A ROBUST COVER GENERATION TECHNIQUE FOR STEGANOGRAPHY USING 2D IMAGES

Similar documents
COVRE OPTIMIZATION FOR IMAGE STEGANOGRAPHY BY USING IMAGE FEATURES ZAID NIDHAL KHUDHAIR

UNIVERSITI PUTRA MALAYSIA

UNIVERSITI PUTRA MALAYSIA GENERATING MUTUALLY UNBIASED BASES AND DISCRETE WIGNER FUNCTION FOR THREE-QUBIT SYSTEM

ANOLYTE SOLUTION GENERATED FROM ELECTROCHEMICAL ACTIVATION PROCESS FOR THE TREATMENT OF PHENOL

SHADOW AND SKY COLOR RENDERING TECHNIQUE IN AUGMENTED REALITY ENVIRONMENTS HOSHANG KOLIVAND UNIVERSITI TEKNOLOGI MALAYSIA

MULTISTAGE ARTIFICIAL NEURAL NETWORK IN STRUCTURAL DAMAGE DETECTION GOH LYN DEE

EVALUATION OF FUSION SCORE FOR FACE VERIFICATION SYSTEM REZA ARFA

ADSORPTION OF ACID FUCHSIN AND FAST GREEN ON ACTIVATED CARBONS

FRAGMENT REWEIGHTING IN LIGAND-BASED VIRTUAL SCREENING ALI AHMED ALFAKIABDALLA ABDELRAHIM

INDEX SELECTION ENGINE FOR SPATIAL DATABASE SYSTEM MARUTO MASSERIE SARDADI UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA VARIABLE STEP VARIABLE ORDER BLOCK BACKWARD DIFFERENTIATION FORMULAE FOR SOLVING STIFF ORDINARY DIFFERENTIAL EQUATIONS

MODELING AND CONTROL OF A CLASS OF AERIAL ROBOTIC SYSTEMS TAN ENG TECK UNIVERSITI TEKNOLOGY MALAYSIA

A STUDY ON THE CHARACTERISTICS OF RAINFALL DATA AND ITS PARAMETER ESTIMATES JAYANTI A/P ARUMUGAM UNIVERSITI TEKNOLOGI MALAYSIA

REMOVAL OF LEAD (II) BY NITRIC ACID-MODIFIED ACTIVATED CARBON

DEVELOPMENT AND CHARACTERIZATION OF MULTI-WAVELENGTH FIBER LASER LIGHT SOURCES BASED ON ERBIUM AND BRILLOUIN GAIN. By SUHAIRI SAHARUDIN

HIGH RESOLUTION DIGITAL ELEVATION MODEL GENERATION BY SEMI GLOBAL MATCHING APPROACH SITI MUNIRAH BINTI SHAFFIE

A COMPUTATIONAL FLUID DYNAMIC FRAMEWORK FOR MODELING AND SIMULATION OF PROTON EXCHANGE MEMBRANE FUEL CELL HAMID KAZEMI ESFEH

EFFECT OF GRAPHENE OXIDE (GO) IN IMPROVING THE PERFORMANCE OF HIGH VOLTAGE INSULATOR NUR FARAH AIN BINTI ISA UNIVERSITI TEKNOLOGI MALAYSIA

INDIRECT TENSION TEST OF HOT MIX ASPHALT AS RELATED TO TEMPERATURE CHANGES AND BINDER TYPES AKRIMA BINTI ABU BAKAR

AUTOMATED MEASUREMENT OF LEVITATION FORCE USING LABVIEW PROGRAMMING LANGUAGE

FLOOD MAPPING OF NORTHERN PENINSULAR MALAYSIA USING SAR IMAGES HAFSAT SALEH DUTSENWAI

UNIVERSITI PUTRA MALAYSIA STABILITY OF MARANGONI CONVECTION IN A FLUID LAYER WITH TEMPERATURE-DEPENDENT VISCOSITY NURUL HAFIZAH BINTI ZAINAL ABIDIN

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF A SPATIOTEMPORAL DATA MODEL FOR MANAGEMENT AND VISUALIZATION OF SURFACE MOVEMENT DATA

DYNAMIC SIMULATION OF COLUMNS CONSIDERING GEOMETRIC NONLINEARITY MOSTAFA MIRSHEKARI

BOUNDARY INTEGRAL EQUATION WITH THE GENERALIZED NEUMANN KERNEL FOR COMPUTING GREEN S FUNCTION FOR MULTIPLY CONNECTED REGIONS

