SlideShare a Scribd company logo
1 of 9
Download to read offline
Stenography and Terroirst 
What is stenography 
“Steganography is the art and science of communicating in a way which hides the existence of the communication.Steganography hides the covert message but not the fact that two parties are communicating with each other. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. The terrorist groups are “hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites” . It doesn't surprise me that terrorists are using this trick. The very aspects of steganography that make it unsuitable for normal corporate use make it ideally suited for terrorist use. Most importantly, it can be used in an electronic dead drop.
Steganography is good way for terrorist cells to communicate, allowing communication without any group knowing the identity of the other. There are other ways to build a dead drop in cyberspace. For example, a spy can sign up for a free, anonymous e-mail account. And bin Laden probably uses those, too communicate. 
Using steganography to embed a message in a pornographic image and posting it to a Usenet newsgroup is the cyberspace equivalent of a dead drop. To everyone else, it's just a picture. But to the receiver, there's a message in there waiting to be extracted.In summary: 
steganography_medium = hidden_message + carrier + steganography_key Figure 1 shows the classification of steganography techniques (Adapted from Bauer 2002). Figure 1. Classification of Steganography Techniques (Adapted from Bauer 2002) Figure 1 shows a common taxonomy of steganographic techniques (Arnold et al. 2003; Bauer 2002). Technical steganography uses scientific methods to hide a message, such as the use of invisible ink or microdots and other size-reduction methods. 
History of Steganography
The darker sides of governments have utilized forms of steganography for decades. In WWII, 
German spies used null ciphers, which “camouflaged” the real message inside an innocent“sounding” message (Johnson).The following message was actually sent by a German Spy in WWII: Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. 
Taking the second letter in each word produces the following message: 
Pershing sails from NY June 1 (Kahn 67). 
As message detection improved, the clandestine world was forced to develop new technologies, which could pass more information and be even less conspicuous. In 1941, the first microdots were discovered “masquerading as a period on a typed envelope carried by a German agent” (Johnson). FBI Director, J. Edgar Hoover referred to the microdot as “the enemy’s masterpiece of espionage.” The message was not hidden, nor encrypted; it was just so small, that it went unnoticed. The microdot permitted the transmission of large amounts of data including maps, 
photographs, documents, and drawings. With swarms of letters passing through the mails, the United States government panicked. By the end of the war, censors had
either prohibited or tampered with flower deliveries, radio song requests, weather reports, children’s drawings sent in the mail, knitting instructions, and anything else that might possibly encode Axis intelligence 
Steganography Software 
There are currently over 140 steganography programs available. The tools range from software that hides data in images to software that hides data in spam. Steganography programs are freely available and easy to use. Unfortunately, these two benefits have enabled terrorists to not only correspond for free, but to hide their plots without the threat of being caught. 
JSteg Shell Version 2.0 
JPEG images are becoming more abundant on the Internet because large images with unlimited colors can be stored in relatively small files. For example, a 1073 x 790 pixel image with 16 million colors can be stored in a 170-kilobyte file. As a BMP, the same image would be more than 2 Megabytes (Johnson). JSteg shell is a Windows Shell. That means that it looks and runs like any other windows program, but to perform its primary
task, it feeds commands to another program (jpeg-jsteg for DOS) (Korejwa). Jsteg is quite simple to use, and manipulation of the container image is near impossible to detect. To use JSteg Shell, launch the program and choose Hide File in JPG Image. After the message file is selected, an RC4-40 encryption algorithm may be applied to the message by entering a passphrase. Applying an encryption algorithm to the message file is always a good idea becauseit enforces “defense in depth.” In other words, if an enemy retrieves the steganographic image, then the encryption algorithm will still have to be broken to retrieve the hidden message. Once the message file is chosen, JSteg reveals the amount of data that needs to be hidden (in bytes). A container file must be chosen. If the container is not big enough to hide the message, then an error message will be displayed. If the message is successfully hidden, then the new, steganographic image can be saved or viewed. Retrieving a file is just as simple as hiding the file. It is basically the same process with a few minor adjustments. Choose Extract File from JPG Image. Select the steganographic imageusing 
