We accept

The Types And Techniques Of Steganography Computer Science Essay

This document concentrate on a new field of analysis in IT sector i. e. Steganography. This record covers various concepts in Steganography, A brief overview of Steganography and launching few types of techniques on the market in Steganography. In addition, it covers other topics like security in Steganography, mobile messaging, MMS Steganography related information. This file closes with a summery and proper solution.

The original footages of Steganography were by the Greek historian Herodotus in hischronicles known as "Histories" and day back to around 440 BC. Herodotus recorded two stories of Steganographic techniques during this time in Greece. The first stated that Ruler Darius of Susa shaved the top of one of his prisoners and wrote a secret message on his head. If the prisoner's scalp grew again, he was delivered to the Kings kid in laws Aristogoras in Miletus undetected. The second story also originated from Herodotus, which boasts a soldier known as Demeratus needed to send a message to Sparta that Xerxes intended to invade Greece. In the past, the writing medium was word written on wax-covered tablets. Demeratus removed the wax from the tablet, wrote the trick note on the underlying hardwood, recovered the tablet with wax to make it seem as a blank tablet and finally sent the doc without being found. Romans used invisible inks, which were predicated on natural substances such as fruit drinks and milk. This was accomplished by heating the hidden wording, thus revealing its material.

Invisible inks have become a lot more advanced and remain in limited use today. During the 15th and 16th centuries, many writers including Johannes Trithemius (author of Steganographia) and Gaspari Schotti (publisher or Steganographica) wrote on Steganagraphic techniques such as coding approaches for text, unseen inks, and incorporating covered communications in music. Between 1883 and 1907, further development can be related to the magazines of Auguste Kerckhoff (writer of Cryptographic Militaire) and Charles Briquet (author of Les Filigranes). These books were mainly about Cryptography, but both can be related to the building blocks of some Steganographic systems plus more significantly to watermarking techniques.

During the days of WWI (World Warfare 1) and WWII (World Battle 11), significant innovations in Steganography occurred.

Concepts such as null ciphers (taking the 3rd letter from each phrase in a harmless message to make a hidden concept, etc), image substitution and microdot (taking data such as pictures and reducing it to how big is a big period on a piece of paper) were presented and embraced as great steganographic techniques.

In the recent digital world of today, namely 1992 to provide, Steganography is being used across the world on computer systems. Many tools and systems have been created that take benefit of old steganographic techniques such as null ciphers, coding in images, audio, video tutorial and microdot. With the study this topic is currently getting a whole lot of great applications for Steganography in the near future.


Steganography replaces unneeded or unused bits in regular computer files (Graphics, sound, words) with items of different and unseen information. Invisible information can be another regular computer file or encrypted data.

Steganography differs from cryptography in a manner that it masks the lifestyle of the note where cryptography works to mask this content of the meaning.

Steganography sometimes found in conjunction with encryption. An encrypted file may still cover information using steganography, so even if the encrypted document is deciphered, the hidden information is not seen.



There will vary ways to hide the subject matter in another, popular are A minimum of Significant bytes and Injection.

When a file or a graphic is created there are few bytes in the data file or image that are not necessary or least important. These type of bytes can be substituted with a note without damaging or replacing the initial message, by which the secrete meaning is hidden in the document or image.

Another way is a note can be immediately injected into a file or image. However in this way how big is the record would be increasing accordingly depending on the secrete message


Digital images are the most widely used cover things for steganography. Because of the option of various file formats for various applications the algorithm used for these formats differs accordingly.

An image is assortment of bytes (know as pixels for images) formulated with different light intensities in several regions of the image. When interacting with digital images for use with Steganography, 8-bit and 24-bit per pixel image files are typical. Both have benefits and drawbacks 8-amount images are a great format to utilize for their relatively small size. The disadvantage is that only 256 possible colors can be utilized which may be a potential problem during encoding. Usually a gray scale color palette is used when working with 8-bit images such as (. GIF) because its progressive change in color would be harder to find after the image has been encoded with the secret message. 24-bit images offer a lot more flexibility when used for Steganography. The large numbers of colors (over 16 million) you can use go well beyond the human aesthetic system (HVS), rendering it very difficult to discover once a top secret meaning, has been encoded.

Large amount of data can be encoded in to 24-bit images as it is compared to 8-piece images. The downside of 24-bit digital images is their size which is high and this makes them suspicious our internet because of the heavy size in comparison with 8-amount images. Depending on the kind of message and kind of the image different algorithms are widely-used.

