD/CAM/PLM. Content. Page 20 "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p. 41–42) "The threat posed by steganography has been documented in numerous intelligence reports." (p. 42) Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images."[22] By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media. Alleged use by intelligence services In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad. Distributed Steganography There are distributed steganography methods , including methodologies that distribute the payload through multiple carrier files in diverse locations to make detection more difficult. For example theU.S. Patent 8,527,779 by cryptographer William Easttom (Chuck Easttom) Steganography in CAD/CAM/PLM. Content. Page 21 . Steganography in CAD/CAM/PLM. Content. Page 22 2. Methods of computer steganography The results of a comparative analysis of methods for COP are shown in Table 1. Table 1 Steganographi Brief description c methods of the methods Limitations Benefits 1.Methods of using the special properties of computer data formats Margins are 1.1. Methods ofexpanding in many using earmarked formultimedia formats, The low degree of secrecy, the expansion of they are filled with the transfer of small amounts of fields of computer zero information and information limited data formats are not considered program Ease of use 1.2. Methods of special formatting of text files: These methods are based on the 1.3.1. Methods change of lines and of using the known placement of words in displacement of a sentence that is words, sentences, Ease of use. provided by inserting 1. The weak performance paragraphs extra spaces between of the method, the transfer of There is a published software words small amounts of information implementation of this 2. The low degree of secrecy method Acrostic - a 1.2.2. Methods for selecting certain special case of this positions of letters method (for example, the initial letters of (zero code) each line form a Steganography in CAD/CAM/PLM. Content. Page 23 Message) Methods based on the use of special 1.2.3. Methods "invisible", hidden of using the special fields for the properties of the organization of field formats are not footnotes and displayed on the references (eg, use a screen black font on a black background) Easy of use. Has published the The information 1.The weak performance ofsoftware 1.3. Methods of is usually stored in thethe method, the transfer of implementation of this hiding places in the unused places GMD small amounts of information method Has published unused floppy disks (eg, zero-track) 2. The low degree of secrecy the software implementation of this method The method is based on the generation of text and 1.4.Methods of 1. The weak performance is a generalization of The resulting text is simulating the of the method, the transfer of the acrostic. For the not suspicious for functions (mimicsmall amounts of information secret message is monitoring network function) 2. The low degree of secrecy generated meaningful text, hiding the message Concealed message is encrypted Easy money and the result realizatsii.Mnogie 1.5. Methods identifies the header is The problem is solved only (White Noise Storm, Sfor removing an removed, leaving onlyhide chastichno.Neobhodimo Tools), ensure the identifying header the encrypted data. advance pass the information to implementation of this file The receiver knows inthe recipient method with with the advance of the PGP algorithm transfer of messages and is missing a title 2. Methods of using redundant audio and visual information 3.1. Methods of Junior level Due to the introduction of Steganography in CAD/CAM/PLM. Content. Ability to transfer a Page 24 using the digital samples additional information distorted large amount of hidden redundancy of contain very little the statistical characteristics of information. The digital photography,useful information. digital streams. To reduce the possibility of copyright digital audio and They filled more signs of compromise requires protection, the latent digital video information does not correction of the statistical image of the brand, affect the quality of characteristics registration numbers, experience that allows etc. you to hide confidential information As can be seen from Table 1, the first direction based on the use of special properties of computer data formats, rather than redundancy itself the data. Special properties of selected formats, taking into account protection of concealed message from the immediate listening, viewing or reading. on Based on the analysis of materials, we can conclude that the main direction Steganography is the use of computer and audio visual redundancy Information. As the preliminary analysis, the use of steganography methods for solving the problems posed in the TOR, is possible in principle. However, all The methods have the following disadvantages: The set of possible implementations of the CC is countable, and of course, that allows for a simple brute-force attack methods, although it requires considerable computational cost. Not all implementations are consistent with the possibility of hardware implementation 3. Algorithms for digital steganography 3.1.1. Algorithms for embedding data in the spatial domain The advantage of these algorithms embedded in the spatial domain is the fact that CVD is introduced in the original image, and there is no need to perform computationally cumbersome linear transformations of images. CEH implemented by manipulating the brightness and color components Most of the algorithms embedded in the spatial domain CEH images based on the use of broadband signals (PNS). The basic idea behind the use of steganography in the PNS is that the data is embedded in the noise signal of low power. Since the signal of low power, the CEH used to protect noise-resistant codes. 3.1.1.1. The algorithm Kutter Steganography in CAD/CAM/PLM. Content. Page 25 Kutter algorithm assumes that the image has RGB encoding. Embedding is performed in the blue channel, since the blue color of the system least sensitive of human vision. - embedded bits, - container, - pseudo-random position in the which the attachment. The secret bits embedded in the blue channel by modifying the brightness where - constant, which determines the energy of the embedded signal. Its value depends on the of the scheme. The more , the higher the robustness of investing, but the greater his visibility. Removing the bit carried by the recipient without his original image, that is blind. To do so runs the prediction value the original, unmodified pixel based on the values of its neighbors. Also, there is a modification of this algorithm, which for assessment using pixel values of several pixels located in the same column and the same line. In this case, the assessment where has the form: - the number of pixels from the top (bottom, left, right) of the estimated pixel ( ). So in the process of embedding each bit of CEH was repeated times, we get cr CEH estimates one bit. The secret is a bit after averaging the difference between estimates pixel and its real value The sign of this difference determines the value of embedded bits. This algorithm does not guarantee the faithful always determine the value of the secret bits both as a function of extracting bits is not the inverse function embedded. Algorithm is robust to many of the known attacks: low-pass filtering image, its compression, in accordance with the algorithm of JPEG, cutting edges. Steganography in CAD/CAM/PLM. Content. Page 26 3.1.1.2. Algorithm Bruyndonckx CEH is a string of bits. To improve the immunity applies Code Bose-Chaudhuri-Hokvingema (BCH). Implementation is carried out by modifying 8x8 block of luminance pixels. The process of embedding is carried out in three stages: 1. Classification of pixels within the block into two groups with approximately uniform brightness. 