Jun 20, 2015
2. WHAT IS STEGANOGRAPHY ?? Steganography from the Greek word steganos meaning covered and the Greek word graphie meaning writing Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination. Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Anyone else viewing the message will fail to know it contains hidden/encrypted data 3. MODERN DIGITAL STEGANOGRAPHY Data is encrypted Then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file. This technique may simply append the data to the file, or disperse it throughout. Carefully crafted programs apply the encrypted data such that patterns appear normal. 4. TECHNIQUES USED FOR STEGANOGRAPHY Masking and Filtering: Is where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. Algorithms and Transformations: This technique hides data in mathematical functions that are often used in compression algorithms. Least Significant Bit Insertion: The most common and popular method of modern day steganography is to make use of the LSB of a pictures pixel information. 5. GENERAL CONCEPT BEHING STEGANOGRAPHY Secret Message Carrier File jpg,bmp , mp3 ,wav Carrier File with Hidden Message 6. STEGANOGRAPHY - TOOLS Steganography Tools Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) Snow JPHide Camouflage Hiderman Many others 7. CAMOUFLAGE Camouflage allows you to hide files by scrambling them and then attaching them to the file of our choice. Append it to the carrier File. For additional security you can password our camouflaged file. We can even camouflage files within camouflaged files. 8. HOW TO CAMOUFLAGE ANY FILE Select a file to be camouflage 9. Select the carrier File Select the destination 10. Add passcode Uncamouflage a camouflage file 11. SNOW Steganographic Nature Of Whitespace. Hide messages in ASCII text by appending whitespace to the end of line. It uses the ICE encryption algorithm. Block Size 64-bit. It runs in 1-bit cipher-feedback (CFB) mode. each output bit is 64-bit Encrypted. 12. Common encryption algorithms used in steganography programs. XOR DES 3DES IDEA AES 13. DES Data Encryption Standard. Design by IBM in 1977 It is also a symmetric key block cipher. Key size 64 bit. [8 bits are used for parity check] , 56-bi are used. Block Size - 64 bit. 16 rounds of operations. There are 2^56 keys Triple DES and AES are the successor of DES. 14. DES ALGORITHM Fractioning of the text in 64-bit Blocks. Initial Permutation of Blocks. Breakdown of the blocks into two parts: left and right, named L and R. Permutation and substitution steps repeated 16 times (called rounds). Re-joining of the left and right parts then inverse initial permutation. 15. IDEA International Data Encryption Algorithm. Symmetric key Block Cipher. It was intended as a replacement of DES. It is used in PGP [Pretty good Encryption]. Key Size - 128 bits. Block Size - 64 bits. Rounds - 8.5 The process of encryption and Decryption is similar. But the order of round keys are inverted.