Hiding Messages in Pictures
Hiding Messages in Pictures
Steganography is all the techniques used to exchange secret messages without drawing attention. It is the science of hiding informatiSome of the old school methods to hide information are: invisible ink, null ciphers, microdots or the use of pinpricks, deliberate misspelling or slightly different font to mark certain words in messages and on maps.
Modern steganography refers to hiding information in digital images, audio files or even video. There are many methods and tools to do that. Nevertheless, and to have double protection, secret messages are first encrypted and then hidden using a steganography tool. The steganographic process can be described with the following formula: Cover medium + Data to hide + Stego key* = Stego Medium * Note that if no encryption is added, there is no need for a Stego key
To reveal the stored message, the LSBs are extracted alone from the Stego Medium and combined together. Watermarking (digital watermarking) Whenever there is a topic about steganography now a day, Digital Watermarking is also mentioned. It refers to embedding hidden messages as well, but not for the purpose of sending secret information. Instead, Watermarking is usually used for the following: 1. Copyright protection: include ownership information. 2. Copy protection: include instructions to stop data copying devices from making and distributing copies of the original. 3. Prove data authenticity. 4. Tracking: If copies of a file are distributed illegally, the source can be revealed if the master copies had unique watermarks included.
Conclusion note
5. The references at the end of this article are quite informative, have a go on them in your free time if you are looking for more details.
References
6. [1] Introduction to Steganography. [cited 2010 Jan 08]; Available from: 7. http://www.infosyssec.com/infosyssec/Steganography/menu.htm 8. [2] Johnson, N. F., Duric, Z., Jajodia, S. Information Hiding: Steganography and Watermarking Attacks and Countermeasures. Kluwer Academic Press. Norwrll, MA, New York, The Hague, London, 2000. [3] Gary C. Kessler. Steganography: Hiding Data Within Data. 2001 [cited 2010 Jan 08]; Available from: 9. http://www.garykessler.net/library/steganography.html 10. [4] Steganography in Signals. [cited 2010 Jan 09]; Available from: 11. http://www.owlnet.rice.edu/~elec301/Projects01/smokey_steg/steg.html 12. [5] Steganography Analyzer Signature Scanner. [cited 2010 Jan 09]; Available from: 13. http://www.sarc-wv.com/stegalyzerss.aspx 14. [6] Gary C. Kessler. An Overview of Steganography for the Computer Forensics Examiner. [cited 2010 Jan 10]; Available from: http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm