Secret Key Steganography - the
e-Security | Vol: 36-12014
© CyberSecurity Malaysia 2014 - All Rights Reserved
14
The embedding process starts by choosing the cover elements and performing the
substitution operation on them. The least signiicant bits of the cover will
be exchanged with the bit of message. This method allows more than one
message bits to be stored in the two least signiicant bit of the cover. This process
is illustrated in Figure 5. In this example, the cover contains all ‘0’ bits, while the
bit message contains all ‘1’ bits.
In order to extract the secret message, the least signiicant bit of the selected cover-
elements will be extracted and lined up. However, the sequence of element indices
used in the embedding process must be accessible by the receiver. By using this
method, information can be hidden with little impacts to the carriers. Because of
the simplicity of applying it into image and audio, this method is now common
to steganography.
B. Pseudorandom Permutation
In this method, a sequence of element indices will be generated by using a
pseudorandom generator. Then the secret messages will be stored into the cover
according to the bit position determined by the previous generated sequence.
Therefore, the secret message bits can be distributed randomly over the whole
cover if all cover bits can be accessed in the embedding process. Figure 6 below
is an illustration of the pseudorandom permutation method.
C. Image Downgrading and Covert Channels
Image downgrading is a special case of a substitution system. It could be used
to exchange images covertly. They are usually used for “leaking” information.
Covert channels in operating systems allow processes to communicate “invisibly”
and possibly across different security zones speciied by a security policy.
Images act both as secret messages and covers. In this method, a cover image and
a secret image have an equal dimension. The sender exchanges the four least
signiicant bits of the cover’s grayscale values with the four most signiicant bits
of the secret image. The receiver extracts the four least signiicant bits of the secret
image. Four bits are suficient to transmit a rough approximation of the secret image
since the degradation of the cover is not visually noticeable in many cases. This
process is illustrated in Figure 7 below.
Figure 6 : Pseudorandom Permutation
Figure 7 : Image Downgrading and Covert Channels Figure 5 : LSB Substitution