YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 1/38

Steganography – Synopsis

STEGANOGRAPHY (A new technique to hide information within

image file)

Page 2: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 2/38

Steganography – Synopsis

A

SYNOPSISON

STEGANOGRAPHY(A new technique to hide information within

image file)Submitted to the

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.)For the Degree Of

BACHELOR OF ENGINEERING(INFORMATION TECHNOLOGY)

Under the Guidance of

Mr. PUNEET SINGH DUGGALHOD

DEPPT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWALPROJECT GUIDE & LECTURER

DEPTT. OF INFORMATION TECHNOLOGYSubmitted ByROHIT PATEL [0202IT071043]

DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]

ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)

DEPARTMENT OF INFORMATION TECHNOLOGYGURU RAMDAS KHALSA INSTITUTE OF SCIENCE AND

TECHNOLOGYJABALPUR

Page 3: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 3/38

Steganography – Synopsis

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE

This is to certify that synopsis “STEGANOGRAPHY (a new technique to hide information within image file)” which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.

Submitted ByROHIT PATEL [0202IT071043]

DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]

ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)

INTERNAL EXTERNAL

Page 4: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 4/38

Steganography – Synopsis

DEPARTMENT OF INFORMATION TECHNOLOGY

This is to certify that synopsis “STEGANOGRAPHY (a new technique to hide information within image file)” which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.

Submitted ByROHIT PATEL [0202IT071043]

DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]

ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)

Mr. PUNEET SINGH DUGGALHOD

DEPTT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWALPROJECT GUIDE & LECTURER

DEPTT. OF INFORMATION TECHNOLOGY

CERTIFICATE

Page 5: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 5/38

Steganography – Synopsis

ACKNOWLEDGEMENT

The synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable.

We are thankful to Mr. Puneet Singh Duggal (HOD of Information Technology Department) under whose support we have been able to make this project a great success.

We express our deep sense of gratitude to Mrs. Mili Jaiswal for their valuable support and supervision throughout the ‘Bachelor of Engineering’ Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided to us by our friends and faculty members.

Rohit patel (0202it071043)

Devendra Vishwakarma (0202IT071013)Narendra Nath Shukla (0202IT071031)Rohit Namdeo (0202IT071042)

Page 6: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 6/38

Steganography – Synopsis

ABSTRACT

Page 7: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 7/38

Steganography – Synopsis

Steganography is the art of hiding the fact that communication is taking

place, by hiding information in other information. Many different carrier file

formats can be used, but digital images are the most popular because of their

frequency on the internet. For hiding secret information in images, there exist a

large variety of steganography techniques some are more complex than others

and all of them have respective strong and weak points. Different applications

may require absolute invisibility of the secret information, while others require a

large secret message to be hidden. This project report intends to give an

overview of image steganography, its uses and techniques. It also attempts to

identify the requirements of a good steganography algorithm and briefly reflects

on which steganographic techniques are more suitable for which applications.

Page 8: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 8/38

Steganography – Synopsis

INTRODUCTION

ABOUT PROJECT

Page 9: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 9/38

Steganography – Synopsis

This project is based on Stegnography technique. Stegnography is the art

and science of hiding information by embedding secure and confidential

messages (such as Identity, Password etc.) within other harmless file format

(such as JPEG, BMP , PNG, WAV, MP3 etc.)

Objective of the project

The main goal of this steganography based system is to covert

communication. So, the fundamental purpose of this steganography based

system is that the hide secure message within any image file format and

generates a encrypted BMP image file format as output containing that secure

message which will not be sensible to third party.

When a message is encrypted, it has no meaning, and it's easy to

understand that it contains sensitive information, a secret - and someone might

try to break it. This Steganography based software solves this problem by hiding

the sensitive information in a harmless file called carrier file (example – bmp,

jpeg ect.).

This approach of information hiding technique has recently became

important in a number of application area :-

This project has following objectives:

To product security tool based on steganography techniques.

Confidential communication and secret data storing using encryption

module.

 Protection of data alteration

To extract techniques of getting secret data using decryption module.

COCEPT OF THE PROJECT

Page 10: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 10/38

Steganography – Synopsis

Secret message Carrier or Cover Medium Stego Key

Stego Medium

Stegnography-

IT is the art and science of hiding information by embedding secure and

confidential messages (such as Identity, Password etc.) within other harmless

digital file format (such as JPEG, BMP , PNG, WAV, MP3 ect.). In one sentence,

Steganography is a technique of hiding information in digital media.

The purpose of steganography is covert communication to hide a message

from a third party. In contrast to cryptography, it is not to keep others from

knowing the hidden information but it is to keep others from thinking that the

information even exists.

The steganography process generally involves placing a hidden message

in some transport medium, called the carrier. The secret message is embedded

in the carrier to form the steganography medium. The use of a steganography

key may be employed for encryption of the hidden message and/or for

randomization in the steganography scheme. In summary:

Cover-object, C

Message, M

F(X,M,K) Stego Object, Z

Page 11: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 11/38

Steganography – Synopsis

Message is the data that the sender wishes to remain it confidential. It can

be plain text, ciphertext, other image, or anything such as a copyright mark, a

covert communication, or a serial number. Encrption key is known as stego-key,

which ensures that only recipient who know the corresponding decoding key will

be able to extract the message from a cover-object. The cover-object with the

secretly embedded message is then called the Stego-object.

Recovering message from a stego-object requires the cover-object itselt

and a corresponding decoding key if a stego-key was used during the encoding

process. The original image may or may not be required in most applications to

extract the message.

There are several suitable carriers below to be the cover-object:

Cover-object, C

Message, M

F(X,M,K) Stego Object, Z

Decoding key corresponding

to stego key

Stego Object Z

Cover Object C

Original message M

Page 12: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 12/38

Steganography – Synopsis

Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg,

mp3 Images file such as bmp, gif and jpg, where they can be both color

and gray-scale.

Steganography Vs Cryptography

Steganography is often confused with cryptology because the two are

similar in the way that they both are used to protect important information. The

difference between two is that steganography involves hiding information so it

appears that no information is hidden at all. If a person or persons views the

object that the information is hidden inside of he or she will have no idea that

there is any hidden information, therefore the person will not attempt to decrypt

the information.

The word steganography comes from the Greek “Seganos”, which mean

covered or secret and – “graphy” mean writing or drawing. Therefore,

steganography mean, literally covered writing.

Image Steganography and bitmap pictures:

Using bitmap pictures for hiding secret information is one of most popular

choices for Steganography. Many types of software built for this purpose, some

of these software use password protection to encrypting information on picture.

To use these software you must have a ‘BMP’ format of a pictures to use it, but

using other type of pictures like “JPEG”, “GIF” or any other types is rather or

never used, because of algorithm of “BMP” pictures for Steganography is simple.

Also we know that in the web most popular of image types are “JPEG” and other

types not “BPM”, so we should have a solution for this problem.

This software provide the solution of this problem, it can accept any type of

image to hide information file, but finally it give the only “BMP” image as an

output that has hidden file inside it.

Page 13: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 13/38

Steganography – Synopsis

Bitmap Steganography:

Bitmap type is the simplest type of picture because that it doesn’t have

any technology for decreasing file size. Structure of these files is that a bitmap

image created from pixels that any pixel created from three colors ( red, green

and blue said RGB) each color of a pixel is one byte information that shows the

density of that color. Merging these three color makes every color that we see in

these pictures. We know that every byte in computer science is created from 8

bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit

(LSB), the idea of using Steganography science is in this place; we use LSB bit for

writing our security information inside BMP pictures. So if we just use last layer

(8st layar) of information, we should change the last bit of pixels, in other hands

we have 3 bits in each pixel so we have 3*hight*width bits memory to write our

information. But before writing our data we must write name of data(file), size of

name of data & size of data. We can do this by assigning some first bits of

memory (8st layer).

(00101101 00011101 11011100)

(10100110 11000101 00001100)

(11010010 10101100 01100011)

Using each 3 pixel of picture to save a byte of data

Page 14: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 14/38

Steganography – Synopsis

SCOPE OF THE PROJECT

The growing possibilities of modern communications need the special

means of security especially on computer network. The network security is

becoming more important as the number of data being exchanged on the

internet increases. Therefore, the confidentiality and data integrity are requires

to protect against unauthorized access and use. This has resulted in an explosive

growth of the field of information hiding

This project is developed for hiding information in any image file. The

scope of the project is implementation of steganography tools for hiding

information includes any type of information file within BMP image files and it

also ask to receiver for the path where the user wants to save Image and

extruded file. In short this software is able to do some kind of encryption for

secure information hiding what is called Steganography. The most common use

of steganography is to hide a file inside another file.

