SlideShare a Scribd company logo
1 of 38
-:- Project title -:-
S T E G A N O G R A P H Y
Submitted By
Group No. : 07
Students name 1 :- patel Nayanbhai Students name 2 :- Bhondva Navnathbhai
Enrollment No. :- 19082291025 Enrollment No. :- 19082291005
BSC IT (cyber security) sem :- 6
U65A5ip2 – 1
Acedemic year : 2021-22
Guided by : mr. Jaimit patel
contents
SR NO. Particulars
1 Project profile
2 Introduction
2.1 Overview
2.2 Background and motivation
2.3 Objective
2.4 Methodology
3 Hardware and software Requirement
4 Tools description
5 Functional specification
6 Proof of concept
7 Future scope
8 References
1. Project profile
Project title stegnography
Objective Use Steganography tools for hiding information.
Platform Windows, Linux
Platform by
Patel Nayanbhai :- 19082291025
Bhondva Navnathbhai :- 19082291005
Internal guide Mr. Jaimit patel
STEGANOGRAPHY
“ The Art of Hidden(Secret) Writing ”
2. Introduction
• Steganography is the practice of hiding information, has
been around for centuries. And in parallel to
technological advances, steganography has also
involved and adapted with the advent of computers and
the internet.
• Digital steganography usually involves hiding data inside
innocuous files such as images, videos, and audio.
• Today, digital stegnography is one of the important
components in the toolboxes of spies and malicious
hackers, as well as human rights activists and political
dissidents.
 What is Steganography ?
 It can be defined as "The art
and science of communicating
in a way which hides the
existence of the
communication”.
 Steganography is the art and
science of embedding secret
messages in a cover message
in such a way that no one, a
part from the sender and
intended recipient, suspects
the existence of the message.
 Who use stegnograpy ?
 Criminals use steganography to hide information and
communicate covertly with other criminals.
 Their goal is five-fold scouting the target, scanning it,
gaining access, staying undetected, and covering their
tracks.
 Steganography type
 Text Steganography
 Image Steganography
 Video Steganography
 Audio Steganography
 Text Steganography
 This article introduces a new technique to hide text-in-text
messages.
 The proposed mechanism uses the structure of omega network
to hide and extract secret messages.
 The generation of secret message is made as follows, take
every letter from the original message, use the omega network
to generate two related letters from the selected letter, and
finally search the dictionary for a suitable English cover word to
hide the generated two letters.
 In order to increase the chance of find a suitable words, the
generated two letters need not to be adjacent in the cover word.
 As a result, the white-space stegnography is used in order to
hide the position of the two letters in the selected cover word.
 Image Steganography
 The Image Steganography refers to the process of hiding data
within an image file. The image selected for this purpose is
called the cover image and the image obtained after
steganography is called the Steg image.
 Detection of the message within the cover image is done by
the process of steganalysis. This can be done through
comparison with the cover image, histogram plotting, or noise
detection.
 Steganography is a method of hiding secret data, by
embedding it into an audio, video, image, or text file. It is one of
the methods employed to protect secret or sensitive data from
malicious attacks.
 Video Steganography
 Video steganography is becoming an important research area
in various data hiding technologies, which has become a
promising tool because not only the security requirement of
secret message transmission is becoming stricter but also
video is more favored.
 this paper, according to the embedded position of secret
message, video steganography is divided into three categories
intra-embedding, pre-embedding and post-embedding.
 Then we introduce the performance assessment for video
steganography and the future popular video steganography
including H.265 video steganography, robust video
steganography and reversible video steganography.
 Audio Steganography
 Audio steganography is about hiding the secret message
into the audio. It is a technique uses to secure the
transmission of secret information or hide their existence.
 It also may provide confidentiality to secret message if the
message is encrypted. To date most of the stegnography
software such as Mp3Stego and DeepSound use block
cipher such as Advanced Encryption Standard or Data
Encryption Standard to encrypt the secret message.
 This is because stream cipher provides bit by bit encryption
meanwhile block cipher provide a fixed length of bits
encryption which result a longer output compare to stream
cipher.
2.1 Overview
 Steganography is the art of covered, or hidden, writing.
 The purpose of steganography is covert
communication to hide the existence of a message
from a third party.
 Steganography is of increasing importance to
individuals in the law enforcement, intelligence, and
military communities.
2.2 Background and
motivation
 I will present about Steganography methods and
tools which I used for this project with some
POC`s/Demo`s.
 To reliably transfer a secret message from a
source to a destination.
 To hide the presence of the secret message from
the Third Party.
 Background History
 Steganography is the use of various methods to
hide information from unwanted eyes.