COMMUTATIVITY DEGREES AND RELATED INVARIANTS OF SOME FINITE NILPOTENT GROUPS FADILA NORMAHIA BINTI ABD MANAF UNIVERSITI TEKNOLOGI MALAYSIA

SYSTEM IDENTIFICATION MODEL AND PREDICTIVE FUNCTIONAL CONTROL OF AN ELECTRO-HYDRAULIC ACTUATOR SYSTEM NOOR HANIS IZZUDDIN BIN MAT LAZIM

ARTIFICIAL NEURAL NETWORK AND KALMAN FILTER APPROACHES BASED ON ARIMA FOR DAILY WIND SPEED FORECASTING OSAMAH BASHEER SHUKUR

EMPIRICAL STRENQTH ENVELOPE FOR SHALE NUR 'AIN BINTI MAT YUSOF

EFFECT OF ROCK MASS PROPERTIES ON SKIN FRICTION OF ROCK SOCKET. YUSLIZA BINTI ALIAS UNIVERSITI TEKNOLOGI MALAYSIA

POSITION CONTROL USING FUZZY-BASED CONTROLLER FOR PNEUMATIC-SERVO CYLINDER IN BALL AND BEAM APPLICATION MUHAMMAD ASYRAF BIN AZMAN

ADSORPTION OF ARSENATE BY HEXADECYLPYRIDINIUM BROMIDE MODIFIED NATURAL ZEOLITE MOHD AMMARUL AFFIQ BIN MD BUANG UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF PROCESS-BASED ENTROPY MEASUREMENT FRAMEWORK FOR ORGANIZATIONS MAHMOOD OLYAIY

DEVELOPMENT OF A COMPUTER INTERFACING TECHNIQUE FOR THE STUDY OF MAGNETIC FORCES OF SUPERCONDUCTOR AND PERMANENT MAGNET

SHAPE-BASED TWO DIMENSIONAL DESCRIPTOR FOR SEARCHING MOLECULAR DATABASE

EFFECTS OF Ni 3 Ti (DO 24 ) PRECIPITATES AND COMPOSITION ON Ni-BASED SUPERALLOYS USING MOLECULAR DYNAMICS METHOD

ULTIMATE STRENGTH ANALYSIS OF SHIPS PLATE DUE TO CORROSION ZULFAQIH BIN LAZIM

COMPUTATIONAL MODELLING AND SIMULATION OF BIOMAGNETIC FLUID FLOW IN A STENOTIC AND ANEURYSMAL ARTERY NURSALASAWATI BINTI RUSLI

ONLINE LOCATION DETERMINATION OF SWITCHED CAPACITOR BANK IN DISTRIBUTION SYSTEM AHMED JAMAL NOORI AL-ANI

WIND TUNNEL TEST TO INVESTIGATE TRANSITION TO TURBULENCE ON WIND TURBINE AIRFOIL MAHDI HOZHABRI NAMIN UNIVERSITI TEKNOLOGI MALAYSIA

THE EFFECT OF THIN-LAYER ELEMENTS IN STRUCTURAL MODELING OF RAIL-TRACK SUPPORTING SYSTEM

SORPTION OF CHROMIUM(VI) AND COPPER(II) FROM AQUEOUS SOLUTION BY CHEMICALLY-MODIFIED RICE HULL

NUMERICAL INVESTIGATION OF TURBULENT NANOFLUID FLOW EFFECT ON ENHANCING HEAT TRANSFER IN STRAIGHT CHANNELS DHAFIR GIYATH JEHAD

MORPHOLOGICAL, GENETIC AND BIOLOGICAL STUDIES OF RED PALM WEEVIL, Rhynchophorus spp. (COLEOPTERA: CURCULIONIDAE) IN TERENGGANU, MALAYSIA

CHANGE DETECTION ON KLANG AREA USING LANDSAT 5-TM DATA NURAMALINA BINTI MAT SERAH UNIVERSITI TEKNIKAL MALAYSIA MELAKA

NUMERICAL SIMULATIONS ON THE EFFECTS OF USING VENTILATION FAN ON CONDITIONS OF AIR INSIDE A CAR PASSENGER COMPARTMENT INTAN SABARIAH BINTI SABRI

DEVELOPMENT OF GEODETIC DEFORMATION ANALYSIS SOFTWARE BASED ON ITERATIVE WEIGHTED SIMILARITY TRANSFORMATION TECHNIQUE ABDALLATEF A. M.