Page 15: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 15/38

Steganography – Synopsis

Methodology

User needs to run the application. The user has two tab options – encrypt

and decrypt. If user select encrypt, application will give the screen to brows and

select image file (such as bmp, jpeg, png) as a cover object, and the file (such as

doc, txt, ppt) that containing the information that you want to embed in cover

object And if user select decrypt option, the application give the screen to select

Stego-Object (bmp image file) that you want to decrypt and ask path where user

want to save the secrete file.

This project has two methods – Encrypt and Decrypt.

In encryption, the secrete information is hiding in with any type of image file.

Decryption is getting the secrete information from image file.

Encryption Process

IMAGE FILE INFORMATION FILE

Page 16: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 16/38

Steganography – Synopsis

BMP file

Page 17: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 17/38

Steganography – Synopsis

Decryption Process

BMP file

Image file Information file

Page 18: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 18/38

Steganography – Synopsis

AdVANTAGES & Limitations of the Software:

Advantages:-

Mainly steganographic based software can be used in sending confidential

images for military purposes where this software enables them to hide file

formats such as text files or image files like jpg or bitmap into another

image files or in mp3 files.

Steganography covers even the existence of a hidden message, ie other

than sender and receiver no one knows there is a secret data is stored in a

carrier file.

Limataion:-

Now days many terrestrial group are using this method of stegnography

to communicate with other terrestrial group since If one knows that a file

contains some hidden data, without knowing the decryption method he is

not able to get the secret data. Because they use some passwords while

hiding the data.

This project has an assumption that is both the sender and receiver must

have shared some secret information before imprisonment. Pure

steganography means that there is none prior information shared by two

communication parties.

Page 19: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 19/38

Steganography – Synopsis

PLANNING

Problem Statement :

The former consists of linguistic or language forms of hidden writing. The

later, such as invisible ink, try of hide messages physically. One disadvantage of

linguistic steganography is that users must equip themselves to have a good

knowledge of linguistry. In recent years, everything is trending toward

digitization. And with the development of the internet technology, digital media

can be transmitted conveniently over the network. Therefore, messages can be

secretly carried by digital media by using the steganography techniques, and

then be transmitted through the internet rapidly

Possible and best plan for solution

Steganography is the art of hiding the fact that communication is taking

place, by hiding information in other information. Many different carrier file

formats can be used, but digital images are the most popular because of their

frequency on the internet. For hiding secret information in images, there exists a

large variety of steganography techniques some are more complex than others

and all of them have respective strong and weak points.

So we prepare this application, to make the information hiding more

simple and user friendly.

Page 20: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 20/38

Steganography – Synopsis

Start Application

Encryption Decryption

BMP Image file

BMP image file

Image Message file

Message file

Planning strategy

Page 21: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 21/38

Steganography – Synopsis

REQUIREMENT ANALYSIS

HARDWARE REQUIREMENT

Computer Intel® or Compatible , Monitor

Pentium III Processor or Higher

Memory (RAM) 256 MB minimum on Windows XP/2000

512 MB recommended on Windows vista/7

Hard Disk Space Minimum 5 GB free space for installing Visual

studio 2008 and .net framework 3.5)

CDROM or DVDROM – Drive

Required for Installation

Operating System

(OS)

Windows XP SP2 or above

Windows vista / Windows 7

Front end Visual Studio .Net 2008 or higher Visual Studio .Net Framework (3.5 or higher)

SOFTWARE REQUIREMENT

FUNCTIONAL REQUIRMENT

Page 22: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 22/38

Steganography – Synopsis

PURPOSE:

The main purpose for preparing this document is to give a general

insight into the analysis and requirements of the existing system or situation and

for determining the operating characteristics of the system.

