SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
STEGANOGRAPHY 
Steganography is a useful tool that allows covert 
transmission of information over an overt 
communications channel. Combining covert channel 
exploitation with the encryption methods of substitution 
ciphers and/or one time pad cryptography, steganography 
enables the user to transmit information masked inside of 
a file in plain view. The hidden data is both difficult to 
detect and when combined with known encryption 
algorithms, equally difficult to decipher. 
This paper provides a general overview of the following 
subject areas: historical cases and examples using 
steganography, how steganography works, what 
steganography software is commercially available and 
what data types are supported, what methods and 
automated tools are available to aide computer forensic 
investigators and information security professionals in 
detecting the use of steganography, after detection has 
occurred, can the embedded message be reliably 
extracted, can the embedded data be separated from the 
carrier revealing the original file, and finally, what are 
some methods to defeat the use of steganography even if 
it cannot be reliably detected. 
INTRODUCTION 
Within the field of Computer Forensics, investigators 
should be aware that steganography can be an effective 
means that enables concealed data to be transferred
inside of seemingly innocuous carrier files. Knowing 
what software applications are commonly available and 
how they work gives forensic investigators a greater 
probability of detecting, recovering, and eventually 
denying access to the data that mischievous individuals 
and programs are openly concealing. 
Generally speaking, steganography brings science to the 
art of hiding information. The purpose of steganography 
is to convey a message inside of a conduit of 
misrepresentation such that the existence of the message 
is both hidden and difficult to recover when discovered. 
The word steganography comes from two roots in the 
Greek language, “Stegos” meaning hidden / covered / or 
roof, and “Graphia” simply meaning writing . 
Similar in nature to the slight of hand used in traditional 
magic, steganography uses the illusion of normality to 
mask the existence of covert activity. The illusion is 
manifested through the use of a myriad of forms 
including written documents, photographs, paintings, 
music, sounds, physical items, and even the human body. 
Two parts of the system are required to accomplish the 
objective, successful masking of the message and 
keeping the key to its location and/or deciphering a 
secret. 
When categorized within one of the two fundamental 
security mechanisms of computer science (cryptographic 
protocols and maintaining control of the CPUs 
instruction pointer), steganography clearly fits within 
cryptography. It closely mirrors common cryptographic 
protocols in that the embedded information is revealed in
much the same manner as substitution or Bacon cipher 
mechanisms . 
This paper will highlight some historical examples, 
discuss the basic principles of steganography showing 
how most instances work, identify software that can be 
used for this purpose, and finally provide an overview of 
current methods employed to detect and defeat it. 
TOOLS 
USED 
FOR 
STEGANOGRAPHY 
StegFS 
StegFS is a Steganographic File System for Linux. Not 
only does it encrypt data, it also hides it such that it 
cannot be proved to be there. Note that this is still 'under 
development'. It is not bug-free yet. There may be 
possibly serious problems. In short, if it destroys your 
computer or your data or causes a minor nuclear 
holocaust don't blame the programmers. Feel free to try 
it, but don't get too upset if you have problems. There are 
still bugs/misfeatures that want fixing. However, it 
should be stable enough for use. You will need to know 
how to patch and compile a kernel. It is strongly 
recommended that you read "StegFS: A Steganographic 
File System for Linux" before attempting to use this file 
system. StegFS is distributed as a kernel patch and a 
tarball containing a set of utilities. You need both to be 
able to use StegFS. This package contains the utilities.
BMP Secrets 
BMP Secrets is another steganography program that 
allows you to store any information in a bitmap file. One 
big advantage of BMP Secrets is that it has a very large 
hiding capacity. Some features include: 
• The program uses an original steganography method 
developed by Parallel Worlds that allows you to 
replace up to 65 percent of the true- color BMP file 
with your data. You can convert the result image 
only to lossless format; lossy formats will destroy 
information inside. If you try to make any changes 
to the result image, information will also be lost. 
• You can choose hiding rate. The higher the hiding rate, 
the lower the quality. However, if you use the 
highest rate it is difficult to find any differences. 
• A built-in to encoding compressor that allows the 
storage of much more text files than binary. 
• You can hide not only in whole image, but also in part. 
You can choose a rectangle on the picture where 
data will be stored. Sometimes you can store two 
different files in two different squares of one image. 
It also increases the security level. 
• You can set an automatic quality option. The program 
will search for the best quality when the whole file 
can be stored. 
• Hiding spreads data all over the image when you 
provide a password. To withdraw an encoded file 
and to decode it is very difficult, because nobody 
except you knows the data-spreading order period. 
• You can view results of your hiding and compare the 
original with the result.
If the whole file cannot be placed in one picture, the file 
can be split. When you unhide this file, you can bring 
parts together into one file, allowing you to hide one big 
file in several images. It also increases the security level, 
as far as one needs all parts to extract hidden file.