Few types in Steganography in Images:

Least significant little bit insertion

Masking and filtering

Redundant Style Encoding

Encrypt and Scatter

Algorithms and transformations

Least significant tad insertion

Least Significant Tad (LSB) insertion is most common algorithm for image steganography, it consists of the changes of LSB layer of image. In this system, the message is stored in the LSB of the pixels which could be looked at as random noises. Thus, altering them does not have any obvious result to the image.

Masking and filtering

Masking and filtering techniques work better with 24 bit and grey size images. They hide info in a way similar to watermarks on genuine paper and are occasionally used as digital watermarks. Masking the images changes the images. To ensure that changes can't be discovered make the changes in multiple small proportions. In comparison to LSB masking is more robust and masked images goes by cropping, compression plus some image handling. Masking techniques embed information in significant areas so that the hidden subject matter is more integral to the cover image than simply hiding it in the "sound" level. This helps it be more suitable than LSB with, for illustration, lossy JPEG images.

Redundant Structure Encoding

Redundant routine encoding is to some extent similar to distributed spectrum approach. In this technique, the note is scattered through out the image predicated on algorithm. This system makes the image inadequate for cropping and rotation. Multiple smaller images with redundancy raise the chance of recovering even when the stegano-image is manipulated.

Encrypt and Scatter

Encrypt and Scatter techniques hides the message as white noises and White Noise Storm is an example which uses uses spread range and occurrence hopping. Previous home window size and data channel are used to generate a random number. And with in this arbitrary amount, on all the eight programs message is spread through the concept. Each route rotates, swaps and interlaces with almost every other channel. Single channel represents one little bit and because of this there are extensive unaffected bits in each route. In this technique it is very complex to draw out the actual subject matter from stegano-image. This system is more secure compared to LSB as it requires both algorithm and key to decode the bit concept from stegano-image. Some users like this methos because of its security as it requires both algorithm and key regardless of the stegano image. This technique like LSB enables image degradation in conditions of image handling, and compression.

Algorithms and transformations

LSB modification way of images does keep good if almost any compression is performed on the resultant stego-image e. g. JPEG, GIF. JPEG images use the discrete cosine transform to achieve compression. DCT is a lossy compression transform because the cosine ideals cannot be calculated exactly, and repeated calculations using limited precision figures bring in rounding errors in to the final result. Variances between original data values and restored data values depend on the method used to analyze DCT


Implanting secrete message into an music is the most challenging strategy in Steganography. It is because the real human auditory system (HAS) has such a captivating range that it can hear over. To place this in perspective, the (HAS) understand over a variety of power greater than one million to one and a variety of frequencies greater than one thousand to one making it extremely hard to add or remove data from the initial data structure. The one weakness in the (HAS) comes at looking to differentiate looks (loud noises drown out silent sounds) and this is what must be exploited to encode hidden knowledge messages in audio without being detected.

Below are the lists of methods which are generally used for music Steganography.

LSB coding

Parity coding

Phase coding

Spread spectrum

Echo hiding

LSB coding

Using the least-significant tad is possible for music, as adjustments usually wouldn't normally create recognizable changes to the may seem. Another method requires advantage of human limitations. You'll be able to encode information using frequencies that are indistinct to the human ear canal. Using frequencies above 20. 000Hz, text messages can be covered inside sound files and can't be detected by human being checks.

Parity coding

Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into distinct regions of examples and encodes each little from the secret message in an example region's parity bit. When the parity tiny selected region will not match the trick little to be encoded, the procedure flips the LSB of one of the samples in the region. Thus, the sender has more of an choice in encoding the trick little, and the indication can be improved in a more unobtrusive fashion.

Phase coding

Phase coding attends to the drawbacks of the noise inducing methods of audio Steganography. Period coding uses the fact that the period components of sound are not as audible to the individuals ear as sound is. Instead of introducing perturbations, this technique encodes the meaning bits as phase shifts in the stage spectrum of an electronic transmission, attaining an indistinct encoding in terms of signal-to-perceived noises ratio.

Spread spectrum

In the framework of music Steganography, the basic spread variety (SS) method makes an attempt to spread secret information over the audio signal's frequency spectrum whenever you can. This is comparable to a system using an execution of the LSB coding that arbitrarily spreads the meaning bits over the whole audio record. However, unlike LSB coding, the SS method spreads the secret message within the sound file's rate of recurrence spectrum, utilizing a code that is independent of the actual signal. As a result, the final transmission occupies a bandwidth more than what is actually required for broadcast.

Echo hiding

In echo concealing, information is implanted in a sound file by introducing an echo in to the separate signal. Just like the spread spectrum method, it too provides advantages for the reason that it allows for a higher data transmitting rate and superior strength in comparison with the noise inducing methods. Only if one echo was created from the original transmission, only one little bit of information could be encoded. Therefore, the initial signal is divided into blocks prior to the encoding process starts. After the encoding process is completed, the blocks are concatenated back together to produce the final indication.