MATHEMATICAL MODELLING OF UNSTEADY BIOMAGNETIC FLUID FLOW AND HEAT TRANSFER WITH GRAVITATIONAL ACCELERATION

ENHANCED COPY-PASTE IMAGE FORGERY DETECTION BASED ON ARCHIMEDEAN SPIRAL AND COARSE-TO-FINE APPROACH MOHAMMAD AKBARPOUR SEKEH

SYNTHESIS AND CHARACTERIZATION OF MESO-SUBSTITUTED PORPHYRIN MUHAMMAD TAHIR MUHAMMAD

INTEGRATED MALAYSIAN METEOROLOGICAL DATA ATMOSPHERIC DISPERSION SOFTWARE FOR AIR POLLUTANT DISPERSION SIMULATION

A GENERALIZED POWER-LAW MODEL OF BLOOD FLOW THROUGH TAPERED ARTERIES WITH AN OVERLAPPING STENOSIS HUDA SALMI BINTI AHMAD

HYDROGEN RECOVERY FROM THE REFORMING GAS USING COMMERCIAL ACTIVATED CARBON MEHDI RAHMANIAN

ROOFTOP MAPPING AND INFORMATION SYSTEM FOR RAINWATER HARVESTING SURAYA BINTI SAMSUDIN UNIVERSITI TEKNOLOGI MALAYSIA

SYNTHESIS AND CHARACTERIZATION OF POLYACRYLAMIDE BASED HYDROGEL CONTAINING MAGNESIUM OXIDE NANOPARTICLES FOR ANTIBACTERIAL APPLICATIONS

HYDROTHERMAL SYNTHESIS OF VANADIUM PHOSPHORUS OXIDE CATALYSTS FOR SELECTIVE OXIDATION OF n-butane TO MALEIC ANHYDRIDE

ELIMINATION OF RAINDROPS EFFECTS IN INFRARED SENSITIVE CAMERA AHMAD SHARMI BIN ABDULLAH

UNIVERSITI PUTRA MALAYSIA DESIGN OF ROBUST PARTICLE SWARM OPTIMIZATION - TUNED FUZZY CONTROLLER FOR A SINGLE AXIS SMALL MAGNETIC LEVITATION SYSTEM

CLASSIFICATION OF MULTIBEAM SNIPPETS DATA USING STATISTICAL ANALYSIS METHOD LAU KUM WENG UNIVERSITITEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA REMOVAL OF METHYL ORANGE AND METHYLENE BLUE FROM AQUEOUS SOLUTION USING DRAGON FRUIT FOLIAGE

DETECTION OF STRUCTURAL DEFORMATION FROM 3D POINT CLOUDS JONATHAN NYOKA CHIVATSI UNIVERSITI TEKNOLOGI MALAYSIA

SOLUBILITY MODEL OF PALM OIL EXTRACTION FROM PALM FRUIT USING SUB-CRITICAL R134a NUR SYUHADA BINTI ABD RAHMAN

UNIVERSITI PUTRA MALAYSIA ANALYTICAL APPROACH FOR LINEAR PROGRAMMING USING BARRIER AND PENALTY FUNCTION METHODS PARWADI MOENGIN FSAS

MATHEMATICAL MODELING FOR TSUNAMI WAVES USING LATTICE BOLTZMANN METHOD SARA ZERGANI. UNIVERSITI TEKNOLOGI MALAYSIAi

OPTICAL TWEEZER INDUCED BY MICRORING RESONATOR MUHAMMAD SAFWAN BIN ABD AZIZ

UNIVERSITI PUTRA MALAYSIA CONVECTION BOUNDARY LAYER FLOWS OVER NEEDLES AND CYLINDERS IN VISCOUS FLUIDS SYAKILA BINTI AHMAD IPM

MONTE CARLO SIMULATION OF NEUTRON RADIOGRAPHY 2 (NUR-2) SYSTEM AT TRIGA MARK II RESEARCH REACTOR OF MALAYSIAN NUCLEAR AGENCY

