By Robert Summitt and Jiten Patel. Steganography. What is Steganography. It is the art and science of writing a message in a way to where the only the recipient knows of its existence. The word Steganography is of Greek origin and means “covered, or hidden writing.”
It is the art and science of writing a message in a way to where the only the recipient knows of its existence.
The word Steganography is of Greek origin and means “covered, or hidden writing.”
Steganographic messages will generally appear as something else such as a picture or a text file.
Provide security over insecure channel
Dates back to 440 BC
Heredotus and wax tablets
Histiaeus and his tattooed slave
Later in the 1500’s Johannes Trithemius
World War II
Pueblo Incident in 1968
Sign Language Photos
M1 = Steganographyis the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present
Hidden messages can also be implemented into audio files using the LSB method.
Sounds and noises at the LSB level can not typically be heard by the human ear.
Therefore when playing the original file it sounds just like a normal .wav or .mp3 file
However it can be decrypted to reveal another sound file or any file for that matter.
File must be big enough to hold hidden message.
Bin Laden: Steganography master?
USA Today reported that Bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say."
One of the most reliable tools for steganography is S-tools
This program was created in 1994 by Andy Brown
There has been no updates since then because of its encryption algorithm.
Nearly impossible to break
4 different types of encryptions to choose from
IDEA, DES, Triple DES, MDC
The password is entered and confirmed by the user and then is encrypted using the desired algorithm
To reveal any image one must know the password along with the encryption algorithm
This makes it extremely difficult to break even using a brute force attack.
Using a script designed for winbatch an attempt was made to brute force a few files that supposedly had hidden files
Script was designed to brute force using a dictionary file
The script also tried every possible encryption method
Dated machines didn’t have enough virtual memory to conduct this test but if they had it would have taken a LONG time!
Including the history, modern uses, and KFC refrences
Site where Winbatch was found
Site explaining LSB and provides script used for Winbatch
Site where S-tools comes from