Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Agenda
01 What is Steganography?
02 History of Steganography
03 Basic Steganographic Model
04 LSB Steganography - Demo
05 Steganography Tools
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
What is Steganography?
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography?
Data is hidden in the
plain sight
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography?
Cryptography
Board meeting is
happening on Tuesday. We
are meeting at 40.7127 S,
74.0059 E
Uksb klsmnc ou fghmhnvb
gh sdeygdh. eu sfhd
vbsnmrig st lolmnar K,
dgfhal V
Board meeting is
happening on Tuesday. We
are meeting at 40.7127 S,
74.0059 E
Sender Receiver
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography?
Cryptography
Sender ReceiverIntruder understands that
secret message is being sent
Uksb klsmnc ou
fghmhnvb gh sdeygdh
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography?
Steganography is the art and science of embedding secret messages in cover message in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message
Sender ReceiverIntruder will not get to know of the
existence of secret message
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
History of Steganography
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganographic Tecniques
Steganography
STEGANOS GRAPHEN
Concealed or
Hidden
Drawing or
Writing
Null CipherWax Tablet Invisible Ink Microdots Semagrams
20191800
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganography Types
Text
Steganography
Image
Steganography
Audio
Steganography
Email
Steganography Network
Steganography
Video
Steganography
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Characteristics of Steganographic Techniques
Transparency
Robustness
Tamper Resistance
Original Image Stego Image
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Basic Steganographic Model
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Basic Steganographic Model
Cover File(X)
Steganographic
Encoder
f(X,M,K)
Secret
Message(M)
Secret
Message(M)
Stego
Object
Key(K)
Steganographic
Decoder
Communication
Channel
Stego Object
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganographic Model: With Encryption
Encryption
Algorithm
Steganographic
Encoder
Decryption
Algorithm
Communication
Channel
Steganographic
Decoder
Message
Key
RECEIVER
Message
Cypher
Text
Cypher
Text
Key Stego Key
Stego Key Cover File
Stego Object
Stego Object
SENDER
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
LSB Steganography
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Pixels & Bits
Pixel
R
G
B
1 0 1 1 0 1 1 1
1 1 0 1 1 0 0 1
1 0 1 0 0 1 0 0
Total: 24 Bits
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Least Significance Bit Steganography
1 1 1 1 1 1 1 1
Most Significant
Bit(MSB)
Least Significant
Bit(LSB)
Value: 255
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0
255
127
255
254
If we change MSB, it will have larger impact on final value. If we change LSB, the impact on final value
is very less
Change in bytes is 99.99999% Change in bytes is 0.000002%
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Least Significant Bit Steganography
1 0 0 0 0 0 1Secret message to hidden:
Letter ‘A’
Pixels before insertion(3 pixels)
Least Significant Bit Steganography(LSBS) involves overwriting the bit with the lowest arithmetic value
Pixels after insertion
10000000 10100100 10110101
10110101 11110011 10110111
11100111 10110011 00110011
10000001 10100100 10110100
10110100 11110010 10110110
11100110 10110011 00110011
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Demo
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Least Significant Bit Steganography - Demo
1 Loads an image and looks at each pixels in hexadecimal value.
2 Converts secret text into bits and stores them in LSB of pixel bits
3 A delimiter is added to the end of the edited pixel values
4
To encode the text into image
To decode the text from image
While retrieving all the 0’s and 1’s extracted until delimiter is found.
Extracted bits are converted into string(secret message)
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Steganography Tools
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganographic Tools
Tool Description
Stegosuite Hide text inside any image
Stegohide Hide secret file in image or audio file.
Xiao Steganography Free software that can be used to hide secret files in BMP
images or in WAV files.
SSuite Picsel Portable application to hide text inside image file
OpenPuff Tool to conceal files in image, audio & flash files
Camouflage Tool that lets you hide any type of file inside of file.
