Steganography
Steganography
Max Weiss
Insertion-based techniques hide data in sections 3.2 Embedding Data in a JPEG Image
of a file that are ignored by the processing
application and do not modify those bits that Because the JPEG file format is compact and
determine the contents of a file that are relevant does not significantly degrade the quality of an
image it is in frequent use on the internet. The the ownership of an entity. Digital watermarking
JPEG format uses a discrete cosine transform is a means by which an image is marked such
(DCT) to identify 64 DCT coefficients in that the owner of a file can rightfully identify any
successive 8x8 pixel blocks. Of these quantized instance of that file to be his own. For example,
coefficients, the least significant bits are used to companies that sell photographs for use in
embed data. Because modifications to these bits websites or advertisements can embed
affect pixel frequency as opposed to spatial watermarks in sample pictures to identify
structure (as in GIF images where image whether or not a photograph in use has been paid
structure information is present at every bit for or not. There has also been significant recent
layer), no obvious distortion is present. research into “fingerprinting” (hidden serial
numbers or a set of characteristics that tend to
4 Shortcomings of Steganography distinguish an object from other similar objects).
In general, fingerprints can be used to detect
Because steganography has gained popularity copyright violators while watermarks can be
only in the past decade, there are many flaws and used to prosecute them.
vulnerabilities that still need to be addressed.
Consequently, new steganography technologies 5.1 Invisible Watermarks
are being released with increased frequency.
There are two forms of digital watermarks:
4.1 Revealing the Existence of Hidden visible and invisible. A visible watermark simply
Data overlays a copyright notice on the original image.
An invisible watermark is the manifestation of
Because steganography modifies an existing file steganography used to embed copyright
that is most likely in circulation on the internet, a information into the file itself without altering its
bitwise comparison of a given file with the visual representation. Steganography can be used
“same” file suspected of containing hidden to either embed text information into an image,
information can reveal use of steganography. or to alter a pattern of bits to form a uniformly
Additionally, two communicating parties can be distributed pattern in the image pixels
easily identified as communicating covertly if indistinguishable by the human eye.
files that normally would not be exchanged
suddenly are. For example, two business 5.2 Steganography with a Slightly
executives frequently exchanging photographs of Different Goal
cars over a period of time could arouse suspicion.
Watermarks do not conform entirely to the
4.2 Rendering Hidden Data Useless paradigms of steganography. While conventional
steganography is based on the idea of hiding as
Once a file is identified as possibly containing much data as possible, digital watermarks tend to
hidden data, one can either attempt to recover the be small. Conventional steganography also
information if the algorithm is known, or to emphasizes the secrecy of the data to be hidden
destroy the data without affecting the quality of and transmitted. Even if an invisible watermark
the original file. An altered bitmap converted to cannot be visually identified, the knowledge that
JPEG would compress the file and remove one exists is enough to discourage potential
unnecessary bits of information, therefore copyright violators.
removing any hidden data. Converting to any
other format may not necessarily cause the image 5.3 Defeating Digital Watermarking
to lose information, but would change the bit
composition of the data, making any hidden data As with other files embedded using
unreadable. steganography, images containing digital
watermarks can be made “clean” by simply
5 Practical Steganography: Digital converting the file to another file format, and
Watermarking back to the original format if desired. One
publicly available tool written by Fabien
Now that the majority of information takes on a Petitcolas (University of Cambridge, Microsoft
digital form, it has become increasingly Research) called StirMark was written to crack
necessary to provide a means by which such several watermarking schemes including
information can be easily identified to be under PictureMarc, SysCoP, JK_PGS, SureSign,
EIKONA-mark, Echo Hiding, and the NEC yi = n2i
method. StirMark can apply a uniformly
distributed jitter pattern on an image, which allows one to calculate the chi-square value
confuses most watermark detecting software. A v+1
more sophisticated attack performed by StirMark x2 = Σ ((yi - yi*)2 / yi*)
introduces a slight yet significant distortion in i=1