Mais conteúdo relacionado

Mais procurados

Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
 
References2_Mahmoud_Anas
References2_Mahmoud_AnasReferences2_Mahmoud_Anas
References2_Mahmoud_AnasAnas Mahmoud
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 

Mais procurados (18)

Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Steganography
Steganography Steganography
Steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
F1803023843
F1803023843F1803023843
F1803023843
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxFall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptx
 
References2_Mahmoud_Anas
References2_Mahmoud_AnasReferences2_Mahmoud_Anas
References2_Mahmoud_Anas
 
319 325
319 325319 325
319 325
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
22
2222
22
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 

Destaque

Presentation1 jack
Presentation1   jackPresentation1   jack
Presentation1 jackTLeeTSIS
 
الواقع الافتراضي
الواقع الافتراضيالواقع الافتراضي
الواقع الافتراضيmuhanad03
 
Cha aim's story presentation
Cha aim's story presentationCha aim's story presentation
Cha aim's story presentationTLeeTSIS
 
Researching the market place 1
Researching the market place 1Researching the market place 1
Researching the market place 1haegf
 
It's Not Just GAAP! Stock Brokers Update: What You Need To Know
It's Not Just GAAP!  Stock Brokers Update: What You Need To KnowIt's Not Just GAAP!  Stock Brokers Update: What You Need To Know
It's Not Just GAAP! Stock Brokers Update: What You Need To KnowCitrin Cooperman
 
My journal ryu
My journal  ryuMy journal  ryu
My journal ryuTLeeTSIS
 
التكنولوجيا
التكنولوجيا التكنولوجيا
التكنولوجيا muhanad03
 
Presentasi resume i
Presentasi resume iPresentasi resume i
Presentasi resume iFita Permata
 
English abstracts
English abstractsEnglish abstracts
English abstractsmalisahmad
 
Naranjilla Micro-Propagation
Naranjilla Micro-PropagationNaranjilla Micro-Propagation
Naranjilla Micro-PropagationAdrianne Seiden
 
Ноутбук та його характеристики
Ноутбук та його характеристикиНоутбук та його характеристики
Ноутбук та його характеристикиnikolyuk22pgf
 
Problemática entre Estados Unidos y Rusia
Problemática entre Estados Unidos y RusiaProblemática entre Estados Unidos y Rusia
Problemática entre Estados Unidos y RusiaJordi Bellamy
 
Franchisors: How To Deal With California AB 525
Franchisors: How To Deal With California AB 525Franchisors: How To Deal With California AB 525
Franchisors: How To Deal With California AB 525Citrin Cooperman
 

Destaque (20)

Presentation1 jack
Presentation1   jackPresentation1   jack
Presentation1 jack
 
GAAP Update
GAAP UpdateGAAP Update
GAAP Update
 
الواقع الافتراضي
الواقع الافتراضيالواقع الافتراضي
الواقع الافتراضي
 
Cha aim's story presentation
Cha aim's story presentationCha aim's story presentation
Cha aim's story presentation
 
Snag it
Snag itSnag it
Snag it
 
Researching the market place 1
Researching the market place 1Researching the market place 1
Researching the market place 1
 
It's Not Just GAAP! Stock Brokers Update: What You Need To Know
It's Not Just GAAP!  Stock Brokers Update: What You Need To KnowIt's Not Just GAAP!  Stock Brokers Update: What You Need To Know
It's Not Just GAAP! Stock Brokers Update: What You Need To Know
 
Questionnaire Results
Questionnaire ResultsQuestionnaire Results
Questionnaire Results
 
Manifesto
ManifestoManifesto
Manifesto
 
My journal ryu
My journal  ryuMy journal  ryu
My journal ryu
 
التكنولوجيا
التكنولوجيا التكنولوجيا
التكنولوجيا
 
Presentasi resume i
Presentasi resume iPresentasi resume i
Presentasi resume i
 
English abstracts
English abstractsEnglish abstracts
English abstracts
 
Listrik Statis
Listrik StatisListrik Statis
Listrik Statis
 
Naranjilla Micro-Propagation
Naranjilla Micro-PropagationNaranjilla Micro-Propagation
Naranjilla Micro-Propagation
 