2. Split each group into categories defined by this grid. 3. Modification of medium brightness values of each category in each group. In the classification there are two types of blocks: blocks with contrast and noise units with distinct differences of brightness. In blocks of the second type of zone different brightness do not have to lie close to each other, not must contain an equal number of pixels. Moreover, some pixels in general can not belong to any one zone. In the first type of blocks classification is particularly difficult. To perform the classification of the brightness values are sorted in ascending order. Further is the point at which the slope of the tangent to the resulting curve is maximal. This point is the boundary separating the two zones in the event that the slope of greater than a certain threshold. Otherwise, the pixels are divided equally between the zones. To sort by category to the pixel blocks are superimposed masks are different for each zone and each block. Purpose is to provide a mask of secrecy implementation. The set of pixels was divided into five subsets: two bands, two category, and the pixels not belonging to any zone (for the blocks of the first type). - the average brightness for the pixels of the two zones and categories. Embedding a bit CEH (option) and the equality of brightness values in the Each zone is provided by: and Steganography in CAD/CAM/PLM. Content. Page 27 CEH extraction algorithm is the inverse algorithm implementation. At the same time calculated the average values of brightness, and there are differences 3.1.1.3. Algorithm Langelaar This algorithm also works with blocks of 8x8. First, it creates pseudorandom mask of zeros and ones of the same size subunit value, and and In addition, each block is divided into two , depending on the mask. For each subunit calculates the average brightness . Next, choose a threshold , and a bit of CEH is built as follows: If this condition is not fulfilled, it is necessary to change the brightness values of pixels subunit . To remove the bits of CVD calculated average luminance subblocks - и . The difference between them to determine the required bits: 3.1.1.4. Algorithm Pitas In this algorithm, the CEH is a two dimensional array of bits the size of image, and the number of units it is equal to the number of zeros. There are several versions of the algorithm proposed Pitasom. Initially proposed to incorporate bits of CVD in each pixel of the image, but then wisely decided to use for this target blocks of 2x2 or 3x3 pixels, which makes the algorithm more robust to compression or filtering. CEH is added to the image: . In the case of a detector block for the introduction of CEH calculates the average brightness value of the block. Hence it is possible to uneven implementation of CEH in pixels, that is, the value of . Thus it is possible to obtain CEH is optimized by the criterion of robustness to the procedure of the compression algorithm JPEG. To do this 8x8 block elements are calculated in advance, Steganography in CAD/CAM/PLM. Content. Page 28 "capacity" of each pixel (taking into account DCT quantization matrix, and JPEG). Then CEH implement in accordance with the calculated capacity. This optimization is done once and for all, and found the mask is applied for each image. 3.1.1.5. Algorithm Rongen In this algorithm, as well as in the algorithm Pitasa, CVD is a two-dimensional matrix of ones and zeros to be approximately equal to their number. The pixels in the that you can implement one (ie robust to distortion), are defined in the the basis of a characteristic function (the characteristic pixels). This function can be computed locally, based on analysis of adjacent pixels. Characteristic pixel is approximately one hundredth of the total, so not all CVD unit is incorporated into these positions. To increase the number of characteristic of pixels, if necessary, is proposed to small predistortion image. The detector finds the values of the characteristic pixel, and compares with the best of him CEH. If the image does not contain CEH, then the characteristic pixels of ones and zeros will be roughly equal. 3.1.1.6. The algorithm PatchWork The algorithm Patchwork is a statistical approach. Initially pseudo-random manner on the basis of two key selected pixel. Then the brightness of one of them is increased by a value (from 1 to 5), the value of brightness of the other - is reduced to the same value. Further, this process is repeated large number of times (~ 10000) and is the sum of all differences. By value this amount is judged on the presence or absence of CVD in the image. The values of selected pixels in each step - и , the increment - . The sum of the differences of pixel values Expected value (the sum of the difference of pixel values in an empty container) is close to zero for sufficiently large n. Expected value will be more . is a Gaussian distribution. In stegodetektor accordance with the key value is checked and if it is significantly different from zero, the decision on the presence of CVD. To improve the robustness algorithm instead of individual pixels, you can use blocks, or patches (hence the the name of the algorithm). Using blocks of various sizes can be considered as the formation of the spectrum of the noise made by CEH (shaping), similar to that used in modern modems. Steganography in CAD/CAM/PLM. Content. Page 29 Patchwork algorithm is sufficiently resistant to compression operations image, its truncation, change the contrast. The main drawback of the algorithm is its instability to affine transformations, ie, rotate, translate, scale. Another disadvantage is the low bandwidth. Thus, the The basic version of the algorithm for the transmission of a bit of a hidden message requires 20,000 pixels. 3.1.1.7. Algorithm Bender Bender's algorithm is based on copying blocks of randomly selected texture area to another, which has similar statistical characteristics. It leads to the appearance of the image is completely identical blocks. These blocks can be be found as follows: 1. Analysis of the autocorrelation function stegoizobrazheniya and finding the peaks. 2. Shift the image in accordance with these peaks and subtracting the image from its shifted copy. 3. The difference in locations of pirated units should be close to zero. Selects a threshold value and smaller than this threshold in absolute value are considered to be the desired blocks. Since copies of the blocks are identical, they vary in the same transformation the entire image. If we make the block size is sufficiently large, then the algorithm will resistant to most of distortion. Algorithm is robust to filtering, compression, image rotation. The main drawback of the algorithm is the complexity of finding an exceptional area, the blocks of which may be substituted without any noticeable degradation in image quality. But addition, this algorithm as the container can be used just enough texture images. The method of LSB LSB (Least Significant Bit, LSB) - the essence of this method is to replace the least significant bits in the container (images, audio or video) to the obscure bits. The difference between empty and filled containers should not be perceptible to human senses. The method is as follows: Suppose there are 8-bit grayscale image. 