 In ancient times, stegnography was mostly done
physically.
 The oldest documented case of stegnography
dates to 500 year, in which Histiaeus, the ruler of
Milteus, tattooed a message on the shaved head
of one of his slaves and let the hair grow back.
He then sent the slave to the Aristagoras, his
son-in-law, who shaved the slave’s head again
and revealed the message.
2.3 Objective
 This presentation is Created for briefing about
hiding information text in any image or text file or
audio or video which is known as
STEGANOGRAPHY.
2.4 Methodology
 project presents a user-friendly and simple but efficient
toolsand techniques which effectively hides a text
message in image file or text file or video file.
 Steganography can be used in forensics investigation
for extracting an information from any file which is
collected from the crime scenes.
 Steganography is also used in finding malware such as
Trojan horse.
3. Hardware Requirement
 The minimum requirements to run the proposed system are:
 Processor : P IV
 Hard Disk : 40GB
 RAM : 256MB Audio system
 The above-mentioned hardware is the minimal requirement. It is
advisable to have much advanced hardware since the purpose of the
system is to response to large number of users rather than a limited
number.
software Requirement
 Kali Linux latest version
 Virtual machine : VM ware / virtual box
 Many tools such as
 StegHide
 Stegsnow
 Exif tool and many more
4. Tools description
 A steganography software tool allows a user to embed
hidden data inside a carrier file, such as an image or video,
and later extract that data.
 It is not necessary to conceal the message in the original
file at all. Thus, it is not necessary to modify the original file
and thus, it is difficult to detect anything.
 The carrier is the signal, stream, or data file into which the
hidden data is hidden by making subtle modifications.
 Steganography tools to perform
 Stegsnow
 Exif tool
 StegHide
 Coagula
 Sonic visualizer
 Audio to text file
5. Functional specification
 Descriptions of data to be entered into the system
 Descriptions of operations performed by each screen
 Descriptions of work-flows performed by the system
 Descriptions of system reports or other outputs
 Who can enter the data into the system
 The system meets applicable regulatory requirements
 The functional specification is designed to be read by a
general audience. Readers should understand the system,
but no particular technical knowledge should be required
to understand the document.
6. Proof of concept
 Steganography is the technique of hiding secret data within
an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its
destination.
 The use of steganography can be combined with
encryption as an extra step for hiding or protecting data.
The word steganography is derived from the Greek
words steganos.
 Steganography can be used to conceal almost any type of
digital content, including text, image, video or audio content
the data to be hidden can be hidden inside almost any
other type of digital content.
Live Demo
Hiding information in image file
 Step 1 : Enter the command in select image
“atril-previewer steg.jpeg”
Write a secret message.
 Step 2 : Enter the command
echo “image steganography hidden message”>> steg.jpeg
hide data in image file.
 Step 3 : Enter the command in read to hidden data
“tail steg.jpeg”
Hiding information in base64 &
decode
 Step 1 : Enter the command in Hidden message in base64
echo “image steganography hidden message” | base64
 Step 2 : Enter The command in base64 hidden message in decode.
echo “<base64 hidden message>” | base64 -d
 Hiding information in text file
 Tool : Stegsnow
 Step 1 : Create a text file.
 Step 2 : Enter the command “Stegsnow -C -m “the hide
message in the text file” -p 9512 hide.txt final.txt” to hide the
data/text inside the file created.
 Step 3 : open the file in notepad and observe in the hide text.
 Step 4 : Enter the command to read the hidden data
“Stegsnow -C -p 9512 final.txt”
Hiding text file in image file
 Tool : StegHide
1. Create a text file and
download a any jpeg
file.
2. Jpeg image file in which
text file will be hidden.
3. Enter the command “StegHide
embed -cf hacker.jpeg -ef
test.txt -p 12345” hide the text
file inside the image.
4. Enter the command “StegHide
extract -sf hacker.jpeg” the
test.txt file from the image file.
Live Demo
Hiding Audio file in text file
7. Future scope
 Steganography transmits secrets through apparently innocuous
covers in an effort to conceal the existence of a secret. Digital
image steganography and its derivatives are growing in use
and application.
 where cryptography and strong encryption are being outlawed,
citizens are looking at steganography to circumvent such
policies and pass messages covertly.
 the near future, the most important use of steganography
techniques will probably be lying in the field of digital
watermarking.
 Content providers are eager to protect their copyrighted works
against illegal distribution and digital watermarks provide a way
of tracking the owners of these materials.
8. References
 https://en.wikipedia.org/wiki/Steganography
 https://www.geeksforgeeks.org/image-steganography-in-
cryptography/
 https://www.hindawi.com/journals/scn/2020/8848315/
 https://linuxhint.com/steghide-beginners-tutorial/
 https://www.poftut.com/how-to-install-and-use-exiftool-in-linux-
windows-kali-ubuntu-mint-with-examples/
 https://stylesuxx.github.io/steganography/
HACKING

