Yogesh Prajapati gave a presentation on steganography, which is the process of hiding a secret message within an ordinary message. He discussed how steganography works, its history including uses during World War II, different tools available, and common methods like hiding messages in images, audio, video or text files. Prajapati also covered attacks on steganography and limitations of existing tools, proposing an algorithm using Java that could hide large amounts of secret data in a carrier file with minimal size increase.
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Steganography.
1. A
Presenation
on
Steganography
Smart Way to Hide a Object . . .
By : Yogesh Prajapati
2. Who am I ?
Name : Yogesh Prajapati
Work : Java Developer
Education : Master of Computer Application
Skill (Java) : J2EE,
Spring(IOC & Security),
Hibernate,
JAX-WS,
Restful Architecture,
No-SQL(Lucene,Solr-Lucane Based Search Engine),
SQL(Ms Sql Server,MySql,PostgreSQL),
JSP, Javascript,Jquery,
Servlet,AJAX,
Load Balancing and Clustering(of App server & Db )
Logging Mechanism in Java,
Security of Web Application…………….
……And even Many More……..
3. Introduction
Steganography is the process of hiding one medium of communication
(text, sound or image) within another without changing in original
format.
Steganography
from the Greek word steganos meaning “covered”
and the Greek word graphie meaning “writing”
Stenography
στεγανός γραφία
Covered writing
4. Introduction Cont. . .
Steganography is the process of hiding of a secret message
within an ordinary message and extracting it at its destination
Anyone else viewing the message will fail to know it contains
hidden/encrypted data
With cryptography the information is known to exist,
but it is encoded in such a way that only the intended recipient can read it.
For Steganography Data Hidden in:
Sound
Text
Packet headers
Unused space of hard drives
Images
6. Example
fE: steganographic function "embedding“
fE-1: steganographic function "extracting"
cover: cover data in which emb will be hidden
emb: message to be hidden
key: parameter of fE
stego: cover data with the hidden message
7. History for Stenography
Ancient Greeks used wax-covered tablets
Tattooed shaved heads
Method used during WW-II
World War Two is better known for the birth of hardcore encoding
Example:
Apparently neutral's protest is thoroughly discounted
and ignored. Isman hard hit. Blockade issue affects
pretext for embargo on by products, ejecting suets and
vegetable oils.
Taking the second letter in each word the following message emerges:
8. History for Stenography
Ancient Greeks used wax-covered tablets
Tattooed shaved heads
Method used during WW-II
World War Two is better known for the birth of hardcore encoding
Example:
pparently neutral's protest is thoroughly discounted
A
and ignored. Isman hard hit. Blockade issue affects
pretext for embargo on by products, ejecting suets and
vegetable oils.
Taking the second letter in each word the following message emerges:
Pershing sails from NY June 1.
10. Not Cryptography?
Cryptography involves encrypting data
Steganography use data in original format
Steganography Cryptography
•Unknown message passing •Known message passing
•Little known technology •Common technology
•Technology still being developed •Most algorithms known to
for certain formats government departments
•Once detected message is •Strong algorithm are currently
known Many Carrier formats resistant to brute force attack
Large expensive computing
power required for cracking
Technology increase reduces
strength
11. Tools Available for Stenography
Over 800 different embedding software programs available
S-Tools – freeware for hiding data in GIF or .bmp image files or .wav files
Hide and Seek
J-Steg
EZ Stego
Image Hide
Digital Picture Envelope
Camouflage
Gif Shuffle
Spam Mimic
JP Hide & Seek
etc…
14. Implementing stenography
•Hiding a message inside a text
•Images
•Least-significant bit modifications
•Masking and filtering
•Audio and video
•IP datagram Steganography
•Algorithms and transformations
•Injection
15. Methods
•Null Cipher
•Steganography In Documents
•Onion Cipher
16. Null Cipher
Main purpose of using a Null Cipher
Hide message among irrelevant data
Confuse the cryptanalyst
Example
If I want to send some confidential Message is that
“Bring two cases of beer ”
For that I send a message to receiver
“ Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.”
22. Attacks on Stenography
Passive Attack
Attacker will try to
Detect the embedded message
Active Attack
Attacker will try to
Destroy the embedded message
Modify the embedded message
23. Attacks on Stenography
Known carrier attack:
The original cover media and stego media
Both are available for analysis.
Steganography only attack:
In this type of attacks, only stego
Media is available for analysis.
Known message attack:
The hidden message is known in this
Case.
Known Steganography attack:
The cover media, stego media as
Well as the Steganography tool or algorithm, are known.
24. Problems of Available Tools of stenography
There are so many tools available for hiding a message or
image or audio or video behind an any carrier file.
The tools are easy to use but a problem of tools is that there another tools
available which are working as reverse engineering of
previous tools means they are capable to find the availably
of out hidden file behind a carrier file.
Size Problem
25. Trying to Solve Problem
•Use of Algorithm in
Java
•In Operating System
Windows XP Professional
29. Difference is
Carrier File ( Size : 534 KB (546,933 bytes) )
Secret Data File (Size : 15.3 MB (16,061,760 bytes) )
New File From Tool ( After Processing Size is : 572 KB)
Difference in original and new file is ( 572 – 534 = 38 KB
)
33. Difference is
Carrier File ( Size : 534 KB (546,933 bytes) )
Secret Data File (Size : 7.77 KB (7,958 bytes) )
New File with zipped secret data
( After Processing Size is : 534 KB (547,256 bytes) )
Difference in original and new file is ( 534 – 534 = 0 KB)
Actual difference is
( 546,933 bytes - 547,256 bytes = 323 bytes )
34. The difference with normal process in
Invisible Secret is: 34 KB
And with our steps difference is 323 bytes
Approximately 100 times Effective than
normal procedure
35. Result
• After Testing this method for different type of medium
We found that this method is work effectively only for
Plain text data
• If you are using image,video,audio than this will work
But It will not give a satisfactory result same as for plain text