00h (00000000b) denotes the color black, FFh (11111111b) - white. In total there are 256 levels . Also assume that the message consists of a byte - for example, 01101011b. By using two low-order bits in the descriptions of pixels, we need 4 pixels. For example, they are black. Then the pixels that contain a hidden message will appear as follows: 00000001 00000010 00000010 00000011. Then change the color of pixels: the first - 1/255 second and third - to 2/255 and the fourth - 3/255. Such gradations, besides that invisible to humans, might not appear when using low-quality output devices. Steganography in CAD/CAM/PLM. Content. Page 30 LSB methods are unstable for all kinds of attacks and may be used only in the absence of noise in the data channel.Detection of LSB-encoded stego carried out by the anomalous characteristics of the distribution range of values of bits of digital signal samples. All methods of LSB are usually additive 3.1.2. Embedding data to transformation fields algorythm Real images are not truely random processes with even magnitude distribution. It is well known fact which isbeing used in compression algorythms, that most of the energy of the image is concentrated in the bottom of the spectrum. That's why one need to decompose the image to subbands. Stegomessage is mixed to the subbands of the image. Low frequency subbands contain most of the energy, thus having a noisy nature. High frequency are more exposed to different processing algorythms, whether it is compressing or Low Pass Filtration. Thus the best candidate for message embedding is middle frequency subbands of the image spectrum. Typical image noise distribution and image frequency spectrum processing is shown on Fig.3 Fig.3. Image noise and processing noise versus frequency Processing noise appears as a result of transformant coefficients quantization. It can be treated as reduction of correlation between the original image transformant coefficients and quantizated coefficients. For example at high levels of compression a situation can occur, when full subbands are discarded. I.e. in general noise dispersion in this subbands is infinite. There is a reduction of correlation between subband coefficients before and after quantization. To achieve acceptable results one need to average the processing noise level over many images. Transformations may be sorted by achieved gainings from encoding [13], single, Adamar's, Haar's, DCT, Wavelet, KLT. Gaining from encoding is refered to as a level of transformation coefficients dispersions redistribution. The greatest advantage gives Karhunen-Loeve transformation (KLT), the smallest - the expansion in the basis of a single pulse (ie, no conversion). The transformations that have high Steganography in CAD/CAM/PLM. Content. Page 31 values of the gains from coding such as DCT, wavelet-transformation, characterized by dramatically uneven distribution of the variances of the coefficients of subbands. High-frequency subbands not suitable for investment because of the large noise processing, and bass - because of the high-noise images. So you have to be limited midranges bands in which the image noise is approximately equal to the noise processing. Since these bands a bit, then the bandwidth stegokanala small. In the case of conversion of lower gains from coding, such as Hadamard or Fourier series, there are more blocks in which the image noise is approximately equal to the noise processing. Consequently, the capacity of the above. Therefore, to increase the capacity of steganographic channel is better to use a lower conversion gain from coding, poorly suited for compression of signals. The effectiveness of the wavelet-transformation and DCT for image compression due to the fact that they are well modeled in the image processing mid-frequency request, separated by "significant" part of "insignificant." Hence, they are more appropriate to apply in the case of the active offender, as a modification of significant factors could lead to an unacceptable distortion of the image. In applying the transformation to the low values of the gains from coding violations there is a risk investments, because the conversion factors are less sensitive to modifications. Fig.4. Block of pixels (8x8) with the location of the DCT coefficients. 3.1.3.1. Embedding data in a discrete cosine transformation coefficients When we use this method, the container is divided into blocks of 8x8 pixels. DCT is applied to each block, resulting in a matrix of dimension 8x8 DCT coefficients. The coefficients are denoted by , where the - block number, 3 - the position of the coefficient within the block. If the block is scanned in a zigzag manner (as it is in JPEG), the coefficients are denoted Steganography in CAD/CAM/PLM. Content. Page 32 by . The coefficient in the upper left corner is usually called the DC-coefficient. It contains information about the brightness of the entire block. The other coefficients are called ACcoefficients. Sometimes it runs monetary policy of the entire image, rather than individual units. Next, we consider some of the algorithms for implementing DCT in the field of DWM. 3.1.2.2. Koch algorithm In this algorithm in a block of 8x8 by embedding 1 bit of DWM. We describe two implementations of this algorithm can be selected pseudorandomly two or three DCT coefficients. We consider the variation of the algorithm with two selectable coefficients. Embedding information in the following manner: for the transferring of 0-bit is necessary to ensure that the difference between the absolute values of the coefficients would be greater than some positive value, and for the transferring of the 1-bit of this difference is less than some negative value: 3.1.2.3. Benham algorithm This algorithm is an improved version of the previous one. Improvements carried out in two directions: to embed all the blocks are not used, but only "suitable" for this, within a block are selected for embedding not two, but three coefficients, which reduces distortion. Suitable for building information blocks are images that are not too smooth, nor does it contain a small number of circuits. For the first type of blocks is characterized by the vanishing of the high-frequency coefficients, for the second type - very large values of several low-frequency coefficients. These features are the cut-off criterion of unsuitable units. When embedding a bit DWM pseudorandomly selected three coefficients DCT block. If you want to invest 1, the coefficients vary so much (if required) that the third factor was less than each of the first two, if you want to embed a 0, it is more than the others. In the event that such a modification would lead to degradation of the image is too large, the coefficients do not change, and this block is simply not used. Changing the three factors instead of two, and even more so the rejection of the changes in the case of unacceptable distortion reduces the error introduced by the DWM. The decoder will always be able to determine the block in which DWM is not built by repeating the analysis performed in the coder. 