SlideShare a Scribd company logo
1 of 11
Steganography: Hiding Data Within Data
                                    Gary C. Kessler
                                    September 2001



   An edited version of this paper with the title "Hiding Data in Data" originally
         appeared in the April 2002 issue of Windows & .NET Magazine .



Cryptography — the science of writing in secret codes — addresses all of the elements
necessary for secure communication over an insecure channel, namely privacy,
confidentiality, key exchange, authentication, and non-repudiation. But cryptography
does not always provide safe communication.

Consider an environment where the very use of encrypted messages causes suspicion. If a
nefarious government or Internet service provider (ISP) is looking for encrypted
messages, they can easily find them. Consider the following text file; what else is it likely
to be if not encrypted?

    qANQR1DBwU4D/TlT68XXuiUQCADfj2o4b4aFYBcWumA7hR1Wvz9rbv2BR6WbEUsy
    ZBIEFtjyqCd96qF38sp9IQiJIKlNaZfx2GLRWikPZwchUXxB+AA5+lqsG/ELBvRa
    c9XefaYpbbAZ6z6LkOQ+eE0XASe7aEEPfdxvZZT37dVyiyxuBBRYNLN8Bphdr2zv
    z/9Ak4/OLnLiJRk05/2UNE5Z0a+3lcvITMmfGajvRhkXqocavPOKiin3hv7+Vx88
    uLLem2/fQHZhGcQvkqZVqXx8SmNw5gzuvwjV1WHj9muDGBY0MkjiZIRI7azWnoU9
    3KCnmpR60VO4rDRAS5uGl9fioSvze+q8XqxubaNsgdKkoD+tB/4u4c4tznLfw1L2
    YBS+dzFDw5desMFSo7JkecAS4NB9jAu9K+f7PTAsesCBNETDd49BTOFFTWWavAfE
    gLYcPrcn4s3EriUgvL3OzPR4P1chNu6sa3ZJkTBbriDoA3VpnqG3hxqfNyOlqAka
    mJJuQ53Ob9ThaFH8YcE/VqUFdw+bQtrAJ6NpjIxi/x0FfOInhC/bBw7pDLXBFNaX
    HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9HPTZXFG6iRIT0wa47
    AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXecWvxFsjR32ebz76U8aLpAK87GZEyTzBx
    dV+lH0hwyT/y1cZQ/E5USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53Y
    WIebvdiCqsOoabK3jEfdGExce63zDI0=
    =MpRf


The message above is a sentence in English that is encrypted using Pretty Good Privacy
(PGP), probably the most commonly used e-mail encryption software today. Besides
being nonsensical to a casual reader, the other indication that this is encrypted is that the
characters comprising the message appear more-or-less at random and do not adhere to
the relative frequency counts that one would expect in a non-encrypted message.
Encrypted data sticks out like a sore thumb.

Steganography is the science of hiding information. Whereas the goal of cryptography is
to make data unreadable by a third party, the goal of steganography is to hide the data
from a third party. In this article, I will discuss what steganography is, what purposes it
serves, and will provide an example using available software.

STEGANOGRAPHY

There are a large number of steganographic methods that most of us are familiar with
(especially if you watch a lot of spy movies!), ranging from invisible ink and microdots
to secreting a hidden message in the second letter of each word of a large body of text
and spread spectrum radio communication. With computers and networks, there are many
other ways of hiding information, such as:

   •   Covert channels (e.g., Loki and some distributed denial-of-service tools use the
       Internet Control Message Protocol, or ICMP, as the communications channel
       between the "bad guy" and a compromised system)
   •   Hidden text within Web pages
   •   Hiding files in "plain sight" (e.g., what better place to "hide" a file than with an
       important sounding name in the c:winntsystem32 directory?)
   •   Null ciphers (e.g., using the first letter of each word to form a hidden message in
       an otherwise innocuous text)

Steganography today, however, is significantly more sophisticated than the examples
above suggest, allowing a user to hide large amounts of information within image and
audio files. These forms of steganography often are used in conjunction with
cryptography so that the information is doubly protected; first it is encrypted and then
hidden so that an adversary has to first find the information (an often difficult task in and
of itself) and then decrypt it.

There are a number of uses for steganography besides the mere novelty. One of the most
widely used applications is for so-called digital watermarking. A watermark, historically,
is the replication of an image, logo, or text on paper stock so that the source of the
document can be at least partially authenticated. A digital watermark can accomplish the
same function; a graphic artist, for example, might post sample images on her Web site
complete with an embedded signature so that she can later prove her ownership in case
others attempt to portray her work as their own.

