session 05_paper 79

Upload: nicholas-dawson

Post on 02-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 Session 05_Paper 79

    1/21

    Department of Computer Science and Engineering, Lovely Professional University, Phagwara, 144 402, PB, India

    Abstract

    1. Introduction

    Cryptography

    Steganography

  • 8/11/2019 Session 05_Paper 79

    2/21

    NSumit Mittu and Rajeev Sobti

  • 8/11/2019 Session 05_Paper 79

    3/21

    Conveying secret messages through album art in MP3 files

    2. Steganography Types and Evolution

    2.1.Types of Steganography

    image steganography

    audio steganography

    protocol

    steganography

    2.2.Evolution of Steganography

  • 8/11/2019 Session 05_Paper 79

    4/21

    NSumit Mittu and Rajeev Sobti

    Apparently neutrals protest time is thoroughly discounted and ignored. Isman hard hit.

    Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Perishingsales from NY June I

    3. Imperceptibility Requirements of Steganography Algorithms

    3.1.

    Invisibility

  • 8/11/2019 Session 05_Paper 79

    5/21

    Conveying secret messages through album art in MP3 files

    3.2.

    Payload Capacity

    3.3.Robustness against statistical attacks

    3.4.Robustness against stego file manipulation

    3.5.

    Independent of file format

    3.6.

    Unsuspicious files

    Figure 5: Imperceptibility Requirements of Steganography Algorithms

    4. Image Steganography Techniques

  • 8/11/2019 Session 05_Paper 79

    6/21

    NSumit Mittu and Rajeev Sobti

    4.1.Direct methods

    4.2.Spatial or Image domain methods

    4.3.

    Frequency or Transform domain methods

    4.4.

    Adaptive steganography methods

  • 8/11/2019 Session 05_Paper 79

    7/21

    Conveying secret messages through album art in MP3 files

    5. LSB Substitution Method

  • 8/11/2019 Session 05_Paper 79

    8/21

    NSumit Mittu and Rajeev Sobti

    This research yields as one of its outcomes a set of pattern based LSB algorithms which are relatively difficult

    to detect than the basic LSB substitution algorithms. These algorithms have been named as the SMart LSBPattern Substitution algorithms.

    6. Audio Steganography Techniques

    6.1.

    The MP3Stego algorithm[8]

    o

    o

    7. SMart LSB Pattern Substitution Algorithms

    Bhandham

    7.1.SMart LSB Patterns

  • 8/11/2019 Session 05_Paper 79

    9/21

    Conveying secret messages through album art in MP3 files

    7.2.Hiding capacity

  • 8/11/2019 Session 05_Paper 79

    10/21

    NSumit Mittu and Rajeev Sobti

    7.3.Algorithm for generating stego bitmap

    Step 1.

    Step 2. Step 3. Step 4.

    Step 5. Step 6. Step 7. Step 8.

    Step 9.

    Step 10.

    7.4.Algorithm for extracting secret text from stego bitmap

    Step 1. Step 2. Step 3.

    Step 4.

    Step 5. Step 6.

    8. SMart LSB Software Tool

    SMart LSB SMart LSB Pattern Substitution

    8.1.Stego Generator

    o o o

  • 8/11/2019 Session 05_Paper 79

    11/21

    Conveying secret messages through album art in MP3 files

    o o o o

    o

    o

    8.2.

    Stego Extractor

    o width o height o file size o maximum hiding capacity o size of data actually hidden in stego bitmap

    Extract Secret Message

    o o

    Save secret text to file

    9. Conveying Secret Messages through Album Art inMP3 Files Modus Operandi

    9.1.The Basic Process

    SMart LSB Pattern Substitution

    Algorithms SMart LSB

    ID3 Tag Editor

  • 8/11/2019 Session 05_Paper 79

    12/21

    NSumit Mittu and Rajeev Sobti

    stego media ID3 Tag Editor

    stego bitmap SMart LSB tool

    9.2.

    Step-by-step

    Step 1. secret.txt

    Step 2. experiment.bmp

    Step 3. SMart LSB Hide Secret Message into an Image Stego Generator

    Read Secret Message from an Image Stego Extractor About SMart LSB tool Get me out of here!!!