Find, and DJPEG.EXE will extract the data. If JSteg Shell finds hidden data that it does not recognize, then the screen below will be displayed; otherwise, this screen is skipped.
Spam Mimic 
One of the newest spins on Steganography includes a website called Spam Mimic, where users can embed encrypted messages in spam in order to disguise the fact that confidential data has been exchanged. To use Spam Mimic, simply go to the site and choose ‘encode’ from the menu, type in a short message, and press enter. This generates a realistic spam message with the secret message imbedded inside it. The spam message can then be cut and pasted into an email client. Upon receiving the message, the email recipient can use the Spam Mimic website to ‘decode’ the spam, and retrieve the original message. 
One flaw in the software is that there is no limit on the size of the message to be encoded. Consequently, a large message will be encoded, but the spam will begin to repeat itself, which could possibly arouse suspicion. Furthermore, the site enforces government surveillance systems, similar
to Echelon, to scan through Terabytes of spam on the off chance that they may contain encrypted messages of interest to the authorities (Leyden). In other words, make sure that if you are going to use Spam Mimic that it is only for legal, legitimate purposes. 
Steganography Detection 
Iomart, a Scottish broadband provider and corporate spyware vendor, recently leaked some information about being “called in” by “U.S. authorities” to help in the /bin/laden hunt, and about finding Al Qaeda steganographic files on “the dark side of the Web” (Greene). The company
“has identified.... hundreds of files, some of them containing Arabic text and dates” (Greene). 
So what’s being done to protect U.S. citizens from future terrorist plots residing on the Web? 
In 1998, the Air Force commissioned WetStone Technologies “to develop a set of statistical tests capable of detecting secret messages in computer files and electronic transmissions, as well as attempting to identify the underlying steganographic method” (McCullagh). Thus, WetStone’s “Steganography Detection and Recovery Toolkit” (S-DART) was born. Gary Gordon, vice president of cyber-forensics at WetStone Technologies, reported that while most of the steganography found has been on hacker sites, several instances have been reported on heavily traveled commercial sites such as Amazon and eBay (McCullagh). In addition to S-DART, Neil Johnson has been developing a stego-detector for the past several months. The program is designed to examine hard drives “like a virus scanner” and identify the electronic fingerprints left behind by steganographic applications. In February, Johnson helped nab a suspect who raised suspicions after repeatedly emailing photographs to addresses that appeared to be of family members, but he never received any replies (McCullagh). Unfortunately, if this 
technology is being implemented in the background, bin Laden and his cohorts somehow managed to slip through the cracks. 
As far as the Government is concerned, there have been a few suggestions made known to the public. One suggestion is that the NSA could keep a database of images, which would help them identify images with subtle changes in the
low order bits (Schneier). U.S. officials concede that it is difficult to intercept, let alone find, hidden messages and images on the Internet’s estimated 28 billion images and 2 billion Web sites (Kelley). Neil Johnson explains, finding files tainted by steganography is like “looking for a piece of straw in a haystack – forget the needle” (Dibbell). The FBI wants all encryption programs to file what amounts to a “master key” with a federal authority that would allow them, with a judge's permission, to decrypt a code in a case of national security (Kelley). Senator Judd Gregg proposed that “software developers give government security agents the ‘keys’ to encryption programs when they are created,” this position is strongly opposed by many in the technology community who worry it could be used to invade the privacy of law-abiding computer users (Eunjung Cha, Krim). 
On October 26, President Bush and Attorney General John Ashcroft convinced Congress to pass the Anti-terrorism Act. The acts gives the police expanded power to wiretap the phone of suspected terrorists, keep tabs on their email, and track their Internet activity. Still, if a steganographic image cannot be found, or if a type of encryption cannot be cracked, then America is still at risk of having terrorist plots right under her nose without anyway to intercept them.