Classic
Classic Classic
Classic
 
Ноутбук та його характеристики
Ноутбук та його характеристикиНоутбук та його характеристики
Ноутбук та його характеристики
 
Problemática entre Estados Unidos y Rusia
Problemática entre Estados Unidos y RusiaProblemática entre Estados Unidos y Rusia
Problemática entre Estados Unidos y Rusia
 
Janashakthi
JanashakthiJanashakthi
Janashakthi
 
Franchisors: How To Deal With California AB 525
Franchisors: How To Deal With California AB 525Franchisors: How To Deal With California AB 525
Franchisors: How To Deal With California AB 525
 

Semelhante a Steganography

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 

Semelhante a Steganography (20)

Multimedia
MultimediaMultimedia
Multimedia
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Steganography
SteganographySteganography
Steganography
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
C01111519
C01111519C01111519
C01111519
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Steganography
SteganographySteganography
Steganography
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Steganography
SteganographySteganography
Steganography
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Steganography

  • 1. STEGANOGRAPHY Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining covert channel exploitation with the encryption methods of substitution ciphers and/or one time pad cryptography, steganography enables the user to transmit information masked inside of a file in plain view. The hidden data is both difficult to detect and when combined with known encryption algorithms, equally difficult to decipher. This paper provides a general overview of the following subject areas: historical cases and examples using steganography, how steganography works, what steganography software is commercially available and what data types are supported, what methods and automated tools are available to aide computer forensic investigators and information security professionals in detecting the use of steganography, after detection has occurred, can the embedded message be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some methods to defeat the use of steganography even if it cannot be reliably detected. INTRODUCTION Within the field of Computer Forensics, investigators should be aware that steganography can be an effective means that enables concealed data to be transferred
  • 2. inside of seemingly innocuous carrier files. Knowing what software applications are commonly available and how they work gives forensic investigators a greater probability of detecting, recovering, and eventually denying access to the data that mischievous individuals and programs are openly concealing. Generally speaking, steganography brings science to the art of hiding information. The purpose of steganography is to convey a message inside of a conduit of misrepresentation such that the existence of the message is both hidden and difficult to recover when discovered. The word steganography comes from two roots in the Greek language, “Stegos” meaning hidden / covered / or roof, and “Graphia” simply meaning writing . Similar in nature to the slight of hand used in traditional magic, steganography uses the illusion of normality to mask the existence of covert activity. The illusion is manifested through the use of a myriad of forms including written documents, photographs, paintings, music, sounds, physical items, and even the human body. Two parts of the system are required to accomplish the objective, successful masking of the message and keeping the key to its location and/or deciphering a secret. When categorized within one of the two fundamental security mechanisms of computer science (cryptographic protocols and maintaining control of the CPUs instruction pointer), steganography clearly fits within cryptography. It closely mirrors common cryptographic protocols in that the embedded information is revealed in
  • 3. much the same manner as substitution or Bacon cipher mechanisms . This paper will highlight some historical examples, discuss the basic principles of steganography showing how most instances work, identify software that can be used for this purpose, and finally provide an overview of current methods employed to detect and defeat it. TOOLS USED FOR STEGANOGRAPHY StegFS StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package contains the utilities.
  • 4. BMP Secrets BMP Secrets is another steganography program that allows you to store any information in a bitmap file. One big advantage of BMP Secrets is that it has a very large hiding capacity. Some features include: • The program uses an original steganography method developed by Parallel Worlds that allows you to replace up to 65 percent of the true- color BMP file with your data. You can convert the result image only to lossless format; lossy formats will destroy information inside. If you try to make any changes to the result image, information will also be lost. • You can choose hiding rate. The higher the hiding rate, the lower the quality. However, if you use the highest rate it is difficult to find any differences. • A built-in to encoding compressor that allows the storage of much more text files than binary. • You can hide not only in whole image, but also in part. You can choose a rectangle on the picture where data will be stored. Sometimes you can store two different files in two different squares of one image. It also increases the security level. • You can set an automatic quality option. The program will search for the best quality when the whole file can be stored. • Hiding spreads data all over the image when you provide a password. To withdraw an encoded file and to decode it is very difficult, because nobody except you knows the data-spreading order period. • You can view results of your hiding and compare the original with the result.
  • 5. If the whole file cannot be placed in one picture, the file can be split. When you unhide this file, you can bring parts together into one file, allowing you to hide one big file in several images. It also increases the security level, as far as one needs all parts to extract hidden file.