    Step 1.

    Step 2.

    Browse cover bitmap image secret text file

  • 8/11/2019 Session 05_Paper 79

    13/21

    Conveying secret messages through album art in MP3 files

    Step 3. Hiding Capacity Step 4.

    Generate Stego Image stego bitmap

    Step 5. ID3 Tag EditorStep 6. Load

    Step 7. Add new

    Step 8. Picture Type Save

    Step 9. Album Art

    Windows Media Player, VLC Media Player, Winamp

    Step 10. On receiving end ID3 Tag Editor Load MP3 file

  • 8/11/2019 Session 05_Paper 79

    14/21

    NSumit Mittu and Rajeev Sobti

    Step 11. album art image Save stego_image.bmp

    Step 1.

    Step 2. Browse

    stego_image.bmpStep 3. Extract Secret Message Step 4. Save secret text to file

  • 8/11/2019 Session 05_Paper 79

    15/21

    Conveying secret messages through album art in MP3 files

    10. Interpretation of Results

    10.1.Invisibility

    10.2.

    Payload Capacity

    10.3.Robustness against statistical attacks

    10.4.Robustness against stego file manipulation

    10.5.Independent of File format

  • 8/11/2019 Session 05_Paper 79

    16/21

    NSumit Mittu and Rajeev Sobti

    10.6.

    Unsuspicious Files

    11. Comparison of Results

    low medium high

    low

    high

    medium

    11.1.

    Payload Capacity

    Very High

  • 8/11/2019 Session 05_Paper 79

    17/21

    Conveying secret messages through album art in MP3 files

    11.2.Invisibility of secret data

    11.3.

    Unsuspicious files

    11.4.

    Robustness against statistical attacks

    11.5.

    Independence of file formats

  • 8/11/2019 Session 05_Paper 79

    18/21

    NSumit Mittu and Rajeev Sobti

    12. Conclusion and Future Scope

    o

  • 8/11/2019 Session 05_Paper 79

    19/21

    Conveying secret messages through album art in MP3 files

    References

    Proc. First Intl Workshop Information Hiding, Lecture Notes inComputer Science No. 1,174, Springer-Verlag

    Proc. Fifth Annual InformationSecurity South Africa Conference (ISSA2005)

    Signal Processing 90 Elsevier

    IEEE Computer 31 (2)

    Pour la Science 229 online

    International Journal of Computer Science And Security (IJCSS)

    International Journal of AdvancedResearch in Computer Science and Software Engineering (IJARCSSE)

    online

    International Journal of Engineering and Technology

    online

    online

    online

    online

    LNCS

    IEEE Security & Privacy Magazine

    IEEE

    IEEE

    International Journal of

    Computer Applications (0975 8887)

    IEEE

    IEEE Transactions on ImageProcessing,

    A thesis in

    Information Sciences and Technology

    Proc. of Sixth National Conference on Science and Technology ofNational Defense

    online

  • 8/11/2019 Session 05_Paper 79

    20/21

    Index

    A

    Audio steganography techniques

    MP3Stego algorithm, 585

    C

    Cryptography, 578concept of, 579

    I

    Image steganography techniques, 582adaptive steganography methods, 583584

    direct methods, 583

    frequency/transform domain methods, 583spatial/image domain methods, 583

    L

    LSB substitution method, 584585

    M

    MP3 filesbasic process, 588589

    step-by-step, 589591

    S

    SMart LSB software toolalgorithm for generating stego bitmap, 587

    file format, independent of, 592

    hiding capacity, 586

    invisibility, 592MP3 and BMP unsuspicious files, 593

    payload capacity, 592

    results comparison of, 593

    594robustness against statistical attacks, 592

    stego extractor, 588

    stego generator, 587588Steganography

    algorithms, imperceptibility requirements of, 581582concept of, 579

  • 8/11/2019 Session 05_Paper 79

    21/21

    types and evolution, 580581

    Stego extractor, 588Stego generator, 587588