More Related Content

What's hot

The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Imagesijtsrd
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChris Furton
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 

What's hot (9)

The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Steganography
SteganographySteganography
Steganography
 
Ijcta2011020338
Ijcta2011020338Ijcta2011020338
Ijcta2011020338
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 

Viewers also liked

La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro auspiciouswoman78
 
Los instrumentos de cuerdas
Los instrumentos de cuerdasLos instrumentos de cuerdas
Los instrumentos de cuerdasTrabajosTardes
 
Catedral de milán
Catedral de milánCatedral de milán
Catedral de milánjuli rueda
 
Smart Commerce 21 - Le ayudamos a vender más
Smart Commerce 21 - Le ayudamos a vender másSmart Commerce 21 - Le ayudamos a vender más
Smart Commerce 21 - Le ayudamos a vender másPere Sanz
 
La lucha noviolenta criterios y metodos ( Gene Sharp)
La lucha noviolenta  criterios y metodos ( Gene Sharp)La lucha noviolenta  criterios y metodos ( Gene Sharp)
La lucha noviolenta criterios y metodos ( Gene Sharp)72pantalla
 
DSD-INT 2015 - EO-related projects at deltares - Jaap Kwadijk
DSD-INT 2015 - EO-related projects at deltares - Jaap KwadijkDSD-INT 2015 - EO-related projects at deltares - Jaap Kwadijk
DSD-INT 2015 - EO-related projects at deltares - Jaap KwadijkDeltares
 
Infografia: Variables SEO Local para Negocios
Infografia: Variables SEO Local para NegociosInfografia: Variables SEO Local para Negocios
Infografia: Variables SEO Local para NegociosNeoAttack
 
Chuinti13 New modes of governance for urban regeneration Gracia Garcia Calvo
Chuinti13 New modes of governance for urban regeneration Gracia Garcia CalvoChuinti13 New modes of governance for urban regeneration Gracia Garcia Calvo
Chuinti13 New modes of governance for urban regeneration Gracia Garcia CalvoTerritorial Intelligence
 
Componentes link basic
Componentes link basicComponentes link basic
Componentes link basicsnake25237
 
Back to the roots. If email is the past, is Google Wave the future?
Back to the roots.  If email is the past, is Google Wave the future?Back to the roots.  If email is the past, is Google Wave the future?
Back to the roots. If email is the past, is Google Wave the future?johanna kollmann
 
Enterprise Europe Network | C-Energy 2020 Updates | Christiana Siambekou
Enterprise Europe Network | C-Energy 2020 Updates | Christiana SiambekouEnterprise Europe Network | C-Energy 2020 Updates | Christiana Siambekou
Enterprise Europe Network | C-Energy 2020 Updates | Christiana SiambekouInvest Northern Ireland
 
Catalog ERA TAC | Optics Trade | 2013
Catalog ERA TAC | Optics Trade | 2013Catalog ERA TAC | Optics Trade | 2013
Catalog ERA TAC | Optics Trade | 2013Optics-Trade
 
Samuel Pipim biography
Samuel Pipim biographySamuel Pipim biography
Samuel Pipim biographySamuel Pipim
 
Don't Think Like an Instructional Designer—Think Like a Game Designer
Don't Think Like an Instructional Designer—Think Like a Game DesignerDon't Think Like an Instructional Designer—Think Like a Game Designer
Don't Think Like an Instructional Designer—Think Like a Game DesignerKarl Kapp
 
Presentation av första kvartalet 2016
Presentation av första kvartalet 2016Presentation av första kvartalet 2016
Presentation av första kvartalet 2016PostNord
 
KLUV Media Kit 5-11-2015
KLUV Media Kit  5-11-2015KLUV Media Kit  5-11-2015
KLUV Media Kit 5-11-2015CBS/KLUV Radio
 
Realidad Aumentada, una nueva lente para ver el mundo.
Realidad Aumentada, una nueva lente para ver el mundo.Realidad Aumentada, una nueva lente para ver el mundo.
Realidad Aumentada, una nueva lente para ver el mundo.Telefónica Grandes Clientes
 

