Wednesday, April 3, 2019
Steganography: Uses, Methods, Tools and Examples
Steganography Uses, Methods, Tools and ExamplesSteganographybyMohammed AlmintakhABSTRACTThis paper talks intimately steganography, steganography is the craft or concealment selective selective randomness within a culture middling without permit others to know rough that entropy is exsisting. I will go finished an introduction just about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own effective. This topic surprisingly is new for most of people who read its name , ill sweat to simplify the idea of this approach as much as possible.1. entreSteganography is the art of screen a meat. The purpose of steganography is to cloak a cognitive content from a someone you dont sine qua non to see it. It is distinguishable than cryptography, the art of unavowed writing, which is intended to make a core mountain non be read , but does not cover up the existence of the secret inter course. Although steganography differs from cryptography, on that point ar umpteen analogies between the devil, and some authors classify steganography as a form of cryptography since abstruse communication is a type of secret writing. Steganography works by changing bits of useless or bot apply entropy in regular computer reads(such as graphics, sound, textbook,HTML) with bits of different, invisible information. This hidden information put forward beplain text,cipher text, or even go steadys.2. Steganography mise en scene info covert is related to two fields, Steganography and watermarking.thither are terzetto main aspects for information concealing, capacity, protective cover, and robustness. Capacity means the amount of information that corporation be hidden, gage refers to the unability of an eavesdropper to detect hidden information, and robustness to the amount of revision the cover medium ignore resist before the hidden information is corrupted. In general, information hiding goes through these runes1. Identification of plain bits in a cover medium. Redundant bits are those bits that skunk be alter without taking care of the quality of the cover medium.2. Then, we select a subset of the redundant bits to be replaced with info from a private message. The stage medium is created by replacing the selected redundant bits with message bits.The modification of redundant bits foundation mixture the statistical properties of the cover medium. As a result, statistical analysis whitethorn reveal the hidden content.3. Uses of SteganographySteganography means of storing information in a stylus that it dissembles the existence of them. Steganography used to carry out hidden ex turns .For fount, Governments are enkindle in two types of communication of hidden data first, which supports national security and second, which does not. Steganography support both types, as well as business soak up similar concerns, about trade secrets for new technologies or products information. Of course, use steganography to communicate greatly reduces the jeopardy of information leakage. Businesses takes advantage of another form of steganography, called watermarking. Watermarking is mainly used to direct and entails hidden unique part of information within a medium without touching the medium. For example , permits say that I restrain design an externalise , with that image , I have embedded a watermark that identifies me as the one who created this image, later on , when this image is subroutine library paste with people , I can later identify myself as the nobleman and I can of course prove that I am the possessor of this. This approach is used by companies for the copyrighted digital media a spread for the purpose of protection. Also, steganography enhances the privacy individually, although it is not a substitute for encryption, of course this is in force(p) only if the hidden embedded information is not detected . If the communication is most never exists, this will becomes so private to be caught.Like many gibes, steganography1. Steganography can be a way which makes it possible to send watchword and information without creation censored and without the fear of the messages being intercepted and traced back to us.2. It is similarly possible to simply use steganography to fund information on a location. For example, several information sources care our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside.3. Steganography can also be used to implement watermarking. Although the concept of watermarking is not unavoidably steganography, in that respect are several steganography techniques that are being used to store watermarks in data. The main difference is on i ntent, while the purpose of steganography is hiding information, watermarking is merely extending the cover source with extra information. Since people will not accept noticeable changes in images, audio or video blames because of a watermark, steganography rules can be used to hide this.4- Steganographic MethodsThe formula below describes the process of steganography as discussed abovecover_medium + hidden_data + stego_key = stego_mediumThe explanation of this formula is,The cover medium refers to the bill that we are going to put our information on it.Hidden data obviously is the data we want to withhold secret.An encryption advanced which is a choice for us.The result shall be a stego medium , which is the same file as the cover medium.The easiest way to hide the data in an image , is called LSB(least significant bit) insertion. think 1 shows a common taxonomy of steganographic techniques.5. Steganography ToolsAsteganography parcel tools allows a user to