Stego can also be used to allow communication within an underground community.
There are several reports, for example, of persecuted religious minorities using
steganography to embed messages for the group within images that are posted to known
Web sites.

STEGANOGRAPHIC METHODS

The following formula provides a very generic description of the pieces of the
steganographic process:

               cover_medium + hidden_data + stego_key = stego_medium
In this context, the cover_medium is the file in which we will hide the hidden_data,
which may also be encrypted using the stego_key. The resultant file is the stego_medium
(which will, of course. be the same type of file as the cover_medium). The
cover_medium (and, thus, the stego_medium) are typically image or audio files. In this
article, I will focus on image files and will, therefore, refer to the cover_image and
stego_image.

Before discussing how information is hidden in an image file, it is worth a fast review of
how images are stored in the first place. An image file is merely a binary file containing a
binary representation of the color or light intensity of each picture element (pixel)
comprising the image.

Images typically use either 8-bit or 24-bit color. When using 8-bit color, there is a
definition of up to 256 colors forming a palette for this image, each color denoted by an
8-bit value. A 24-bit color scheme, as the term suggests, uses 24 bits per pixel and
provides a much better set of colors. In this case, each pix is represented by three bytes,
each byte representing the intensity of the three primary colors red, green, and blue
(RGB), respectively. The Hypertext Markup Language (HTML) format for indicating
colors in a Web page often uses a 24-bit format employing six hexadecimal digits, each
pair representing the amount of red, blue, and green, respectively. The color orange, for
example, would be displayed with red set to 100% (decimal 255, hex FF), green set to
50% (decimal 127, hex 7F), and no blue (0), so we would use "#FF7F00" in the HTML
code.

The size of an image file, then, is directly related to the number of pixels and the
granularity of the color definition. A typical 640x480 pix image using a palette of 256
colors would require a file about 307 KB in size (640 • 480 bytes), whereas a 1024x768
pix high-resolution 24-bit color image would result in a 2.36 MB file (1024 • 768 • 3
bytes).

To avoid sending files of this enormous size, a number of compression schemes have
been developed over time, notably Bitmap (BMP), Graphic Interchange Format (GIF),
and Joint Photographic Experts Group (JPEG) file types. Not all are equally suited to
steganography, however.

GIF and 8-bit BMP files employ what is known as lossless compression, a scheme that
allows the software to exactly reconstruct the original image. JPEG, on the other hand,
uses lossy compression, which means that the expanded image is very nearly the same as
the original but not an exact duplicate. While both methods allow computers to save
storage space, lossless compression is much better suited to applications where the
integrity of the original information must be maintained, such as steganography. While
JPEG can be used for stego applications, it is more common to embed data in GIF or
BMP files.

The simplest approach to hiding data within an image file is called least significant bit
(LSB) insertion. In this method, we can take the binary representation of the hidden_data
and overwrite the LSB of each byte within the cover_image. If we are using 24-bit color,
the amount of change will be minimal and indiscernible to the human eye. As an
example, suppose that we have three adjacent pixels (nine bytes) with the following RGB
encoding:

                           10010101      00001101       11001001
                           10010110      00001111       11001010
                           10011111      00010000       11001011


Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually
compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of
the 9 bytes above, we get the following (where bits in bold have been changed):

                           10010101      00001100       11001001
                           10010111      00001110       11001011
                           10011111      00010000       11001011


Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly
50%, of the LSBs.

This description is meant only as a high-level overview. Similar methods can be applied
to 8-bit color but the changes, as the reader might imagine, are more dramatic. Gray-scale
images, too, are very useful for steganographic purposes. One potential problem with any
of these methods is that they can be found by an adversary who is looking. In addition,
there are other methods besides LSB insertion with which to insert hidden information.

Without going into any detail, it is worth mentioning steganalysis, the art of detecting and
breaking steganography. One form of this analysis is to examine the color palette of a
graphical image. In most images, there will be a unique binary encoding of each
individual color. If the image contains hidden data, however, many colors in the palette
will have duplicate binary encodings since, for all practical purposes, we can't count the
LSB. If the analysis of the color palette of a given file yields many duplicates, we might
safely conclude that the file has hidden information.

But what files would you analyze? Suppose I decide to post a hidden message by hiding
it in an image file that I post at an auction site on the Internet. The item I am auctioning is
real so a lot of people may access the site and download the file; only a few people know
that the image has special information that only they can read. And we haven't even
discussed hidden data inside audio files! Indeed, the quantity of potential cover files
makes steganalysis a Herculean task.

