SlideShare a Scribd company logo
STEGANOGRAPHY
The Art of Hiding Secrets
Abdelhamid Limami
Security Consultant @ ITDefence
OVERVIEW
• Introduction
• History
• Difference Between Stego & Crypto
• How Steganography work
- Example
• What is Steganalysis
-Example
• Conclusion
INTRODUCTION TO STEGANOGRAPHY
• Steganography is the art and science of embedding secret messages in cover
message in such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message.
• Steganography is a Greek origin where Greek words means :
• “Art of concealing a message, means concealed writing ”.
grafiasteganos
covered writing
HISTORY
Hiding messages on
messengers head
Using invisible inks Writing messages on wood
underlying wax tablets
STEGANOGRAPHY VS CRYPTOGRAPHY
Stegano
• It conceals the existence of the
message.
• It does not alter the structure of the
secret messages , but hides it inside a
cover-file so it cannot be seen.
• Steganography make the secret
message unseen.
Crypto
• Hiding the contents of a secret message
from malicious people.
• tIn cryptography , the Structure of a
message is scrambled to make it
meaningless and unintelligible unless the
decryption key is provided
• Cryptography Encrypt the message but it
can be seen.
Both Have Been used as mean to protect information.
HOW STEGANOGRAPHY WORK ?
METHODOLOGY
TYPES OF STEGANOGRAPHY
• Using LSB [Least Significant Bit] Method by Replacing
least significant bits with the message to be encoded.
• Most popular technique when dealing with images.Image
• Hide a secret message in the same nth letter of every word
in text message.
• Another way by using HTMLText
• The same as image steganography ,but instead of image we
use audio signals.Audio
In Fact, any other file can be used in
steganography
LSB INSERTION’S EXAMPLE
• An image may have the following three pixels (9 bytes) in it somewhere:
(01010010, 10010110, 10100100)
(10110100, 10010001, 01001110)
(10110110, 00101110, 11010001)
• If we wanted to hide [131 or 10000011], we would use/replace the least-significant bits of
each byte:
(01010011, 10010110, 10100100)
(10110100, 10010000, 01001110)
(10110111, 00101111, 11010001)
IMAGE STEGANOGRAPHY
Simple image steganography by hiding
one image into another.
AUDIO STEGANOGRAPHY
• Let’s assume an audio file had the following 8 bytes of data in it somewhere:
Original: 180, 229, 139, 172, 209, 151, 21, 104
In binary, this would be:
10110100-11100101-10001011-10101100-11010001-10010111-00010101-01101000
• If we wanted to hide the byte value 214 (11010110), we use the LSB from each byte to hide
our byte:
10110101-11100101-10001010-10101101-11010000-10010111-00010101- 01101000
• The changes result in the following bytes, which are so close to the originals that the
difference will be inaudible:
Modified: 181, 229, 138, 173, 208, 151, 21, 104
STEGANOGRAPHY TOOLS
• Here’s some of the steganography tools that help to embed files with a key(password) :
Steganos
S-Tools (GIF, JPEG)
StegHide (WAV, BMP)
Invisible Secrets (JPEG)
JPHide
Camouflage
Hiderman
LET’S HAVE AN EXAMPLE USING
HIDERMAN
STEGANALYSIS
Identification of hidden files
WHAT IS STEGANALYSIS ?
Definition
o Identifying the existence of a message
o Not extracting the message
o Note: Technically, Steganography deals with the concealment of a message, not
the encryption of it
Steganalysis essentially deals with the detection of hidden content
So…How is this meaningful ??
THE ANSWER
• By identifying the existence of a hidden
message, perhaps we can identify the tool used
to hide it.
• If we identify the tool, maybe we can use that
tool to extract the original message.
WHAT YOU GONNA NEED TO START
STEGANALYSIS ?
 Have some knowledge about Hexadecimal and decimal
 Know different File format signature
 Know how to work with a Hex Editor like “Winhex”
STEGANALYSIS: METHODS OF DETECTION
Categories
• Histogram analysis
• Change in file properties (size difference, date/time, checksum)
• Statistical Attack
• Visually
Signature :
• A pattern consistent with the program used
STEGANALYSIS : FILE SIGNATURES
Hex Signature File Extension ASCII Signature
FF D8 FF E0 xx xx
4A 46 49 46 00
JPEG (JPEG, JFIF, JPE, JPG) ÿØÿà..JFIF
47 49 46 38 37 61
47 49 46 38 39 61
GIF GIF87a
GIF89a
42 4D BMP BM
EXAMPLE : HIDERMAN - CASE STUDY
By using Stegspy a Steganalysis tool we
have been able to detect that Hiderman
has been used
SO HOW HIDERMAN HAS BEEN DETECTED? 
Let’s inspect it manually using Winhex
ANOTHER EXAMPLE OF AUDIO STEGANALYSIS
CONCLUSION
Steganography Has both good and bad aspects :
Merit:
• More secure.
• Difficult to Detect
• Does not attract any focus.
Demerit:
• Complex Process.
• Increase in data size can arise suspension.
Thank you 

More Related Content

What's hot

Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
Nikhil Tripathi
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Steganography
SteganographySteganography
Steganography
Deepak Raj
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 

Viewers also liked

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
Prince Boonlia
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCTLOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
I3E Technologies
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
Om Vishnoi
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
HENI BHUNGALIA
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Taha Malampatti
 
A Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis DetectionA Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis Detection
Editor IJCATR
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Projectsuzrocky
 