OPTIMAL CONTROL BASED ON NONLINEAR CONJUGATE GRADIENT METHOD IN CARDIAC ELECTROPHYSIOLOGY NG KIN WEI UNIVERSITI TEKNOLOGI MALAYSIA

GENERATING MULTI-LEVEL OF DETAILS FOR THREE-DIMENSIONAL BUILDING MODELUSINGTERRESTRIAL LASER SCANNINGDATA RIZKA AKMALIA

DESIGN AND DEVELOPMENT OF A NOVEL MULTIWAVELENGTH BRILLOUIN-ERBIUM FIBER LASER

SYNTHESIS AND CHARACTERIZATION OF SUPRAMOLECULAR POLYMER BASED ON LINOLEIC ACID OF SUNFLOWER OIL MILI PURBAYA UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI PUTRA MALAYSIA NECESSARY AND SUFFICIENT CONDITION FOR EXTENTION OF CONVOLUTION SEMIGROUP MAI ZURWATUL AHLAM BINTI MOHD JAFFAR FS

CHARACTERISTICS OF SOLITARY WAVE IN FIBER BRAGG GRATING MARDIANA SHAHADATUL AINI BINTI ZAINUDIN UNIVERSITI TEKNOLOGI MALAYSIA

UNIVERSITI SAINS MALAYSIA. CCS513 Computer Vision and Image Analysis [Penglihatan Komputer dan Analisis Imej]

DENSITY FUNCTIONAL THEORY SIMULATION OF MAGNETISM DUE TO ATOMIC VACANCIES IN GRAPHENE USING SIESTA

ADSORPTION AND STRIPPING OF ETHANOL FROM AQUEOUS SOLUTION USING SEPABEADS207 ADSORBENT

OPTIMIZATION OF CHROMIUM, NICKEL AND VANADIUM ANALYSIS IN CRUDE OIL USING GRAPHITE FURNACE ATOMIC ABSORPTION SPECTROSCOPY NURUL HANIS KAMARUDIN

UNIVERSITI PUTRA MALAYSIA DIELECTRIC PROPERTIES OF STRONTIUM TITANATE AND CALCIUM TITANATE PREPARED VIA SOLID STATE AND MECHANICAL ALLOYING METHODS

UNIVERSITI PUTRA MALAYSIA

PREDICTION OF FREE FATTY ACID IN CRUDE PALM OIL USING NEAR INFRARED SPECTROSCOPY SITI NURHIDAYAH NAQIAH BINTI ABDULL RANI

PREPARATION AND CHARACTERIZATION OF MICROWAVE-MODIFIED ADSORBENTS FROM Casuarina equisetifolia SEEDS FOR DYE ADSORPTION APPLICATION

UNIVERSITI PUTRA MALAYSIA EFFECT OF NON-UNIFORM TEMPERATURE GRADIENT AND MAGNETIC FIELD ON MARANGONI AND BENARD-MARANGONI CONVECTION

ENGINEERING PROPERTIES OF OLDER ALLUVIUM BADEE ABDULQAWI HAMOOD ALSHAMERI. Universiti Teknologi Malaysia

INFLUENCES OF GROUNDWATER, RAINFALL, AND TIDES ON BEACH PROFILES CHANGES AT DESARU BEACH FARIZUL NIZAM BIN ABDULLAH

STABILITY OF TRIAXIAL WEAVE FABRIC COMPOSITES EMPLOYING FINITE ELEMENT MODEL WITH HOMOGENIZED CONSTITUTIVE RELATION NORHIDAYAH RASIN

UNIVERSITI SAINS MALAYSIA. CIT562 Bioinformatics Computing [Perkomputeran Bioinformatik]

UNIVERSITI PUTRA MALAYSIA

SEDIMENTATION RATE AT SETIU LAGOON USING NATURAL. RADIOTRACER 210 Pb TECHNIQUE

MATERIAL SELECTION IN MECHANICAL DESIGN OF CAR BUMPER NURUL AZWAN BIN ADNAN BACHELOR OF ENGINEERING UNIVERSITI MALAYSIA PAHANG

THE DEVELOPMENT OF PORTABLE SENSOR TO DETERMINE THE FRESHNESS AND QUALITY OF FRUITS USING CAPACITIVE TECHNIQUE LAI KAI LING

UNIVERSITI PUTRA MALAYSIA CARBON NANOTUBE - BASED MICROWAVE RESONANT SENSOR FOR ORGANIC CONTAMINANTS DETECTION AHMAD MOHAMMADI