A STEGANOGRAPHY EXAMPLE

There are a number of software packages that perform steganography on just about any
software platform; readers are referred to Neil Johnson's list of steganography tools at
http://www.jjtc.com/Steganography/toolmatrix.htm. Some of the better known packages
for Windows NT and Windows 2000 systems include:

   •   Hide4PGP (http://www.heinz-repp.onlinehome.de/Hide4PGP.htm)
   •   MP3Stego (http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/)
   •   Stash (http://www.smalleranimals.com/stash.htm)
   •   Steganos (http://www.steganos.com/english/steganos/download.htm)
   •   S-Tools (available from http://www.webattack.com/download/dlstools.shtml)
FIGURE 1. The cover_image (5th wave.gif), hidden_data file (virusdetectioninfo.txt), and stego_key.




The following examples come from Andy Brown's S-Tools for Windows. S-Tools allows
users to hide information into BMP, GIF, or WAV files. The basic scheme of the
program is straight-forward; you drag an image or audio file into the S-Tools active
window to act as the cover_medium, drag the hidden_data file onto the cover_medium,
and then provide a stego_key for encryption. The result is the stego_medium. All of this
is shown in Figure 1:

     1. I highlighted the GIF image file 5th wave.gif and dragged it to the S-Tools active
        window. Note that S-Tools reports that up to 138,547 bytes can be hidden in this
        image file.
     2. I next highlighted a 14 KB text file called virusdetectioninfo.txt and dragged it
        onto the image file in S-Tools.
     3. A dialog box pops up telling me that I am hiding 6,019 bytes of data and asks for
        a passphrase with which to encrypt the hidden text; the default secret key crypto
        scheme used by S-Tools is the International Data Encryption Algorithm (IDEA).
FIGURE 3. Extracting hidden information from the image file.




    Once the image file has been received, the user merely drags the file to S-Tools
    and right-clicks over the image, specifying the Reveal option. A dialog box will
    pop up requesting the passphrase. Figure 3 shows the information about the
    hidden archive file, and allows the user to open the file.
CONCLUSION

  Steganography is a really interesting subject and outside of the mainstream
  cryptography and system administration that most of us deal with day after day.
  But it is also quite real; this is not just something that's used in the lab or an
  arcane subject of study in academia. Stego may, in fact, be all too real — there
  have been several reports that the terrorist organization behind the September 11
  attacks in New York City, Washington, D.C., and outside of Pittsburgh used
  steganography as one of their means of communication.

  Two of the more recent books on the subject are Information Hiding:
  Steganography and Watermarking - Attacks and Countermeasures by N.F.
  Johnson, Z. Duric, and S. Jajodia (Kluwer Academic Publishers, 2000) and
  Information Hiding Techniques for Steganography and Digital Watermarking,
  edited by S. Katzenbeisser and F.A.P. Petitcolas (Artech House Books, 2000).
  One of the most informative Web sites on the subject is Neil Johnson's
  Steganography & Digital Watermarking Page at
  http://www.jjtc.com/Steganography/.




                                     SIDEBAR
                            Other Forms of Steganography



  While much of the steganography employed today is quite high-tech,
  steganography itself can make use of many low-tech methods. The goal of stego
  is merely to hide the presence of a message; remember how well the critical
  missive was hidden in plain sight in Poe's "The Purloined Letter"?

  One common, almost obvious, form of steganography is called a null cipher. In
  this type of stego, the hidden message is formed by taking the first (or other fixed)
  letter of each word in the cover message. Consider this cablegram that might have
  been sent by a journalist/spy from the U.S. to Europe during World War I:

PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT
IMMENSELY.

  The first letters of each word form the character string:
  PERSHINGSAILSFROMNYJUNEI. A little imagination and some spaces yields the
  real message: PERSHING SAILS FROM NY JUNE I.
Another form of steganography uses a template (e.g., a piece of paper with holes
cut in it) or a set of preselected locations on the page to hide a message. In this
case, obviously, the sender and receiver must use the same template or rules.
Consider this note:

THE MOST COMMON WORK ANIMAL IS THE HORSE. THEY CAN BE USED
TO FERRY EQUIPMENT TO AND FROM WORKERS OR TO PULL A PLOW.
BE CAREFUL, THOUGH, BECAUSE SOME HAVE SANK UP TO THEIR
KNEES IN MUD OR SAND, SUCH AS AN INCIDENT AT THE BURLINGTON
FACTORY LAST YEAR. BUT HORSES REMAIN A SIGNIFICANT FIND. ON
A FARM, AN ALTERNATE WORK ANIMAL MIGHT BE A BURRO BUT THEY
ARE NOT AS COMFORTABLE AS A TRANSPORT ANIMAL.

