SlideShare a Scribd company logo
-:- Project title -:-
S T E G A N O G R A P H Y
Submitted By
Group No. : 07
Students name 1 :- patel Nayanbhai Students name 2 :- Bhondva Navnathbhai
Enrollment No. :- 19082291025 Enrollment No. :- 19082291005
BSC IT (cyber security) sem :- 6
U65A5ip2 – 1
Acedemic year : 2021-22
Guided by : mr. Jaimit patel
contents
SR NO. Particulars
1 Project profile
2 Introduction
2.1 Overview
2.2 Background and motivation
2.3 Objective
2.4 Methodology
3 Hardware and software Requirement
4 Tools description
5 Functional specification
6 Proof of concept
7 Future scope
8 References
1. Project profile
Project title stegnography
Objective Use Steganography tools for hiding information.
Platform Windows, Linux
Platform by
Patel Nayanbhai :- 19082291025
Bhondva Navnathbhai :- 19082291005
Internal guide Mr. Jaimit patel
STEGANOGRAPHY
“ The Art of Hidden(Secret) Writing ”
2. Introduction
• Steganography is the practice of hiding information, has
been around for centuries. And in parallel to
technological advances, steganography has also
involved and adapted with the advent of computers and
the internet.
• Digital steganography usually involves hiding data inside
innocuous files such as images, videos, and audio.
• Today, digital stegnography is one of the important
components in the toolboxes of spies and malicious
hackers, as well as human rights activists and political
dissidents.
 What is Steganography ?
 It can be defined as "The art
and science of communicating
in a way which hides the
existence of the
communication”.
 Steganography is the art and
science of embedding secret
messages in a cover message
in such a way that no one, a
part from the sender and
intended recipient, suspects
the existence of the message.
 Who use stegnograpy ?
 Criminals use steganography to hide information and
communicate covertly with other criminals.
 Their goal is five-fold scouting the target, scanning it,
gaining access, staying undetected, and covering their
tracks.
 Steganography type
 Text Steganography
 Image Steganography
 Video Steganography
 Audio Steganography
 Text Steganography
 This article introduces a new technique to hide text-in-text
messages.
 The proposed mechanism uses the structure of omega network
to hide and extract secret messages.
 The generation of secret message is made as follows, take
every letter from the original message, use the omega network
to generate two related letters from the selected letter, and
finally search the dictionary for a suitable English cover word to
hide the generated two letters.
 In order to increase the chance of find a suitable words, the
generated two letters need not to be adjacent in the cover word.
 As a result, the white-space stegnography is used in order to
hide the position of the two letters in the selected cover word.
 Image Steganography
 The Image Steganography refers to the process of hiding data
within an image file. The image selected for this purpose is
called the cover image and the image obtained after
steganography is called the Steg image.
 Detection of the message within the cover image is done by
the process of steganalysis. This can be done through
comparison with the cover image, histogram plotting, or noise
detection.
 Steganography is a method of hiding secret data, by
embedding it into an audio, video, image, or text file. It is one of
the methods employed to protect secret or sensitive data from
malicious attacks.
 Video Steganography
 Video steganography is becoming an important research area
in various data hiding technologies, which has become a
promising tool because not only the security requirement of
secret message transmission is becoming stricter but also
video is more favored.
 this paper, according to the embedded position of secret
message, video steganography is divided into three categories
intra-embedding, pre-embedding and post-embedding.
 Then we introduce the performance assessment for video
steganography and the future popular video steganography
including H.265 video steganography, robust video
steganography and reversible video steganography.
 Audio Steganography
 Audio steganography is about hiding the secret message
into the audio. It is a technique uses to secure the
transmission of secret information or hide their existence.
 It also may provide confidentiality to secret message if the
message is encrypted. To date most of the stegnography
software such as Mp3Stego and DeepSound use block
cipher such as Advanced Encryption Standard or Data
Encryption Standard to encrypt the secret message.
 This is because stream cipher provides bit by bit encryption
meanwhile block cipher provide a fixed length of bits
encryption which result a longer output compare to stream
cipher.
2.1 Overview
 Steganography is the art of covered, or hidden, writing.
 The purpose of steganography is covert
communication to hide the existence of a message
from a third party.
 Steganography is of increasing importance to
individuals in the law enforcement, intelligence, and
military communities.
2.2 Background and
motivation
 I will present about Steganography methods and
tools which I used for this project with some
POC`s/Demo`s.
 To reliably transfer a secret message from a
source to a destination.
 To hide the presence of the secret message from
the Third Party.
 Background History
 Steganography is the use of various methods to
hide information from unwanted eyes.
