Project Report - Athabasca University

advertisement
Project Report
Brigitte Si
25 July 2004
Athabasca University
COMP607 Project
Project Report
Page 1 of 13
Table of Contents
1.
Introduction ................................................................................................................ 3
1.1
Project Goal ................................................................................................................... 3
1.2
Motivation...................................................................................................................... 3
1.3
Resources ....................................................................................................................... 4
2.
Background Research................................................................................................. 5
3.
Project Details ............................................................................................................. 6
3.1
Project Overview............................................................................................................ 6
3.1.1 Requirements Gathering ............................................................................................... 6
3.1.2 Tutorial Design ............................................................................................................. 6
3.1.3 Scheduling ..................................................................................................................... 7
3.2
Steganography for Computer Images........................................................................... 7
3.3
More Recent Use of Steganography ............................................................................. 8
4.
Conclusion .................................................................................................................. 9
5.
Glossary ..................................................................................................................... 10
6.
References and Bibliography ................................................................................... 11
Project Report
Page 2 of 13
1.
Introduction
Digital multimedia data provides a robust and easy editing and
modifying of data. The data can be delivered over computer networks
with little to no errors and often without interference.
Unfortunately, digital media distribution raises a concern for digital
content owners. Digital data can be copied without any loss in quality
and content. This poses a big problem for the protection of intellectual
property rights of copyright owners. Watermarking is a solution to the
problem. It can be defined as embedding digital data, such as
information about the owner, recipient, and access level, without being
detectable in the host multimedia data.
Steganography relies on hiding covert message in unsuspected
multimedia data and is generally used in secret communication
between acknowledged parties. Steganography is a method of
encryption that hides data among the bits of a cover file, such as a
graphic or an audio file. The technique replaces unused or insignificant
bits with the secret data. Steganography is not as robust to attacks
since the embedded data is vulnerable to destruction.
Watermarking has the feature of robustness against attacks. Even if
the existence and method of embedding the data is known, it may be
difficult to destroy the hidden data.
Data hiding and data embedding can be classified as methods between
steganography and watermarking.
1.1 Project Goal
The goal of the project is to construct an introductory tutorial on the
subject of steganography, mainly focused on embedding text data in
digital images.
Additionally, the tutorial walks through two steganographic program
examples.
1.2 Motivation
Project Report
Page 3 of 13
The primary reason for selecting steganography among the list of
possible project topics was due to the unfamiliarity of the word that
twigged an interest in the subject.
Another motivation for researching the topic was after reading an
online article in the USA Today titled “Terror groups hide behind Web
encryption” that claims terrorists and, in particular, Osama bin Laden
and the al-Qaida network, may be using steganography to
communicate with each other in planning terrorist attacks. It is
thought that images with hidden messages are placed on bulletin
boards or dead drops for other terrorists to pick up and retrieve hidden
messages. Thus far, this supposition has yet to be proven.
1.3 Resources
The single resource dedicated to the project is the author of the
report.
Project Report
Page 4 of 13
2.
Background Research
The primary tool used in the research of steganography and
watermarking is the Internet.
The first objective was to understand the various terminologies related
to the field. This was done through the Wikipedia and the
hyperdictionary websites.
Additional technical details were obtained from various articles listed
under the References and Bibliography section.
The following points can be attributed to the renaissance of
steganography:

Government ban on digital cryptography. Individuals and
companies who seek confidentiality look to steganography as an
important complementary since combining cryptography and
steganography can help in avoiding suspicion and protect
privacy.

The increased need to protect intellectual property rights by
digital content owners, using efficient watermarking.

The trend towards electronic communications and humans desire
to conceal messages from curious eyes. With rapid advancement
in technology, steganographic software is becoming effective in
hiding information in image, audio or text files.
Project Report
Page 5 of 13
3.
Project Details
3.1 Project Overview
3.1.1
Requirements Gathering
It was determined at an early stage of the requirements gathering that
the tutorial will focus primarily on steganography for embedding text
information in computer images. The steganography techniques
covered include least significant bit insertion, masking and filtering,
and algorithms and transformations. The tutorial does not cover other
steganography techniques such as distortion, spread spectrum
steganography, and statistical steganography.
Since “information hiding” refers to both watermarking and
steganography, digital watermarking is briefly mentioned in the
tutorial. As well, the tutorial contains a section on steganalysis.
Two steganographic program examples were selected from the
Internet to include in the tutorial.

JPHS (Jpeg hide and seek) is a free program designed by Allan
Latham.