3.1.2.4. Podilchuk algorithm This algorithm requires the presence of the source image from a detector in the detection of a DWM. Embedded data simulated real random process with normal distribution, unit variance and Steganography in CAD/CAM/PLM. Content. Page 33 zero mean. For each DCT coefficient is determined by the threshold value, above which the change could lead to degradation of the image. This threshold depends on the position of the coefficient in the matrix (ie, the frequency range over which it is responsible). In addition, the threshold is due and the properties of the image: contrast and brightness of the block. Embedding is as follows: if the absolute value of the coefficient is less than the threshold, it does not change. Otherwise, it is added to the product of the threshold values and the values of DWM. When it detects a DWM, first the coefficients of the original image are subtracted from the corresponding coefficients of the modified image. Then calculated the correlation coefficient, and established the fact of a DWM. 3.1.2.5. Hsu algorithm In this algorithm, the decoder DWM also requires the original image. However, the decoder determines not the fact of DWM, and distinguishes built-in data. As the DWM appears black and white image is half the size of the container. Before embedding the image subjected to random permutations. DWM is embedded in the mid-DCT coefficients (the fourth part of the total). These coefficients are located along the second diagonal DCT. coefficient For embedding DWM bit in the it is necessary to find the sign of the difference of the coefficient of the current block and the corresponding coefficient from the previous block: If you need to build 1, the coefficient change so that the sign of the difference was positive, if 0 - so that the sign of the difference was negative. There are a number of improvements to the basic algorithm. First, instead of the values of the coefficients, you can use their absolute values. Second, instead of the coefficient of the previous block, you can use DC-coefficient of the current block. It also takes into account the process of quantization of the coefficients: Another improvement of this algorithm is the sorting order in which blocks of the DWM are arranged in descending order in which the number of units. The blocks of the original image and the container are arranged in descending order of variances. After that holds the corresponding embedding data. This algorithm is not robust with respect to the JPEG-compression. 3.1.2.6. Cox algorithm Steganography in CAD/CAM/PLM. Content. Page 34 This algorithm is robust to many signal processing operations. Detection of integrated DWM it is done using the original image. Insertion data represent a sequence of real numbers with zero mean and unit variance. For investment information using multiple AC-DCT coefficients of images with the greatest vigor. The author suggests three ways to embed DWM according to the following expressions: The first version can be used when energy is comparable to the energy DWM modifiable factor. Otherwise, either DWM will not robust or distortion is too large. Therefore, it is to embed the information is possible only with a slight change in the range of energy values of the coefficients. When it detects a DWM performs the reverse operation: compute DCT original and modified images, found the difference between the coefficients of the highest magnitude. 3.1.2.7. Barni algorithm This algorithm is an improvement of the Cox algorithm, and it also holds monetary policy of the entire image. It is no longer required detection of the source image, that is, the scheme blind. To embed a DWM are not used most AC-coefficients, and average in size. As the DWM performs an arbitrary bit string. The selected coefficients are modified as follows: Then the inverse DCT is performed and produced an additional processing step: the original and modified images are combined with weighting coefficients: Here, noise) and for the textured areas (in which the human eye is very sensitive to the added in the homogeneous regions. The value of and for non- overlapping blocks of fixed size. For example, as is not for every pixel individually, expedient to use the normalized variance of the blocks. In the DWM detector computed the correlation between the modified image and DWM, 3.2. Additive algorithms Steganography in CAD/CAM/PLM. Content. Page 35 Algorithms for additive introduction of information are in a linear modification of the original image, and its recovery in the decoder is the correlation methods. In this DWM is usually added to the image container, or "fusion" in it. 3.2.1. Algorithms based on the linear data embedding In the additive methods of implementing the DWM is a sequence being implemented in the selected subset of samples of the original image of length , which is . The main and most commonly used expression for the embedding of information in this case: where - weighting factor, - a modified pixel. Another way to embed the watermark was proposed by Cox: or, with the using logarithms of the coefficients . For installation in accordance with the first formula, DWM in the decoder can be found as: Here, extracting the mean a counts of the resulting image, whether or not containing CEH . After compared with the original CEH. With that as a measure of identity watermark value is the correlation coefficient sequences: This value varies in the range [-1, 1]. Values close to unity, indicate that the extracted sequence are most likely to match the built-in CEH. Therefore, in this case, it is concluded that the analyzed image contains a watermark. In the decoder can be installed a certain Steganography in CAD/CAM/PLM. Content. Page 36 threshold, (here - default standard deviation), which determines the probability of errors of the first and second kind, when detecting DWM. The coefficient can not be permanent, and adaptively change according to the local properties of the original image. This makes the watermark more robust (resistant to removal). To increase the robustness of the implementation of the algorithms used in many broadband signals. At the same information bits can be repeated many times, are encoded using the correction code, or these may be applied to any other conversion, after which they are modulated with a Gaussian pseudo-random sequence. This sequence is a good model of the noise present in real images. At the same time synthetic images (created on the computer) do not contain noise and are difficult to seamlessly integrate a sequence. To extract the embedded information in the additive embedding scheme is usually necessary to have a CEH source image that is strong enough limits the scope of such methods. There are also blind extraction methods CEH [15], compute the correlation sequence coefficients of the resulting image with all of the : Then, the resulting value of the correlation coefficient is compared with some threshold of detection The main disadvantage of this method is that the image itself, in this case is regarded as a noise signal. There is a hybrid approach (half-blind scheme), when the information about the original image is available in the retrieval of information, but do not know the actual original image. The correlation method can only detect the presence or absence of DWM. For all the same bits of information needed to test all possible sequences, which is extremely computationally complex task. 3.2.2. Algorithms based on the merger of the CEH and the container If instead of a sequence of pseudorandom numbers is embedded in the image another image (eg company logo), the corresponding algorithms are called algorithms implementing the merger. The size of messages being introduced much smaller than the original image. Before embedding, it can be encrypted or transformed in some other way. Steganography in CAD/CAM/PLM. Content. Page 37 Such algorithms have two advantages. First, you can prevent a distortion of the hidden message, because people will still be able to recognize it. Secondly, the presence of an embedded logo is a more convincing proof of ownership than the presence of a pseudo-random numbers. 