 In ancient times, stegnography was mostly done
physically.
 The oldest documented case of stegnography
dates to 500 year, in which Histiaeus, the ruler of
Milteus, tattooed a message on the shaved head
of one of his slaves and let the hair grow back.
He then sent the slave to the Aristagoras, his
son-in-law, who shaved the slave’s head again
and revealed the message.
2.3 Objective
 This presentation is Created for briefing about
hiding information text in any image or text file or
audio or video which is known as
STEGANOGRAPHY.
2.4 Methodology
 project presents a user-friendly and simple but efficient
toolsand techniques which effectively hides a text
message in image file or text file or video file.
 Steganography can be used in forensics investigation
for extracting an information from any file which is
collected from the crime scenes.
 Steganography is also used in finding malware such as
Trojan horse.
3. Hardware Requirement
 The minimum requirements to run the proposed system are:
 Processor : P IV
 Hard Disk : 40GB
 RAM : 256MB Audio system
 The above-mentioned hardware is the minimal requirement. It is
advisable to have much advanced hardware since the purpose of the
system is to response to large number of users rather than a limited
number.
software Requirement
 Kali Linux latest version
 Virtual machine : VM ware / virtual box
 Many tools such as
 StegHide
 Stegsnow
 Exif tool and many more
4. Tools description
 A steganography software tool allows a user to embed
hidden data inside a carrier file, such as an image or video,
and later extract that data.
 It is not necessary to conceal the message in the original
file at all. Thus, it is not necessary to modify the original file
and thus, it is difficult to detect anything.
 The carrier is the signal, stream, or data file into which the
hidden data is hidden by making subtle modifications.
 Steganography tools to perform
 Stegsnow
 Exif tool
 StegHide
 Coagula
 Sonic visualizer
 Audio to text file
5. Functional specification
 Descriptions of data to be entered into the system
 Descriptions of operations performed by each screen
 Descriptions of work-flows performed by the system
 Descriptions of system reports or other outputs
 Who can enter the data into the system
 The system meets applicable regulatory requirements
 The functional specification is designed to be read by a
general audience. Readers should understand the system,
but no particular technical knowledge should be required
to understand the document.
6. Proof of concept
 Steganography is the technique of hiding secret data within
an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its
destination.
 The use of steganography can be combined with
encryption as an extra step for hiding or protecting data.
The word steganography is derived from the Greek
words steganos.
 Steganography can be used to conceal almost any type of
digital content, including text, image, video or audio content
the data to be hidden can be hidden inside almost any
other type of digital content.
Live Demo
Hiding information in image file
 Step 1 : Enter the command in select image
“atril-previewer steg.jpeg”
Write a secret message.
 Step 2 : Enter the command
echo “image steganography hidden message”>> steg.jpeg
hide data in image file.
 Step 3 : Enter the command in read to hidden data
“tail steg.jpeg”
Hiding information in base64 &
decode
 Step 1 : Enter the command in Hidden message in base64
echo “image steganography hidden message” | base64
 Step 2 : Enter The command in base64 hidden message in decode.
echo “<base64 hidden message>” | base64 -d
 Hiding information in text file
 Tool : Stegsnow
 Step 1 : Create a text file.
 Step 2 : Enter the command “Stegsnow -C -m “the hide
message in the text file” -p 9512 hide.txt final.txt” to hide the
data/text inside the file created.
 Step 3 : open the file in notepad and observe in the hide text.
 Step 4 : Enter the command to read the hidden data
“Stegsnow -C -p 9512 final.txt”
Hiding text file in image file
 Tool : StegHide
1. Create a text file and
download a any jpeg
file.
2. Jpeg image file in which
text file will be hidden.
3. Enter the command “StegHide
embed -cf hacker.jpeg -ef
test.txt -p 12345” hide the text
file inside the image.
4. Enter the command “StegHide
extract -sf hacker.jpeg” the
test.txt file from the image file.
Live Demo
Hiding Audio file in text file
7. Future scope
 Steganography transmits secrets through apparently innocuous
covers in an effort to conceal the existence of a secret. Digital
image steganography and its derivatives are growing in use
and application.
 where cryptography and strong encryption are being outlawed,
citizens are looking at steganography to circumvent such
policies and pass messages covertly.
 the near future, the most important use of steganography
techniques will probably be lying in the field of digital
watermarking.
 Content providers are eager to protect their copyrighted works
against illegal distribution and digital watermarks provide a way
of tracking the owners of these materials.
8. References
 https://en.wikipedia.org/wiki/Steganography
 https://www.geeksforgeeks.org/image-steganography-in-
cryptography/
 https://www.hindawi.com/journals/scn/2020/8848315/
 https://linuxhint.com/steghide-beginners-tutorial/
 https://www.poftut.com/how-to-install-and-use-exiftool-in-linux-
windows-kali-ubuntu-mint-with-examples/
 https://stylesuxx.github.io/steganography/
HACKING