Viewers also liked (19)

La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro
La Emperatriz Un Buen Auguro
 
Los instrumentos de cuerdas
Los instrumentos de cuerdasLos instrumentos de cuerdas
Los instrumentos de cuerdas
 
Catedral de milán
Catedral de milánCatedral de milán
Catedral de milán
 
Smart Commerce 21 - Le ayudamos a vender más
Smart Commerce 21 - Le ayudamos a vender másSmart Commerce 21 - Le ayudamos a vender más
Smart Commerce 21 - Le ayudamos a vender más
 
JBM-HH Bulletin 5-20
JBM-HH Bulletin 5-20JBM-HH Bulletin 5-20
JBM-HH Bulletin 5-20
 
La lucha noviolenta criterios y metodos ( Gene Sharp)
La lucha noviolenta  criterios y metodos ( Gene Sharp)La lucha noviolenta  criterios y metodos ( Gene Sharp)
La lucha noviolenta criterios y metodos ( Gene Sharp)
 
DSD-INT 2015 - EO-related projects at deltares - Jaap Kwadijk
DSD-INT 2015 - EO-related projects at deltares - Jaap KwadijkDSD-INT 2015 - EO-related projects at deltares - Jaap Kwadijk
DSD-INT 2015 - EO-related projects at deltares - Jaap Kwadijk
 
Infografia: Variables SEO Local para Negocios
Infografia: Variables SEO Local para NegociosInfografia: Variables SEO Local para Negocios
Infografia: Variables SEO Local para Negocios
 
Chuinti13 New modes of governance for urban regeneration Gracia Garcia Calvo
Chuinti13 New modes of governance for urban regeneration Gracia Garcia CalvoChuinti13 New modes of governance for urban regeneration Gracia Garcia Calvo
Chuinti13 New modes of governance for urban regeneration Gracia Garcia Calvo
 
Signo lingüístico Rodniel Ocando
Signo lingüístico Rodniel OcandoSigno lingüístico Rodniel Ocando
Signo lingüístico Rodniel Ocando
 
Componentes link basic
Componentes link basicComponentes link basic
Componentes link basic
 
Back to the roots. If email is the past, is Google Wave the future?
Back to the roots.  If email is the past, is Google Wave the future?Back to the roots.  If email is the past, is Google Wave the future?
Back to the roots. If email is the past, is Google Wave the future?
 
Enterprise Europe Network | C-Energy 2020 Updates | Christiana Siambekou
Enterprise Europe Network | C-Energy 2020 Updates | Christiana SiambekouEnterprise Europe Network | C-Energy 2020 Updates | Christiana Siambekou
Enterprise Europe Network | C-Energy 2020 Updates | Christiana Siambekou
 
Catalog ERA TAC | Optics Trade | 2013
Catalog ERA TAC | Optics Trade | 2013Catalog ERA TAC | Optics Trade | 2013
Catalog ERA TAC | Optics Trade | 2013
 
Samuel Pipim biography
Samuel Pipim biographySamuel Pipim biography
Samuel Pipim biography
 
Don't Think Like an Instructional Designer—Think Like a Game Designer
Don't Think Like an Instructional Designer—Think Like a Game DesignerDon't Think Like an Instructional Designer—Think Like a Game Designer
Don't Think Like an Instructional Designer—Think Like a Game Designer
 
Presentation av första kvartalet 2016
Presentation av första kvartalet 2016Presentation av första kvartalet 2016
Presentation av första kvartalet 2016
 
KLUV Media Kit 5-11-2015
KLUV Media Kit  5-11-2015KLUV Media Kit  5-11-2015
KLUV Media Kit 5-11-2015
 
Realidad Aumentada, una nueva lente para ver el mundo.
Realidad Aumentada, una nueva lente para ver el mundo.Realidad Aumentada, una nueva lente para ver el mundo.
Realidad Aumentada, una nueva lente para ver el mundo.
 