SCOPE:

Document plays a vital role in the development life cycle (SDLC).As it

describes the complete requirement of the system. It is meant for use by the

developers and will be the basic during testing phase.

The following two things are considered in detail characteristic of

functional requirement:

1. Input

2. Output

1. INPUT: -

Steganography system requires any type of image file (as a cover

image file) and the secure information or message that is to be hidden. It has

two modules encrypt and decrypt.

The main objective during the input designs is as given below:

To produce a cost-effective method of input. To ensure that the input is acceptable and understood by the user. Controlling the amount of input Avoiding error in data.

2. OUTPUT:-

Page 23: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 23/38

Steganography – Synopsis

This steganography system produces a BMP image file format (as

output) containing the cover image that appears in outer world and the

secure information file that will be hidden inside covered image by

embedding that using some stego-key.

One of the most important factors of an information system for the

user is the output the system produces. Without the quality of the output,

the entire system may appear unnecessary that will make us avoid using it

possibly causing it to fail.

The term output applying to information produced by an information

system whether printed or displayed while designing the output we should

identify the specific output that is needed to information requirements

select a method to present the formation and create a document report or

other formats that contains produced by the system.

Whether the output is formatted report or a simple listing of the

contents of a file, a computer process will produce the output.

A Document

A Message

Retrieval from a data store

FEASIBILITY STUDY

Page 24: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 24/38

Steganography – Synopsis

Before developing project we studied the feasibility of the project in

determining whether or not to implement this project/software and also did the

analysis of the potential impact of the proposed project or software, that

includes advantages and disadvantages of both the current situation and the

proposed project.

Following points are given below, on which we studied the feasibility

before designing of the project:-

1. Is the project concept viable?

2. Are the project’s cost and schedule assumptions realistic?

3. What are the current estimated cost and schedule for the project?

4. Have the major risks to the project been identified and can they

minimized or avoided?

5. Is the software development plan complete and adequate to support

further development work?

6. Have users and developers been able to agree on a detailed user

interface prototype? If not, are the requirements really stable?

Architecture

Front end:-

My project fulfills all the above mentioned criteria of feasibility study.

Page 25: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 25/38

Steganography – Synopsis

Visual studio 2008 (.NET Framework using C# language)

Back end:-

A stego key for encryption and decryption.

SDLC (Software development life cycle)

Page 26: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 26/38

Steganography – Synopsis

System analysis

Steganography system requires any type of image file and the information

or message that is to be hidden. It has two modules encrypt and decrypt.

Begins when anOrganization identifiesa need of software.ConceptProposal isCreated

Defines the scope or boundary of the concepts. Includes System Boundary, Cost Benefit Analysis.Risk Management Plan & Feasibility Study

Develops a Project Management Plan and other planning documents.Provides the basis for acquiring the resources needed to achieve

Analyses user needs and develop requirement specification, & user requirement. Create a detailed Functional Requirement Document

Transforms detailed requirements into complete, detailed system design document. Focus on how to deliver the required functionality.

Page 27: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 27/38

Steganography – Synopsis

Microsoft .Net framework prepares a huge amount of tool and options for

programmers that they simples programming. One of .Net tools for pictures and

images is auto-converting most types of pictures to BMP format. I used this tool

in this software called “Steganography” that is written in C#.Net language and

you can use this software to hide your information in any type of pictures

without any converting its format to BMP (software converts inside it).

Algorithms and Techniques

There are three different techniques you can use to hide information in a

cover file:

1. Injection (or insertion) -

Using this technique, you store the data you want to hide in sections of a

file that are ignored by the processing application. By doing this you avoid

modifying those file bits that are relevant to an end-user—leaving the cover file

perfectly usable. For example, you can add additional harmless bytes in an

executable or binary file. Because those bytes don't affect the process, the end-

user may not even realize that the file contains additional hidden information.

However, using an insertion technique changes file size according to the amount

of data hidden and therefore, if the file looks unusually large, it may arouse

suspicion.

2. Substitution -

Using this approach, you replace the least significant bits of information

that determine the meaningful content of the original file with new data in a way

that causes the least amount of distortion. The main advantage of that technique

is that the cover file size does not change after the execution of the algorithm.