3.2.3.1. The algorithm Chaya (Chae) The algorithm is implemented in black and white image (logo), up to 25% of the size of the original image. Before embedding the one-level decomposition is performed as an original image and logo with the Haar filter. The wavelet coefficients of the original image are denoted as , and wavelet coefficients of the logo - . The modifications are all conversion factors. First, the coefficients of each sub-band as the original image and the logo is represented by 24 bits (of which one bit is assigned to the sign). Since the size of the logo is 4 times smaller than the original image, it is necessary to increase the number of its coefficients. For this purpose, the following steps. Denote by A, B, and C, respectively, senior, middle and low bytes of the 24 - bit representation of the logo. High byte of each of these numbers represents, respectively, A, B, or C, the other two bytes are filled with zeros. Then, the advanced four unit factors logo. He then added to the element-wise 24-bit version of the original image The resulting value is displayed back to the original scale based on the minimum and maximum values of the coefficient of sub-band. After that is the inverse discrete VI. To remove the CEH used inverse formula This algorithm makes it possible to hide a fairly large amount of data in the original image up to a quarter of the size of the original image. 3.2.2.2. The algorithm Kandar (Kundur) Also, as in the algorithm, Chaya, and implemented the original images are of the wavelet transform. Used to embed all the coefficients of detailed sub-bands. Steganography in CAD/CAM/PLM. Content. Page 38 Many of these factors is divided into nonoverlapping blocks of size are denoted , where and . The blocks and , respectively, the location factor and the level of resolution. The watermark is added to the elements of the original image as follows: where where – scale factor, calculated by the formula: – weighting matrix, which determines the frequency sensitivity of the system view of the person, - operator of the DFT. Thus, the algorithm uses a fairly complex model of human of view. For detection in the detector can be used as the calculation correlation function, and visual comparison. 3.2.3. Algorithms based on the quantization By quantization we mean the process of mapping a large (possibly infinite) set of values with a finite set of numbers. It is clear that this is accompanied by a decrease of information due to its distortion. The quantization is used in lossy compression algorithms. There are scalar and vector quantization. In vector quantization, as opposed to a scalar, the map is not of a single frame, and their combination (vector). From information theory it is known that vector quantization on the effective scalar degree of compression, having a greater complexity. In steganography are used both types of quantization. In the encoder quantizer entire range of the original set is divided into intervals and each interval representing the number of his chosen. This number is a code word and the quantizer is usually the centroid of the interval of quantization. The set of codewords is called a workbook quantizer. All values that fall in this interval are replaced by the encoder to the corresponding code word. In the decoder, the number of accepted matches a certain value. Quantization interval is usually referred to as quantizer step. Embedding data using the quantization refers to non-linear methods.Transmitted message has limited power to perform its stealth requirements. Interference is the original signal and another Gaussian noise - noise processing (quantization). Encoder source signal is known, the decoder has to retrieve CVD without the knowledge of both components of the noise. There are numerous methods to improve Costas (to combat the noise), consisting in the use of structured quantizers (eg, lattice or a tree). Most preferably, the introduction of information in the spectral region of the image. If this linear methods are used, then the embedding CEH produced in the middle of the band. This is because the energy of the image is concentrated mainly in the low-frequency (LF) region. Steganography in CAD/CAM/PLM. Content. Page 39 Consequently, the detector CEH in this area there is a loud noise of the signal. In the highfrequency (RF) fields of the noise has a large amount of processing, such as compression. In contrast to the linear and nonlinear circuits embedded information can be used bass region, since the power being introduced CEH does not depend on the amplitude ratios. This is explained by the fact that the non-linear algorithms to hide the correlation detector is not used, the coefficients of small and large amplitude are treated equally. 4. A choice of a method of embedding of DWM (digital watermark) in the imagecontainer Embedding of DWM is possible thanks to peculiarity of system of perception of the person. It is well known that images possess big psychovisual redundancy. The eye of the person is similar to the low-frequency filter therefore especially imperceptible there are distortions in highfrequency area of a range of spectrum. For negotiation of influences of a printing-down and scanout the most successful there were the methods which have received the name of the modulations methods of the image-container, and modulation can be carried out both in frequency [2-5], and in spatial areas of the image [7,8]. For compensation of geometrical distortions such as shift, turn and change of scale of the image is used the polar logarithmic system of coordinates with a corner and logarithmic radius on axes of coordinates [3] or is applied transformation of Mellinga [2] invariant to turn and scale. In case introduction of DWM in frequency area of modulation are exposed peak components of a complex range of the image container [3] . For this purpose previously is made calculation peak and phase partials components of transformation of Fourier. For a characterization of consequences of the geometrical distortions connected with casual turn, shift or scale change, in the image-container, except DWM, the image-template [9] is built in. In case introduction of DWM in spatial area the signal of DWM is built in by modulation of the initial image-container, and extraction DWM (demodulation) is carried out by means of a linear filtration of the image [7]. If the image is color, a signal of DWM takes root by updating of values of pixels into Blue channel the RGB of the image [8]. Updating is carried out either addition, or subtraction depending on value of the introduced bit of DWN of brightness of the image-container. 