RAINFALL SERIES LIM TOU HIN

PENGGUNAAN GAMBAR RAJAH DALAM MENYELESAIKAN MASALAH GERAKAN LINEAR SITI NOR HIDAYAH BINTI ISMAIL UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF A CUT-SLOPE STABILITY ASSESSMENT SYSTEM FOR PENINSULAR MALAYSIA SUHAIMI BIN JAMALUDIN

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF A NEW CONVERGING THERMAL WAVE TECHNIQUE FOR DIFFUSIVITY MEASUREMENT OF HIGH CONDUCTIVITY THIN FOILS

UNIVERSITI PUTRA MALAYSIA COPYRIGHT UPM PREPARATION AND CHARACTERIZATION OF HIGH- DENSITY POLYETHYLENE/POLYSTYRENE/CLAY NANOCOMPOSITES SUSSAN AZIZY

AMPLIFICATION OF PARTIAL RICE FLORIGEN FROM MALAYSIAN UPLAND RICE CULTIVAR HITAM AND WAI ABDULRAHMAN MAHMOUD DOGARA UNIVERSITI TEKNOLOGI MALAYSIA

ROOT FINDING OF A SYSTEM OF NONLINEAR EQUATIONS USING THE COMBINATION OF NEWTON, CONJUGATE GRADIENT AND QUADRATURE METHODS

UNIVERSITI PUTRA MALAYSIA ACCELERATING COSMOLOGIES WITH EXTENDED PRODUCT SPACES CH NG HAN SIONG ITMA

HUBUNGAN JARINGAN ANTARA PERUSAHAAN KECIL DAN SEDERHANA INDUSTRI PELANCONGAN DI KAMPUNG CHERATING LAMA, PAHANG SUHAINI BINTI IBRAHIM

Transcription:

A ROBUST COVER GENERATION TECHNIQUE FOR STEGANOGRAPHY USING 2D IMAGES By MD. NABIL BIN HJ. AHMAD ZAWAWI Thesis Submitted to the School of Graduate Studies,, In Fulfilment of the Requirement for the Degree of Master of Science September 2006

This thesis is dedicated to the Steganographers of the past, present and future To my wife, family, friends, supervisors and superiors Thank you for your support.

Abstract of thesis presented to the Senate of in fulfilment of the requirement for the degree of Master of Science A ROBUST COVER GENERATION TECHNIQUE FOR STEGANOGRAPHY USING 2D IMAGES By MD. NABIL HJ. AHMAD ZAWAWI September 2006 Chairman Faculty : Associate Professor Ramlan bin Mahmod, PhD : Computer Science and Information Technology Steganography is still in its infancy as in comparison to cryptography in terms of research and development. The word steganography comes from the Greek roots Steganos Graphos, that literary means covered writing. While cryptography aims to obstruct information access to unintended third party, the aim of steganography is to deny the very existence of it. Users of steganography do not advertise the existence of information in fact, denies its existence in the first place. Cryptography can be used prior to using steganography for an added layer of data security. The general model for steganography consists of three main components, that is the embedded data (the message one wishes to secretly send), the CoverObject (the media being used to hide the data) and the StegoObject (the product of using coverobject to hide the embedded data). Simmons (1984) introduces the Prisoners Problem as a classic scenario for covert communication. The problem describes a scenario where two prisoners named Alice and Bob that are put in two different cells and needed to communicate an escape plan with each other.

All communications need to go through the warden, Willy and as long as Willy does not suspect anything, the communication can be put through. Many steganographic techniques mainly focus on the information payload and undetectability of the system. In this research, we approach the steganographic problem of a passive warden and also with great considerations the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned. We see this third criteria as equally important as the first and second because an active attack does not require the attacker to know whether an object is a stegoobject or not. An active attack simply change or modify a particular object s characteristic in its path with conditions that the object is still viewable and acceptable for general view. Applying the cover generation technique, the proposed steganographic technique can evade detection, able to carry useful amount of information and also at the same time survives an active attack that can jeopardise the information it carries.

