Professional Documents
Culture Documents
PAGE
S.No. CONTENTS NUMBER
01 Abstract 1
02 Introduction 2
03 History 3
05 Steganographic Techniques 5
06 Related Work 5
07 Problem Statement 10
08 Scope Statement 10
09 Proposed Solution 10
10 Proposed Model 11
11 References 12
“we can scarcely imagine a time when there did not exist a necessity, or at least a desire, of
transmitting information from one individual to another in such a manner as to elude general
comprehension.”[1]
With every passing by day, more and more people are switching over to fascinating on-line
i.e. “always on” communication to perform their in routine business and personal tasks. This
rapid swing from the existing time consuming complex manual procedural formalities have
forced the Government and Business communities to offer their services such as home shopping,
banking, billing, taxation etc., to public, in open and on 24/7 basis.
The gigantic global network of inter connected computer systems, commonly known to
people as Internet and composed of expensive gadgetry and software services, is a vital source of
this drift.
However, the above fascinating and instantly available on line facilities are closely tied with
issues concerning availability, integrity, confidentiality and authentication of information
exchanged over communication media which has lead to the evolution of information hiding
techniques such as Cryptography and Steganography, for secure on and off line communication.
Steganography, which dates back to the time of ancient Greeks, has also found its way into
the field of Computer Science and is effectively being used alone or together with cryptography.
The evolution of NL has opened up doors for the technological revolution which has
brought dramatic changes in the lives of people all over the world. One of such changes is the
introduction of Internet for public which, originally developed for military usage, has grown
in to a gigantic global system of interconnected computer networks.
The development of Internet for the military is just a glimpse of the security concern
associated with communication which is, and has remained a serious concern of both, the
public and private sectors alike.
Over the ages, miscellaneous data hiding techniques have been evolved to protect
confidential information from falling into the hands of hostile, which can be classified into
two broad categories namely Cryptography and Steganography.
2. History
The word Steganography is derived from the Greek which means covered (or hidden)
writing. While Cryptography concerns itself with making the intelligible information as un-
intelligible, Steganography hides the existence of that information.
The recent interest in Steganography should not be linked up with the publication of the
NEWS in USA Today of the year 2000 which stated that terrorists might be using
steganography for concealing their secrets from the law enforcing agencies. The history of
steganography dates back to fifth century B.C. where in Greece, it was exercised by the
prisoners of King Darius. Another famous quoted technique is that of tattooing of a secret
message over the shaved scalp of a slave. After some time when the hair of the salve grew,
he was sent to the destination where his head was again shaved for reading the camouflaged
message. Germans showed masterly expertise in World War II. With ‘microdot’ technique,
messages were photographed and reduced to size as small as a period (full stop) [3][4].
The fascinating attribute attached with digital text documents is the fact that these are
written, saved and retrieved by the personal computer in a manner as is seen by the necked
eye. This is contrary to the mechanics of other digital file formats like image, video, audio
etc. where the information saved in computer is different from that, which is retrieved.
Various techniques for hiding data in text file exist. It is, however, worth to mention that
Text steganography is considered as the most challenging of all since it involves zero
overhead of meta data often used for hiding information [7].
A number of protocols and different data embedding techniques exist that enable us to
hide information in a given object. However, all of the protocols and techniques must satisfy
following requirements so that correct steganography can be applied. The following lists
requirement that all steganography techniques must adhere:
Ph.D. Thesis Proposal 4 By: KHAN FARHAN RAFAT
3.1 The integrity of the hidden information after it has been embedded inside the stego
object must remain intact.
3.2 The stego object must remain unchanged or almost unchanged to the naked eye.
3.3 It is assumed that attacker knows that secret data is hidden inside the stego object.
4. STEGANOGRAPHIC TECHNIQUES
A number of available digital media including Text, Image, Audio, Video Files together
with other types are being used for hiding secret information.
5. RELATED WORK
Table 1
Acronym Translation
l8 Too late
C See
CM Call Me
In this method words can be substituted with their abbreviations to represent the
binary bit pattern of zero or one corresponding to the bits of secret information.
Table 2
Favorite Favourite
Criticize Criticise
Fulfill Fulfil
Table 3
Big Large
Small Little
Chilly Cool
Smart Clever
Spaced Stretched
Synonym substitution of words is used to hide the binary bits of secret information.
The synonym substitution may represent a single or multiple bit combination for the
secret information.
HTML Tags can be used in varying combination or as gaps and horizontal tabulation
to represent a pattern of secret information bits.
5.4.1 Using white space in tags
Stego key:
<user >
<name>Alice</name >
<id >01</id>
</user>
Stego data:
<img src=”foo1.jpg”></img>
<img src=”foo2.jpg”/>
<img src=”foo3.jpg”/>
<img src=”foo4.jpg”/>
<img src=”foo5.jpg”></img>
5.6. IPv4 [20]
Figure 2
Figure 2 shows how the IP (version 4) header is organized. Three unused bits have
been marked (shaded) as places to hide secret information. One is before the DF and
MF bits and another unused portion of this header is inside the Type of service field
which contains two unused bits (the least significant bits).
5.7. The Transport Layer [[20]
Figure 3
Figure 4
This method hides information by shifting the text lines to some degree to represent
binary bits of secret information.
Figure 5
Here, the distance between words is altered to hide bits of secret information.
This method hides the secret information bits by associating certain attributes to the
text characters.
This method makes use of change tracking technique of MS Word for hiding
information, where the stego-object appears to be a work of collaborated writing.
The bits to be hidden are first embedded in the degenerated segments of the cover
document. This is followed by the revision of degenerated text thereby imitating it
as being an edited piece of work.
6. PROBLEM STATEMENT
6.1 All of the existing text based encoding methods either require original file or the
knowledge of the original files formatting to be able to decode the secret
message.
6.2 Adding spaces between words and lines or HTML tags or Inserting data past end
of file mark Increases File length and are equally eye catching.
7. SCOPE STATEMENT
8. PROPOSED SOLUTION
[2]. Elements of Cryptography – 6th Edition (Student edition). Arthur H. Robinson, joel L.
Morison, Phillip C. Muehrcke, A. John Kimerling, Stephen C. Guptill, ISBN – 9-814-
12638-1
[4]. Steganography 2nd Lt. James Caldwell, U.S. Air Force, 2003, www.stsc.hill.af.mil , last
accessed November 14, 2008.
[5]. Algorithms for Audio Watermarking and Steganography Nedeljko Cvejic, University
of Oulu 2004.
[7]. Techniques for data hiding W. Bender, D. Gruhl, N. Morimoto, and A. Lu, IBM Systems
Journal, Vol. 35, Issues 3&4, pp. 313-336, 1996.
[12].Document Marking and Identification using Both Line and Word Shifting S. H. Low
N. F. Maxemchuk J. T. Brassil L. O'Gorman, AT&T Bell Laboratories, Murray Hill NJ
07974, 0743-166W95-1995 IEEE
[15].A New Steganographic Method for Data Hiding in Microsoft Word Documents by a
Change Tracking Technique Tsung-Yuan Liu, Wen-Hsiang Tsai,and Senior Member,
1556-6013 © 2007 IEEE
[19].Steganography: A New Horizon for Safe Communication through XML Aasma Ghani
Memon, Sumbul Khawaja and Asadullah Shah. Isra UniversityHyderabad, Pakistan.Journal
of heoretical and Applied Information Technology ©2005 – 2008