4.1. The methods using as containers audiofiles For reliable concealment of data in the acoustic channel the system of concealment must reply the following requirements: to be resistant to everywhere used algorithms of compression with losses Steganography in CAD/CAM/PLM. Content. Page 40 not to bring in a signal distortions perceived by human hearing not to bring appreciable changes in container statistics De facto a standard format of sound files at the moment is the MP3 format. Therefore, work not defiant suspicions of stegosystem in the acoustic channel should be based on this format. MP3 - the full name MPEG 1 Layer 3 - a format of coding of the sound files, entering into a standard of coding of a video information of MPEG 1. Basic feature of a format is compression with losses: after packing and unpacking of the sound file by means of MP3 result isn't a bit-by-bit copy of the original. Over again, when coding insignificant components are purposefully excluded from a packed signal. At preservation of acceptable quality, a MP3 allows to compress sound data in ten and more times. It is reached by the accounting of features of human hearing, including effect of masking of a weak signal of one range of frequencies more powerful signal of the next range when it takes place, or a powerful signal of the previous frame causing temporary falling of sensitivity of an ear to a signal of the current frame (minor sounds are removed which aren't heard by a human ear because of existence during this or previous moment of another, louder ). It is considered as inability of the majority of people to distinguish signals, on capacity lying below a certain level, a miscellaneous for different frequency ranges. This process is called as adaptive coding and allows to save on the least significant from the point of view of perception the person sounding details. Extent of compression (therefore and quality), is defined by width of a data flow set at coding - bitrate. As well as in the considered case of introduction of information in images, algorithms of introduction in audiofiles place hidden data or in an uncompressed signal before its compression, or it is direct in the compressed signal - as a rule, in entropic compressed coefficient of transformation. Some methods as use for concealment not an audiosignal as that, and various features and office information of files-containers. Let's consider at first algorithms of concealment of data in an uncompressed sound stream. Broadband coding. In a signal is added modulated by the message the noise with amplitude slightly above a masking limit . Advantage of this scheme is effectiveness performance and high capacity, a shortcoming - heard distortions brought in a signal. At concealment of one bit in sequence of coefficient the target sequence is calculated as follows: Steganography in CAD/CAM/PLM. Content. Page 41 where - casual binary sequence, - threshold of audibility of i subband , - the hidden bit. For calculation of a threshold of audibility the can be used psychoacoustic model containing in a format of coding of a MP3, or any other . Thus, the method allows to operate psychoacoustic nature of distortions brought in a signal. For extraction of the hidden bit from sequence of coefficient is used function of correlation of the accepted coefficient and initial casual sequence. It should be noted that because of unreliability of extraction this method demands use of codes of correction of mistakes. It leads to reduction as speed, and capacity of a method. Phase coding. In this method that fact is used that the human ear perceives not values of a phase, but only their difference. The signal breaks into segment, values of a phase on the first segment are used for coding of the hidden message, value of phases of other segment so that the difference of phases between segment remained invariable. For coding of values of phases, on a crowd of phases is allocated the set of evenly distributed values corresponding to bits 0 and 1 . Value of a phase is replaced with the next value corresponding to the demanded bit. The difference of values in a set depends on frequency of a strip, and varies from sensitive strips to on on high-frequency strips. For coding of one bit of the hidden message is used a certain sequence of changes of phases, various for coding 0 and for coding 1 . For extraction of the hidden message the following where function of detection is used: - amplitude and the phase i-go of the received signal. - expected sequence of phases in the process of coding bit 1. - expected sequence of phases in the process of coding bit 0. and - the next to the values of phases corresponding 1 and 0. If , the bit of the hidden message is accepted equal 1, differently 0. Method provides high efficiency of coding by criterion of the signal-noise, however its capacity of the relation is insignificant, and makes from 8 to 32 bits a second. Steganography in CAD/CAM/PLM. Content. Page 42 The echo-coding uses non-uniform intervals between an echo-signals for coding of sequence of values. When overlapping a number of restrictions be observed condition of obscurity for human perception. The echo is characterized by three parameters: initial amplitude, extent of attenuation, delay. At achievement of a certain threshold between a signal and an echo they mix up. In this point of people can't distinguish these two signals. It is difficult to define existence of this point, as it depends on quality of initial record and the listener. As a rule, the delay about one thousand second that is quite acceptable for the majority of records and listeners is used. Two various delays are used at zero and unit coding. These both delays should be less, than a threshold of sensitivity of an ear of the listener to a received echo. Noise replacement. In this method that fact is used that the human ear perceives not so much a form, how many energy of noise. As in the MP3 format is completely coded the form noisy frequency subband , data subband can be used for concealment of data. The entrance signal is transformed to frequency area by means of the modified discrete kosinusny transformation (MDKP) used in a MP3. At concealment of one bit in sequence of coefficient, the target sequence is calculated as follows: где - Random binary sequence, When extracting the hidden bits, as in the case of wideband coding using the correlation function of the coefficients and adopted the original random sequence. As proposed to use the noisy bands with frequencies above 5 kHz. It should be noted that the method is stable with respect to the MP3 compression, since the algorithm MP3 encoding does not change the signs of the coefficients MDKP. Capacity method ranges from 20 to 60 bits per second. The method also quite simple to implement, because it is based on widely implemented on different platforms MDKP algorithm, which is a part MP3 encoder. In general, methods of hiding data in an uncompressed audio stream are a number of serious disadvantages: Possible visibility when listening; Limited bandwidth; Implementation complexity. Steganography in CAD/CAM/PLM. Content. Page 43 Introduced into the signal unnatural distortion in the signal, such as white noise a certain amplitude, discrete phase of the signal, etc., can be high probability of finding the specific methods of detection. Thus, the algorithms are more promising to reveal more details 'Directly into the compressed MP3 stream'. At the current time is invited to a series of algorithms that use the data to hide proprietary