Abstrak tesis yang dikemukakan kepada Senat sebagai memenuhi keperluan untuk ijazah Master Sains TEKNIK PENJANAAN SAMARAN TEGAR BAGI STEGANOGRAFI MENGGUNAKAN IMEJ 2D Oleh MD. NABIL HJ. AHMAD ZAWAWI September 2006 Pengerusi Fakulti : Profesor Madya Ramlan bin Mahmod, PhD : Sains Komputer dan Teknologi Maklumat Berbanding dengan kriptografi, steganografi merupakan bidang yang masih baharu dari segi penyelidikan dan pembangunan. Perkataan steganografi berasal daripada kata akar Greek, Steganos Graphos, yang secara ilmiahnya bermaksud penulisan samaran. Berbanding kriptografi yang bertujuan untuk menghalang capaian maklumat kepada pihak yang tidak sepatutnya, tujuan steganografi adalah untuk menidakkan sepenuhnya kewujudan maklumat tersebut. Pengguna steganografi tidak memberitahu langsung tentang kewujudan maklumat bahkan, menafikan kewujudannya dari awal lagi. Kriptografi boleh digunakan sebelum menggunakan steganografi untuk menambahkan satu lagi lapisan keselamatan data. Model umum steganografi terdiri daripada tiga komponen utama, iaitu data terbenam (mesej yang ingin dihantar secara rahsia), objeksamaran (media yang digunakan untuk menyembunyikan data) dan juga objekstego (objek yang terhasil daripada penggunaan objeksamaran untuk menyembunyikan data terbenam). Simmons (1984) memperkenalkan permasalahan tahanan sebagai sebuah senario klasik untuk komunikasi rahsia. Permasalahan tersebut

menerangkan sebuah senario di mana dua orang tahanan bernama Alice dan Bob yang telah diletakkan di dalam dua sel tahanan berasingan dan mereka perlu berkomunikasi untuk berbincang tentang rancangan untuk melarikan diri. Semua komunikasi perlu dibuat melalui seorang warden bernama Willy dan selagi Willy tidak mengesyaki apa-apa, komunikasi tersebut akan berjalan lancar. Kebanyakan teknik steganografi hanya memfokuskan kepada kadar muatan maklumat dan keupayaan sistem tersebut mengelak daripada pengesanan. Dalam penyelidikan ini, kami mendekati permasalahan steganografi dari segi seorang warden yang pasif dan juga dengan pertimbangan yang mendalam terhadap ancaman serangan aktif daripada warden yang aktif di mana ketahanan objekstego diambil kira. Kami melihat kriteria ketiga ini sebagai sama penting dengan ciri pertama dan kedua kerana serangan aktif tidak memerlukan penyerang untuk mengetahui sama ada sesuatu objek itu adalah sebuah objekstego ataupun tidak. Sebuah serangan aktif hanya perlu menukar atau mengubah suai ciri sesebuah objek dalam laluannya dengan syarat objek tersebut masih boleh dilihat dan diterima untuk tatapan umum. Dengan mengaplikasikan teknik penjanaan samaran, teknik steganografi yang dicadangkan mampu mengelak daripada pengesanan, mampu membawa sejumlah maklumat yang berguna dan dalam masa yang sama dapat mengatasi serangan aktif yang boleh mengancam maklumat yang dibawanya.

ACKNOWLEDGEMENTS Many thanks go firstly, as they should always be, to Allah, who blessed me with the ability to undertake and finally complete this work. With a deep sense of gratitude, I wish to express my sincere thanks to my supervisors, Assoc. Prof. Dr. Ramlan bin Mahmod and Dr. Rahmita Wirza O.K. Rahmat for their immense help and patience in guiding and supervising me throughout completing this research work. Many thanks to my colleagues and fellow friends for the help extended to me when I approached them and the valuable discussions we had during the course of research. The cooperation I received from other faculty members is gratefully acknowledged. I would like to share this moment of happiness with my parents Hj. Ahmad Zawawi bin Hj. Ali and Hjh. Siti Zubaidah bt Abdun, who taught me the values of faith and hard work by their own example. The episode of acknowledgement would not be complete without the mention of my beloved wife Mrs. Norazmalinda binti Abdullah for her patience and for providing me constant encouragement who have rendered me enormous support during the whole tenure of my research. I am grateful for the inspiration and moral support she provided throughout my research work. Finally, I would like to thank all whose direct and indirect supports helped me upon completing my thesis on time.