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training | Edureka

  • 2.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Agenda 01 What is Steganography? 02 History of Steganography 03 Basic Steganographic Model 04 LSB Steganography - Demo 05 Steganography Tools
  • 3.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. What is Steganography?
  • 4.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training What is Steganography? Data is hidden in the plain sight
  • 5.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training What is Steganography? Cryptography Board meeting is happening on Tuesday. We are meeting at 40.7127 S, 74.0059 E Uksb klsmnc ou fghmhnvb gh sdeygdh. eu sfhd vbsnmrig st lolmnar K, dgfhal V Board meeting is happening on Tuesday. We are meeting at 40.7127 S, 74.0059 E Sender Receiver
  • 6.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training What is Steganography? Cryptography Sender ReceiverIntruder understands that secret message is being sent Uksb klsmnc ou fghmhnvb gh sdeygdh
  • 7.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training What is Steganography? Steganography is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message Sender ReceiverIntruder will not get to know of the existence of secret message
  • 8.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. History of Steganography
  • 9.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Steganographic Tecniques Steganography STEGANOS GRAPHEN Concealed or Hidden Drawing or Writing Null CipherWax Tablet Invisible Ink Microdots Semagrams 20191800
  • 10.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Steganography Types Text Steganography Image Steganography Audio Steganography Email Steganography Network Steganography Video Steganography
  • 11.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Characteristics of Steganographic Techniques Transparency Robustness Tamper Resistance Original Image Stego Image
  • 12.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Basic Steganographic Model
  • 13.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Basic Steganographic Model Cover File(X) Steganographic Encoder f(X,M,K) Secret Message(M) Secret Message(M) Stego Object Key(K) Steganographic Decoder Communication Channel Stego Object
  • 14.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Steganographic Model: With Encryption Encryption Algorithm Steganographic Encoder Decryption Algorithm Communication Channel Steganographic Decoder Message Key RECEIVER Message Cypher Text Cypher Text Key Stego Key Stego Key Cover File Stego Object Stego Object SENDER
  • 15.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. LSB Steganography
  • 16.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Pixels & Bits Pixel R G B 1 0 1 1 0 1 1 1 1 1 0 1 1 0 0 1 1 0 1 0 0 1 0 0 Total: 24 Bits
  • 17.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Least Significance Bit Steganography 1 1 1 1 1 1 1 1 Most Significant Bit(MSB) Least Significant Bit(LSB) Value: 255 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 255 127 255 254 If we change MSB, it will have larger impact on final value. If we change LSB, the impact on final value is very less Change in bytes is 99.99999% Change in bytes is 0.000002%
  • 18.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Least Significant Bit Steganography 1 0 0 0 0 0 1Secret message to hidden: Letter ‘A’ Pixels before insertion(3 pixels) Least Significant Bit Steganography(LSBS) involves overwriting the bit with the lowest arithmetic value Pixels after insertion 10000000 10100100 10110101 10110101 11110011 10110111 11100111 10110011 00110011 10000001 10100100 10110100 10110100 11110010 10110110 11100110 10110011 00110011
  • 19.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Demo
  • 20.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Least Significant Bit Steganography - Demo 1 Loads an image and looks at each pixels in hexadecimal value. 2 Converts secret text into bits and stores them in LSB of pixel bits 3 A delimiter is added to the end of the edited pixel values 4 To encode the text into image To decode the text from image While retrieving all the 0’s and 1’s extracted until delimiter is found. Extracted bits are converted into string(secret message)
  • 21.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Steganography Tools
  • 22.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Steganographic Tools Tool Description Stegosuite Hide text inside any image Stegohide Hide secret file in image or audio file. Xiao Steganography Free software that can be used to hide secret files in BMP images or in WAV files. SSuite Picsel Portable application to hide text inside image file OpenPuff Tool to conceal files in image, audio & flash files Camouflage Tool that lets you hide any type of file inside of file.
  • 23.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training