A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Digital Color 24-bit Color Indexed Color Image file compression
Information Representation
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
F5 A Steganographic Algorithm
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Grey Level Enhancement Contrast stretching Linear mapping Non-linear mapping Efficient implementation of mapping algorithms Design of classes to support.
White-Box Cryptography
The Binary Numbering Systems
Steganography and Network Security
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Connecting with Computer Science, 2e
Compression JPG compression, Source: Original 10:1 Compression 45:1 Compression.
Overview of Digital Stenography
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
How Images are Represented Bitmap images (Dots used to draw the image) Monochrome images 8 bit grey scale images 24 bit colour Colour lookup tables Vector.
Connecting with Computer Science 2 Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
©Brooks/Cole, 2003 Chapter 2 Data Representation.
Steganography detection Roland Cmorik, Martin Šumák.
COMP Bitmapped and Vector Graphics Pages Using Qwizdom.
MATH 224 – Discrete Mathematics
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Chapter 11 Fluency with Information Technology 4 th edition by Lawrence Snyder (slides by Deborah Woodall : 1.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Addison Wesley is an imprint of © 2010 Pearson Addison-Wesley. All rights reserved. Chapter 5 Working with Images Starting Out with Games & Graphics in.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
CS 111 – Sept. 10 Quiz Data compression –text –images –sounds Commitment: –Please read rest of chapter 1. –Department picnic next Wednesday.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Introduction to Steganalysis Schemes Multimedia Security.
Graphics An image is made up of tiny dots called pixels (“picture elements”) The resolution determines the.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Image File Formats. What is an Image File Format? Image file formats are standard way of organizing and storing of image files. Image files are composed.
Data Representation. What is data? Data is information that has been translated into a form that is more convenient to process As information take different.
Chapter 1 Background 1. In this lecture, you will find answers to these questions Computers store and transmit information using digital data. What exactly.
Cryptographic Anonymity Project Alan Le
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Image File Formats By Dr. Rajeev Srivastava 1. Image File Formats Header and Image data. A typical image file format contains two fields namely Dr. Rajeev.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Unit 2.6 Data Representation Lesson 3 ‒ Images
Digital Steganography
Security Using Armstrong Numbers and Authentication using Colors
Binary Representation in Audio and Images
Computer Science Higher
Welcome
How to Convert Pictures into Numbers
Steganography.
Look at Me Mod 4 Lesson 3 Graphics Module 4- Build a Game.
Visit for more Learning Resources
Representing Images 2.6 – Data Representation.
Steganography with Digital Images
Ch2: Data Representation
A Data Hiding Scheme Based Upon Block Truncation Coding
Encryption & Steganography: Amazing Things To Do with Bits
STEGANOGRAPHY IN IMAGES
Presentation transcript:

A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07

CONTENTS 1. Literary Research 2. Cryptography and Steganography 3. Theory of Image Steganography 4. Details of Algorithm 5. How Steganography Works 6. Block Diagram 7. Steganalysis 8. References

LITERARY RESEARCH Papers read  A novel security Model combining cryptography and Steganography  Domenico Bloisi and Luca Iocchi, IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY Key Learning's  Idea that cryptography and steganography can be combined to form a secure system. Highlights  Paper uses standard RSA and LSB technique for crypto-steganography.

Cryptography  Cryptography Definition  AES Algorithm and its Use.  Shortcomings of AES algorithm and cryptography.

Image Steganography IMAGE STEGANOGRAPHY ENCYPTIONDECRYPTION ORIGINAL IMAGE TEXT MESSAGE ORIGINAL MESSAGE

Basic Formula For Crypt-Steganography COVER MEDIUMHIDDEN DATASTEGO KEY STEGO MEDIUM

Scope Of Image Steganography  Steganography is the technique for hiding information in images.  Cryptic messages are further hidden in images thereby further encrypting them and making them invisible altogether.  One of its various application is in Digital Watermarking.

 Hacking of information online and use of images by terrorists make steganography and steganalysis very relevant fields to research on.  Applying RSA algorithm and LSB algorithm for crypt-steganography.

Algorithm The algorithm is mainly divided into three major steps: 1) AES data encryption algorithm.

Structure of Each Round

Algorithm 2) Generation of prime number, finding its primitive root and using it to randomize bits.  First a password (large no) is entered by the user.  Generate the smallest prime no greater than the password.  Find its primitive root.

Theory of Primitive Root If g is a primitive root modulo n, then for every integer a with gcd(a, n) = 1, there is an integer k such that g k ≡ a (mod n). Such k is called the index or discrete logarithm of a to the base g modulo n.gcddiscrete logarithm

Algorithm 3) Using modified LSB technique to hide the encrypted message behind the carrier image.  Select the pixel from the number generated by the primitive root of prime modulo n method.  Replace the LSB of this pixel with the first bit of cipher text generated by the AES algorithm.

LSB Algorithm  In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image. If we are using 24-bit color, the amount of change will be minimal and indiscernible to the human eye. As an example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding:

 Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden): If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed)

Block Diagram for Encryption Secret Message AES Encryptor Cipher Code Prime No. >k Primitive Root Function + Carrier Image Random Pixel Replace LSB with C.C. Encrypted Image

Block Diagram for Decryption Prime No. >k ORIGINAL MESSAGE AES Decryptor Collect Data from LSB Random Pixel Primitive Root Function Encrypted Image +

How Steganography Works The process can be divided into further parts as below:-  Use of Bitmap Files  Bit Evaluation  Interaction  Encoding/Decoding Method  Hiding Message

Use of Bitmap Files  First you will need to read your picture as a jpg and then save it in 24-bit bmp format.  You will need to use bmp files for this assignment because JPEG’s are ”lossy” meaning that what you write to the file may be changed slightly so that the resulting image can be stored more efficiently.  Thus JPEG’s will not work for steganography because JPEG’s will change the secret message when storing the file to disk.  Here are the commands to save your file. You can give it the same name except be sure to put a.bmp file extension on the end.

Bitmap loadedTrueBitmap; DecryptedBitmap;  These commands will load the original.bmp file and the decrypted.bmp file after handling all the size and name conversion of the original.bmp file  Note that image size should be reduced to at max 1/4 original size because bmp files take a lot of memory. You will run in to less trouble if your image is smaller.

Interaction  Prompt the user if they want to encode or decode a message.  Use the File Chooser dialog to prompt the user for an input file.  If encode, prompt the user for an input message. Encode the message into the picture.  Then use the File Chooser dialog to prompt the user for an output file.  Save the new picture/message in this file (using bmp format).  If decode, extract the message from the file. Print the message.

Encoding/Decoding Method  Extract the pixels of your target picture in one big array using the textgetPixels() method.  Use the first pixel (at spot 0) to hide the length of your message (number of characters). You will limit yourself to messages that are between 0 and 255 characters long.  After that use every eleventh pixel to hide characters in your message. Start at pixel 11, then pixel 22, and so on until you hide all characters in your message.  Every thing that you need to hide in a pixel is 8-bits long. The length (in the first pixel) is a byte. You can typecast all the Unicode chars to bytes as well.  Use the method below to hide each byte in an appropriate pixel.

Hiding Method  The problem with changing the red values in our encode/decode steps, is that these often cause quite visible changes in the resulting image. This is especially true if the pixels that are being changed are part of a large section of uniformly colored pixels – the ”dots” stand out and are noticeable.  As an option, we can change only the lower order bits of each pixel color (red, blue, and green). This will make subtle changes to each pixel’s color and will not be as evident.  Remember that each pixel has three bytes: one byte for red, blue and green colors. Each byte has 8 bits to encode a number between 0 and 255.

 We have swap out the red color byte for a character, it is possible that we are changing the redness of that pixel by quite a bit. For example, we might have had a pixel with values of (225, 100, 100) which has lots of red, some green and some blue – this is basically a reddish pixel with a slight bit of pink color to it.  Now suppose we are to store the character ”a” in the red part of this pixel. An ”a” is encoded as decimal number 97 so our new pixel becomes (97, 100, 100).  Now we have equal parts of all three colors to produce a dark grey pixel. This dark grey is noticeably different than the dark pink we had before; it will definitely stand out in the image especially if the other nearby pixels are all dark pink.

 we only change the last three bits (lowest three bits) – these are the bits that determine the ”ones place”, the ”twos place” and the ”fours place”.  We can only alter the original pixel color value by ±7. Let us think of our original pixel as a bits: (r7 r6 r5 r4 r3 r2 r1 r0, g7 g6 g5 g4 g3 g2 g1 g0, b7 b6 b5 b4 b3 b2 b1 b0). And our character (byte) as some bits: c7 c6 c5 c4 c3 c2 c1 c0.

 Then we can place three of these character bits in the lowest red pixel, three more in the lowest green pixel, and the last two in the lowest blue pixel as follows: (r7 r6 r5 r4 r3 c7 c6 c5, g7 g6 g5 g4 g3 c4 c3 c2, b7 b6 b5 b4 b3 b2 c1 c0). If we had done this to pixel (225, 100, 100) with character ”a”, we obtain: original pixel = ( , , ) ”a” = new pixel = ( , , ) new pixel = ( 227, 96, 101 )

User Manual Hiding Any File In Image

Encryption

Decryption

Steganalysis  Steganalysis is the art and science of detecting messages hidden using steganography.  In Image Steganography we propose to predict each pixel gray scale value in the original cover image by using its neighboring pixels' gray scale values, and obtain a prediction-error image by subtracting the predicted image from the test image.

 It is expected that this prediction-error image removes various information other than that caused by data hiding, thus making the steganalysis more efficient because the hidden data are usually unrelated to the cover media. In other words, the prediction-error image is used to erase the image content. The prediction algorithm is expressed below

 where a, b, c are is the context of the pixel x under consideration, is the prediction value of x. The location of a, b, c can be illustrated below. Xc ab

REFERENCES BOOK  Stefan Katzenbeisser, Fabien A. P. Petitcolas : Information hiding techniques for steganographyInformation hiding techniques for steganography JOURNALS  Phillip A Ragalia,’Cryptographic measures in information hiding’.  Piyush Marwah, Paresh Marwah, ‘Visual Cryptographic Steganography in Images’. Online   

THANKING YOU