In video steganography, a video recording record would be inserted with supplementary data to hide secret messages. Along the way, an intermediate indication which really is a function of concealed message data and data of content transmission would be generated. Content data (video tutorial record) is then coupled with this intermediate transmission to direct result encoding. The supplementary data range from duplicate control data which is often brains by consumer electronic device and used to disable copying.

The intermediate transmission may also contain a pseudo arbitrary key data in order to conceal encoding and decode needs related key to extract hidden information from encoded content. In a few implementations rules data is inserted in the content transmission with auxiliary data. This legislation data includes known properties permitting its identification in the embedded content sign. This encoding is robust against scaling, resampling and other forms of content degradation, so the supplementary data can be diagnosed from the content which might have been degraded.

There will vary approaches for video steganography in addition to the above mentioned. Most common are posted and discussed below.

Least Significant Tad Insertion

This is the most simple and popular way for all sorts of steganography. In this method the digital video recording file is considered as split frames and changes the displayed image of each video body. LSB of just one 1 byte in the image is used to store the secret information. Effecting changes are too small to be identified by human eye. This technique enhances the capacity of the concealed meaning but compromises the security requirements such as data integrity.

Real time video steganography

This kind of steganography involves hiding home elevators the output image on the device. This method considers each body shown at any moment irrespective of whether it is image; text. The image is then divided into blocks. If pixel colors of the blocks are similar then changes color characteristics of number of these pixels somewhat. By labeling each framework with a series number it could even be easy to recognize missing parts of information. To extract the info, the exhibited image should be saved first and relevant program can be used then.


Steganography in documents just targets altering some of its characteristics. They can either be characteristics of content material or even text formatting. Here are few ways detailed and talked about to put into practice the same.

Since everyone can read, encoding words in neutral phrases is doubtfully effective. But taking the first letter of each expression of the previous sentence, one can see that it is possible and not very difficult. Hiding information in simple text can be done in many various ways. One way is by simple adding white space and tabs to the ends of the lines of the record. The last technique was successfully found in practice and even after a wording has been printed out and copied in some recoverable format for ten times, the secret message could be retrieved.

Another possible way of holding a secret inside a text is utilizing a publicly available cover source, a reserve or a papers, and by using a code which is made up for exemplory case of a combo of a page number, a lines quantity and a persona number. In this manner, no information stored inside the cover source causes the hidden subject matter. Discovering this will depend exclusively on increasing knowledge of the secret key.

Setting qualifications color and font color is one of the mainly used staganographic approach. This technique is focused for Microsoft expression documents. Choose predefined colors and established font and background colors of unseen character types such as space, tab or the carriage come back heroes. R, G, B beliefs are 8 bits means we have allowed selection of 0 to 255. Most of the viewers wouldn't normally feel interested about color worth of these invisible personas hence 3 bytes of information is easily concealed in each occurrence of space, tab or carriage return. This approach needs no additional information to cover up required pieces.



Pure Steganography is a Steganography system it doesn't require previous exchange of some secret information before sending subject matter; therefore, no information is required to start out the communication process: the security of the machine thus depends entirely on its secrecy. The 100 % pure Steganography can be explained as the quadruple (C, M, D, and E) where:

C: the set of possible covers.

M: the set of secret therapeutic massage with |C| |M|.

E: C-M 'C the embedding function.

D: C 'M of the extraction function with the house that D (E(c, m))=m for everyone m M and c C.

Cover (C)

Message (M)

Embedding (E)

Extracting (D)



In most applications, pure Steganography is preferred, since no stego-key must be shared between your communication associates, although a real Steganography protocols don't provide any security if an attacker has learned the embedding method


A Private Key Steganography system is similar to a symmetric cipher, where in fact the sender decides a cover and embeds the secret message into the cover utilizing a secret key. If the Private Key found in the embedding process may the receiver, he is able to reverse the process and extract the trick message.

Anyone who doesn't know the Private Key shouldn't be in a position to obtain proof the encoded information. The Private Key Steganography can be defined as the quintuple (C, M, K, DK, and EK) where:

C: the set of possible covers.

M: the group of secret message.

K: the group of secret secrets.

