Skip to main content <#maincontent> We will keep fighting for all libraries - stand with us! Internet Archive logo A line drawing of the Internet Archive headquarters building façade. Search icon An illustration of a magnifying glass. Search icon An illustration of a magnifying glass. Upload icon An illustration of a horizontal line over an up pointing arrow. Upload User icon An illustration of a person's head and chest. Sign up | Log in Web icon An illustration of a computer application window Wayback Machine Texts icon An illustration of an open book. Books Video icon An illustration of two cells of a film strip. Video Audio icon An illustration of an audio speaker. Audio Software icon An illustration of a 3.5" floppy disk. Software Images icon An illustration of two photographs. Images Donate icon An illustration of a heart shape Donate Ellipses icon An illustration of text ellipses. More Hamburger icon An icon used to represent a menu that can be toggled by interacting with this icon. Internet Archive Audio Live Music Archive Librivox Free Audio Featured * All Audio * This Just In * Grateful Dead * Netlabels * Old Time Radio * 78 RPMs and Cylinder Recordings Top * Audio Books & Poetry * Computers, Technology and Science * Music, Arts & Culture * News & Public Affairs * Spirituality & Religion * Podcasts * Radio News Archive Images Metropolitan Museum Cleveland Museum of Art Featured * All Images * This Just In * Flickr Commons * Occupy Wall Street Flickr * Cover Art * USGS Maps Top * NASA Images * Solar System Collection * Ames Research Center Software Internet Arcade Console Living Room Featured * All Software * This Just In * Old School Emulation * MS-DOS Games * Historical Software * Classic PC Games * Software Library Top * Kodi Archive and Support File * Vintage Software * APK * MS-DOS * CD-ROM Software * CD-ROM Software Library * Software Sites * Tucows Software Library * Shareware CD-ROMs * Software Capsules Compilation * CD-ROM Images * ZX Spectrum * DOOM Level CD Books Books to Borrow Open Library Featured * All Books * All Texts * This Just In * Smithsonian Libraries * FEDLINK (US) * Genealogy * Lincoln Collection Top * American Libraries * Canadian Libraries * Universal Library * Project Gutenberg * Children's Library * Biodiversity Heritage Library * Books by Language * Additional Collections Video TV News Understanding 9/11 Featured * All Video * This Just In * Prelinger Archives * Democracy Now! * Occupy Wall Street * TV NSA Clip Library Top * Animation & Cartoons * Arts & Music * Computers & Technology * Cultural & Academic Films * Ephemeral Films * Movies * News & Public Affairs * Spirituality & Religion * Sports Videos * Television * Videogame Videos * Vlogs * Youth Media Search the history of over 835 billion web pages on the Internet. Search the Wayback Machine Search icon An illustration of a magnifying glass. Mobile Apps * Wayback Machine (iOS) * Wayback Machine (Android) Browser Extensions * Chrome * Firefox * Safari * Edge Archive-It Subscription * Explore the Collections * Learn More * Build Collections Save Page Now Capture a web page as it appears now for use as a trusted citation in the future. Please enter a valid web address * About * Blog * Projects * Help * Donate * Contact * Jobs * Volunteer * People * Sign up for free * Log in Search metadata Search text contents Search TV news captions Search radio transcripts Search archived web sites Advanced Search * About * Blog * Projects * Help * Donate Donate icon An illustration of a heart shape * Contact * Jobs * Volunteer * People Full text of "Steganography " See other formats POLYTECHNIC UNIVERSITY Department of Computer and Information Science Introduction to Steganography K. Ming Leung Abstract: This material deals with the history and an introduction to the art and science of staganography. A simple example illustrating how a large number of hidden images can be embedded within a given image. Directory e Table of Contents e Begin Article Copyright © 2000 mleung@poly.edu Last Revision Date: November 11, 2004 Table of Contents 1. Introduction 2. History and Steganography 3. Embedding Images in the LSB of an Image Section 1: Introduction 3 1. Introduction Steganography simply takes one piece of information and hides it within another.[1, 2] Computer files (images, sounds recordings, even disks) contain unused or insignificant areas of data. Steganography takes advantage of these areas, replacing them with information (en- crypted mail, for instance). The files can then be exchanged without anyone knowing what really lies inside of them. An image of the space shuttle landing might contain a private letter to a friend. A recording of a short sentence might contain your company’s plans for a secret new product. Steganography can also be used to place a hid- den ”trademark” in images, music, and software, a technique referred to as watermarking. Steganography sometimes is used when encryption is not permit- ted. Or, more commonly, steganography is used to supplement en- cryption. An encrypted file may still hide information using steganog- raphy, so even if the encrypted file is deciphered, the hidden message is not seen. Steganography (literally meaning covered writing) dates back to Toc SB | >> < > Back < Doc Doc ® Section 1: Introduction 4 ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger’s head, letting his hair grow back, then shaving it again when he arrived at his contact point. Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other works become available in digital form, the ease with which perfect copies can be made may lead to large-scale unauthorized copy- ing, and this is of great concern to the music, film, book and software publishing industries. At the same time, moves by various govern- ments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. Steganography has gained much more popularity since the Septem- ber 11 attacks on the U.S. Some people suspected that terrorists con- nected with the incidents might have used it for covert communica- Toc SB | | dd < > Back < Doc Doc ® Section 2: History and Steganography 5 tions. While no such connection has been proven, the concern points out the effectiveness of steganography as a means of obscuring data. Indeed, along with encryption, steganography is one of the fundamen- tal ways by which data can be kept confidential. Steganalysis is the detection and the task of the recovery of hidden data. 2. History and Steganography Throughout history, a multitude of methods and variations have been used to hide information. David Kahn’s ” The Codebreakers” [3] pro- vides an excellent accounting of this history. Bruce Norman recounts numerous tales of cryptography and steganography during times of war in ”Secret Warfare: The Battle of Codes and Ciphers” [4]. One of the first documents describing steganography is from the Histories of Herodotus. In ancient Greece, text was written on wax covered tablets. In one story Demeratus wanted to notify Sparta that Xerxes intended to invade Greece. To avoid capture, he scraped the wax off of the tablets and wrote a message on the underlying wood. Toc SB | >> < > Back < Doc Doc ® Section 2: History and Steganography 6 He then covered the tablets with wax again. The tablets appeared to be blank and unused so they passed inspection by sentries without question. Another ingenious method was to shave the head of a messenger and tattoo a message or image on the messengers head. After allowing his hair to grow, the message would be undetected until the head was shaved again. Another common form of invisible writing is through the use of invisible inks. Such inks were used with much success as recently as World War II. An innocent letter may contain a very different message written between the lines. Early in World War II steganographic technology consisted almost exclusively of invisible inks. Common sources for invisible inks are milk, vinegar, fruit juices and urine. All of these darken when heated. With the improvement of technology and the ease as to the de- coding of these invisible inks, more sophisticated inks were developed which react to various chemicals. Some messages had to be ”devel- oped” much as photographs are developed with a number of chemicals in processing labs. Toc SB | | dd < > Back < Doc Doc ® Section 2: History and Steganography 7 Null ciphers (unencrypted messages) were also used. The real mes- sage is camouflaged” in an innocent sounding message. Due to the ”sound” of many open coded messages, the suspect communications were detected by mail filters. However ”innocent” messages were al- lowed to flow through. An example of a message containing such a null cipher from is: Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. By taking the third letter in each word, the following message emerges: Send Lawyers, Guns, and Money. The following message was actually sent by a German Spy in World War II: Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Toc SB | >> < > Back < Doc Doc ® Section 2: History and Steganography 8 Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges: Pershing sails from NY June 1. Note that i represents 1 in Roman numerals. As message detection improved, new technologies were developed which could pass more information and be even less conspicuous. The Germans developed microdot technology which FBI Director J. Edgar Hoover referred to as ’the enemy’s masterpiece of espionage.” Microdots are photographs the size of a printed period having the clarity of standard-sized type- written pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941. The message was not hidden, nor encrypted. It was just so small as to not draw attention to itself (for a while). The information can be read by the intended recipient using a microscope. With many methods being discovered and intercepted, the Office of Censorship took extreme actions such as banning flower deliveries Toc SB | >> < > Back < Doc Doc ® Section 2: History and Steganography 9 which contained delivery dates, crossword puzzles and even report cards as they can all contain secret messages. Censors even went as far as rewording letters and replacing stamps on envelopes. With every discovery of a message hidden using an existing ap- plication, a new steganographic application is being devised. There are even new twists to old methods. Drawings have often been used to conceal or reveal information. It is simple to encode a message by varying lines, colors or other elements in pictures. Computers take such a method to new dimensions as we will see later. Even the layout of a document can provide information about that document. There is a series of publications dealing with docu- ment identification and marking by modulating the position of lines and words. Similar techniques can also be used to provide some other *covert” information just as 0 and 1 are informational bits for a com- puter. As in one of their examples, word-shifting can be used to help identify an original document. A similar method can be applied to display an entirely different message. Take the following sentence (SO), produced for example in HTML: Toc SB | >> < > Back < Doc Doc ® Section 2: History and Steganography 10
 