More Related Content

Similar to HACKING

Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkStephen Hasford
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsMaddiSujitha
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 

Similar to HACKING (20)

Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
C01111519
C01111519C01111519
C01111519
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
1.pdf
1.pdf1.pdf
1.pdf
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

HACKING

  • 1. -:- Project title -:- S T E G A N O G R A P H Y Submitted By Group No. : 07 Students name 1 :- patel Nayanbhai Students name 2 :- Bhondva Navnathbhai Enrollment No. :- 19082291025 Enrollment No. :- 19082291005 BSC IT (cyber security) sem :- 6 U65A5ip2 – 1 Acedemic year : 2021-22 Guided by : mr. Jaimit patel
  • 2. contents SR NO. Particulars 1 Project profile 2 Introduction 2.1 Overview 2.2 Background and motivation 2.3 Objective 2.4 Methodology 3 Hardware and software Requirement 4 Tools description 5 Functional specification 6 Proof of concept 7 Future scope 8 References
  • 3. 1. Project profile Project title stegnography Objective Use Steganography tools for hiding information. Platform Windows, Linux Platform by Patel Nayanbhai :- 19082291025 Bhondva Navnathbhai :- 19082291005 Internal guide Mr. Jaimit patel
  • 4. STEGANOGRAPHY “ The Art of Hidden(Secret) Writing ”
  • 5. 2. Introduction • Steganography is the practice of hiding information, has been around for centuries. And in parallel to technological advances, steganography has also involved and adapted with the advent of computers and the internet. • Digital steganography usually involves hiding data inside innocuous files such as images, videos, and audio. • Today, digital stegnography is one of the important components in the toolboxes of spies and malicious hackers, as well as human rights activists and political dissidents.
  • 6.  What is Steganography ?  It can be defined as "The art and science of communicating in a way which hides the existence of the communication”.  Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, a part from the sender and intended recipient, suspects the existence of the message.
  • 7.  Who use stegnograpy ?  Criminals use steganography to hide information and communicate covertly with other criminals.  Their goal is five-fold scouting the target, scanning it, gaining access, staying undetected, and covering their tracks.
  • 8.  Steganography type  Text Steganography  Image Steganography  Video Steganography  Audio Steganography
  • 9.  Text Steganography  This article introduces a new technique to hide text-in-text messages.  The proposed mechanism uses the structure of omega network to hide and extract secret messages.  The generation of secret message is made as follows, take every letter from the original message, use the omega network to generate two related letters from the selected letter, and finally search the dictionary for a suitable English cover word to hide the generated two letters.  In order to increase the chance of find a suitable words, the generated two letters need not to be adjacent in the cover word.  As a result, the white-space stegnography is used in order to hide the position of the two letters in the selected cover word.
  • 10.  Image Steganography  The Image Steganography refers to the process of hiding data within an image file. The image selected for this purpose is called the cover image and the image obtained after steganography is called the Steg image.  Detection of the message within the cover image is done by the process of steganalysis. This can be done through comparison with the cover image, histogram plotting, or noise detection.  Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks.
  • 11.  Video Steganography  Video steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement of secret message transmission is becoming stricter but also video is more favored.  this paper, according to the embedded position of secret message, video steganography is divided into three categories intra-embedding, pre-embedding and post-embedding.  Then we introduce the performance assessment for video steganography and the future popular video steganography including H.265 video steganography, robust video steganography and reversible video steganography.
  • 12.  Audio Steganography  Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence.  It also may provide confidentiality to secret message if the message is encrypted. To date most of the stegnography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message.  This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher.
  • 13. 2.1 Overview  Steganography is the art of covered, or hidden, writing.  The purpose of steganography is covert communication to hide the existence of a message from a third party.  Steganography is of increasing importance to individuals in the law enforcement, intelligence, and military communities.
  • 14. 2.2 Background and motivation  I will present about Steganography methods and tools which I used for this project with some POC`s/Demo`s.  To reliably transfer a secret message from a source to a destination.  To hide the presence of the secret message from the Third Party.
