Steganography

...let us know what you think, free speech!
Post Reply
User avatar
DrVirus
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 383
Joined: 16 May 2007, 16:00
16
Contact:

Steganography

Post by DrVirus »

Well I was just reading around on various techniques of hiding datas when I stumbled upon this very interesting one. You see my problem with average cryptography was that, if someone has look at your cipher or password request he/she will understand that there is something to hide. And he/she is bound to get a crack at it. And we all know that no data is safe forever. So as always I was wondering if there was this technique that doesn't look anything like cipher or that doesn't ask for a password and still holds that data. Only you get to know how to unlock it or decipher it.
Steganography does just that. With this technique you can hide your data in a picture, you can hide in audio files etc etc. It's fasinating. So I was wondering if any of you exprienced people can help me out with a few ebooks on how to create it (with out any downloadable software thank you). Any and all help are appriciated.
And for the once interested this is the wikilink for the article http://en.wikipedia.org/wiki/Steganography .
I hope I am allowed to post it. If not it was a mistake, sorry I will remove it instantly. Please don't ban me. [-o< (I am serious)

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

STEGANOGRAPHIC TECHNIQUES

A. Substitution Technique
In the substitution technique ; the redundant parts
are covered with a secret message. This technique
includes the Least Significant Bit Substitution method ,
where we choose a subset of cover elements and
substitute the least significant bits of each element by the
message bits .Message may be encrypted or compressed
before hiding. A pseudorandom number generator may
be used to spread the secret message over the cover in a
random manner. This is an easy method but is vulnerable
to corruption due to small changes in carrier.

B. Transform Domain Technique
In the transfer domain technique; the secret message
is embedded in the transform space (e.g. frequency
domain) of the cover. An example of this method
includes the Discrete Cosine Transform (DCT) domain.
The cover image is split into 8*8 blocks and each block
is used to encode one message bit. The blocks are chosen
in a pseudorandom manner. The relative size of two
predefined DCT coefficients is modulated using the
message bit. The two coefficients are chosen from
middle frequencies.

C. Spread Spectrum Technique
This technique uses the concept of spread spectrum .
The message is spread over a wide frequency bandwidth.
The signal to noise ratio in every frequency band is so
small that it is difficult to detect. Even if parts of
message are removed from several bands, enough
information is present in other bands to recover the
information. Thus it is difficult to remove the message
completely without entirely destroying the cover .It is a
very robust technique that finds application in military
communication.

D. Statistical Techniques
In the statistical techniques , the information is
encoded by changing several properties of the cover. The
cover is split into blocks and each block is used to hide
one message bit .If the message bit is one, then the cover
block is modified otherwise the cover block is not
modified. This technique is difficult to apply because a
good test must be found that allows for proper
distinction between modified and unmodified cover
blocks.

E. Distortion Techniques
The information is stored by distorting the signal.
The encoder applies a sequence of modifications to the
cover . This sequence corresponds to the secret message
. The decoder measures the differences between the
original cover and the distorted cover to detect the
sequence of modifications and consequently recover the
secret message. This method is not used in many
applications because the decoder must have access to the
original cover.
---------
STEGANOGRAPHIC TOOLS

Blindside
Blindside is an application of steganography that
allows one to conceal a file, or set of files within a
standard computer image. The new image looks
identical to the human eye, but can contain up to 50k or
so of secret data. The hidden files can also be password
encrypted, to prevent unauthorised access to their data.

Data Marking Technologies
DataMark Technologies currently market four digital
steganography products - StegComm for confidential
multimedia communication, StegMark for digital
watermarking of digital storage media, StegSafe for
digital storage and linkage and StegSign for e-commerce
transactions. Each software product is packaged into a
Standard version and a Professional version.

Digital Picture Envelope
Digital Picture Envelope is a program you can make
your secret data imperceptible to any human eyes. So,
you can store/send it very safely in/through your
computer. Actually, it can embed your secret data in a
vessel image (we call it a "dummy" image, or a "picture
envelope") without changing the visual quality of the
dummy image. It does not change even the file size. If
you want to see the secret data, you can easily restore it
from the secret- embedded dummy image.

Gifshuffle
The program gifshuffle is used to conceal messages
in GIF images by shuffling the colourmap, which leaves
the image visibly unchanged. gifshuffle works with all
GIF images, including those with transparency and
animation, and in addition provides compression and
encryption of the concealed message.

Hide4PGP
Hide4PGP is a freeware program distributed as
source code in ANSI C and precompiled executables for
DOS (any version but 1.x - is there one outside the
museum?), OS/2 (Warp and up), and the Win32 console
(9x and NT). It's purpose is to hide any data in a way
that the viewer or listener does not recognize any
difference.

Invisible secrets
Invisible Secrets hides your private data into
innocent looking files, like pictures, or web pages. It also
features: strong encryption algorithms; a locker that
allows you to password protect certain applications; a
password management solution and a real-random
password generator; a shredder that helps you destroy
beyond recovery files, folders and internet traces; the
ability to create self-decrypting packages; secured
password transfer.

JPHIDE and JPSEEK
JPHIDE and JPSEEK are programs which allow you
to hide a file in a jpeg visual image. There are lots of
versions of similar programs available on the internet but
JPHIDE and JPSEEK are rather special. The design
objective was not simply to hide a file but rather to do
this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual
image, a low insertion rate (under 5%) and the absence
of the original file, it is not possible to conclude with any
worthwhile certainty that the host file contains inserted
data. As the insertion percentage increases the statistical
nature of the jpeg coefficients differs from "normal" to
the extent that it raises suspicion. Above 15% the effects
begin to become visible to the naked eye. Of course
some images are much better than others when used a
host file - plenty of fine detail is good. A cloudless blue
sky over a snow covered ski paradise is bad. A waterfall
in a forest is probably ideal.

Snow
The program snow is used to conceal messages in
ASCII text by appending whitespace to the end of lines.
Because spaces and tabs are generally not visible in text
viewers, the message is effectively hidden from casual
observers. And if the built-in encryption is used, the
message cannot be read even if it is detected.

Steg Party
StegParty is a system for hiding information inside of
plain-text files. Unlike similar tools currently available it
does not use random gibberish to encode data -- it relies
on small alterations to the message, like changes to
spelling and punctuation. Because of this you can use
any plain-text file as your carrier , and it will be more-orless
understandable after the secret message is
embedded.

--------------
http://www.rimtengg.com/coit2007/procee ... dfs/64.pdf
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
lilrofl
Siliconoclast
Siliconoclast
Posts: 1363
Joined: 28 Jan 2009, 17:00
15
Location: California, USA
Contact:

Stego

Post by lilrofl »

I used to use stenography a lot, back then it was limited to GIF and WAV files, and a program called STools was about as good as you could get, times have changed a bit though. A few months ago a friend of mine turned me on to a program called Masker 7.5... it hides anything in anything while keeping the carrier file fully functional. The size of the carrier file becomes an issue if you are hiding large data in small files, but for small in large or small in small there is little suspicion raised.

I played with it long enough to be sure it worked, but I have little practical need for it, so I shoved it away on a data CD lol, full version is about 40 Euros, but i suppose there are ways around that too =)

very cool program though, intuitive and easy to use as well.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

http://www.freedownloadscenter.com/Util ... asker.html

Masker is a program that encrypts your files so that a password is needed to open them, and then it hides files and folders inside of carrier files, such as image files, video, program or sound files. The strong encryption up to 448-bit and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. You can hide any files, and even whole folders with sub-folders! The carrier file will remain fully functional! Images can be viewed, sounds can be played and videos can be displayed on the monitor. You can transfer the carrier file through the internet and the hidden files inside will be transfered simultaneously with the carrier file, because they are the part of the carrier file.

nice.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

hm, pretty much like Truecrypt DNR....I never used the masker app, but imo open source is always the best choice:
http://www.truecrypt.org/

but well, both is not really steganography imo, because the "file" you use as container for the encrypted content is not functional....if you hide a picture in such a stub and give the stub the name 1.wav it LOOKS like a wav file, but you can't play it in an audio player. and this is what steganography is supposed to do, to hide a file in another one by keeping the functionality of the container file.
the most professional tool at the moment is Steghide btw:
http://steghide.sourceforge.net/

:wink:

User avatar
lilrofl
Siliconoclast
Siliconoclast
Posts: 1363
Joined: 28 Jan 2009, 17:00
15
Location: California, USA
Contact:

Masker

Post by lilrofl »

<quote>"but well, both is not really steganography imo, because the "file" you use as container for the encrypted content is not functional....if you hide a picture in such a stub and give the stub the name 1.wav it LOOKS like a wav file, but you can't play it in an audio player."</quote>

Not so I think, granted I hid a movie in a picture, I ended up with a picture that was as large as a movie and opened up looking like a picture, when I hid a picture in a movie I ended up with a movie that was not noticeably bigger but contained the picture.

I think you are right in that it isn't stego really... because stenography uses a changed bit at the end of the color code in pictures for example.

<CRaSH> that was my train of thought that just got derailed...

I have to run, duty calls and all that jazz... if need be I'll finish when I get back, but this group has a surprising tendency to fling ideas as fast as they are thought, so I don't think there will be any need of my 2 cents by that time.

You guys rock!

User avatar
DrVirus
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 383
Joined: 16 May 2007, 16:00
16
Contact:

Post by DrVirus »

All right. Thanks DNR. That's what I was talking about. Thanks a lot. =D>

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Hey bb, I agree - true stego has to work. The object behind stego is not awesome crypto, but hiding the fact that a hidden file exist inside a image or audio file. Stego has to be seriously considered by those with something to hide - Here in the USA, law enforcement authorities can put you in jail for upto 5 years if you don't give them your password (why bother cracking triple DES 256-bit pw, you'll tell them the pw!).

But if you hide the fact that you have locked/encrypted/hidden files - then there is little chance they can put you in jail for them. This means hiding the tools used to make/decrypt stego files from the LE authorities. Having a Masker icon on your desktop is an obvious give away.. :wink:

yea mon! Good thread :)

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Post Reply