message so it cannot be seen. A cipher message,
for instance, might arouse suspicion on the part of
the recipient while an invisible message created with
steganographic methods will not.
In fact, steganography can be useful when the
use of cryptography is forbidden: where cryptogra-
phy and strong encryption are outlawed, steganog-
raphy can circumvent such policies to pass message
covertly. However, steganography and cryptography
differ in the way they are evaluated: steganography
fails when the ”enemy” is able to access the content
of the cipher message, while cryptography fails when
the ”enemy” detects that there is a secret message
present in the steganographic medium (Johnson and
Jajodia, 1998).
The disciplines that study techniques for decipher-
ing cipher messages and detecting hide messages are
called cryptanalysis and steganalysis. The former de-
notes the set of methods for obtaining the meaning
of encrypted information, while the latter is the art of
discovering covert messages.
The aim of this paper is to describe a method for
integrating together cryptography and steganography
through image processing. In particular, we present a
system able to perform steganography and cryptogra-
phy at the same time. We will show such system is an
effective steganographic one (making a comparison
with the well known F5 algorithm (Westfeld, 2001))
and is also a theoretically unbreakable cryptographic
one (we will demonstrate our system is equivalent to
the Vernam cipher (Menezes et al., 1996)).
2 IMAGE BASED
STEGANOGRAPHIC SYSTEMS
The majority of today’s steganographic systems uses
images as cover media because people often transmit
digital pictures over email and other Internet commu-
nication (e.g., eBay). Moreover, after digitalization,
images contain the so-called quantization noise which
provides space to embed data (Westfeld and Pfitz-
mann, 1999). In this article, we will concentrate only
on images as carrier media.
The modern formulation of steganography is of-
ten given in terms of the prisoners’ problem (Sim-
mons, 1984; Kharrazi et al., 2004) where Alice and
Bob are two inmates who wish to communicate in or-
der to hatch an escape plan. However, all commu-
nication between them is examined by the warden,
Wendy, who will put them in solitary confinement at
the slightest suspicion of covert communication.
Specifically, in the general model for steganogra-
phy (see Fig. 2), we have Alice (the sender) wishing
to send a secret message M to Bob (the receiver): in
order to do this, Alice chooses a cover image C.
The steganographic algorithm identifies C’s re-
dundant bits (i.e., those that can be modified with-
out arising Wendy’s suspicion), then the embedding
process creates a stego image S by replacing these re-
dundant bits with data from M.
Figure 2: Steganographic Model.
S is transmitted over a public channel (monitored
by Wendy) and is received by Bob only if Wendy has
no suspicion on it. Once Bob recovers S, he can get
M through the extracting process.
The embedding process represents the critical task
for a steganographic system since S must be as simi-
lar as possible to C for avoiding Wendy’s intervention
(Wendy acts for the eavesdropper).
Least significant bit (LSB) insertion is a common
and simple approach to embed information in a cover
file: it overwrites the LSB of a pixel with an M’s bit. If
we choose a 24-bit image as cover, we can store 3 bits
in each pixel. To the human eye, the resulting stego
image will look identical to the cover image (Johnson
and Jajodia, 1998).
Unfortunately, modifying the cover image
changes its statistical properties, so eavesdroppers
can detect the distortions in the resulting stego im-
age’s statistical properties. In fact, the embedding of
high-entropy data (often due to encryption) changes
the histogram of colour frequencies in a predictable
way (Provos and Honeyman, 2003; Westfeld and
Pfitzmann, 1999).
Westfeld (Westfeld, 2001) proposed F5, an algo-
rithm that does not overwrite LSB and preserves the
stego image’s statistical properties (see Sect. 5.2).
Since standard steganographic systems do not pro-
vide strong message encryption, they recommend to
encrypt M before embedding. Because of this, we
have always to deal with a two-steps protocol: first
we must cipher M (obtaining M’) and then we can
embed M’ in C.
In the next sections we will present a new all-in-
one method able to perform steganography providing
VISAPP 2007 - International Conference on Computer Vision Theory and Applications
128