Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for example by civil rights organisations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else’s knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The initial aim of this study was to investigate steganography and how it is implemented. Based on this work a number of common methods of steganography could then be implemented and evaluated. The strengths and weaknesses of the chosen methods can then be analysed. To provide a common frame of reference all of the steganography methods implemented and analysed used GIF images. Seven steganography methods were implemented. The methods were chosen for their different strengths in terms of resistance to different types of steganalysis or their ability to maximise the size of the message they could store. All of the methods used were based on the manipulation of the least significant bits of pixel values or the rearrangement of colours to create least significant bit or parity patterns, which correspond to the message being hidden.
[1]
Nick Efford,et al.
Digital Image Processing: A Practical Introduction Using Java
,
2000
.
[2]
Hannes Federrath,et al.
Modeling the Security of Steganographic Systems
,
1998,
Information Hiding.
[3]
Peter Wayner.
Chapter one – Framing Information
,
2002
.
[4]
Jiri Fridrich,et al.
Secure Steganographic Methods for Palette Images
,
1999,
Information Hiding.
[5]
Jiri Fridrich.
A New Steganographic Method for Palette-Based Images
,
1999,
PICS.
[6]
James D. Murray,et al.
Encyclopedia of graphics file formats
,
1994
.
[7]
James D. Murray,et al.
Encyclopedia of graphics file formats, 2nd Edition
,
1996
.
[8]
Peter Wayner,et al.
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
,
2002
.
[9]
Andreas Pfitzmann,et al.
Attacks on Steganographic Systems
,
1999,
Information Hiding.
[10]
Ross Anderson,et al.
Information hiding terminology
,
1996
.
[11]
Sushil Jajodia,et al.
Steganalysis of Images Created Using Current Steganography Software
,
1998,
Information Hiding.
[12]
Mark R. Nelson,et al.
LZW data compression
,
1989
.
[13]
Sushil Jajodia,et al.
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
,
2000,
IH 2012.