The Old Stories Of Covert Communication

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

ABSTRACT:

It is time to wrap up the old stories of covert communication. As time goes by, we are updating in each and everything in what we do, want, and utilize. Communication and Technology are not exceptions. Although they go hand in hand, Internet aficionados often end up with security issues in the former directly or indirectly in touch with the latter. What has to be done? We should increase the security in what we convey to the world online; for that emerging technologies (in our case with an ancient touch!) should be drawn into battle between the originators and mutilators! For efficient way of secret exchange of information, Cryptography and Steganography endow with a phenomenal contribution. Our objective is to grant this as a study identifying the nuances of steganography in some notable grounds. This paper does not fail to present the principles and attributes of steganography, traditional methods in the past, upcoming directions and also glances through detection mechanisms. Thus this paper gives the readers a good overview about Steganography.

INTRODUCTION:

Information Security is a subfield of computing which stands for defending information from illicit entrée, scrutiny, amendment, commotion etc. Putting it simple it deals with the technologies to safeguard covert information from all sorts of hacking. Information Security can be broadly categorized as Network Security, Computer Security and Internet Security. Computer Security incorporates all the practices and means through which system-based paraphernalia, data and services are safeguarded from the premeditated or involuntary access of the third party. It embraces fortification not only from the above mentioned but also from impromptu actions, natural catastrophe etc.

While Network Security is a dedicated field concerning provisions and guidelines espoused by a network/system bureaucrat to shelter a network and the wherewithal accessed via the network from mistreat, Internet Security is a division coping with browser and application level security because this is the widely utilized medium which is also highly prone to scam. The three fundamental notions for information security are privacy, reliability, and accessibility. That is, the users should be guaranteed that information is trusted to be shared, it should be shared only in the form they suppose, it should be obtainable when needed and of course it should be processed by the systems in time and in truthful conduct.

Let’s roll back to know the brief history information security. It gets back to primeval times and begins with the egression of officialdom in organization and rivalry. Caesar took the pride of inventing Caesar cipher around 50 B.C. to foil his communication from being examined. Insightful information is communicated from source to destination via trusted people and is also stocked up in a protected milieu. Encoding the covert information was also in practice during the World War II.

The beginning of computer epoch witnessed brisk and speedy progression in providing security both in hardware and software level. The researches exploited mainframes to achieve the goal by rewiring and punch cards as there were no computer networks at that time. In 1960s, ARPANET project, the forerunner of internet, made the possibility of data storage and processing. Defense Department presented a study based on Security Controls known as R-609 in 1970s. Increased usage of PCs in 1980s demanded the enhanced security and GUIs to OSs drew hackers from nook and corner of the globe in 1990s. The unavailability of protection technologies leads to various forms of security theft in those days during which it was not fashionable concern.

As many techniques used from the ancient period up to recent times failed to pledge secret data communication, Cryptography and Steganography came into light and blow the lid off. They have now become the unbeatable mode of communication of a secret from source to destination. While the former deals with text alone, the latter spreads its wings to all multimedia files. Cryptography initially eased the problem of one to one communication whereas Steganography endeavors one to many communication in a more sophisticated way.

The underlying principle in steganography is that the cloak-and-dagger information is communicated from the source to destination in disguise. That is generally the receiver gets the desired message undercover. How it is so? The key elements involved for an indispensable steganographic scheme are the payload, cover, key, saving the best for last, the algorithm. Payload is what the private information to be conveyed, cover is the medium in which payload is entrenched, key, as it says, is the crucial index involved in the operation and finally the algorithm is the course of action we adopt to attain the goal.

Simple yet most needed mottos of steganography will be the message should not be visible to any one (imperceptibility), even the receiver, when he/she does have a look at it, it should be incubus for everyone trying to retrieve (robustness), and technique should be put into service effortlessly, more of secret data should be able to infix and convey (capacity).

The following sections throw a light in knowing the details of steganography. The history and current trends behind the routine, utilities of one, methodologies in practice, ways to crack a steganographic scheme (steganalysis) are discussed.

PAST:

Greeks were more successful in conveying secret messages. Though their measures did not fall into the category of prompt cryptography, they were the initiatives for the later discovered. They also did not fail to use steganography; in fact the word is coined from the Greek language meant for hidden writing. For evidence, the archives date back to 440 B.C. They also conveyed the secret with the help of wax in woods! The messenger’s body is tattooed with secret and sent over to the destination.

In olden days, secret message is communicated to the recipient by placing a grille having holes in script of not detrimental text. This revealed the covert content within the holes. Invisible ink was used by Romans as a key to privacy using which the secret is written and becomes quickly invisible. The measures to later make visible the invisible are also noteworthy. It was a successful key to espionage. It was useful in stamping, marking properties, product identification and many more. Invisible ink is developed by means of heat, UV rays, chemical reaction etc. that could stand for its purpose.