Viewers also liked (11)

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCTLOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
LOW-COMPLEXITY FEATURES FOR JPEG STEGANALYSIS USING UNDECIMATED DCT
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
A Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis DetectionA Review on Classification Based Approaches for STEGanalysis Detection
A Review on Classification Based Approaches for STEGanalysis Detection
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Project
 

Similar to Art of Steganography

steganography
steganographysteganography
steganography
shiveverma
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Gerhard Claassen
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
9905234521
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
SaloniGoyal45
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
ssuser2299e8
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
MrMoliya
 

Similar to Art of Steganography (20)

steganography
steganographysteganography
steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
SteganographySteganography
Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
Steganography
SteganographySteganography
Steganography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 

Recently uploaded

Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 

Recently uploaded (20)

Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 

Art of Steganography

  • 1. STEGANOGRAPHY The Art of Hiding Secrets Abdelhamid Limami Security Consultant @ ITDefence
  • 2. OVERVIEW • Introduction • History • Difference Between Stego & Crypto • How Steganography work - Example • What is Steganalysis -Example • Conclusion
  • 3. INTRODUCTION TO STEGANOGRAPHY • Steganography is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. • Steganography is a Greek origin where Greek words means : • “Art of concealing a message, means concealed writing ”. grafiasteganos covered writing
  • 4. HISTORY Hiding messages on messengers head Using invisible inks Writing messages on wood underlying wax tablets
  • 5. STEGANOGRAPHY VS CRYPTOGRAPHY Stegano • It conceals the existence of the message. • It does not alter the structure of the secret messages , but hides it inside a cover-file so it cannot be seen. • Steganography make the secret message unseen. Crypto • Hiding the contents of a secret message from malicious people. • tIn cryptography , the Structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is provided • Cryptography Encrypt the message but it can be seen. Both Have Been used as mean to protect information.
  • 8. TYPES OF STEGANOGRAPHY • Using LSB [Least Significant Bit] Method by Replacing least significant bits with the message to be encoded. • Most popular technique when dealing with images.Image • Hide a secret message in the same nth letter of every word in text message. • Another way by using HTMLText • The same as image steganography ,but instead of image we use audio signals.Audio In Fact, any other file can be used in steganography
  • 9. LSB INSERTION’S EXAMPLE • An image may have the following three pixels (9 bytes) in it somewhere: (01010010, 10010110, 10100100) (10110100, 10010001, 01001110) (10110110, 00101110, 11010001) • If we wanted to hide [131 or 10000011], we would use/replace the least-significant bits of each byte: (01010011, 10010110, 10100100) (10110100, 10010000, 01001110) (10110111, 00101111, 11010001)
  • 10. IMAGE STEGANOGRAPHY Simple image steganography by hiding one image into another.
  • 11. AUDIO STEGANOGRAPHY • Let’s assume an audio file had the following 8 bytes of data in it somewhere: Original: 180, 229, 139, 172, 209, 151, 21, 104 In binary, this would be: 10110100-11100101-10001011-10101100-11010001-10010111-00010101-01101000 • If we wanted to hide the byte value 214 (11010110), we use the LSB from each byte to hide our byte: 10110101-11100101-10001010-10101101-11010000-10010111-00010101- 01101000 • The changes result in the following bytes, which are so close to the originals that the difference will be inaudible: Modified: 181, 229, 138, 173, 208, 151, 21, 104
  • 12. STEGANOGRAPHY TOOLS • Here’s some of the steganography tools that help to embed files with a key(password) : Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) JPHide Camouflage Hiderman
  • 13. LET’S HAVE AN EXAMPLE USING HIDERMAN
  • 15. WHAT IS STEGANALYSIS ? Definition o Identifying the existence of a message o Not extracting the message o Note: Technically, Steganography deals with the concealment of a message, not the encryption of it Steganalysis essentially deals with the detection of hidden content So…How is this meaningful ??
  • 16. THE ANSWER • By identifying the existence of a hidden message, perhaps we can identify the tool used to hide it. • If we identify the tool, maybe we can use that tool to extract the original message.
  • 17. WHAT YOU GONNA NEED TO START STEGANALYSIS ?  Have some knowledge about Hexadecimal and decimal  Know different File format signature  Know how to work with a Hex Editor like “Winhex”
  • 18. STEGANALYSIS: METHODS OF DETECTION Categories • Histogram analysis • Change in file properties (size difference, date/time, checksum) • Statistical Attack • Visually Signature : • A pattern consistent with the program used
  • 19. STEGANALYSIS : FILE SIGNATURES Hex Signature File Extension ASCII Signature FF D8 FF E0 xx xx 4A 46 49 46 00 JPEG (JPEG, JFIF, JPE, JPG) ÿØÿà..JFIF 47 49 46 38 37 61 47 49 46 38 39 61 GIF GIF87a GIF89a 42 4D BMP BM
  • 20. EXAMPLE : HIDERMAN - CASE STUDY By using Stegspy a Steganalysis tool we have been able to detect that Hiderman has been used
  • 21. SO HOW HIDERMAN HAS BEEN DETECTED?  Let’s inspect it manually using Winhex
  • 22. ANOTHER EXAMPLE OF AUDIO STEGANALYSIS
  • 23. CONCLUSION Steganography Has both good and bad aspects : Merit: • More secure. • Difficult to Detect • Does not attract any focus. Demerit: • Complex Process. • Increase in data size can arise suspension.