 
We explore new steganographic and cryptographic 
algorithms and techniques throughout the world to 
produce wide variety and security in the electronic 
web called the Internet. 

and apply some word shifting algorithm (S1) to produce the sen- tence in HTML format:
 
 
We   
explore 
   
new steganographic and cryptographic algorithms 
and techniques throughout 
   
the world 


Toc << >> < > Back << Doc Doc ® 


Section 2: History and Steganography 11 


   

to produce 

   

wide 

   

variety and security in the electronic 

   

web 

   

called the Internet. 
This is achieved by expanding the space before explore, the, wide, and web by one point and condensing the space after explore, world, wide and web by one point in sentence $1. Independently, the sentences containing the shifted words appear harmless, but com- bining this with the original sentence produces a different message: explore the world wide web. Toc << >> < > Back << Doc Doc ® Section 3: Embedding Images in the LSB of an Image 12 3. Embedding Images in the LSB of an Image We illustrate here how secret images can be embedded in the least significant bits of a seemingly harmless image. In the following Matlab program that was adopted from Moler,|[5] A is a 64 x 64 matrix containing double precision real numbers for an image. The numbers are all scaled to lie between 0 and 1. We can use the Matlab function imagesc to display it as a 32-bit gray scale image. It turns out that hidden in the less significant bits of the original data are numerous other images. They can be extracted in Matlab in the following way. Consider a particular element, say a, of matrix A. Since a lies between 0 and 1, it has a sign of +1 and an exponent FE =0, and can therefore be represented as dy | dp dsa tote + oS. a SY: 252 Toc SB | >> < > Back < Doc Doc ® Section 3: Embedding Images in the LSB of an Image 13 Note that for arbitrary integers n and m, where n > m and m > 0, [2"a| = |do2” + dy2~) +--+ 4+ dp2° + dygi 27) + +++ d5q2"-*? | = apt +02" 7 fo +,2", and so wu = mod (|2"a|,2"-*") a rt pea) = d,2°°" + d,2”. The maximum value of u is 2"~”+1! — 1, and its minimum is 0. Thus v =u+1 has maximum value 2"~™*! and minimum value 1. The resulting matrix U can therefore be displayed as a (n — m + 1)-bit gray scale image. Here we can obtain a total of 16 images by selecting m from the array p=(|l 6 11 16 17 18 19 20 25 30 35 36 40 44 48 52), Toc SB | >> < > Back < Doc Doc ® Section 3: Embedding Images in the LSB of an Image 14 and n from the array q=([5 10 15 16 17 18 19 24 29 34 35 39 43 47 51 52). The complete Matlab program is show below. % steganall2.m % modified from steganall.m written by C. Moler. % Steganography: Here are all images hidden in the % default CDATA for the IMAGE command. p= [1 6 11 16 17 18 19 20 25 30 35 36 40 44 48 52]; q = [5 10 15 16 17 18 19 24 29 34 35 39 43 47 51 52]; clf % clear current figure. image % returns a handle to an IMAGE object. imageh = get(gca,’child’); % A is a 64x64 matrix with values in [0 1]. A = get(imageh, ’cdata’)/32; clf shg Toc << >> < > Back << Doc Doc ® Section 3: Embedding Images in the LSB of an Image colormap (gray (32)) ; bigscreen; % Image obtained from the entire original data: subplot (1,2,1); imagesc(A); title(’Image from the full data’); axis image; axis ij; axis off; % This shows the image obtained using only % the top most significant bit of the data: subplot (1,2,2); m= 1; n=5; U = mod(floor(27n*A) ,27 (n-m+1)) ; V = Uti; imagesc(V) %Scale data and display as image title([int2str(m) ’:’ int2str(n)]) axis image; axis ij; axis off; Toc > < > Back < Doc 15 Doc Section 3: Embedding Images in the LSB of an Image 16 pause; % The following shows that 15 other images are % secretly embedded in the original one. for k = 1:16 subplot (4,4,k) m = p(k); n = q(k); U = mod(floor(27n*A) ,27 (n-m+1)); V = Ut1; imagesc(V) %Scale data and display as image title([int2str(m) ’:’ int2str(n)]) axis image; axis ij; axis off; end Toc > < > Back << Doc Doc ® Section 3: Embedding Images in the LSB of an Image 17 References [1] Neil F. Johnson, Zoran Duric, and Sushil G. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Counter- measures (Advances in Information Security, Volume 1), Kluwer Academic Publishers, 2001. 2| Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley, 2003. 3] David Kahn, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, An authoritative history of cryptography in general. 4] Bruce Norman, Secret Warfare: The Battle of Codes and Ciphers, Borgo Press, 1990. 5] The Matlab program was adopted from C. Moler, Numerical Computing with Matlab at the Mathworks site. Toc SB | >> < > Back < Doc Doc ® Section 3: Embedding Images in the LSB of an Image 5 18