I certify that an Examination Committee has met on 14 September 2006 to conduct the final examination of Md. Nabil Ahmad Zawawi on his master of science thesis entitled "A Robust Cover Generation Technique For Steganography Using 2D Images" in accordance with Universiti Pertanian Malaysia (Higher Degree) Act 1980 and Universiti Pertanian Malaysia (Higher Degree) Regulations 1981. The Committee recommends that the candidate be awarded the relevant degree. Members of the Examination Committee are as follows: Mohamed Othman, PhD Associate Professor Faculty of Computer Science and Information Technology (Chairman) Hajah Fatimah Dato Ahmad, PhD Associate Professor Faculty of Computer Science and Information Technology (Internal Examiner) Shyamala Doraisamy, PhD Lecturer Faculty of Computer Science and Information Technology (Internal Examiner) Mohamad Shanudin Zakaria, PhD Associate Professor Faculty of Technology and Information Science Universiti Kebangsaan Malaysia (External Examiner) HASANAH MOHD. GHAZALI, PhD Professor/Deputy Dean School of Graduate Studies Date:

This thesis submitted to the Senate of and has been accepted as fulfilment of the requirement for the degree of Master of Science. The members of the Supervisory Committee are as follows: Ramlan bin Mahmod, PhD Associate Professor Faculty of Computer Science and Information Technology (Chairman) Rahmita Wirza O.K. Rahmat, PhD Lecturer Faculty of Computer Science and Information Technology (Member) AINI IDERIS, PhD Professor/Dean School of Graduate Studies Date: 8 FEBRUARI 2007

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at UPM or other institutions. MD. NABIL BIN AHMAD ZAWAWI Date: 18 DECEMBER 2006

LIST OF TABLES Table Page 1 Adversarial Model (Johnson et al., 2001) 2.21 2 Summary of JPEG Compression Test 5.25 3 Summary of Image conversion Test 5.27 4 Summary of Image Processing Test 5.33

LIST OF FIGURES Figure Page 1 A Classification of Information Hiding Techniques (Pfitzmann, 1996) 2.5 2 General Model for Steganography 2.7 3 The Prisoner s Problem 2.9 4 StegoScenery Process 3.3 5 StegoScenery Environment 3.4 6 StegoScenery Architecture 3.5 7 Context Level DFD for StegoScenery System 3.6 8 Level 1 DFD for StegoScenery System 3.7 8 (a) Algorithm for the Rendering Module 3.8 8 (b) Rendering Module FlowChart 3.9 8 (c) Algorithm for the Retrieving Module 3.11 8 (d) The Retrieving Module 3.12 9 (a) Texture Repository Clouds 3.14 9 (b) Texture Repository Trees 3.14 9 (c) Texture Repository Kid A 3.15 9 (d) Texture Repository Kid B 3.15 9 (e) Texture Repository Kid C 3.16 9 (f) Texture Repository Kid D 3.16 9 (g) Texture Repository TShirt Prints A 3.17 9 (h) Texture Repository TShirt Prints B 3.17 10 Example of Character to Object Representation 4.3 11 (a) Object Location Reference 4.3 11 (b) Example of Object Location Scattered by Key 2 4.4 12 The Secret Message 4.5 13 The StegoImage Generated by StegoScenery 4.5 14 Character Location Reference After Assignment 4.7 15 Reference File To Encode The Object To Character Representations 4.8 16 Decoding Process For The Second And Third Character Of The Message 4.9 17 Original Image Cover Image 5.8 18 Enhanced LSB Experiment Result 5.9 18 (a) Histogram analysis of the Original Image 5.10 18 (b) Histogram Analysis of the StegoImage from StegoScenery 5.10 18 (c) Histogram Analysis for the Second Comparison 5.11 18 (d) Histogram Analysis of the StegoImage from InThePicture 5.12 18 (e) Histogram Analysis of the StegoImage from InPlainView 5.12 18 (f) Histogram Analysis of the StegoImage from PictureMessenger 5.13 18 (g) Histogram Analysis for the Third Comparison 5.14 18 (h) Histogram Analysis of the StegoImage from ImageHide 5.14 19 Visual Test Using The Compression Tool Winzip 5.16 20 (a) Statistical Test for Original Image 5.18 20 (b) Statistical Test for StegoScenery Image 5.18

20 (c) Statistical Test for InThePicture Image 5.19 20 (d) Statistical Test for InPlainView Image 5.19 20 (e) Statistical Test for ImageHide Image 5.20 20 (f) Statistical Test for PictureMessenger Image 5.20