4t HIT Mail Privacy LITE 1.01 is a tool provided free of charge by
4t Niagara Software.
3.1.2
Tutorial Design
The tutorial is written in HTML. The main page is the menu.htm file.
The tutorial was designed for easy navigation. An attempt was made
to achieve a concise tutorial on the subject of steganography without
losing the reader with excessive technical detail on the steganographic
techniques.
Self-test quiz are available in certain sections of the tutorial. The quiz
enables readers to test their understanding on the particular section of
the tutorial.
Project Report
Page 6 of 13
3.1.3
Scheduling
The project requirements and design were made exclusively by the
single resource. Since the project did not involve group dynamics the
project schedule was fairly well paced.
Task
Gather Requirements.
Design Tutorial.
Create Self-Test Quiz.
Test Example Programs.
Test & Assess Tutorial.
Total Number of Hrs:
Estimated
Hours
20
15
6
3
1
45
Actual
Hours
23
20
5
3
1
52
3.2 Steganography for Computer Images
The challenge of using steganography in computer images is to hide as
much data as possible with the least noticeable difference in the
image. There are a number of steganographic methods and
applications available for download on the Internet.
In general, the steganography process consists of the following steps:

Identifying redundant bits in a cover image.

Selecting a subset of the redundant bits to be replaced with the
secret message. The stego image is created by replacing these
redundant bits with the message bits.
Information hidden by setting the least significant bits of the image
pixels to the bits of the secret data may be invisible to the human eye
but it is relatively easy to detect and remove by a third party who
suspect the presence of the embedded data.
Steganography is more noticeable with JPEG images due to the lossy
compression algorithm used in JPEG files. There may be a significant
difference between the file size of the cover image and the stego
image. The algorithm used also affects the probability of detection of
Project Report
Page 7 of 13
the steganography. An algorithm used to hide large amounts of
information typically result in greater change to the image appearance.
Refer to the tutorial for a detail explanation of how steganography is
used in computer images.
3.3 More Recent Use of Steganography
A more recent use of steganography is in the design of covered
channels in TCP/IP for thwarting filters and firewalls. Although this
steganography method is not covered in the tutorial it warrants a brief
mention in the report.
The following is a simple explanation of the build-up of a TCP/IP
connection:
For each connection there is a send sequence number and a receive
sequence number. The synchronization requires each side to send its
own initial sequence number and to receive a confirmation of it in
acknowledgment from the other side. Each side must receive the other
side's initial sequence number and send a confirmation
acknowledgment.
1)
2)
3)
4)
A
A
A
A
-->
<-<--->
B
B
B
B
SYN
ACK
SYN
ACK
my sequence number is X
your sequence number is X
my sequence number is Y
your sequence number is Y
Since step 2 and 3 can be combined in a single message this is called
a three-way handshake. In this three-way handshake hidden data can
be embedded in the packet header.
For example, host A sends a synchronization package and an initial
sequence number to host B requesting acknowledgement. Host B
answers with an initial sequence number increased by one and its
acknowledgement. The connection is established by the
acknowledgement from host A to host B. By embedding hidden
identification information in the header data it is possible to create a
'bounce' effect. Host A sends the package to host B, but this time, due
to the hidden data in the header, host B sends the acknowledgement
that was meant for host A to host C. Host C can establish the
connection anonymously without host B knowing that host C is not
host A.
Project Report
Page 8 of 13
4.
Conclusion
Steganography is not intended to replace cryptography but rather to
supplement it. If a message is encrypted and hidden with a
steganographic method it provides an additional layer of protection
and reduces the chance of the hidden message being detected.
Steganography is still a fairly new concept to the general public
although this is likely not true in the world of secrecy and espionage.
Digital watermark technology is currently being used to track the
copyright and ownership of digital content. Efforts to improve the
robustness of the watermarks are necessary to ensure that the
watermarks and embedded information can securely defend against
watermarking attacks.
With continuous advancements in technology it is expected that in the
near future more efficient and advanced techniques in steganalysis will
emerge that will help law enforcement to better detect illicit materials
transmitted through the Internet.
The tutorial introduces a tiny part of the art of steganography.
Steganography goes well beyond simply hiding text information in an
image. Steganography applies not only to digital images but to other
