Documente Academic
Documente Profesional
Documente Cultură
__________________________________________________________________________________
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. It is a process in which a message or important data is hidden in a picture or in any other media such that a normal person cannot interpret it. Steganography is also known as the science of hiding information. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos () meaning "covered or protected", and graphei () meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.
Types of Steganography:
Manual Method Automated method
Manual Method :
In this method of steganography, the user uses the command prompt. With the help of command lines this method is performed. This manual method is very easy to use but is quite old now thus it is not used these days. This method does not have any sort of privacy and can be accessed by any person. By just opening the image in Notepad, any user can access the private hidden data. No security option is provided in this method. The most important thing which differentiates the original image with the transformed image, it is the image size. For example, if the size of the original image is 100kb the transformed image would not be of the same size. Its size will always be greater than the original image. In Manual method, the user opens the command prompt, selects the location of the image and of the text document and write the code :
File names have been inserted along with the new file name.
Automated Method :
As the name suggests, this method of steganography is peformed with help of software or tools which perform the same task as performed by the manual method. It is a very easy and ready to use method of steganography. S-Tools is used to perform this method. In this software a image is dragged and placed on screen of the software. Right click on the image and save it as File Name.bmp. Select the text document, drag and place it over the image. An option of inserting an password will arise. Add and verify the password and select the encryption algorithm. Save the image and open the image again in S-tools. Right click the image and select Reveal. A window will open, save that document in .txt format, a file will be saved that can be opened via notepad. 1. Open S-tool software.
4. Set password and encryption algorithm and then save the image.
5. Open the encrypted image, right click and select reveal. Enter the password and save the document and open it in notepad.
Advantages :
The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messagesno matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
"...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups..." "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." "The threat posed by steganography has been documented in numerous intelligence reports."
Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" contained a section entitled "Covert Communications and Hiding Secrets Inside Images." By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty but rather prioritising the target media. According to recently found material, hidden messages from Al-Qaeda were found in a stash of pornography.
I hope you followed these two tricks, i will carry on updating the blog with such knowledgeable stuff. Keep following this blog, have a good day (^_^) .