Similar to Stenographgh[1]

steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_clubAntz911
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 

Similar to Stenographgh[1] (20)

Steganography
Steganography Steganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography
SteganographySteganography
Steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 

Recently uploaded

Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 

Recently uploaded (20)

Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 

Stenographgh[1]

  • 1. Stenography and Terroirst What is stenography “Steganography is the art and science of communicating in a way which hides the existence of the communication.Steganography hides the covert message but not the fact that two parties are communicating with each other. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. The terrorist groups are “hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites” . It doesn't surprise me that terrorists are using this trick. The very aspects of steganography that make it unsuitable for normal corporate use make it ideally suited for terrorist use. Most importantly, it can be used in an electronic dead drop.
  • 2. Steganography is good way for terrorist cells to communicate, allowing communication without any group knowing the identity of the other. There are other ways to build a dead drop in cyberspace. For example, a spy can sign up for a free, anonymous e-mail account. And bin Laden probably uses those, too communicate. Using steganography to embed a message in a pornographic image and posting it to a Usenet newsgroup is the cyberspace equivalent of a dead drop. To everyone else, it's just a picture. But to the receiver, there's a message in there waiting to be extracted.In summary: steganography_medium = hidden_message + carrier + steganography_key Figure 1 shows the classification of steganography techniques (Adapted from Bauer 2002). Figure 1. Classification of Steganography Techniques (Adapted from Bauer 2002) Figure 1 shows a common taxonomy of steganographic techniques (Arnold et al. 2003; Bauer 2002). Technical steganography uses scientific methods to hide a message, such as the use of invisible ink or microdots and other size-reduction methods. History of Steganography
  • 3. The darker sides of governments have utilized forms of steganography for decades. In WWII, German spies used null ciphers, which “camouflaged” the real message inside an innocent“sounding” message (Johnson).The following message was actually sent by a German Spy in WWII: Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word produces the following message: Pershing sails from NY June 1 (Kahn 67). As message detection improved, the clandestine world was forced to develop new technologies, which could pass more information and be even less conspicuous. In 1941, the first microdots were discovered “masquerading as a period on a typed envelope carried by a German agent” (Johnson). FBI Director, J. Edgar Hoover referred to the microdot as “the enemy’s masterpiece of espionage.” The message was not hidden, nor encrypted; it was just so small, that it went unnoticed. The microdot permitted the transmission of large amounts of data including maps, photographs, documents, and drawings. With swarms of letters passing through the mails, the United States government panicked. By the end of the war, censors had
  • 4. either prohibited or tampered with flower deliveries, radio song requests, weather reports, children’s drawings sent in the mail, knitting instructions, and anything else that might possibly encode Axis intelligence Steganography Software There are currently over 140 steganography programs available. The tools range from software that hides data in images to software that hides data in spam. Steganography programs are freely available and easy to use. Unfortunately, these two benefits have enabled terrorists to not only correspond for free, but to hide their plots without the threat of being caught. JSteg Shell Version 2.0 JPEG images are becoming more abundant on the Internet because large images with unlimited colors can be stored in relatively small files. For example, a 1073 x 790 pixel image with 16 million colors can be stored in a 170-kilobyte file. As a BMP, the same image would be more than 2 Megabytes (Johnson). JSteg shell is a Windows Shell. That means that it looks and runs like any other windows program, but to perform its primary