Ek: C-M-K 'C With the house that DK (EK(c, m, k), k)=m for all m M, c C and k K




Cover (C)

Embedding (E)

Message (M)

Extracting (D)

Message (M)


Public key Steganography will not be based upon the swapping of an exclusive key. It necessitates two secrets, one of them private (top secret) and the other open public: the general public key is stored in a open public database, whereas the general public key is used in the embedding process. The Private Key is employed to reconstruct the secret message A great way to build a general population key Steganography system is to use a public key crypto system. The sender and the device can exchange open public tips of some general population key cryptography algorithm before imprisonment. General public key Steganography utilizes the actual fact that the decoding function in a Steganography system can be employed to any cover, if it already consists of a secret communication. The public key Steganography relies on the fact that encrypted information is arbitrary enough to hide in plain view. The sender encrypts the information with the receiver's general population key to obtain a random-looking therapeutic massage and embeds it in a route known to the receiver, thereby replacing some of the natural arbitrariness with which every communication process is supported. Assume that both the cryptographic algorithms and the embedding functions are publicly known. The device who cannot decide a priori if hidden knowledge information is transmitted in a particular cover think the introduction of message and simply try to extract and decrypt it using his private key. If the cover actually included information, the decryption information is the sender's message



Mobile Messaging Service allows mobile users to send and receive messages comprising image, music and video recording. These text messages are exchanged in the end through an element known as Mobile Switching Center.

MMS announcements have many perks like communicating even though the server is active, exchanging emails while making calls, sending offline emails. In addition they provide services like eCommerce. As there is possibility of disclosure of private and personal information between various systems, information security has got tremendous importance. MMS Steganography provides confidentiality and integrity with refined unremovability. Users can profit from concealed channels to be able to receive and send hidden information and keys.

Multimedia items may contain covered information inlayed to them using steganography techniques.

The steganography strategy used must satisfy following:

Reliability of secreted information after it's been embedded inside the content should be correct.

Content object should remain intact or almost unchanged to the human being eyes.

There can be mainly two types of steganography techniques possible for MMS things.

Fragile steganography comprises of implanting information into a document which is destroyed if the document is improved.

Video Technique: Works over training video documents. Combinations of audio and image techniques are used to put into practice this as entire. The opportunity of adding lots of data is a lot greater.

Sound Approach: Works over music files like Mp3 data files. Encode data as binary to appear to be noises and can be recognized by receiver with correct key. Data being added is in narrow bandwidth compared to the medium.

Robust techniques aim to embed information into a document which cannot easily be ruined.

Image Hiding: Works over images.

Lease Significant Bit

Least significant items of each pixel in a single image are used to hide the most important items of another. Simple and easy way of information hiding.

Direct Cosine Transform

Transformed DCT coefficients would be improved. Image would be made strong by scattering the hiding information equally.

Wavelet Transform

Dividing whole image into small wavelets and then conceal the information. Coefficients of wavelets are improved with tolerable noise.

Text Strategy: Works over documents. Just by changing some of the characteristics of the content information can be inlayed. Alterations would not be noticeable to customer.

As MMS Steganography becomes more widely used there must be a clear definition of robustness. This definition helps to prevent recognition and removal of inlayed data. Here are the few properties a good technique should carry:

Quality of press should not perceptibly degrade after embedding key data.

Secret data should be imperceptible devoid of secret knowledge, usually the key.

If several data are there, they should not hamper with one another.

Secret data should make it through which don't degrade the identified quality of work.


As MMS holds multi formatted data such as Content material, Audio, Training video and images, it has got more likelihood of sending secret messages and can apply various methodologies in order to keep the communication safe and magic formula. Currently this analysis is all about Text and Video tutorial centered Steganography.

An MMS suitable mobile with inbuilt video cameras and personalized applications has high importance in conditions of steganography creation and extraction



Processing time

Resource time consumption


Text technique





Easy and simple to implement

Video technique





Holds lot of information in comparison to text technique

Table -1- comparison between Text and Video recording steganography Techniques


MMS Messages can take any of video recording, audio, image and text encapsulated with in Synchronized Media Integration Words (SMIL) .

The suggested steganography deals with three major parts of MMS which can offer us with maximum capacity possible rather than compromising main aim which is total security. The most important issues in steganography are secrecy, payload, robustness and swiftness. Below steps describes suggested steganography working model:

First area of the process hides stegno type in SMIL using white space algorithm.

Then Least Significant Little algorithm can be used to hide the trick message in video.

Rest of the info would be hidden inside word of the MMS using abbreviation algorithm.

Ratio of information hiding in video tutorial part to word part is 6:1 hence I bit stored in text message corresponds to 6 bits stored in 3gp training video.

High security can be awarded with reasonable processing velocity and without impacting on the performance of mobile.

2. 10 Section SUMMERY

This document is focused on available Steganography techniques and methodologies. It includes listed down the various methodologies and their uses. Along with these, it has additionally included about the MMS Steganography importance and ways to achieve that.

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment