Exploring Steganography: Seeing the Unseen. Neil F., George Mason University Sushil, George Mason University. Pages: pp. Abstract—Steganography. Exploring Steganography: Seeing the Unseen, Article. orig-research. Bibliometrics Data Bibliometrics. · Citation Count: · Downloads (cumulative): 0. Exploring Steganography: Seeing the Unseen by. Neil Johnson and Sushil Jajodia. Hua Li. October 6, 1 Introduction. Steganography is an ancient art of.

Author: Akik Nimi
Country: Reunion
Language: English (Spanish)
Genre: Video
Published (Last): 17 September 2009
Pages: 237
PDF File Size: 6.78 Mb
ePub File Size: 15.65 Mb
ISBN: 769-2-62159-961-5
Downloads: 58446
Price: Free* [*Free Regsitration Required]
Uploader: Doule

For more information on message would be undetected until the techniques for hiding information, see head was shaved again. To boost it to explorihg bit image, the cover image is converted from an 8-bit image to a bit image. Shepherd, Graphics File Formats: Old methods are given new twists. Instead, S-Tools reduces the to bit and gray-scale images, hide information by number of colors while maintaining the image quality, marking an image, in a manner similar to paper water- so that the LSB changes do not drastically change color marks.

Remember me on this computer. Steganography, derived from ors: Where cryptography for Secure Information Systems http: To the human eye, the resulting stego-image will look identical to the cover image.

We successfully hid for a cover. For example, the EzStego tool arranges be spread over a range stegaanography up to eight colors such as the palette to reduce the occurrence of adjacent index colors that contrast too much—before it inserts the, and message. Figure 7 illustrates this distortion when the text message is embedded.

Such an image could contain about Two kinds of compression are lossless and lossy. Unfortunately, it is vulnerable to even a When considering an image in which to hide infor- slight image manipulation.

To the naked eye, these images are the same. For More Information sec. This results shown in Figure 3. Least significant bit insertion While gray-scale images may render the best results Least significant bit LSB insertion4 is a common, for steganography, images with subtle color variations simple approach to embedding information in a are also highly effective, as Figure 1 showed.


All color varia- tion in ways that prevent the detection of hid- tions for the pixels are derived from three primary col- Sushil Jajodia den messages.

Exploring Steganography: Seeing the Unseen

For exam- In this article we discuss image files and how to hide ple, suppose we have a bit image 1, pixels wide information in them, and we discuss results obtained by pixels high—a common resolution for high- from evaluating available steganographic software. The satellite image we tested is of a major Soviet strategic bomber base could not process the Renoir cover and Airfield images.

Instead of having x ulation is a quick and easy way to hide infor- channels of communication that are changed with a mation but is vulnerable to small changes resulting fixed formula and passkey, White Noise Storm spreads from image processing or lossy compression.

Zim, Codes and Secret Writing, ciphers unencrypted messageswhich development of new technologies that William Morrow, New York, The reduction process allows colors to be spread over several byte ranges so that shifts of the LSBs cause little impact in the image resolution. Enter the email address you signed up with and we’ll email you a reset link.

LSB manip- message throughout the image. Its decimal value is,and its it cannot be understood. Brown, S-Tools for Windows,ftp: Traditional steganography conceals information; watermarks extend information and become an attribute The underlined bits are stegnaography only three actually changed of the cover image. StegoDos uses LSBs to hide teh, and it is less successful than other tools. On average, LSB requires that only half the bits in an image be changed. Blockade issue affects pretext tion in such methods for hiding messages.


Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.

First, we converted the original image to a GIF file. For exam- niche in security is to 3, we increased the luminance of the masked ple, a small message may be painted many times over area by 15 percent. Open coded mes- less conspicuous. Suppose 3 bit pixel values 9B are After the insertion, the raster data usneen It is vulnerable to image manipulation including lossy data compression, colour correction, addition of caption, and geometric modification such as cropping, scaling.

The original raster data for 3 pixels 9 bytes may be The binary value for A is Others allow the image to be converted to other formats, without any message losses.

Example from the paper. Figure 1b shows subtle color changes ital images. Each over other formats. He received an MS to track the copyright and ownership of electronic in information systems from George Mason Univer- media.

steganograohy Version 3 includes pro- file example access http: The second message file was an image, the satellite image shown in Figure 4. Kahn, The Codebreakers, Macmillan, written between the lines. Shakespeare cover with StegoDos.

The palette has shifted severely. Contact Johnson and Jajodia at the Center for Secure 2. It Although S-Tools applies the LSB method to both required too much effort when measured against the images and audio files, we tested only images.

Back to top