The Codex of Business Writing Software for Real-World Solutions 2.pptx
HACKING
1. -:- Project title -:-
S T E G A N O G R A P H Y
Submitted By
Group No. : 07
Students name 1 :- patel Nayanbhai Students name 2 :- Bhondva Navnathbhai
Enrollment No. :- 19082291025 Enrollment No. :- 19082291005
BSC IT (cyber security) sem :- 6
U65A5ip2 – 1
Acedemic year : 2021-22
Guided by : mr. Jaimit patel
2. contents
SR NO. Particulars
1 Project profile
2 Introduction
2.1 Overview
2.2 Background and motivation
2.3 Objective
2.4 Methodology
3 Hardware and software Requirement
4 Tools description
5 Functional specification
6 Proof of concept
7 Future scope
8 References
3. 1. Project profile
Project title stegnography
Objective Use Steganography tools for hiding information.
Platform Windows, Linux
Platform by
Patel Nayanbhai :- 19082291025
Bhondva Navnathbhai :- 19082291005
Internal guide Mr. Jaimit patel
5. 2. Introduction
• Steganography is the practice of hiding information, has
been around for centuries. And in parallel to
technological advances, steganography has also
involved and adapted with the advent of computers and
the internet.
• Digital steganography usually involves hiding data inside
innocuous files such as images, videos, and audio.
• Today, digital stegnography is one of the important
components in the toolboxes of spies and malicious
hackers, as well as human rights activists and political
dissidents.
6. What is Steganography ?
It can be defined as "The art
and science of communicating
in a way which hides the
existence of the
communication”.
Steganography is the art and
science of embedding secret
messages in a cover message
in such a way that no one, a
part from the sender and
intended recipient, suspects
the existence of the message.
7. Who use stegnograpy ?
Criminals use steganography to hide information and
communicate covertly with other criminals.
Their goal is five-fold scouting the target, scanning it,
gaining access, staying undetected, and covering their
tracks.
8. Steganography type
Text Steganography
Image Steganography
Video Steganography
Audio Steganography
9. Text Steganography
This article introduces a new technique to hide text-in-text
messages.
The proposed mechanism uses the structure of omega network
to hide and extract secret messages.
The generation of secret message is made as follows, take
every letter from the original message, use the omega network
to generate two related letters from the selected letter, and
finally search the dictionary for a suitable English cover word to
hide the generated two letters.
In order to increase the chance of find a suitable words, the
generated two letters need not to be adjacent in the cover word.
As a result, the white-space stegnography is used in order to
hide the position of the two letters in the selected cover word.
10. Image Steganography
The Image Steganography refers to the process of hiding data
within an image file. The image selected for this purpose is
called the cover image and the image obtained after
steganography is called the Steg image.
Detection of the message within the cover image is done by
the process of steganalysis. This can be done through
comparison with the cover image, histogram plotting, or noise
detection.
Steganography is a method of hiding secret data, by
embedding it into an audio, video, image, or text file. It is one of
the methods employed to protect secret or sensitive data from
malicious attacks.
11. Video Steganography
Video steganography is becoming an important research area
in various data hiding technologies, which has become a
promising tool because not only the security requirement of
secret message transmission is becoming stricter but also
video is more favored.
this paper, according to the embedded position of secret
message, video steganography is divided into three categories
intra-embedding, pre-embedding and post-embedding.
Then we introduce the performance assessment for video
steganography and the future popular video steganography
including H.265 video steganography, robust video
steganography and reversible video steganography.
12. Audio Steganography
Audio steganography is about hiding the secret message
into the audio. It is a technique uses to secure the
transmission of secret information or hide their existence.
It also may provide confidentiality to secret message if the
message is encrypted. To date most of the stegnography
software such as Mp3Stego and DeepSound use block
cipher such as Advanced Encryption Standard or Data
Encryption Standard to encrypt the secret message.
This is because stream cipher provides bit by bit encryption
meanwhile block cipher provide a fixed length of bits
encryption which result a longer output compare to stream
cipher.
13. 2.1 Overview
Steganography is the art of covered, or hidden, writing.
The purpose of steganography is covert
communication to hide the existence of a message
from a third party.
Steganography is of increasing importance to
individuals in the law enforcement, intelligence, and
military communities.
14. 2.2 Background and
motivation
I will present about Steganography methods and
tools which I used for this project with some
POC`s/Demo`s.
To reliably transfer a secret message from a
source to a destination.
To hide the presence of the secret message from
the Third Party.
15. Background History
Steganography is the use of various methods to
hide information from unwanted eyes.
In ancient times, stegnography was mostly done
physically.
The oldest documented case of stegnography
dates to 500 year, in which Histiaeus, the ruler of
Milteus, tattooed a message on the shaved head
of one of his slaves and let the hair grow back.
He then sent the slave to the Aristagoras, his
son-in-law, who shaved the slave’s head again
and revealed the message.
16. 2.3 Objective
This presentation is Created for briefing about
hiding information text in any image or text file or
audio or video which is known as
STEGANOGRAPHY.
17. 2.4 Methodology
project presents a user-friendly and simple but efficient
toolsand techniques which effectively hides a text
message in image file or text file or video file.
Steganography can be used in forensics investigation
for extracting an information from any file which is
collected from the crime scenes.
Steganography is also used in finding malware such as
Trojan horse.
18. 3. Hardware Requirement
The minimum requirements to run the proposed system are:
Processor : P IV
Hard Disk : 40GB
RAM : 256MB Audio system
The above-mentioned hardware is the minimal requirement. It is
advisable to have much advanced hardware since the purpose of the
system is to response to large number of users rather than a limited
number.
19. software Requirement
Kali Linux latest version
Virtual machine : VM ware / virtual box
Many tools such as
StegHide
Stegsnow
Exif tool and many more
20. 4. Tools description
A steganography software tool allows a user to embed
hidden data inside a carrier file, such as an image or video,
and later extract that data.
It is not necessary to conceal the message in the original
file at all. Thus, it is not necessary to modify the original file
and thus, it is difficult to detect anything.
The carrier is the signal, stream, or data file into which the
hidden data is hidden by making subtle modifications.
21. Steganography tools to perform
Stegsnow
Exif tool
StegHide
Coagula
Sonic visualizer
Audio to text file
22. 5. Functional specification
Descriptions of data to be entered into the system
Descriptions of operations performed by each screen
Descriptions of work-flows performed by the system
Descriptions of system reports or other outputs
Who can enter the data into the system
The system meets applicable regulatory requirements
The functional specification is designed to be read by a
general audience. Readers should understand the system,
but no particular technical knowledge should be required
to understand the document.
23. 6. Proof of concept
Steganography is the technique of hiding secret data within
an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its
destination.
The use of steganography can be combined with
encryption as an extra step for hiding or protecting data.
The word steganography is derived from the Greek
words steganos.
Steganography can be used to conceal almost any type of
digital content, including text, image, video or audio content
the data to be hidden can be hidden inside almost any
other type of digital content.
24. Live Demo
Hiding information in image file
Step 1 : Enter the command in select image
“atril-previewer steg.jpeg”
Write a secret message.
Step 2 : Enter the command
echo “image steganography hidden message”>> steg.jpeg
hide data in image file.
Step 3 : Enter the command in read to hidden data
“tail steg.jpeg”
27. Step 1 : Enter the command in Hidden message in base64
echo “image steganography hidden message” | base64
Step 2 : Enter The command in base64 hidden message in decode.
echo “<base64 hidden message>” | base64 -d
28. Hiding information in text file
Tool : Stegsnow
Step 1 : Create a text file.
29. Step 2 : Enter the command “Stegsnow -C -m “the hide
message in the text file” -p 9512 hide.txt final.txt” to hide the
data/text inside the file created.
30. Step 3 : open the file in notepad and observe in the hide text.
Step 4 : Enter the command to read the hidden data
“Stegsnow -C -p 9512 final.txt”
31. Hiding text file in image file
Tool : StegHide
1. Create a text file and
download a any jpeg
file.
2. Jpeg image file in which
text file will be hidden.
32. 3. Enter the command “StegHide
embed -cf hacker.jpeg -ef
test.txt -p 12345” hide the text
file inside the image.
4. Enter the command “StegHide
extract -sf hacker.jpeg” the
test.txt file from the image file.
36. 7. Future scope
Steganography transmits secrets through apparently innocuous
covers in an effort to conceal the existence of a secret. Digital
image steganography and its derivatives are growing in use
and application.
where cryptography and strong encryption are being outlawed,
citizens are looking at steganography to circumvent such
policies and pass messages covertly.
the near future, the most important use of steganography
techniques will probably be lying in the field of digital
watermarking.
Content providers are eager to protect their copyrighted works
against illegal distribution and digital watermarks provide a way
of tracking the owners of these materials.