More Related Content

Similar to HACKING

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 

Similar to HACKING (20)

Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
C01111519
C01111519C01111519
C01111519
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Steganography
SteganographySteganography
Steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
steganography.ppt
steganography.pptsteganography.ppt
steganography.ppt
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
1.pdf
1.pdf1.pdf
1.pdf
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 

HACKING

  • 1. -:- Project title -:- S T E G A N O G R A P H Y Submitted By Group No. : 07 Students name 1 :- patel Nayanbhai Students name 2 :- Bhondva Navnathbhai Enrollment No. :- 19082291025 Enrollment No. :- 19082291005 BSC IT (cyber security) sem :- 6 U65A5ip2 – 1 Acedemic year : 2021-22 Guided by : mr. Jaimit patel
  • 2. contents SR NO. Particulars 1 Project profile 2 Introduction 2.1 Overview 2.2 Background and motivation 2.3 Objective 2.4 Methodology 3 Hardware and software Requirement 4 Tools description 5 Functional specification 6 Proof of concept 7 Future scope 8 References
  • 3. 1. Project profile Project title stegnography Objective Use Steganography tools for hiding information. Platform Windows, Linux Platform by Patel Nayanbhai :- 19082291025 Bhondva Navnathbhai :- 19082291005 Internal guide Mr. Jaimit patel
  • 4. STEGANOGRAPHY “ The Art of Hidden(Secret) Writing ”
  • 5. 2. Introduction • Steganography is the practice of hiding information, has been around for centuries. And in parallel to technological advances, steganography has also involved and adapted with the advent of computers and the internet. • Digital steganography usually involves hiding data inside innocuous files such as images, videos, and audio. • Today, digital stegnography is one of the important components in the toolboxes of spies and malicious hackers, as well as human rights activists and political dissidents.
  • 6.  What is Steganography ?  It can be defined as "The art and science of communicating in a way which hides the existence of the communication”.  Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, a part from the sender and intended recipient, suspects the existence of the message.
  • 7.  Who use stegnograpy ?  Criminals use steganography to hide information and communicate covertly with other criminals.  Their goal is five-fold scouting the target, scanning it, gaining access, staying undetected, and covering their tracks.
  • 8.  Steganography type  Text Steganography  Image Steganography  Video Steganography  Audio Steganography
  • 9.  Text Steganography  This article introduces a new technique to hide text-in-text messages.  The proposed mechanism uses the structure of omega network to hide and extract secret messages.  The generation of secret message is made as follows, take every letter from the original message, use the omega network to generate two related letters from the selected letter, and finally search the dictionary for a suitable English cover word to hide the generated two letters.  In order to increase the chance of find a suitable words, the generated two letters need not to be adjacent in the cover word.  As a result, the white-space stegnography is used in order to hide the position of the two letters in the selected cover word.
  • 10.  Image Steganography  The Image Steganography refers to the process of hiding data within an image file. The image selected for this purpose is called the cover image and the image obtained after steganography is called the Steg image.  Detection of the message within the cover image is done by the process of steganalysis. This can be done through comparison with the cover image, histogram plotting, or noise detection.  Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks.
  • 11.  Video Steganography  Video steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement of secret message transmission is becoming stricter but also video is more favored.  this paper, according to the embedded position of secret message, video steganography is divided into three categories intra-embedding, pre-embedding and post-embedding.  Then we introduce the performance assessment for video steganography and the future popular video steganography including H.265 video steganography, robust video steganography and reversible video steganography.
  • 12.  Audio Steganography  Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence.  It also may provide confidentiality to secret message if the message is encrypted. To date most of the stegnography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message.  This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher.
  • 13. 2.1 Overview  Steganography is the art of covered, or hidden, writing.  The purpose of steganography is covert communication to hide the existence of a message from a third party.  Steganography is of increasing importance to individuals in the law enforcement, intelligence, and military communities.
  • 14. 2.2 Background and motivation  I will present about Steganography methods and tools which I used for this project with some POC`s/Demo`s.  To reliably transfer a secret message from a source to a destination.  To hide the presence of the secret message from the Third Party.