  • 15.  Background History  Steganography is the use of various methods to hide information from unwanted eyes.  In ancient times, stegnography was mostly done physically.  The oldest documented case of stegnography dates to 500 year, in which Histiaeus, the ruler of Milteus, tattooed a message on the shaved head of one of his slaves and let the hair grow back. He then sent the slave to the Aristagoras, his son-in-law, who shaved the slave’s head again and revealed the message.
  • 16. 2.3 Objective  This presentation is Created for briefing about hiding information text in any image or text file or audio or video which is known as STEGANOGRAPHY.
  • 17. 2.4 Methodology  project presents a user-friendly and simple but efficient toolsand techniques which effectively hides a text message in image file or text file or video file.  Steganography can be used in forensics investigation for extracting an information from any file which is collected from the crime scenes.  Steganography is also used in finding malware such as Trojan horse.
  • 18. 3. Hardware Requirement  The minimum requirements to run the proposed system are:  Processor : P IV  Hard Disk : 40GB  RAM : 256MB Audio system  The above-mentioned hardware is the minimal requirement. It is advisable to have much advanced hardware since the purpose of the system is to response to large number of users rather than a limited number.
  • 19. software Requirement  Kali Linux latest version  Virtual machine : VM ware / virtual box  Many tools such as  StegHide  Stegsnow  Exif tool and many more
  • 20. 4. Tools description  A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.  It is not necessary to conceal the message in the original file at all. Thus, it is not necessary to modify the original file and thus, it is difficult to detect anything.  The carrier is the signal, stream, or data file into which the hidden data is hidden by making subtle modifications.
  • 21.  Steganography tools to perform  Stegsnow  Exif tool  StegHide  Coagula  Sonic visualizer  Audio to text file
  • 22. 5. Functional specification  Descriptions of data to be entered into the system  Descriptions of operations performed by each screen  Descriptions of work-flows performed by the system  Descriptions of system reports or other outputs  Who can enter the data into the system  The system meets applicable regulatory requirements  The functional specification is designed to be read by a general audience. Readers should understand the system, but no particular technical knowledge should be required to understand the document.
  • 23. 6. Proof of concept  Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.  The use of steganography can be combined with encryption as an extra step for hiding or protecting data. The word steganography is derived from the Greek words steganos.  Steganography can be used to conceal almost any type of digital content, including text, image, video or audio content the data to be hidden can be hidden inside almost any other type of digital content.
  • 24. Live Demo Hiding information in image file  Step 1 : Enter the command in select image “atril-previewer steg.jpeg” Write a secret message.  Step 2 : Enter the command echo “image steganography hidden message”>> steg.jpeg hide data in image file.  Step 3 : Enter the command in read to hidden data “tail steg.jpeg”
  • 25.
  • 26. Hiding information in base64 & decode
  • 27.  Step 1 : Enter the command in Hidden message in base64 echo “image steganography hidden message” | base64  Step 2 : Enter The command in base64 hidden message in decode. echo “<base64 hidden message>” | base64 -d
  • 28.  Hiding information in text file  Tool : Stegsnow  Step 1 : Create a text file.
  • 29.  Step 2 : Enter the command “Stegsnow -C -m “the hide message in the text file” -p 9512 hide.txt final.txt” to hide the data/text inside the file created.
  • 30.  Step 3 : open the file in notepad and observe in the hide text.  Step 4 : Enter the command to read the hidden data “Stegsnow -C -p 9512 final.txt”
  • 31. Hiding text file in image file  Tool : StegHide 1. Create a text file and download a any jpeg file. 2. Jpeg image file in which text file will be hidden.
  • 32. 3. Enter the command “StegHide embed -cf hacker.jpeg -ef test.txt -p 12345” hide the text file inside the image. 4. Enter the command “StegHide extract -sf hacker.jpeg” the test.txt file from the image file.
  • 33. Live Demo Hiding Audio file in text file
  • 34.
  • 35.
  • 36. 7. Future scope  Steganography transmits secrets through apparently innocuous covers in an effort to conceal the existence of a secret. Digital image steganography and its derivatives are growing in use and application.  where cryptography and strong encryption are being outlawed, citizens are looking at steganography to circumvent such policies and pass messages covertly.  the near future, the most important use of steganography techniques will probably be lying in the field of digital watermarking.  Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials.
  • 37. 8. References  https://en.wikipedia.org/wiki/Steganography  https://www.geeksforgeeks.org/image-steganography-in- cryptography/  https://www.hindawi.com/journals/scn/2020/8848315/  https://linuxhint.com/steghide-beginners-tutorial/  https://www.poftut.com/how-to-install-and-use-exiftool-in-linux- windows-kali-ubuntu-mint-with-examples/  https://stylesuxx.github.io/steganography/