Applying a template or rule as to which words to read to this message might yield
the following:

                                             HORSE
    FERRY
                                                 SANK
        IN                                                     BURLINGTON
                                                                 FIND
              ALTERNATE
                                    TRANSPORT

There are other alternatives to the template method such as:

   o   Pinpricks in maps to use as an overlay for relevant letters in messages
   o   Deliberate misspelling to mark words in the message
   o   Use of small changes in spacing to indicate significant letters or words in a
       hidden message
   o   Use of a slightly different font in a typeset message to indicate the hidden
       letters (e.g., the difference between Courier and Courier New is
       barely noticeable unless you are looking for it)

Steganography doesn't just apply to written forms of communication. Radio and
TV messages, from World War II to today, can be used to hide coded or hidden
messages. Some government sources suspect that Osama bin Laden's pre-
recorded videos that are re-played on TV stations around the world contain hidden
messages.

Some argue that the U.S. Marine Corps Navaho code talkers of WWII represent a
form of steganography. The messages themselves weren't encrypted; the plaintext
was right there in the open, just in a language that was unknown by the Japanese.
Disappearing ink and microdots are other ways in which messages can be hidden
from the casual observer.

One of the oldest stego schemes was to shave the head of a messenger and tattoo a
message on the messenger's head. After the hair grows back, the messenger can
be sent to the intended recipient, where the messenger's head can be shaved and
the message recovered. This method is decidingly clever, patient, and very low-
tech, and goes right to the heart of steganography's literal meaning of "covered
writing."



ABOUT THE AUTHOR: Gary C. Kessler is an Associate Professor and
program director of the Computer Networking major at Champlain College in
Burlington, Vermont, and an independent consultant and writer. His e-mail
address is kumquat@sover.net.

More Related Content

What's hot

Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
 
B03208016
B03208016B03208016
B03208016inventy
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 

What's hot (19)

Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
B03208016
B03208016B03208016
B03208016
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 

Viewers also liked

Voice & accent
Voice & accentVoice & accent
Voice & accentAqib Memon
 
If Everyone Was a Vegetarian
If Everyone Was a VegetarianIf Everyone Was a Vegetarian
If Everyone Was a Vegetarianbpavic13
 
how to have New ideas
how to have New ideashow to have New ideas
how to have New ideasAqib Memon
 
Corporate crime reporter
Corporate crime reporterCorporate crime reporter
Corporate crime reporterAqib Memon
 
Human personality and its pathology
Human personality and its pathologyHuman personality and its pathology
Human personality and its pathologyAqib Memon
 
Mentally slow poision
Mentally slow poisionMentally slow poision
Mentally slow poisionAqib Memon
 
Voice & accent
Voice & accentVoice & accent
Voice & accentAqib Memon
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humorAqib Memon
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyAqib Memon
 
約會暴力 基礎篇
約會暴力 基礎篇約會暴力 基礎篇
約會暴力 基礎篇TAGV-moodle
 
約會暴力 迷思篇
約會暴力 迷思篇約會暴力 迷思篇
約會暴力 迷思篇TAGV-moodle
 
The way to get rid of fatness
The way to get rid of fatnessThe way to get rid of fatness
The way to get rid of fatnessAqib Memon
 
Андрей Беленко "Безопасность мобильных приложений "
Андрей Беленко "Безопасность мобильных приложений "Андрей Беленко "Безопасность мобильных приложений "
Андрей Беленко "Безопасность мобильных приложений "IT Event
 
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"IT Event
 
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"IT Event
 

Viewers also liked (20)

certificates_vdberg (2)
certificates_vdberg (2)certificates_vdberg (2)
certificates_vdberg (2)
 
Voice & accent
Voice & accentVoice & accent
Voice & accent
 
If Everyone Was a Vegetarian
If Everyone Was a VegetarianIf Everyone Was a Vegetarian
If Everyone Was a Vegetarian
 
New ideas
New ideasNew ideas
New ideas
 
certificates_vdberg (2)
certificates_vdberg (2)certificates_vdberg (2)
certificates_vdberg (2)
 
how to have New ideas
how to have New ideashow to have New ideas
how to have New ideas
 
certificates_vdberg (2)
certificates_vdberg (2)certificates_vdberg (2)
certificates_vdberg (2)
 
Corporate crime reporter
Corporate crime reporterCorporate crime reporter
Corporate crime reporter
 
Human personality and its pathology
Human personality and its pathologyHuman personality and its pathology
Human personality and its pathology
 
Mentally slow poision
Mentally slow poisionMentally slow poision
Mentally slow poision
 
Voice & accent
Voice & accentVoice & accent
Voice & accent
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humor
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shy
 
網路騷擾
網路騷擾網路騷擾
網路騷擾
 
約會暴力 基礎篇
約會暴力 基礎篇約會暴力 基礎篇
約會暴力 基礎篇
 
約會暴力 迷思篇
約會暴力 迷思篇約會暴力 迷思篇
約會暴力 迷思篇
 
The way to get rid of fatness
The way to get rid of fatnessThe way to get rid of fatness
The way to get rid of fatness
 
Андрей Беленко "Безопасность мобильных приложений "
Андрей Беленко "Безопасность мобильных приложений "Андрей Беленко "Безопасность мобильных приложений "
Андрей Беленко "Безопасность мобильных приложений "
 
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"
Василий Сливка "Xamarin: Тестирование на Темной Стороне Силы"
 
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"
Александр Зимин "Нестандартная верстка для стандартных компонентов в iOS"
 

Similar to Steganography

Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx9905234521
 
An introduction to mitigation for data hiding in lossless images
An introduction to mitigation for data hiding in lossless  imagesAn introduction to mitigation for data hiding in lossless  images
An introduction to mitigation for data hiding in lossless imagesThomas Brown, CISSP
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...IOSR Journals
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
 

Similar to Steganography (20)

Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
An introduction to mitigation for data hiding in lossless images
An introduction to mitigation for data hiding in lossless  imagesAn introduction to mitigation for data hiding in lossless  images
An introduction to mitigation for data hiding in lossless images
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
akashreport
akashreportakashreport
akashreport
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
H018114956
H018114956H018114956
H018114956
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
 

More from Aqib Memon

Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal codeAqib Memon
 
Speech preparation
Speech preparationSpeech preparation
Speech preparationAqib Memon
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleAqib Memon
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relativesAqib Memon
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyAqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++Aqib Memon
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++Aqib Memon
 
If i become pm of pakistan
If i become pm of pakistanIf i become pm of pakistan
If i become pm of pakistanAqib Memon
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Basic questions about artificial intelligence
Basic questions about artificial intelligenceBasic questions about artificial intelligence
Basic questions about artificial intelligenceAqib Memon
 
Speech preparation
Speech preparationSpeech preparation
Speech preparationAqib Memon
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleAqib Memon
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humorAqib Memon
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relativesAqib Memon
 

More from Aqib Memon (18)

Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal code
 
Speech preparation
Speech preparationSpeech preparation
Speech preparation
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive people
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relatives
 
A guide to good communication skills even if you are shy
A guide to good communication skills even if you are shyA guide to good communication skills even if you are shy
A guide to good communication skills even if you are shy
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
Atm machine using c++
Atm machine using c++Atm machine using c++
Atm machine using c++
 
New ideas
New ideasNew ideas
New ideas
 
If i become pm of pakistan
If i become pm of pakistanIf i become pm of pakistan
If i become pm of pakistan
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Basic questions about artificial intelligence
Basic questions about artificial intelligenceBasic questions about artificial intelligence
Basic questions about artificial intelligence
 
Speech preparation
Speech preparationSpeech preparation
Speech preparation
 
How to handle and help emotionally sensitive people
How to handle and help emotionally sensitive peopleHow to handle and help emotionally sensitive people
How to handle and help emotionally sensitive people
 
Good sense of humor
Good sense of humorGood sense of humor
Good sense of humor
 
Dealing with relatives
Dealing with relativesDealing with relatives
Dealing with relatives
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Steganography

  • 1. Steganography: Hiding Data Within Data Gary C. Kessler September 2001 An edited version of this paper with the title "Hiding Data in Data" originally appeared in the April 2002 issue of Windows & .NET Magazine . Cryptography — the science of writing in secret codes — addresses all of the elements necessary for secure communication over an insecure channel, namely privacy, confidentiality, key exchange, authentication, and non-repudiation. But cryptography does not always provide safe communication. Consider an environment where the very use of encrypted messages causes suspicion. If a nefarious government or Internet service provider (ISP) is looking for encrypted messages, they can easily find them. Consider the following text file; what else is it likely to be if not encrypted? qANQR1DBwU4D/TlT68XXuiUQCADfj2o4b4aFYBcWumA7hR1Wvz9rbv2BR6WbEUsy ZBIEFtjyqCd96qF38sp9IQiJIKlNaZfx2GLRWikPZwchUXxB+AA5+lqsG/ELBvRa c9XefaYpbbAZ6z6LkOQ+eE0XASe7aEEPfdxvZZT37dVyiyxuBBRYNLN8Bphdr2zv z/9Ak4/OLnLiJRk05/2UNE5Z0a+3lcvITMmfGajvRhkXqocavPOKiin3hv7+Vx88 uLLem2/fQHZhGcQvkqZVqXx8SmNw5gzuvwjV1WHj9muDGBY0MkjiZIRI7azWnoU9 3KCnmpR60VO4rDRAS5uGl9fioSvze+q8XqxubaNsgdKkoD+tB/4u4c4tznLfw1L2 YBS+dzFDw5desMFSo7JkecAS4NB9jAu9K+f7PTAsesCBNETDd49BTOFFTWWavAfE gLYcPrcn4s3EriUgvL3OzPR4P1chNu6sa3ZJkTBbriDoA3VpnqG3hxqfNyOlqAka mJJuQ53Ob9ThaFH8YcE/VqUFdw+bQtrAJ6NpjIxi/x0FfOInhC/bBw7pDLXBFNaX HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9HPTZXFG6iRIT0wa47 AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXecWvxFsjR32ebz76U8aLpAK87GZEyTzBx dV+lH0hwyT/y1cZQ/E5USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53Y WIebvdiCqsOoabK3jEfdGExce63zDI0= =MpRf The message above is a sentence in English that is encrypted using Pretty Good Privacy (PGP), probably the most commonly used e-mail encryption software today. Besides being nonsensical to a casual reader, the other indication that this is encrypted is that the characters comprising the message appear more-or-less at random and do not adhere to the relative frequency counts that one would expect in a non-encrypted message. Encrypted data sticks out like a sore thumb. Steganography is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data
  • 2. from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software. STEGANOGRAPHY There are a large number of steganographic methods that most of us are familiar with (especially if you watch a lot of spy movies!), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding information, such as: • Covert channels (e.g., Loki and some distributed denial-of-service tools use the Internet Control Message Protocol, or ICMP, as the communications channel between the "bad guy" and a compromised system) • Hidden text within Web pages • Hiding files in "plain sight" (e.g., what better place to "hide" a file than with an important sounding name in the c:winntsystem32 directory?) • Null ciphers (e.g., using the first letter of each word to form a hidden message in an otherwise innocuous text) Steganography today, however, is significantly more sophisticated than the examples above suggest, allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself) and then decrypt it. There are a number of uses for steganography besides the mere novelty. One of the most widely used applications is for so-called digital watermarking. A watermark, historically, is the replication of an image, logo, or text on paper stock so that the source of the document can be at least partially authenticated. A digital watermark can accomplish the same function; a graphic artist, for example, might post sample images on her Web site complete with an embedded signature so that she can later prove her ownership in case others attempt to portray her work as their own. Stego can also be used to allow communication within an underground community. There are several reports, for example, of persecuted religious minorities using steganography to embed messages for the group within images that are posted to known Web sites. STEGANOGRAPHIC METHODS The following formula provides a very generic description of the pieces of the steganographic process: cover_medium + hidden_data + stego_key = stego_medium
  • 3. In this context, the cover_medium is the file in which we will hide the hidden_data, which may also be encrypted using the stego_key. The resultant file is the stego_medium (which will, of course. be the same type of file as the cover_medium). The cover_medium (and, thus, the stego_medium) are typically image or audio files. In this article, I will focus on image files and will, therefore, refer to the cover_image and stego_image. Before discussing how information is hidden in an image file, it is worth a fast review of how images are stored in the first place. An image file is merely a binary file containing a binary representation of the color or light intensity of each picture element (pixel) comprising the image. Images typically use either 8-bit or 24-bit color. When using 8-bit color, there is a definition of up to 256 colors forming a palette for this image, each color denoted by an 8-bit value. A 24-bit color scheme, as the term suggests, uses 24 bits per pixel and provides a much better set of colors. In this case, each pix is represented by three bytes, each byte representing the intensity of the three primary colors red, green, and blue (RGB), respectively. The Hypertext Markup Language (HTML) format for indicating colors in a Web page often uses a 24-bit format employing six hexadecimal digits, each pair representing the amount of red, blue, and green, respectively. The color orange, for example, would be displayed with red set to 100% (decimal 255, hex FF), green set to 50% (decimal 127, hex 7F), and no blue (0), so we would use "#FF7F00" in the HTML code. The size of an image file, then, is directly related to the number of pixels and the granularity of the color definition. A typical 640x480 pix image using a palette of 256 colors would require a file about 307 KB in size (640 • 480 bytes), whereas a 1024x768 pix high-resolution 24-bit color image would result in a 2.36 MB file (1024 • 768 • 3 bytes). To avoid sending files of this enormous size, a number of compression schemes have been developed over time, notably Bitmap (BMP), Graphic Interchange Format (GIF), and Joint Photographic Experts Group (JPEG) file types. Not all are equally suited to steganography, however. GIF and 8-bit BMP files employ what is known as lossless compression, a scheme that allows the software to exactly reconstruct the original image. JPEG, on the other hand, uses lossy compression, which means that the expanded image is very nearly the same as the original but not an exact duplicate. While both methods allow computers to save storage space, lossless compression is much better suited to applications where the integrity of the original information must be maintained, such as steganography. While JPEG can be used for stego applications, it is more common to embed data in GIF or BMP files. The simplest approach to hiding data within an image file is called least significant bit (LSB) insertion. In this method, we can take the binary representation of the hidden_data
  • 4. and overwrite the LSB of each byte within the cover_image. If we are using 24-bit color, the amount of change will be minimal and indiscernible to the human eye. As an example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding: 10010101 00001101 11001001 10010110 00001111 11001010 10011111 00010000 11001011 Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed): 10010101 00001100 11001001 10010111 00001110 11001011 10011111 00010000 11001011 Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly 50%, of the LSBs. This description is meant only as a high-level overview. Similar methods can be applied to 8-bit color but the changes, as the reader might imagine, are more dramatic. Gray-scale images, too, are very useful for steganographic purposes. One potential problem with any of these methods is that they can be found by an adversary who is looking. In addition, there are other methods besides LSB insertion with which to insert hidden information. Without going into any detail, it is worth mentioning steganalysis, the art of detecting and breaking steganography. One form of this analysis is to examine the color palette of a graphical image. In most images, there will be a unique binary encoding of each individual color. If the image contains hidden data, however, many colors in the palette will have duplicate binary encodings since, for all practical purposes, we can't count the LSB. If the analysis of the color palette of a given file yields many duplicates, we might safely conclude that the file has hidden information. But what files would you analyze? Suppose I decide to post a hidden message by hiding it in an image file that I post at an auction site on the Internet. The item I am auctioning is real so a lot of people may access the site and download the file; only a few people know that the image has special information that only they can read. And we haven't even discussed hidden data inside audio files! Indeed, the quantity of potential cover files makes steganalysis a Herculean task. A STEGANOGRAPHY EXAMPLE There are a number of software packages that perform steganography on just about any software platform; readers are referred to Neil Johnson's list of steganography tools at
  • 5. http://www.jjtc.com/Steganography/toolmatrix.htm. Some of the better known packages for Windows NT and Windows 2000 systems include: • Hide4PGP (http://www.heinz-repp.onlinehome.de/Hide4PGP.htm) • MP3Stego (http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/) • Stash (http://www.smalleranimals.com/stash.htm) • Steganos (http://www.steganos.com/english/steganos/download.htm) • S-Tools (available from http://www.webattack.com/download/dlstools.shtml)
  • 6. FIGURE 1. The cover_image (5th wave.gif), hidden_data file (virusdetectioninfo.txt), and stego_key. The following examples come from Andy Brown's S-Tools for Windows. S-Tools allows users to hide information into BMP, GIF, or WAV files. The basic scheme of the program is straight-forward; you drag an image or audio file into the S-Tools active window to act as the cover_medium, drag the hidden_data file onto the cover_medium, and then provide a stego_key for encryption. The result is the stego_medium. All of this is shown in Figure 1: 1. I highlighted the GIF image file 5th wave.gif and dragged it to the S-Tools active window. Note that S-Tools reports that up to 138,547 bytes can be hidden in this image file. 2. I next highlighted a 14 KB text file called virusdetectioninfo.txt and dragged it onto the image file in S-Tools. 3. A dialog box pops up telling me that I am hiding 6,019 bytes of data and asks for a passphrase with which to encrypt the hidden text; the default secret key crypto scheme used by S-Tools is the International Data Encryption Algorithm (IDEA).
  • 7.
  • 8. FIGURE 3. Extracting hidden information from the image file. Once the image file has been received, the user merely drags the file to S-Tools and right-clicks over the image, specifying the Reveal option. A dialog box will pop up requesting the passphrase. Figure 3 shows the information about the hidden archive file, and allows the user to open the file.
  • 9. CONCLUSION Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. But it is also quite real; this is not just something that's used in the lab or an arcane subject of study in academia. Stego may, in fact, be all too real — there have been several reports that the terrorist organization behind the September 11 attacks in New York City, Washington, D.C., and outside of Pittsburgh used steganography as one of their means of communication. Two of the more recent books on the subject are Information Hiding: Steganography and Watermarking - Attacks and Countermeasures by N.F. Johnson, Z. Duric, and S. Jajodia (Kluwer Academic Publishers, 2000) and Information Hiding Techniques for Steganography and Digital Watermarking, edited by S. Katzenbeisser and F.A.P. Petitcolas (Artech House Books, 2000). One of the most informative Web sites on the subject is Neil Johnson's Steganography & Digital Watermarking Page at http://www.jjtc.com/Steganography/. SIDEBAR Other Forms of Steganography While much of the steganography employed today is quite high-tech, steganography itself can make use of many low-tech methods. The goal of stego is merely to hide the presence of a message; remember how well the critical missive was hidden in plain sight in Poe's "The Purloined Letter"? One common, almost obvious, form of steganography is called a null cipher. In this type of stego, the hidden message is formed by taking the first (or other fixed) letter of each word in the cover message. Consider this cablegram that might have been sent by a journalist/spy from the U.S. to Europe during World War I: PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. The first letters of each word form the character string: PERSHINGSAILSFROMNYJUNEI. A little imagination and some spaces yields the real message: PERSHING SAILS FROM NY JUNE I.
  • 10. Another form of steganography uses a template (e.g., a piece of paper with holes cut in it) or a set of preselected locations on the page to hide a message. In this case, obviously, the sender and receiver must use the same template or rules. Consider this note: THE MOST COMMON WORK ANIMAL IS THE HORSE. THEY CAN BE USED TO FERRY EQUIPMENT TO AND FROM WORKERS OR TO PULL A PLOW. BE CAREFUL, THOUGH, BECAUSE SOME HAVE SANK UP TO THEIR KNEES IN MUD OR SAND, SUCH AS AN INCIDENT AT THE BURLINGTON FACTORY LAST YEAR. BUT HORSES REMAIN A SIGNIFICANT FIND. ON A FARM, AN ALTERNATE WORK ANIMAL MIGHT BE A BURRO BUT THEY ARE NOT AS COMFORTABLE AS A TRANSPORT ANIMAL. Applying a template or rule as to which words to read to this message might yield the following: HORSE FERRY SANK IN BURLINGTON FIND ALTERNATE TRANSPORT There are other alternatives to the template method such as: o Pinpricks in maps to use as an overlay for relevant letters in messages o Deliberate misspelling to mark words in the message o Use of small changes in spacing to indicate significant letters or words in a hidden message o Use of a slightly different font in a typeset message to indicate the hidden letters (e.g., the difference between Courier and Courier New is barely noticeable unless you are looking for it) Steganography doesn't just apply to written forms of communication. Radio and TV messages, from World War II to today, can be used to hide coded or hidden messages. Some government sources suspect that Osama bin Laden's pre- recorded videos that are re-played on TV stations around the world contain hidden messages. Some argue that the U.S. Marine Corps Navaho code talkers of WWII represent a form of steganography. The messages themselves weren't encrypted; the plaintext was right there in the open, just in a language that was unknown by the Japanese. Disappearing ink and microdots are other ways in which messages can be hidden from the casual observer. One of the oldest stego schemes was to shave the head of a messenger and tattoo a message on the messenger's head. After the hair grows back, the messenger can
  • 11. be sent to the intended recipient, where the messenger's head can be shaved and the message recovered. This method is decidingly clever, patient, and very low- tech, and goes right to the heart of steganography's literal meaning of "covered writing." ABOUT THE AUTHOR: Gary C. Kessler is an Associate Professor and program director of the Computer Networking major at Champlain College in Burlington, Vermont, and an independent consultant and writer. His e-mail address is kumquat@sover.net.