On the other hand, the approach has at least two drawbacks. First, the resulting

stego file may be adversely affected by quality degradation—and that may

arouse suspicion. Second, substitution limits the amount of data that you can

hide to the number of insignificant bits in the file

Page 28: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 28/38

Steganography – Synopsis

3. Generation -

Unlike injection and substitution, this technique doesn't require an existing

cover file—this technique generates a cover file for the sole purpose of hiding

the message. The main flaw of the insertion and substitution techniques is that

people can compare the stego file with any pre-existing copy of the cover file

(which is supposed to be the same file) and discover differences between the

two. You won't have that problem when using a generation approach, because

the result is an original file, and is therefore immune to comparison tests.

Among the substitution techniques, a very popular methodology is

the LSB (Least Significant Bit) algorithm, which replaces the least

significant bit in some bytes of the cover file to hide a sequence of bytes

containing the hidden data. That's usually an effective technique in cases where

the LSB substitution doesn't cause significant quality degradation, such as in 24-

bit bitmaps.

The encrypt module is used to hide information into the image; no one can

see that information or file. This module requires any type of image and

message and gives the only one image file in destination.

Page 29: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 29/38

Steganography – Synopsis

The decrypt module is used to get the hidden information in an image file.

It take the image file as an output, and give two file at destination folder, one is

the same image file and another is the message file that is hidden it that.

Before encrypting file inside image we must save name and size of file in a

definite place of image. We could save file name before file information in LSB

layer and save file size and file name size in most right-down pixels of image.

Writing this information is needed to retrieve file from encrypted image in

decryption state.

SYSTEM DESIGN

Page 30: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 30/38

Steganography – Synopsis

System

Basic System Architecture

Page 31: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 31/38

Steganography – Synopsis

Start Application

Encryption Decryption

BMP Image file

BMP image file

Image Message file

Message file

At Sender At Receiver

Use-Case

Page 32: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 32/38

Steganography – Synopsis

Sender

Start Encrypt Module of system

Select & Load the Cover Image

Select & Load the File containing Secure Msg

Using Stego-Key for Encryption

<<includes>>

Start Decrypt Module of system

Embed Msg within cover image & Generate Stego-

Image

Send Stego image file

Receive Stego- image file

Page 33: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 33/38

Steganography – Synopsis

Start Decrypt Module of system

Separate Secure file from stego-image

Generate & save file in specified path

Data Flow Diagram

Cover Image Secure Message

Bit stream Bit stream

Page 34: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 34/38

Steganography – Synopsis

StegoSystem Encoder

Stego Image

Stego Image

Bit stream with changed LSB of cover image

Cover image Bit stream + Secure File Bit stream

Page 35: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 35/38

Steganography – Synopsis

StegoSystem Decoder

Cover Image Secure Message

Original Bit streamOriginal Bit stream

StegoSystem Encoder

Cover Image

Secure Message

File

Stego Image

Stego image bit stream (cover image + message)

Page 36: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 36/38

Steganography – Synopsis

StegoSystem Decoder

Secure Message

Control Flow Diagram

Loading Cover file bit stream

Loading Message file bit stream

Prepare Cover Data

EncodePrepared cover data with message data

Page 37: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 37/38

Steganography – Synopsis

Generate Stego Data

Page 38: Steganography Synopsis Final

SYNOPSIS ON STRGANOGRAPHY Page 38/38

Steganography – Synopsis

CONCLUSION

Steganography is a really interesting subject and outside of the mainstream

cryptography and system administration that most of us deal with day after day.

Steganography can be used for hidden communication. We have explored the

limits of steganography theory and practice. We printed out the enhancement of

the image steganography system using LSB approach to provide a means of

secure communication. A stego-key has been applied to the system during

embedment of the message into the cover image.

This steganography application software provided for the purpose to how to use

any type of image formats to hiding any type of files inside their. The master

work of this application is in supporting any type of pictures without need to

convert to bitmap, and lower limitation on file size to hide, because of using

maximum memory space in pictures to hide the file.

Since ancient times, man has found a desire in the ability to communicate

covertly. The recent explosion of research in watermarking to protect intellectual

property is evidence that steganography is not just limited to military or

espionage applications. Steganography, like cryptography, will play an

increasing role in the future of secure communication in the “digital world”.