attach hidden data i n a crew cut file, such as an image or video, and sometimes it could be an audio , and later take off that data. It is not requisite to hide the message in the original file at all. Thus, it is not necessary to edit the original file and thus, it is hard to detect nothing. If a granted part of the message is subjected to successive bitwise manipulation to pass the cyphertext, then there is no evidence in the original file to show that it is being used by a third party. to encrypt a file. An example of this method is described in a self-published science fiction novel. In that example a file is encrypted using a 1949 photo from a digital archive of National Geographic magazine.6. Steganography ExampleThere are software that preform steganography, some of well knows architectural plans are Hide4PGP (http//www.heinz-repp.onlinehome.de/Hide4PGP.htm)MP3Stego (http//www.cl.cam.ac.uk/fapp2/steganography/mp3stego/)Stash (http//www.smalleranimals.com/stash.htm)Steganos (http//www.stega nos.com/ face/steganos/download.htm)S-Tools (available fromhttp//www.webattack.com/download/dlstools.shtml)7- Describing a tool of Steganography and how it worksTake a font on this pictureFigure 2 Stego pictureThis picture looks ok , nothing suspicious , nothing wrong with it , but in truth it has a hidden message. If you use a software tool to dismantle the pictures , this result will come upFigure 3 QuickStego programBasically , this technique is done by these steps below Figure 4 Steganography process8- Deep knowledge of SteganographySteganography comes from the Greek words for cover writing.It is the practice of disguising the existence of a message.Generally, innocent looking carriers, e.g., pictures, audio, video, text, etc. that hold the hidden information The combination of hidden data-plus-cover is known as the stego-object Stegokey An additional piece of information, such as a password or mathematical variable, required to embed the secret information Typical Scenario vector Sender Hides Secret pass on In a Cover using a Stegokey Transmitted Carrier Appears Innocuous Receiver Decodes Secret Message by Removing the Cover Using the Stegokey Receiver Reads Secret Message9.Steganography and aegisAs noted above , steganography is an effective and efficient way of hiding data, it is just protecting the data from the unauthorized or unwanted interception. tho stego is merely one of many methods to defend the confidentiality of data. It is probably the best used in integration with another data-hiding method. When used in collection, these ways can all be a part of a layered security mechanism. Some good complementary methods includeencryption-Encryptionis the operation of hybridisation data or plaintext through a series of mathematical processes that generate an alternate form of the original text known as ciphertext. The encrypted text can only be read by one who have been given the proper key to decrypt the ciphertext back into its original plain text form. Encryption doesnt hide data, but it does make it difficult to readHidden directories (Windows)- Windows provides this feature, which allows users to hide files. Using this mechanism is as easy as changing the characteristics of a directory to hidden, and hoping that no one can view all types of files in their look forr.hiding directories (Unix)- in current directories that have a herd of files, such as in the /dev directory on a Unix implementation, or making a directory that starts with three dots () versus the normal single or double dot.Covert channels- Some tools can be used to transfer important data in obviously normal network traffic. One such tool that does that is Loki. Loki is a tool that hides data in ICMP traffic (like ping).10.Steganography vs. EncryptionThe goal of steganography is to not keep others know the hidden information, of cource , to keep others from thinking that the information even exist.if a method of steganography causes someone to suspect the medium which carries the data , then the method has failed. Encryption and Steganography achieve separate goals, encryption is changing the meaning of the message so it cannot be read, steganography does not change the meaning or change the data to make it unusable or unintended, rather, it prevents the third party from suspecting that there is a communication or data even exists.For these people who want to reach ultimate in security or privacy , can combine both approaches , encryption and steganography. Encrypted data is difficult to be order from normal occurring phenomena than a normal plain text (which is a piercing text) in the medium, there are several steganography tools that can encrypt data before hiding them in a chosen medium.Steganography should not be confused with encryption .Encryption disguises the content of a message. The existence of the message is usually obvious.Steganography disguises the existence of the message .However, additional security can be o btained if steganography is combine with encryption.11. Steganalysis and its techniquesSteganalysis , is the counter measure of steganography, is the art of detecting that there is a steganography exists , or a decoded data within a medium. There are two main major tools in Steganalysis, information theory and statistical analysis. primarily , this reveals clearly the tremendous potential for hidden information in the interner data of course as long as a set of data can be compressed to smaller sizes.there should be a set for hidden data within the medium.Steganalysis can be classified in a similar way as cryptanalysis methods, largely establish on how much