You are on page 1of 4

Digital Steganography

ABSTRACT
The phenomenal growth in e-commerce The word "steganography" actually stems from a
applications through the Internet in the past few Greek word meaning "covered writing". Some
years has led to a genuine need, as well as a common analogies to the digital form can be
sense of urgency, for both small office and home found in nature. For example, a leaf insect
office (SOHO) and corporate users to protect (hidden message) exploits the natural
their data transactions through the Internet. surrounding of leaves (host message or
These data transactions may include sensitive container) to camouflage itself. Or an infantry
document transfer, digital signature soldier camouflages himself by painting and
authentication, digital watermarking for covered himself in colors that match its
copyright protection, and digital data storage and surrounding. One of the successful revolts of
linkage. In this paper, the use of digital Han Chinese against the Mongols during the
steganography for information security in Yuan dynasty also exploited the use of
various ecommerce applications through the steganography. In this scenario, the Chinese took
Internet will be discussed in detail. These advantage of the Mid-Autumn festival by
applications include digital watermarking for distributing moon cakes (container) with a
copyright protection of multimedia data, digital message inside (hidden data) to their members
signature authentication and validation of informing them of the planned revolt.
electronic documents, digital data storage and
linkage for binding digitized photographs with DIGITAL STEGANOGRAPHY
personal attribute information, as well as secure The applications of digital steganography in
communication of multimedia data through the various e-commerce applications through the
open channels. Enhanced information security Internet will be discussed in detail. These
will lead to wider e-commerce applications that applications include digital watermarking for
involve e-communication, e-transactions, e- copyright protection of multimedia data, digital
filing, and e-publications. signature authentication and validation of
electronic documents, digital data storage and
INTRODUCTION linkage for binding digitized photographs with
The conventional way of securing data personal attribute information, as well as secure
transactions is through the use of standard communication of multimedia data. Targeting
encryption key techniques such as RSA, DES, these applications, Data Mark Technologies
and 3DES. In the past three years, however; a (DMT) have developed four digital
new branch of data security techniques known as steganography products based on their patent-
digital steganography has evolved and is pending algorithms, as follows:
continuing to receive a great deal of attention 1. Secure Communication (StegCommTM)
from both the academic and industrial 2. Digital Signature Authentication (StegSignTM)
communities Since then, a number of 3. Digital Watermarking (StegMarkTM)
companies have established in the US and 4. Digital Storage and Linkage (StegSafeTM)
Europe to commercialize and market
steganography products. Many of these 1. SECURE COMMUNICATION
steganography products were developed as plug- StegCommTM is a state-of-the-art digital
ins and OEM applications. Instead of scrambling steganography software package developed by
the data using either a standard symmetric or DMT for confidential multimedia
asymmetric key system as in the case of communication. The software allows the user to
encryption, digital steganography exploits the select a multimedia data file or "container" for
use of a host data or message (also known as a embedding hidden text, audio sequence, video
container) to hide or embed another data or clip, or any form of data file. Figure 1 illustrates
message into it. Unlike encryption, the host data the basic concept of digital steganography when
or container used in Steganography is not applied to text encoding. The contents of the text
scrambled or hidden during the communication message are hashed with those of the container
process. Only a hashed form of the hidden data file to produce a key file. The key file is also
derived from a mathematical combination of the known as a “Stegfile” Many conventional
host and hidden data is transmitted for decoding. steganography techniques simply incorporate a
Digital Steganography
combination of cryptography and steganography. available at the receiver end. Figure 3 illustrates
The cryptography operation is used first to a graphical user interface (GUI) for
scramble the hidden text. For steganography StegCommTM. StegCommTM is currently being
operation, the scrambled data is then inserted or marketed in two product versions: Standard and
"hidden" into the least significant bits (LSB) of Professional. For some corporate companies,
the container data. One of the common such as banks and financial institutions, as well
drawbacks of these techniques is that the as government agencies, where data security is
container file has to be of certain size greater of paramount importance, the Professional
than the hidden file. Other limitations include the version offers an additional layer of security by
knowledge required on the exact location of the incorporating an encryption solution, such as
hidden text, the limited container data formats, DES or 3DES, to the stegfile prior to open
and the export restriction of using encryption channel communication. Passwords for both
algorithms to certain countries. These difficulties container file and stegfile are also available in
are circumvented by the use of StegComm™. the Professional version. However, for SOHO
First, StegCommTM utilizes a patent-pending and home users, the Standard version is more
lossless algorithm (the HTTY algorithm) that than adequate for their day-to-day needs in
does not affect the data integrity of the container secure data communication.
file. Second, the program is completely
independent of the size of the container file 2. DIGITAL SIGNATURE
relative to that of the hidden file. Third, as AUTHENTICATION
steganography is a relatively new field, there are StegSignTM is a software product specifically
currently no export restrictions on products that developed by DMT to prevent malicious
incorporate this technology. Another key tampering of private and confidential documents.
advantage of the lossless algorithm is the option These documents include company memos,
to select any digital data file from a webpage Emails and letters. StegSignTM can provide a
on the Internet. As the algorithm does not wide spectrum of applications in the e-commerce
corrupt or overwrite the container file, sector. Such e-commerce applications include
multimedia data posted on any webpage, such as business transactions between banks and
images (JPEG, GIF), video clips (AVI, MPEG) customers, legal document exchanges between
or audio files (WAV, MIDI), can be selected as lawyers and clients, and scenarios involving non-
the container file. Furthermore, customized repudiation issues. This product will detect any
container files, such as the voices and images of unwarranted tampering and alert the receiver
the sender captured via video conferencing, can side immediately. StegSignTM incorporates
be generated very easily. Therefore, the patent-pending algorithms filed by DMT. A
probability of knowing which container file used digital signature and a multimedia container
during encoding is infinitesimally small. It is password are embedded into the confidential
almost like "finding a needle in a haystack." document. The basic operation of StegSignTM is
The operations involved in using StegCommTM illustrated through a data flow diagram as shown
are illustrated in figure 2. A multimedia ontainer in figure 4. The digital signature can be inputted
file is first chosen from the PC hard disk or from as a handwritten signature or as a personal seal.
a webpage on the Internet. The knowledge of The container password can either be a normal
this container file must be pre-determined and text string, an image, or a binary file. For the
communicated securely between the sender and Professional version, encryption is available to
receiver. The algorithm generates a hash file or provide another added layer of security for the
stegfile from the inputs of the container file and "signed" document. More mathematical random
the hidden text. The stegfile contains random lock combinations for data embedding
data based on a number of mathematical are also included in the Professional version.
operations between the two input files. The Figure 5 illustrates a typical GUI sample from
random data bears no data resemblance to either StegSignTM.
the container or the hidden file. For example, if a
hacker were to intercept this stegfile and perform
his normal decoding analysis on the data,
3. DIGITAL WATERMARKING
without the knowledge of the container file, it is StegMarkTM is digital watermarking software for
virtually impossible for him to decode the copyright protection of digital images, music
stegfile. The hidden file can therefore only be CDs, DVDs, and other forms of multimedia data.
decoded if both the container and the stegfile are In the case of digital images, the files can come
Digital Steganography
from a variety of sources, such as the Internet, 4. DIGITAL LINKAGE AND
digital still cameras, and video cameras. Many STORAGE
digital watermarking techniques in the market StegSafeTM is the latest of DMT steganography
embed only a certain number of bits or products that provides a secure data linkage
characters into the image. However, StegMarkTM between a digital image and attribute text
can embed either a text or image watermark information. The attribute information can be
invisibly into an "unlabelled" image. The text any personal records such as employee details,
watermark can be of many characters, for hospital patient medical records, or law
example, for a colour image of size 512 x 512, enforcement records. Currently, many personal
more than a few thousand characters may be records with ID photographs are manually or
embedded. The image watermark technique of electronically filed. Tampering to these records,
StegMarkTM is currently the only digital such as changing the name, photograph, or
watermarking product available in the market medical conditions, can be performed if the
that offers the embedding of a company's hacker is able to gain security access to the
logo/trademark into an image. For a 512 x 512 database. The main function of StegSafeTM is to
image, an image watermark of size up to 128 x securely link the personal record and digital
128 can be embedded entirely into the image, photograph together and then create a hash file
without the loss of image integrity. This unique that can be safely stored in a database. This hash
"image-in-image" watermarking technique has file is unique to and can only be decoded with
already been filed for an international patent and the original photograph and associated personal
is currently under pending status. The record. Tampering with any one of these files
performance of any watermarking technique is will render the decoding process ineffective. The
essentially a direct tradeoff between image database administrator will be able to determine
integrity and robustness of the watermark. Figure whether these files have been modified, by
illustrates the data flow process of the checking the original hash file with the digitized
StegMarkTM product. A GUI of StegMarkTM is photograph. An optional password is also
shown in figure 7. How robust a watermark is available to protect the hash file prior to data
depends on whether it can survive various storage. The basic operation of StegSafeTM is
"attacks" that include contrast changes, cropping, illustrated in figure 8 and a GUI sample of this
scratches, and filtering. However, the image product is shown in figure 9.
integrity of the "labelled" image must not
degrade poorly from an increased level of
robustness to these attacks. There are currently CONCLUSIONS
many exaggerating claims that some The use of digital steganography for Infosecurity
watermarking techniques can survive all kinds of in various e-commerce applications through the
image manipulation attacks. However, many of Internet has been discussed in detail in this
these attacks will destroy the watermark, simply paper. These applications include digital
because the labelled image values with the watermarking for copyright protection of
embedded watermark have now been multimedia data, digital signature authentication
significantly modified. Obviously, depending on and validation of electronic documents, digital
the watermarking techniques, some attacks can data storage and linkage for binding digitized
be defended more successful than others. photographs with personal attribute information,
StegMarkTM has been tested repeatedly with a as well as secure communication of multimedia
number of image attacks that included contrast data through open channels. Digital
stretching (reduction and sharpening), pixel steganography can provide one of the safest and
defects, low pass and high pass filtering on the unrestricted information security tools in the
image-in-image watermarking technique. The market, and is poised to advance the pace of
image watermark is able to survive most of these growth of e-commerce applications in Singapore
attacks. Although some of the image watermark and beyond.
pixels were affected, the overall structure of the
watermark remained intact and could still be
recognized. The recognition of a watermark is an
important issue as it can be used in the court of
law to defend the true ownership of the
intellectual property.
.
Digital Steganography
REFERENCES
1. Memon, N. and Wong, P.W., "Protecting
Digital Media Content", Communications of the
ACM, Vol.
41, 7, July1998
5
2. "WWW References on Multimedia
Watermarking and Data Hiding Research &
Technology",
http://www-nt.e-technik.uni-erlangen.de/
%7Ehartung/watermarkinglinks.html
3. Ho, A.T.S., "Method and Apparatus for
Camouflaging Data", PCT/SG98/00023, 18
March, 1998
4. Ho, A.T.S. and Tam, S.C., "Methods for
Embedding Image, Audio and Video
Watermarks in Digital
Data", PCT/SG98/00039, 1 June, 1998
5. Ho, A.T.S., Tam, S.C., Tan, Siong Chai, and
Yap, Lian Teck, "Methods of Digital
Steganography for
Multimedia Data", SG9803458-0, 28 October,
1998

You might also like