401 likes | 1.45k Views
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **<br>This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools.<br>Below is the list of topics covered in this session:<br>1. What is Steganography?<br>2. History of Steganography<br>3. Basic Steganographic Model<br>4. LSB Steganography<br>5. Demo: LSB Steganography<br>6. Demo: Steganographic Tools<br><br><br>Cyber Security Playlist: https://bit.ly/2N2jlNN <br>Cyber Security Blog Series: https://bit.ly/2AuULkP <br><br>Instagram: https://www.instagram.com/edureka_lea...<br>Facebook: https://www.facebook.com/edurekaIN/ <br>Twitter: https://twitter.com/edurekain <br>LinkedIn: https://www.linkedin.com/company/edureka
E N D
Agenda 01 What is Steganography? 02 History of Steganography 03 Basic Steganographic Model 04 LSB Steganography - Demo Steganography Tools 05 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography? Copyright © 2018, edureka and/or its affiliates. All rights reserved.
What is Steganography? Data is hidden in the plain sight Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography? Cryptography Board meeting is happening on Tuesday. We are meeting at 40.7127 S, Board meeting is happening on Tuesday. We are meeting at 40.7127 S, 74.0059 E Uksb klsmnc ou fghmhnvb gh sdeygdh. eu sfhd vbsnmrig st lolmnar K, dgfhal V 74.0059 E Receiver Sender Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography? Cryptography Uksb klsmnc ou fghmhnvb gh sdeygdh Intruder understands that secret message is being sent Receiver Sender Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Steganography? Steganography is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message Receiver Sender Intruder will not get to know of the existence of secret message Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
History of Steganography Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Steganographic Tecniques Steganography 2019 1800 Concealed or Hidden Drawing or Writing GRAPHEN STEGANOS Wax Tablet Invisible Ink Null Cipher Microdots Semagrams Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganography Types Image Steganography Text Audio Steganography Steganography Email Video Steganography Steganography Network Steganography Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Characteristics of Steganographic Techniques Transparency Robustness Tamper Resistance Original Image StegoImage Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Basic Steganographic Model Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Basic Steganographic Model StegoObject Cover File(X) Steganographic Encoder f(X,M,K) Secret Message(M) Communication Channel Key(K) Secret Message(M) Steganographic Decoder Stego Object Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganographic Model: With Encryption Key StegoKey Cover File Cypher Text Message StegoObject Encryption Algorithm Steganographic Encoder SENDER Communication Channel Cypher Text Steganographic Decoder Decryption Algorithm StegoObject Message RECEIVER Key StegoKey Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
LSB Steganography Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Pixels & Bits 1 0 1 1 0 1 1 1 R G 1 1 0 1 1 0 0 1 Pixel B 1 0 1 0 0 1 0 0 Total: 24 Bits Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Least Significance Bit Steganography If we change MSB, it will have larger impact on final value. If we change LSB, the impact on final value is very less Value: 255 1 1 1 1 1 1 1 1 Least Significant Bit(LSB) Most Significant Bit(MSB) 255 255 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 254 127 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 Change in bytes is 0.000002% Change in bytes is 99.99999% Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Least Significant Bit Steganography Least Significant Bit Steganography(LSBS) involves overwriting the bit with the lowest arithmetic value Secret message to hidden: Letter ‘A’ 1 0 0 0 0 0 1 Pixels after insertion Pixels before insertion(3 pixels) 10000000 10100100 10110101 10110101 11110011 10110111 11100111 10110011 00110011 10000001 10100100 10110100 10110100 11110010 10110110 11100110 10110011 00110011 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Demo Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Least Significant Bit Steganography - Demo To encode the text into image 1 Loads an image and looks at each pixels in hexadecimal value. 2 Converts secret text into bits and stores them in LSB of pixel bits 3 A delimiter is added to the end of the edited pixel values To decode the text from image While retrieving all the 0’s and 1’s extracted until delimiter is found. Extracted bits are converted into string(secret message) 4 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Steganography Tools Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Steganographic Tools Tool Stegosuite Stegohide Xiao Steganography Description Hide text inside any image Hide secret file in image or audio file. Free software that can be used to hide secret files in BMP images or in WAV files. Portable application to hide text inside image file Tool to conceal files in image, audio & flash files Tool that lets you hide any type of file inside of file. SSuite Picsel OpenPuff Camouflage Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training