Steganography: Definition
Steganography: Definition
Steganography: Definition
1. Introduction
Definition:
Steganography is the technique of hiding secret data within an ordinary, non-
secret, file or message in order to avoid detection; the secret data is then extracted
at its destination. The use of steganography can be combined with encryption as an
extra step for hiding or protecting data. The word steganography is derived from
the Greek words steganos (meaning hidden or covered) and the Greek root graph
(meaning to write).
Steganography can be used to conceal almost any type of digital content, including
text, image, video or audio content; the data to be hidden can be hidden inside
almost any other type of digital content. The content to be concealed through
steganography -- called hidden text -- is often encrypted before being incorporated
into the innocuous-seeming cover text file or data stream. If not encrypted, the
hidden text is commonly processed in some way in order to increase the difficulty
of detecting the secret content.
Steganography is practiced by those wishing to convey a secret message or code.
While there are many legitimate uses for steganography, malware developers have
also been found to use steganography to obscure the transmission of malicious
code.
Forms of steganography have been used for centuries and include almost any
technique for hiding a secret message in an otherwise harmless container. For
example, using invisible ink to hide secret messages in otherwise inoffensive
messages; hiding documents recorded on microdot -- which can be as small as 1
millimeter in diameter -- on or inside legitimate-seeming correspondence; and even
by using multiplayer gaming environments to share information.
2. Key Differences Between Steganography and
Cryptography
1. The meaning of the steganography is “covered or hidden writing” while
cryptography signifies “secret writing”.
2. Steganography is an attempt to achieve secure and undetectable
communication. On the other hand, cryptography intends to make the
message readable for only the target recipient but not by others through
obtaining a disguised form of the message.
3. In steganography, the main structure of the message is not changed whereas
cryptography imposes a change on the secret message before transferring it
over the network.
4. The cryptography is prevalently used unlike steganography, which is not so
familiar.
5. The degree of the security of the secret data is measured by the key length
which makes the algorithm strong and unbreakable. Conversely, there is no
such thing in steganography.
6. Steganography provides only confidentiality and authentication. On the
contrary, the principles of security provided by the cryptography are
confidentiality, integrity, authentication, and non-repudiation.
7. Spacial domain, transform domain embedding and model-based are some of
the algorithms used in steganography. In contrast, the cryptography uses
techniques named as trans-positional, substitution, stream and block ciphers.
8. The steganography can be employed on any medium such as text, audio,
video, and image while cryptography is implemented only on the text file.
9. The reverse engineering employed to decode the message in cryptography is
known as cryptanalysis. As against, the technique used to detect the presence
of the steganography is known as steganalysis.
3. Pure Steganography
Pure Steganography is defined as a steganographic system which does not require
the exchange of a cipher such as a stego-key. This method of is not much secure
because the sender and receiver can rely only upon the assumption that no other
parties are aware of the secret message.
6. Types of Steganography
1. Text Steganography: Hiding information in text is the most important method
of steganography. The method was to hide a secret message in every nth letter of
every word of a text message. After booming of Internet and different type of
digital file formats it has decreased in importance. Text steganography using
digital files is not used very often because the text files have a very small amount
of redundant data.
2. Image Steganography: Images are used as the popular cover objects for
steganography. A message is embedded in a digital image through an embedding
algorithm, using the secret key. The resulting stego image is send to the receiver.
On the other side, it is processed by the extraction algorithm using the same key.
During the transmission of stego image unauthenticated persons can only notice
the transmission of an image but can’t guess the existence of the hidden message.
3. Audio Steganography: Audio stenography is masking, which exploits the
properties of the human ear to hide information unnoticeably. An audible, sound
can be inaudible in the presence of another louder audible sound. This property
allows to select the channel in which to hide information.
4. Protocol Steganography: The term protocol steganography is to embedding
information within network protocols such as TCP/IP. We hide information in the
header of a TCP/IP packet in some fields that can be either optional or are never
used.
8. Steganalysis
Steganalysis is the study of detecting messages hidden using steganography; this is
analogous to cryptanalysis applied to cryptography.
The goal of steganalysis is to identify suspected packages, determine whether or
not they have a payload encoded into them, and, if possible, recover that payload.
Unlike cryptanalysis, in which intercepted data contains a message (though that
message is encrypted), steganalysis generally starts with a pile of suspect data files,
but little information about which of the files, if any, contain a payload. The
steganalyst is usually something of a forensic statistician, and must start by
reducing this set of data files (which is often quite large; in many cases, it may be
the entire set of files on a computer) to the subset most likely to have been altered.
9. Conclusion
Steganography is not intended to replace cryptography but supplement it. Hiding a
message with steganography methods reduces the chance of a message being
detected. However, if that message is also encrypted, if discovered, it must also be
cracked. There are an infinite number of steganography applications.
Steganography does not only pertain to digital images but also to other media (files
such as voice, other text and binaries; other media such as communication
channels, the list can go on and on).
steganography is not a good solution to secrecy. If a message is encrypted using
substitution (substituting one alphabet h another), permute the message (shuffle the
text) and apply a substitution again, then the encrypted ciphertext is more secure
than using only substitution or only permutation. NOW, if the ciphertext is
embedded in an image, video, voice, etc. it is even more secure. If an encrypted
message is intercepted, the interceptor knows the text is an encrypted message.
With steganography, the interceptor may not know the object contains a message.
10. References
- Jayaram P, Ranganatha H R, Anupama H S, " Information Hiding Using Audio
Steganography – A Survey" in The International Journal of Multimedia & Its
Applications (IJMA) Vol.3, No.3, August 2011
- Jammi Ashok, Y. Raju, S. Munishankaraiah, K. Srinivas "Steganography: An
Overview" in International Journal of Engineering Science and Technology Vol.
2(10), 2010
- Pratap Chandra Mandal Modern "Steganographic technique: A survey" in
International Journal of Computer Science & Engineering Technology (IJCSET)