information MP3, the most famous of these is the ability to 'mp3stego'. This algorithm modifies MP3 encoding process, so that the LSB official fields frame MP3, for example, the volume of information within the main frame coincide with the current bit obscure. The features of the method are almost unnoticeable when listening; high complexity of implementation and slow work, as it is necessary to complete the entire MP3 encoding process, the capacity of 50 bits per second. It should be noted that the information entered in the Service lead to changes discrepancies in the results of these methods with the results of the standard Encoder MP3. Such changes can be detected with high probability the enemy. As a faster alternative, we proposed a method of concealment data using a particular format MP3 - interframe gaps. The data stream consists of MP3 frames - plots the data encoding 26ms audio signal. Each frame contains a 4-byte header containing a synchronizing word and service information. Service information includes, in particular, the version format, stereo mode and bitrate. These values uniquely determine the frame size. The number of bytes needed to compress the sound with a given quality depends on the characteristics of a particular sound. Thus, the difficult to compress signal sections with more detail requires more bytes than the simple ones. On this basis, MP3 allows for storage of compressed data frame in the remaining unoccupied bytes the previous frame. In order to properly positioned in the frame header specifies the offset to the beginning of the data. Tag end of the data itself is not, decoding stops at the end extracting the required number of cosine transform coefficients. Any information between the end of one frame and the beginning of the next data the frame is ignored decoder, respectively, that is where you can place hidden data. To do this, the frame size increases by increasing its bit rate by one level, for example, 128kbits / c up to 160kbit / c. This method does not introduce any distortion in the sound-box, easy, fast has a large bandwidth (about 20% of the container). However, knowing concealment algorithm is easy to Steganography in CAD/CAM/PLM. Content. Page 44 detect the presence of hidden information, based on from the fact that the standard MP3 stream is no "extra" bytes. Thus, the method can be used only when needed rapid transfer of large amount of information and is not expected serious opposition the enemy. The most resistant to the discovery of a method for concealing errors in the quantization MP3 of the coefficients. MP3 encoding is built in a classic case of compression with losses, which consists of three steps: Convert the signal to a lot of information about the signal was concentrated in a small number of coefficients. In the MP3 used a modified discrete cosine transform. Quantization, that is, dividing the coefficients obtained for certain values and then rounding the result to the nearest whole number. At this stage there is a loss of information. The values of the quantization of dividers to MP3 evaluated on the basis of a given bit rate and the psychoacoustic model that determines the maximum allowable noise level. The entropy of lossless compression. In MP3 compression is used with static Huffman codes. Obtained during the quantization integer coefficients can be directly used for hiding data, eg by embedding in the least significant bit. This, however, introduces considerable noise in the output signal and with high probability can be detected. Can be used to conceal only part of the coefficients, choosing them as to minimize the distortion introduced. Since the modified rate differs from the original by not more than 1, minimizing the total deviation from the original signal is reduced to the selection coefficients with the fractional part is close to 0.5. In addition, to maintain the structure stream of compressed data, the coefficients are selected, the modification which does not change size of the encoding of speech, in particular, are discarded with zero coefficients value. There is a problem decoding at the receiver - decoder has no information about what factors are used to hide, that is, message should be presented as a function of the decoder to a known vector of bits all the coefficients, as used, or not. Using this as a multiplication by a function common to the sender and receiver given by secret key matrix, a system of linear algebraic equations, which the sender solves for the vector-bit coefficients. Do not be modifying factors determine the values of some variables. Maximally possible size of the message, in which the system has a solution tends to the number of modifiable factors in the increase of the number thus, the method allows no loss of capacity used to hide arbitrary elements of the container. Steganography in CAD/CAM/PLM. Content. Page 45 Structure of entropy coding in MP3 imposes additional restrictions on permissible to modify the coefficients. The coefficients in the one block divided into three groups, each of which is packaged with a separate Huffman table. The first two groups are packed in pairs as follows: in the flow written code from the table corresponding to the pair, after which the sign bits are written each sample. Numbers greater than the maximum for the table are coded as the maximum possible count, plus the number of bits determined by the table, written after the code that contains the number added to the value. The last block of coefficients is encoded fours with the possible values coefficients -1, 0, 1. The length of blocks contained in the overhead frame that allows us to calculate the number of zero values of samples at the end of the frame. Changes in the coefficients of the last block, ie, replacement of -1 and 0, 0 and 1, will change the size of the compressed coefficient (because of the appearance or disappearance sign bit), which in turn can lead to structural damage of MP3 files - information will be more or less than the allocated space for it in the frame. From the coefficients of the first two blocks of modifications to be no more than one factor in the pair, and the need to retrofit a pair of code size coincided with the size of the source code. Typically, this condition is satisfied for codes large numbers. Percentage of available coefficients decreases rapidly with decreasing bit rate, as more coefficients are coded zero or close to zero values. These limitations lead to a screening of about 85% of the appropriate coefficients. Maximum permissible deviation of the fractional part of the coefficient of 0.5 is defined based on size of the message, which should hide in the container so that the number of available coefficients were close to the maximum message size. In order to achieve acceptable levels of performance of the method, MP3 stream is divided on the staff of the same size. The number of frames in the groups selected in order that the number of modifiable factors they had about the same. In each group, hiding SLAE is solved independently. Thus, the despite the fact that while the Gauss method in each group is proportional to the cube the number of equations, the total time increases linearly with the number of factors used. However, each group must contain a certain the number of bits of the service, which recorded the length of the message in this group. Hence the smaller the group, (and faster method), the more bits spent on the service information. This method of protection from high throughput detection provides the ability to order a half per cent of the container. It is well suited for situations where the expected counter-informed enemy. Steganography in CAD/CAM/PLM. Content. Page 46 4. The advertising market overview of steganography software Blindside is an application of steganography that allows one to conceal a file, or set of files within a standard computer image. The new image looks identical to the human eye, but can contain up to 50k or so of secret data. The hidden files can also be password encrypted, to prevent unauthorised access to their data. DataMark Technologies currently market four digital steganography products StegComm for confidential multimedia communication, StegMark for digital watermarking of digital storage media, StegSafe for digital storage and linkage and StegSign for e-commerce transactions. Each software product is packaged into a Standard version and a Professional version. While the Standard versions cater to the general needs of our customers, additional security and accessibility features are found in Professional versions. Digital Picture Envelope is a program you can make your secret data imperceptible to any human eyes. So, you can store/send it very safely in/through your computer. Actually, it can embed your secret data in a vessel image (we call it a "dummy" image, or a "picture envelope") without changing the visual quality of the dummy image.It does not change even the file size. If you want to see the secret data, you can easily restore it from the secret- embedded dummy image. The program gifshuffle is used to conceal messages in GIF images by shuffling the colourmap, which leaves the image visibly unchanged. gifshuffle works with all GIF images, including those with transparency and animation, and in addition provides compression and encryption of the concealed message. Hide4PGP is a freeware program distributed as source code in ANSI C and precompiled executables for DOS (any version but 1.x - is there one outside the museum?), OS/2 (Warp and up), and the Win32 console (9x and NT). It's purpose is to hide any data in a way that the viewer or listener does not recognize any difference. InThePicture Encrypt Files & Messages into redundant space in Windows Bitmap (BMP) image files. Invisible Secrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a realrandom password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer. Steganography in CAD/CAM/PLM. Content. Page 47 JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal. P3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information -- actually this is the only attack we know yet -- but at the expense of severe quality loss. NICETEXT is a package that converts any file into pseudo-natural-language text OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided. Scramdisk is a program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct passphrase. Without the correct passphrase the files on the virtual drive are totally inaccessible. The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected. Steganography in CAD/CAM/PLM. Content. Page 48 SteganoGifPaletteOrder Hiding data into the palette of a GIF file. Steganos hides secret information in sound, image, and text files. This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. Stego Hide and recover encrypted data in your GIF files StegParty is a system for hiding information inside of plain-text files. Unlike similar tools currently available it does not use random gibberish to encode data -- it relies on small alterations to the message, like changes to spelling and punctuation. Because of this you can use any plain-text file as your carrier , and it will be more-or-less understandable after the secret message is embedded. wbStego is a tool that hides any type of file in bitmap images, text files, HTML files or Adobe PDF files. The file in which you hide the data is not optically changed. It can be used to exchange sensitive data securely or to add hidden copyright information to the file. TextHide Software to hide any data in unsuspicious text in order to store or communicate secrets (textual steganography). 5. Statement of the problem of detection of hidden messages The vast majority of methods for detection of hidden data is based on an analysis of the characteristics of the probability distribution of the container elements. This allows you to predict the enemy's actions in solving the problem of detection of hidden data. The following is a mathematical model of the basic most probable enemy action, based on the provisions of detection theory. Adoption of a solution enemy hidden in the target data carrier is not performed on a single value of a quantity characterizing the contents of the media, and throughout the carrier, i.e. based on a sample consisting of N values of the implementation that makes better use of a priori information and to receive the greater good than the more significant sample size N. Thus, the task of the enemy on the development of detection methods can be interpreted as an optimization problem: Steganography in CAD/CAM/PLM. Content. Page 49 where a collection of empty containers, the function of hiding data - Detection, We write the function of detection by assessing: - пороговая оценка. - The threshold score. Since the containers are used as sources of excess real signal, the contents of the container can be divided into signal and "noise", where the noise is understood sampling noise, quantum noise, etc. the distortions introduced in the "ideal" signal. In the case of non-volatile media as containers for the noise we mean the unused blocks of the file system. I imagine the container as Where - the container without the noise, - noise is present in the container. Then Where - the weight of the corresponding estimates. It is clear that with increasing resources enemy, particularly the number of empty containers available, estimation is improved: Besides the introduction of hidden data in the signal-to-container could result in "visible" outside observer distortions. Accordingly, based on the results of the analysis and of a hidden data channel practicable algorithms for data hiding place hidden in the noise of the data container: Steganography in CAD/CAM/PLM. Content. Page 50 Thus, the optimal method for detection of hidden data is constructed based on the following algorithm of detection: 1 Select the noise parameters from the provided container for analysis using the selected method of isolating the noise N, 2) The decision is "YES" or "NO" depending on the evaluation of hidden data in the selected noise Consequently, the task of developing a detection method can be represented as a function of searching for an optimal evaluation and optimal allocation function Noise The task of constructing a noise estimation is the task of classification. According to its interpretation in the present case is required to construct an algorithm which assigns to the noise obtained from the presented analysis for the container to one of two classes - the class of noise containing hidden data or class of noises that do not contain hidden data. The object in this case, noise can be represented as a vector consisting of separate noise characteristics. The algorithm uses the sample selection, which consists of a set of empty and full containers. Steganography in CAD/CAM/PLM. Content. Page 51