Another prominent means of steganography is usage of dots and microdots. England was known for this practice. Unlike Greeks, British used newspapers rather than harmless text to hide the message. This seemed safer with almost zero percentage for detection as no one reading the newspaper would think that there was actually something hidden. All they could see is splash of ink. Not only did they use papers, but also tapes, frames, unreadable signs, in fact whatever they got. People used Morse code and postal stamps for writing covert data.

Ancient emperors used null ciphers; books ‘Polygraphie’ was written on methods and practices of cryptography and ‘Steganographia’ dealt with steganography; Americans used code talkers later in world war to communicate.

PRESENT:

Steganography can be stated as an extended version of cryptography i.e. it is security all the way through anonymity! Present day steganography aims at only one thing ‘security in all means’! Well, privacy is what we anticipate in internet communication. As internet has become necessity rather than luxury these days, the more information we access and share via internet, the more risky the process is. Steganography and its branches, used in their digitized version have reached out to the researchers to exploit the two as means of secrecy. Digital techniques may be categorized into spatial and transform domains, distortion based, masking, filtering based which under variant conditions yield projected results. The specialty in this new phase of steganography is that it suits all types of multimedia files. The concept can be molded according to the application and need.

This ecstatic mechanism has given numerous measures for instance watermarking, fingerprinting to hide a secret in a carrier file. Many algorithms and new methods like LSB, OPAP, PI have been developed to enrich a scheme for practical implementation. Moreover, steganography exploits various disciplines of mathematics and engineering which gives a different color to the scheme. To name a few, matrix, set theory, information theory, calculus, OFDM, CDMA and many more.

Some of the applications of steganography are when organizations use it to protect the intellectual property, to prevent piracy, digital watermarks for films, producing photo tiles, forensic science, authentication of documents, ethical issues etc. Nowadays steganography is used along with cryptography to give better results. New forms of steganography are also being discovered. There were no measures for evaluating a particular method in olden days. But now as technology has seen a phenomenal evolution performance measures are applicable to steg algorithms too. Thus, it is done via the image metrics MSE and PSNR. If a method is proposed nowadays, with the results it has given, it is tested against attacks, compared with the existing ones and then is accepted or modified.

FUTURE:

Steganography bids interesting revelation for information hiding commercially. Since steganographic schemes have proved their purposes beyond imagination, their new phases are now being uncovered for hiding data without a glitch. No wonder this has become one of the prime fields of research and works are going on around the planet to implement the notion more effectively. Also it is noteworthy to mention here is the fact that equal importance is given to steganalysis as well. Up-to-the-minute strategies of reprobates are unearthed by the researchers which have in return turned as another research field. Though steganography is a good stuff to hide data, getting all its prospects in a single scheme is really tough.

The future of this discipline may directed towards applying steganography mechanism in every explicit application so that rather than in general it can be exploited for a specific purpose. Another criterion may be tagging a digital file where steganographic schemes may contribute even more. Already existing schemes can be improvised and made resistant to attacks of geometrical nature and compound embedding is also a good line of protection.

Even though steganography remains a paradox, protecting cerebral business properties with its help is highly indispensable. Apart from researchers, Governmental and Nongovernmental organizations, industrialists, business men can come forward to widen the area of steganographic research to improvise it and can think of measures for practical implementation and to create awareness. Effective combination of steganography with other disciplines of study is another area of focus.

STEGANOGRAPHIC TECHNIQUES:

Engender of many techniques in steganography which gives the path to take it to a more secured level. Mainly in steg, one can lock the data in text, video, audio and in image. Let we discuss about how safe these techniques are?

TEXT STEGANOGRAPHY:

Hiding secret message in text is a very taxing task. Replacing secret message requires more redundant data, but it is not so in text files. But its smaller memory occupation and simpler communication attracts the steg people to use this efficiently. Three categories of text steganography are based on linguistics, statistics and random generation and formats. Physical text formatting is used in format based methods to conceal the data. For example, inclusion of spaces, planned misspellings scattered all over the text and font resizing.

The second one is random and statistical generation which makes use of the character and word sequences to hide the data. In character sequences just entrench the data randomly, in word sequences, by making use of the geometric nature of frequency and length of the letter and word respectively, generate the words having identical features of that of the originals. Third method uses the linguistic structure and properties of text to hide the information.

In text steganography, different steganographic approaches are hiding by selection, HTML documents, Line and Word shifting, hiding using whitespace, Semantic based hiding, Abbreviation based hiding. Hiding by selection, the name implies that by selecting the character in the cover text is the easiest way to bury the data.HTML tags are case insensitive, so it is simple to embed in HTML documents, this is one of the method in text steganography. Next popular method is line and word shifting, by shifting the line vertically and word horizontally by spacing of fixed inches gives the secret information to the receiver.

Whitespaces in text also behave as a carrier to send the secret data, two spaces implies 1 is hidden and one space mean 0 is hidden, so based on the whitespaces the receiver reveal the data. In semantic based hiding, synonyms of words are used for hiding. Next one is Abbreviation based hiding, create the lexical dictionary with corresponding abbreviation, and then replace the carrier text with this abbreviation. American and British spellings for the same words produce the text steg. For example, "Center" is designated by 1 while "Centre" is designated by 0. To consider the above methods as base, many advanced methods are created with better embedding capacity and imperceptibility in text steganography.

IMAGE STEGANOGRAPHY:

Image steganography is the most accepted and widely used steganographic means in which hush-hush information is transmitted from the sender to the receiver through an innocuous interface. Since there are plentiful images on hand, one can do wonders in secret communication which is already rocking the world and no doubt it is going to rule the upcoming years. Images of different formats with varying characteristics are exercised which gives distinguished and anticipated results. Commonly gray and color images are used to achieve secrecy during transmission. Thousands of techniques are currently in practice to achieve the same which alters the color symbolizing pixels’ arithmetic value and intensity.

Image steganographic techniques are broadly classified into spatial and transform domain, distortion, masking techniques and filtering techniques. One of the most employed mechanisms in spatial domain other than PVD and matrix based embedding, is LSB. It is established in the pixels of the cover either in sequential or in random fashion. It does not produce perceptible modification to the image thus making it escapes human eye attack. The benefit of LSB is that it can hide more secret bits but at the same time it needs enhanced robustness.

Common way of masking or filtering images is by watermarking where rather than embedding in noise level, crucial areas only submit themselves to manipulation. Its main aim is to provide copyright protection and is more connected to images and survives attacks attributable to lossy compression. Watermarking is more robust than LSB and can be categorized as fragile, fingerprinting and visible. Of this fingerprinting is a helping hand in forensics, authentication, copy and copyright control etc., DWT, DFT and DCT are the eminent transform domain techniques. Distortion techniques are nothing but they are out and out cover images and their characteristics based and one should have a thorough knowledge about these prior to retrieval. The cover images used in image steganography may have the formats of mp3, jpeg, wav, bmp etc. Out of these jpeg offers maximum compression ratio and image quality. So they are widely used as covers in current trends of image steganography.

AUDIO STEGANOGRAPHY:

The process of hiding the information in a digitized audio and making it unnoticeable to the human ear is called audio steganography. This subfield of steganography has emerged recently due to the abundance of audio files. In support of exemplar, channel can be preferred by making a perceptible sound imperceptible in the company of other sound. Since we have a sharp and vibrant hearing capacity, encoding secret information in audio is one of the exigent process. At the same time, we have a ban of inability to set apart strident and quiet sounds which is, without doubt, is a key for encoding secrets. The two crucial constraints for encoding technique are the broadcasting means of the audio and its digital layout. The main attributes of audio steganography are sampling rate, amplification, adding noise, quantization, encoding and decoding, filtering, transcoding.

The audio steganographic domains may be broadly classified as Codec, Temporal and Transform. Codec domain platforms are bit stream hiding and modifying code book. Temporal domain embraces the disciplines Silence intervals, echo hiding and LSB. Distinguished Transform domain principles are Wavelet, Tone insertion, magnitude spectrum, cepstral domain techniques etc. Of all these prominent encoding techniques employed are spread spectrum, LSB and parity coding, phase coding. LSB coding is the common method of substituting secret bits in the place of that of the cover. Phase coding is characterize by embedding the secret as phase shifts in the cover’s spectrum leading to muffled coding described by SNR. Spread spectrum technique comprises of DSSS and FHSS. The secret message can also be infixed into a cover audio by means of echo, which process is known as Echo Hiding. Three crucial bounds for doing so are namely decay rate, offset and amplitude. Generally, they are positioned below the humans’ audible range so that they cannot identify the echo.

Even though audio steganography is an effective way of hiding data, it suffers from some notable criticism. To name a few, selected audio files (mostly wav) only can be encoded; up to 500 characters of message is only allowed; the increase in amount of data to be embedded causes increased intricacy; short of estimable interface; more time consumption for computation; one cannot know the frequency discrepancies etc.

VIDEO STEGANOGRAPHY:

Since video is the combination of image and audio, their steganographic techniques are pertinent to video as well. Instead of images and audio separately, a video containing secret information is sent from the source to destination. Payload in video steganography can be a text, audio or image. This application is developed for embedding secrets in an inoffensive medium. Unlike others, key is optional here in video. Bob communicates the encrypted video to Alice through an open channel where she retrieves the secret using the algorithm and key. Video steganography, more-attention-needed discipline, carries files in a more stout and secure manner, incorporating features of cryptography and steganography.

Since DCT changes the images in a video to a negligible extent, it is mostly employed in video Steganography. That is, it does so by rounding the images’ value. Thus a change in a pixel color goes unnoticed. To make the attack harder, secret can be embedded in then and there manner rather than sequentially. For a perfect video steganographic routine, extraction should be lossless, the quality of sound and that of the picture should be high, and the video should be absolutely distortion less.

Two correlations of video file come from the fact that every frame in a sequence has inter pixel spatial correlation and a video’s anecdotal feature leading to temporal correlation. Some huge benefits of video steganography are distortions go unnoticed since video is nothing but incessant course of data or information and ability to hide more data contrasting audio steganography. Also since it is highly complex to embed data in a video, this resists attacks to a great extent.

PROTOCOL STEGANOGRAPHY:

The phenomenon by which the secret information is rooted inside network protocols is called protocol steganography. Thus steganography has come up with one more form to have private communication. There subsists some stealthy channels in OSI model used in almost all systems where in steganography comes into play. For example, TCP/IP’s header in some places where they are not at all employed or discretionary can be used to hide data or by manipulating the packet length also the goal is achieved. It covers the major properties of a successful steganography methodology whilst continuing the blatant transmission.

The two common approaches associated with protocol steganography are typical embedding and phylogenic retrieval. The former is the customary embedding strategies whereas the latter comprises of functions engendered inherently which reduces the buried data by making the most of payload. In spite of rigorous experiments, statistical tests, linguistic verification, protocol steganography has emerged as a secure and robust means of communication.

DETECTION

As per the proverb "Nothing ventured nothing gained", we should take some risk to detect hide information over a media, There are lot of steganographic techniques to hide information; similarly there are lot of techniques to analyze it. Different steps are followed for different techniques; let us see one by one.

TEXT STEGANALYSIS:

As mentioned earlier, steganography based on text is broken down to basic categories- format, linguistic based, generation of statistical plus random nature. Text steganography methods encrypt the information in such a way that other than receiver and sender, no one can find that there is some hidden information. Public key and private key are used to encrypt the information.

Abnormal patterns stand out in uncovering the probability of hidden information. Trifling disparities in spacing within lines and words over text is fairly intricate for an onlooker to find out. Still, if opened with ordinary text processing software, too small to see characters along with tagged spaces are freely judged.

Mainly if source of the keys or method of encryption gets revealed then secrecy of the information won’t exist.

IMAGE STEGANALYSIS:

Steganalysis over image is based on image format, the various image formats are gif, bmp, jpeg.

IN GIF

Basically for images of gif format (8 bpp), palette based steganalysis is exploited. The palette table characterizes the pixel color. LSB embedding over gif image alters the 24 bit RGB value of the pixel results, changing palette color of the pixel. When palette color changes strength of the stego-image will diminish. While fulfilling statistical steganalysis, gif image measures the alteration over the palette color.

IN BMP

Raw image steganalysis is used for bmp image, it has lossless LSB plane. While embedding over lossless LSB plane results in casting over two gray scale values. Statistical analysis over bmp image shows the length of the hidden message.

IN JPEG

The popular steganography systems that are available to hide message over jpeg images are as follows JSteg, JSteg-Shell, JPhide and Outguess. These three systems uses least significant bit embedding in order to hide messages, while performing statistical steganalysis over this methods, then the secret message will be revealed.

AUDIO AND VIDEO STEGANALYSIS:

Audio signals are high capacity data streams. Phase and echo hiding are some steganalysis technique over audio signals. The phase steganalysis scheme examines the details of amendments in phase belonging to every audio fragment which is because of adscititious property of uncovered phase.

Maximum frequency is scrutinized through short window by calculating its central moments of 8th order which is later fed to SVM to distinguish manipulated and original audio files. This principle is the underlying concept of echo analysis.

Unification of image and sound values are known as video files. Very few steganalysis methods are convenient for video; they are based on exploring the Temporal Correlation between Frames, Asymptotic Relative Efficiency (ARE) and Mode Detection.

CONCLUSION:

Steganography is the science of hiding information with a long history and the capability to adapt to new levels of technology. For a confidential communication steganography plays an imperative role and it also provides secrecy as well as privacy in an organization. Various steganography techniques uses multimedia objects like text, image, audio and video to hide or cover the ambiguous information. While new steganography methods are being developed at the mean time, new methods are also rising to analyze the origin; the process of analyzing a multimedia object to check whether any secret information present in it is known as steganalysis. In this paper we discussed a lot of steganography and steganalysis methods in order to improve its intricate level of stego-object. In future more number of methods will be developed based on the steganography and steganalysis methods which we conferred in this survey paper.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now