Advertisment

Steganography: A domain beyond cryptography

author-image
CIOL Bureau
Updated On
New Update

Popularity of the Internet in the last decade gave a new life to the field of

information hiding. Extensive use of digital media like text, images, audio and

video on the Internet generated a requirement for providing traffic security. It

was found that merely concealing the contents of the message (cryptography) was

not adequate for transmitting confidential information over public networks.

What was required was an additional layer in security that conceals the very

fact that communication has taken place. This is when information hiding

techniques started to gain significance.

Advertisment

Information hiding started its development as a separate discipline under

information security with steganography as one of its main branches. It borrowed

ideas from the similar, more established disciplines like cryptology and

low-probability-of-intercept communication. With the progress in signal

processing and multimedia technologies in addition to growing security

requirements over the Internet, steganography made a noticeable impact within a

short time.

In the mid 90s research was initiated in the field of digital steganography

to provide a solution for securing multimedia communications. Steganography

deals with a host of techniques that conceals the existence of a hidden

communication. The secret message to be transmitted is camouflaged in a carrier

such that its detection becomes difficult. Information related to the sender and

the receiver of the message can also be hidden in this way. A number of cover

types are available for hiding data that include text, network packets, images,

audio and video. The secret data can be a simple textual message, an image or a

voice recording. Different techniques are available for modifying or

manipulating the cover to embed secret messages and can be broadly classified as

substitution, transform-domain and spread-spectrum techniques.

Advertisment

Substitution techniques

Substitution techniques replace the less significant parts of the cover media

with message bits to be embedded. They allow higher data capacity and low

computational complexity compared to other techniques. Moreover these techniques

can be used to hide not only text messages but also images and audio. The

disadvantage with substitution techniques is that they are not robust to attacks

and cannot sustain high levels of noise.

Advertisment

Transform-domain techniques

Advertisment

Using transform-domain techniques it is possible to embed a secret message in

different frequency bands of the cover. Popular transform-domain techniques are

Discrete Fourier Transforms (DFT), Discrete Cosine Transforms (DCT) and Discrete

Wavelet Transforms (DWT). These techniques are comparatively robust to attacks.

The disadvantages however is by embedding in these high frequencies creates less

impact on the perceivability of the media but provide low robustness to

different attacks. In contrast, embedding in the lower frequencies helps to

withstand many attacks but creates perceptible impact on the media. It is also a

relatively more expensive technique.

Spread Spectrum Steganography

Advertisment

Spread Spectrum techniques enable communication that cannot be jammed or

intercepted by tuning in to a single or a particular set of frequencies. The

frequency band that a signal occupies is spread many times so as to make

detection and removal difficult. Direct sequence (DS) and frequency hopping (FH)

spread spectrum techniques are used for information hiding. Using spread

spectrum methods the secret message is scattered throughout the cover, which has

a higher bandwidth. Hiding in images, audio and video using spread spectrum

techniques are quite robust to attacks.

In today’s networked world, steganography finds a number of important

applications, here’re a few potential applications: -

  • Network intrusions and hacking of Websites have caused huge losses to

    enterprises. Steganography can be a useful technique in protecting your

    valuable data resources.
  • Automatic audit of technical data, art, music or videos on the Internet

    can be done with steganographic techniques. Even radio programs and

    advertisements on the Internet can be subjected to such audits with these

    techniques.
  • Healthcare IT is catching up like wild fire. Steganographic techniques can

    be put to advantage here through medical imaging applications. For instance

    the patient name and details can be easily embedded in the scanned image

    without loss of quality and can be extracted later for medical verification

    from the network.
  • Video conferencing systems are being used commonly today in enterprises.

    Steganographic techniques can be put to good use here. For instance

    information that is transmitted including the sender and receiver details

    can be hidden using steganography thus protecting the transmission from

    being snooped.

Though information hiding techniques like steganography complemented by

techniques such cryptography can provide foolproof security, there is room for

improvement in terms of robustness and flexibility of use.

tech-news