media as well, such as audio files, communication channels, and other
text and binary files.
Project Report
Page 9 of 13
5.
Glossary
Cover image - An image containing an embedded message.
Cypher text – Refers to encrypted data.
Cryptography – The art of protecting information by encrypting it into
an unreadable format, called cipher text. A secret key is used to
decrypt the message into plain text.
Encryption – The translation of data into a secret code.
Least significant bit (LSB) - The bit contributing the least value in a
string of bits.
Lossless compression - For most types of data, lossless compression
techniques can reduce the space needed by only about 50%. No data
is lost in the process. For greater compression, one must use a lossy
compression technique.
Lossy compression - Lossy compression technologies attempt to
eliminate redundant or unnecessary information. Some amount of data
is lost in the process.
Plain text – Refers to any message that is not encrypted - also called
clear text.
Steganalysis – The art of discovering and rendering useless covert
messages.
Steganography - A means of overlaying one set of information
("message") on another (a cover).
Stego image - The result of combining the cover image and the
embedded message.
Stego text – It is the result of applying some steganographic process
to a plain text (not necessarily encrypted).
TCP/IP - The Transmission Control Protocol / Internet Protocol is the
standard protocol suite used on the Internet.
Project Report
Page 10 of 13
6.
References and Bibliography
1.
iNFOSYSSEC. Cryptography, Encryption and Stenography.
[online] 2000. Available at
http://www.infosyssec.org/infosyssec/cry2.htm; Accessed on 23
June 2004.
2.
Wikipedia - The Free Encyclopedia. Steganography. [online]
2004 June. Available at
http://en.wikipedia.org/wiki/Steganography; Accessed on 23
June 2004.
3.
Wikipedia - The Free Encyclopedia. Stegotext. [online] 2004
June. Available at http://en.wikipedia.org/wiki/Stegotext;
Accessed on 23 June 2004.
4.
Plunt. Steganography (hide and seek) Tutorial. [online]
Astalavista Group. 2004 January. Available at
http://www.astalavista.com//data/hide_and_seek.txt; Accessed
on 24 June 2004.
5.
Kahn, D. The Codebreakers. The Macmillan Company. New York.
1967.
6.
Johnson, N. F., Duric, Z., Jajodia, S. Information Hiding:
Steganography and Watermarking - Attacks and
Countermeasures. Kluwer Academic Press. Norwrll, MA, New
York, The Hague, London, 2000.
7.
Johnson, N. F., Jajodia, S. Exploring Steganography: Seeing the
Unseen. [online] 1998 February. Available at
http://www.jjtc.com/pub/r2026.pdf; Accessed on 24 June 2004.
8.
Rude, T. J. Steganography - Disappearing Cryptography. [online]
CRAZYTRAIN.COM 2000. Available at
http://www.crazytrain.com/rudedude.pps; Accessed on 25 June
2004.
9.
Haldar, V. Steganography and Audio. [online] Available at
http://www.ics.uci.edu/~lopes/teaching/280ubicompW03/studen
ts%20presentations/vivek%20haldar.pdf; Accessed on 27 June
2004.
Project Report
Page 11 of 13
10.
hyperdictionary. Discrete cosine transform. [online] 2003.
Available at
http://www.hyperdictionary.com/computing/discrete+cosine+tra
nsform; Accessed on 27 June 2004.
11.
hyperdictionary. Fast Fourier transform. [online] 2003. Available
at
http://www.hyperdictionary.com/dictionary/Fast+Fourier+Transf
orm; Accessed on 27 June 2004.
12.
Wikipedia. Wavelet compression. [online] 2004 May. Available at
http://en.wikipedia.org/wiki/Wavelet_compression; Accessed on
27 June 2004.
13.
Wi-Fi Planet. Blowfish. [online] 2003 October. Available at
http://wi-fiplanet.webopedia.com/TERM/B/Blowfish.html;
Accessed on 30 June 2004.
14.
Johnson, N. F., Jajodia, S. Steganalysis of Images Created Using
Current Steganography Software. [online] 1998. Available at
http://www.jjtc.com/ihws98/jjgmu.html; Accessed on 29 June
2004.
15.
Johnson, N. F., Jajodia, S. Steganalysis: The Investigation of
Hidden Information. [online] 1998 September. Available at
http://www.jjtc.com/pub/it98a.htm; Accessed on 30 June 2004.
16.
Wikipedia - The Free Encyclopedia. Steganalysis. [online] 2004
May. Available at http://en.wikipedia.org/wiki/Steganalysis;
Accessed on 02 July 2004.
17.
Kessler, G. An Overview of Steganography for the Computer
Forensics Examiner. [online] 2004 February. Available at
http://www.garykessler.net/library/fsc_stego.html; Accessed on
02 July 2004.
18.
Computerworld. Steganography: Hidden Data. Quickstudy by
Deborah Radcliff. [online] 2002. Available at
http://www.computerworld.com/securitytopics/security/story/0,
10801,71726,00.html; Accessed on 02 July 2004.
19.
Craver, S., Yeo, B., Yeung, M. Technical trials and legal
Tribulations. Communications of the ACM [online] 1998 July.
Project Report
Page 12 of 13
Volume 41. Issue 7. Available at
http://portal.acm.org/citation.cfm?id=278476.278486&dl=portal
&dl=ACM&idx=278476&part=periodical&WantType=periodical&ti
tle=Communications%20of%20the%20ACM; Accessed on 03
July 2004.
20.
Gupta, M. Steganography is more than a tool for spies. [online]
Eurescom 2001. Available at
http://www.eurescom.de/message/messageSep2001/stegano.as
p; Accessed on 05 July 2004.
Project Report
Page 13 of 13
Download