prior information is known Steganography-only attack The steganography medium is the only item available for analysis.Known-carrier attack The carrier and steganography media are both available for analysis.Known-message attack The hidden message is known.Chosen-steganography attack The steganography medium and algorithmic pro gram are both known.Chosen-message attack A known message and steganography algorithm are used to create steganography media for future analysis and comparison.Known-steganography attack The carrier and steganography medium, as well as the steganography algorithm, are known.12. Method of SteganographyA lot of methods are available for digital Steganography. But exploiting the lenient constraints of a file formats is the most famous one. There are a lot of softwares that uses this technique.a- interpret as carriersOne of the ways to hide data is using images , which is a good method.The difficulty to reveal the data hidden increases with the detailed in an image, and that makes it harder to guess or to suspect that image. JPHIDE/JPSeek is a software that uses the coefficients to hide the information. (http//linux01.gwdg.de/alatham/stego.html).There was a new method of that , that embeds data in visually unnoticeable parts of an image. These both methods transfer the image. The us er however can explore image degradation with different messages and images of different length. Another way is for GIF images, is to modify an images palette for hiding its data. Gifshuffle, which is a tool , that doesnt modify the image itself, in any visible way. It permutes a GIF images color map, that will leave the original image on the whole intact.b- auditory sensation File CarriersA lot of packages also available for embedding and hiding data in the audio files. One of the tools for audio file hiding stego is the MP3Stego,which does not only hide information effectively , of cource arbitrary, rather also claims to be partly strong method of watermarking the tar deposited MP3 audio files. The WAV formal , which stands for Wavaform Audio File Format, is a Microsoft audio format which mainly windows depends on, however, this format lets users hide data using StegoWave or Steghide (http//www.radiusnet.net/crypto/steanography/Java/stegowav.zip) (http//steghide.sourceforge.net /). These sites refer to both programs in order. Steghide modifies the LSB of data to be transmit in the carrier medium. Using an audio file as a medium is less popular than using an image as a steganography medium.c- entropy OrderingThe data club which does not have fiat constrains, is usually a very good method of steganography. Each change of a group of objects could be pointed to a positive integer. pointing can then be used to encode the hidden data by modifying the sequence of objects that are not considered in request by the carrier medium. While this technique mainly, does not change the information quality, the data which are hidden can of course easily get lost if the medium is encoded again. For example, if we have a GIF which its color map live of hidden data, we could then open the GIF in our favorite graphics-editing tool package that will be used , and save it again. Visually, the result will be both identical , from the original file to the second file, but the ordering of the color map may have been lost.13. LimitationsSteganography is limited just like that encryption is, if bob wants to send an image with a hidden message to alice , he have to first agree secretly with alice on a way of steganography. Underneath the encryption model , alice can be evenhandedly sure when she has got some ciphertext. Let us have a scenario about alice ,when she wants to borrow bobs camera and neglects to tell him to be careful for every 73rd byte in the images she sends him.Bobs will be ignorant of Alices steganography efforts. The chanses that bob will let alice borrow his digital camera will decrease the large list of pictures he will receive from her.The amount of data that could be effectively hidden in a medium is heading to be limited by the size of the medium itselt. The less limitations that exist on the ace of the medium, the more potential it has for hiding data.14. ConclutionI have briefly explained and define steganography , which is in m y opinion an effective tool to do so many things regarding security or reliability in any field of communication .what I mean that , this technique can be used in any section in real life, military , businesess, educational , governments and more.Also , I have shown varous tools and how they function well.15- References1- Artz, D. (2001). Digital steganography Hiding data within data. IEEE net income Computing, 75-80.2- Provos, N., Honeyman, P. (2012). Detecting Steganographic Content on the Internet.3- Classification of Hiding Techniques Ref F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, Information Hiding A Survey, in Proc. Of the IEEE , vol. 87, No. 7, July 1999, pg. 1063Kessler, G. (2001, September 11). Steganography Hiding Data Within Data. Retrieved December 6, 2014, from http//www.garykessler.net/library/steganography.htmlhttp//www.garykessler.net/library/fsc_stego.htmlKessler, G. (2004, February 2). An Overview of Steganography for the Computer Forensics Examiner. Retri eved December 6, 2014, from http//www.garykessler.net/library/fsc_stego.htmlhttp//www.symantec.com/connect/articles/steganography-revealedhttp//en.wikipedia.org/wiki/SteganographyNetworkhttp//www.webopedia.com/TERM/S/steganography.htmlhttp//quickcrypto.com/free-steganography-software.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment