Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Steganography.

6,264 views

Published on

This Presentation describe how to use a Concept of Steganography in Real Scenario , this is given by Example.

Published in: Technology
  • Be the first to comment

Steganography.

  1. 1. APresenation on Steganography Smart Way to Hide a Object . . . By : Yogesh Prajapati
  2. 2. Who am I ?Name : Yogesh PrajapatiWork : Java DeveloperEducation : Master of Computer ApplicationSkill (Java) : J2EE, Spring(IOC & Security), Hibernate, JAX-WS, Restful Architecture, No-SQL(Lucene,Solr-Lucane Based Search Engine), SQL(Ms Sql Server,MySql,PostgreSQL), JSP, Javascript,Jquery, Servlet,AJAX, Load Balancing and Clustering(of App server & Db ) Logging Mechanism in Java, Security of Web Application……………. ……And even Many More……..
  3. 3. Introduction Steganography is the process of hiding one medium of communication (text, sound or image) within another without changing in original format. Steganography from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing” Stenography στεγανός γραφία Covered writing
  4. 4. Introduction Cont. . . Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination Anyone else viewing the message will fail to know it contains hidden/encrypted data With cryptography the information is known to exist, but it is encoded in such a way that only the intended recipient can read it. For Steganography Data Hidden in: Sound Text Packet headers Unused space of hard drives Images
  5. 5. Example
  6. 6. Example fE: steganographic function "embedding“ fE-1: steganographic function "extracting" cover: cover data in which emb will be hidden emb: message to be hidden key: parameter of fE stego: cover data with the hidden message
  7. 7. History for Stenography Ancient Greeks used wax-covered tablets Tattooed shaved heads Method used during WW-II World War Two is better known for the birth of hardcore encoding Example: Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges:
  8. 8. History for Stenography Ancient Greeks used wax-covered tablets Tattooed shaved heads Method used during WW-II World War Two is better known for the birth of hardcore encoding Example: pparently neutrals protest is thoroughly discounted A and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  9. 9. Different Kinds of Steganography
  10. 10. Not Cryptography?Cryptography involves encrypting dataSteganography use data in original format Steganography Cryptography •Unknown message passing •Known message passing •Little known technology •Common technology •Technology still being developed •Most algorithms known to for certain formats government departments •Once detected message is •Strong algorithm are currently known Many Carrier formats resistant to brute force attack Large expensive computing power required for cracking Technology increase reduces strength
  11. 11. Tools Available for Stenography Over 800 different embedding software programs available S-Tools – freeware for hiding data in GIF or .bmp image files or .wav files  Hide and Seek  J-Steg  EZ Stego  Image Hide  Digital Picture Envelope  Camouflage  Gif Shuffle  Spam Mimic JP Hide & Seek  etc…
  12. 12. Steganography – Modern Day
  13. 13. How Actually Implemented ?
  14. 14. Implementing stenography •Hiding a message inside a text •Images •Least-significant bit modifications •Masking and filtering •Audio and video •IP datagram Steganography •Algorithms and transformations •Injection
  15. 15. Methods •Null Cipher •Steganography In Documents •Onion Cipher
  16. 16. Null Cipher Main purpose of using a Null Cipher Hide message among irrelevant data Confuse the cryptanalyst Example If I want to send some confidential Message is that “Bring two cases of beer ” For that I send a message to receiver “ Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.”
  17. 17. Steganography In Documents•Using Tool : SNOW
  18. 18. Steganography In Documents•How to hide a message…
  19. 19. Steganography In Documents•After Processing
  20. 20. Steganography In Documents•Retrieve a Message…
  21. 21. Onion Cipher
  22. 22. Attacks on StenographyPassive Attack Attacker will try to Detect the embedded messageActive Attack Attacker will try to Destroy the embedded message Modify the embedded message
  23. 23. Attacks on Stenography Known carrier attack: The original cover media and stego media Both are available for analysis. Steganography only attack: In this type of attacks, only stego Media is available for analysis. Known message attack: The hidden message is known in this Case. Known Steganography attack: The cover media, stego media as Well as the Steganography tool or algorithm, are known.
  24. 24. Problems of Available Tools of stenography There are so many tools available for hiding a message or image or audio or video behind an any carrier file. The tools are easy to use but a problem of tools is that there another tools available which are working as reverse engineering of previous tools means they are capable to find the availably of out hidden file behind a carrier file.  Size Problem
  25. 25. Trying to Solve Problem •Use of Algorithm in  Java •In Operating System  Windows XP Professional
  26. 26. Invisible Secret (The STEGO Tools)Carrier File ( Size : 534 KB (546,933 bytes) )
  27. 27. Secret Data File (Size : 15.3 MB (16,061,760 bytes) )
  28. 28. New File From Tool ( After Processing)
  29. 29. Difference isCarrier File ( Size : 534 KB (546,933 bytes) )Secret Data File (Size : 15.3 MB (16,061,760 bytes) )New File From Tool ( After Processing Size is : 572 KB)Difference in original and new file is ( 572 – 534 = 38 KB )
  30. 30. OUR WORK ON THIS Create RAR File of data file
  31. 31. Size of data file
  32. 32. After Processing the Final File Size is
  33. 33. Difference isCarrier File ( Size : 534 KB (546,933 bytes) )Secret Data File (Size : 7.77 KB (7,958 bytes) )New File with zipped secret data( After Processing Size is : 534 KB (547,256 bytes) )Difference in original and new file is ( 534 – 534 = 0 KB)Actual difference is( 546,933 bytes - 547,256 bytes = 323 bytes )
  34. 34. The difference with normal process inInvisible Secret is: 34 KBAnd with our steps difference is 323 bytesApproximately 100 times Effective thannormal procedure
  35. 35. Result• After Testing this method for different type of mediumWe found that this method is work effectively only forPlain text data• If you are using image,video,audio than this will workBut It will not give a satisfactory result same as for plain text
  36. 36. Thank You . . .

×