  • 15.  Background History  Steganography is the use of various methods to hide information from unwanted eyes.  In ancient times, stegnography was mostly done physically.  The oldest documented case of stegnography dates to 500 year, in which Histiaeus, the ruler of Milteus, tattooed a message on the shaved head of one of his slaves and let the hair grow back. He then sent the slave to the Aristagoras, his son-in-law, who shaved the slave’s head again and revealed the message.
  • 16. 2.3 Objective  This presentation is Created for briefing about hiding information text in any image or text file or audio or video which is known as STEGANOGRAPHY.
  • 17. 2.4 Methodology  project presents a user-friendly and simple but efficient toolsand techniques which effectively hides a text message in image file or text file or video file.  Steganography can be used in forensics investigation for extracting an information from any file which is collected from the crime scenes.  Steganography is also used in finding malware such as Trojan horse.
  • 18. 3. Hardware Requirement  The minimum requirements to run the proposed system are:  Processor : P IV  Hard Disk : 40GB  RAM : 256MB Audio system  The above-mentioned hardware is the minimal requirement. It is advisable to have much advanced hardware since the purpose of the system is to response to large number of users rather than a limited number.
  • 19. software Requirement  Kali Linux latest version  Virtual machine : VM ware / virtual box  Many tools such as  StegHide  Stegsnow  Exif tool and many more
  • 20. 4. Tools description  A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.  It is not necessary to conceal the message in the original file at all. Thus, it is not necessary to modify the original file and thus, it is difficult to detect anything.  The carrier is the signal, stream, or data file into which the hidden data is hidden by making subtle modifications.
  • 21.  Steganography tools to perform  Stegsnow  Exif tool  StegHide  Coagula  Sonic visualizer  Audio to text file
  • 22. 5. Functional specification  Descriptions of data to be entered into the system  Descriptions of operations performed by each screen  Descriptions of work-flows performed by the system  Descriptions of system reports or other outputs  Who can enter the data into the system  The system meets applicable regulatory requirements  The functional specification is designed to be read by a general audience. Readers should understand the system, but no particular technical knowledge should be required to understand the document.
  • 23. 6. Proof of concept  Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.  The use of steganography can be combined with encryption as an extra step for hiding or protecting data. The word steganography is derived from the Greek words steganos.  Steganography can be used to conceal almost any type of digital content, including text, image, video or audio content the data to be hidden can be hidden inside almost any other type of digital content.
  • 24. Live Demo Hiding information in image file  Step 1 : Enter the command in select image “atril-previewer steg.jpeg” Write a secret message.  Step 2 : Enter the command echo “image steganography hidden message”>> steg.jpeg hide data in image file.  Step 3 : Enter the command in read to hidden data “tail steg.jpeg”
  • 25.
  • 26. Hiding information in base64 & decode
  • 27.  Step 1 : Enter the command in Hidden message in base64 echo “image steganography hidden message” | base64  Step 2 : Enter The command in base64 hidden message in decode. echo “<base64 hidden message>” | base64 -d
  • 28.  Hiding information in text file  Tool : Stegsnow  Step 1 : Create a text file.
  • 29.  Step 2 : Enter the command “Stegsnow -C -m “the hide message in the text file” -p 9512 hide.txt final.txt” to hide the data/text inside the file created.
  • 30.  Step 3 : open the file in notepad and observe in the hide text.  Step 4 : Enter the command to read the hidden data “Stegsnow -C -p 9512 final.txt”
  • 31. Hiding text file in image file  Tool : StegHide 1. Create a text file and download a any jpeg file. 2. Jpeg image file in which text file will be hidden.
  • 32. 3. Enter the command “StegHide embed -cf hacker.jpeg -ef test.txt -p 12345” hide the text file inside the image. 4. Enter the command “StegHide extract -sf hacker.jpeg” the test.txt file from the image file.
  • 33. Live Demo Hiding Audio file in text file
  • 34.
  • 35.
  • 36. 7. Future scope  Steganography transmits secrets through apparently innocuous covers in an effort to conceal the existence of a secret. Digital image steganography and its derivatives are growing in use and application.  where cryptography and strong encryption are being outlawed, citizens are looking at steganography to circumvent such policies and pass messages covertly.  the near future, the most important use of steganography techniques will probably be lying in the field of digital watermarking.  Content providers are eager to protect their copyrighted works against illegal distribution and digital watermarks provide a way of tracking the owners of these materials.
  • 37. 8. References  https://en.wikipedia.org/wiki/Steganography  https://www.geeksforgeeks.org/image-steganography-in- cryptography/  https://www.hindawi.com/journals/scn/2020/8848315/  https://linuxhint.com/steghide-beginners-tutorial/  https://www.poftut.com/how-to-install-and-use-exiftool-in-linux- windows-kali-ubuntu-mint-with-examples/  https://stylesuxx.github.io/steganography/