  • 5. task, it feeds commands to another program (jpeg-jsteg for DOS) (Korejwa). Jsteg is quite simple to use, and manipulation of the container image is near impossible to detect. To use JSteg Shell, launch the program and choose Hide File in JPG Image. After the message file is selected, an RC4-40 encryption algorithm may be applied to the message by entering a passphrase. Applying an encryption algorithm to the message file is always a good idea becauseit enforces “defense in depth.” In other words, if an enemy retrieves the steganographic image, then the encryption algorithm will still have to be broken to retrieve the hidden message. Once the message file is chosen, JSteg reveals the amount of data that needs to be hidden (in bytes). A container file must be chosen. If the container is not big enough to hide the message, then an error message will be displayed. If the message is successfully hidden, then the new, steganographic image can be saved or viewed. Retrieving a file is just as simple as hiding the file. It is basically the same process with a few minor adjustments. Choose Extract File from JPG Image. Select the steganographic imageusing Find, and DJPEG.EXE will extract the data. If JSteg Shell finds hidden data that it does not recognize, then the screen below will be displayed; otherwise, this screen is skipped.
  • 6. Spam Mimic One of the newest spins on Steganography includes a website called Spam Mimic, where users can embed encrypted messages in spam in order to disguise the fact that confidential data has been exchanged. To use Spam Mimic, simply go to the site and choose ‘encode’ from the menu, type in a short message, and press enter. This generates a realistic spam message with the secret message imbedded inside it. The spam message can then be cut and pasted into an email client. Upon receiving the message, the email recipient can use the Spam Mimic website to ‘decode’ the spam, and retrieve the original message. One flaw in the software is that there is no limit on the size of the message to be encoded. Consequently, a large message will be encoded, but the spam will begin to repeat itself, which could possibly arouse suspicion. Furthermore, the site enforces government surveillance systems, similar
  • 7. to Echelon, to scan through Terabytes of spam on the off chance that they may contain encrypted messages of interest to the authorities (Leyden). In other words, make sure that if you are going to use Spam Mimic that it is only for legal, legitimate purposes. Steganography Detection Iomart, a Scottish broadband provider and corporate spyware vendor, recently leaked some information about being “called in” by “U.S. authorities” to help in the /bin/laden hunt, and about finding Al Qaeda steganographic files on “the dark side of the Web” (Greene). The company
  • 8. “has identified.... hundreds of files, some of them containing Arabic text and dates” (Greene). So what’s being done to protect U.S. citizens from future terrorist plots residing on the Web? In 1998, the Air Force commissioned WetStone Technologies “to develop a set of statistical tests capable of detecting secret messages in computer files and electronic transmissions, as well as attempting to identify the underlying steganographic method” (McCullagh). Thus, WetStone’s “Steganography Detection and Recovery Toolkit” (S-DART) was born. Gary Gordon, vice president of cyber-forensics at WetStone Technologies, reported that while most of the steganography found has been on hacker sites, several instances have been reported on heavily traveled commercial sites such as Amazon and eBay (McCullagh). In addition to S-DART, Neil Johnson has been developing a stego-detector for the past several months. The program is designed to examine hard drives “like a virus scanner” and identify the electronic fingerprints left behind by steganographic applications. In February, Johnson helped nab a suspect who raised suspicions after repeatedly emailing photographs to addresses that appeared to be of family members, but he never received any replies (McCullagh). Unfortunately, if this technology is being implemented in the background, bin Laden and his cohorts somehow managed to slip through the cracks. As far as the Government is concerned, there have been a few suggestions made known to the public. One suggestion is that the NSA could keep a database of images, which would help them identify images with subtle changes in the
  • 9. low order bits (Schneier). U.S. officials concede that it is difficult to intercept, let alone find, hidden messages and images on the Internet’s estimated 28 billion images and 2 billion Web sites (Kelley). Neil Johnson explains, finding files tainted by steganography is like “looking for a piece of straw in a haystack – forget the needle” (Dibbell). The FBI wants all encryption programs to file what amounts to a “master key” with a federal authority that would allow them, with a judge's permission, to decrypt a code in a case of national security (Kelley). Senator Judd Gregg proposed that “software developers give government security agents the ‘keys’ to encryption programs when they are created,” this position is strongly opposed by many in the technology community who worry it could be used to invade the privacy of law-abiding computer users (Eunjung Cha, Krim). On October 26, President Bush and Attorney General John Ashcroft convinced Congress to pass the Anti-terrorism Act. The acts gives the police expanded power to wiretap the phone of suspected terrorists, keep tabs on their email, and track their Internet activity. Still, if a steganographic image cannot be found, or if a type of encryption cannot be cracked, then America is still at risk of having terrorist plots right under her nose without anyway to intercept them.