SlideShare une entreprise Scribd logo
1  sur  17
Analyzing the file hidden by the
 steganography tool and how
 the steganography detection
         tool detects it


                Group 6
 Ahmet Aydin - Arman Güngör - Laili Aidi
Background
 Steganography is hiding secret message into cover
  media, no one suspects from the presence of hidden
  message.

 Steganalysis is the art of revealing hidden message in
  a cover media.

 Keywords: Stego file, truck file (cover media)
Goal
 Figuring out the pattern of the bytes in the stego file.
 How steganalysis tool (Stegspy) identify the bytes
  appended to the cover media.

 Comparing steganography tools: Hiderman and Masker
Limitation of Study
 The analysis is only done with the text and JPEG
  files, not with audio or video file.

 There are parts of the stego files that cannot be
  analyzed yet, because the encryption that is used in the
  steganography process make these bytes complicated
  to be analyzed.
Steganography Type
 Robust steganography: involves embedding
  information into a file, cannot easily be destroyed.
   Fingerprinting
   Watermarking
 Fragile steganography: involves embedding information
  into cover media, destroyed if that media is modified.
Steganography Technique
 Binary File Techniques
 Plaintext Steganography Techniques
 Still imagery Steganography Techniques
 Audio and Video Steganography
 IP datagram steganography / Network Covert Channel /
  Network steganography
Steganalysis Technique
 Based on unusual pattern in the media or visual
  detection of the same.

 This can be done because the properties of electronic
  media are changed after it is used to hide any
  object, result degradation in terms of quality or unusual
  characteristics of the media.
Steganography Attacks
 Known carrier attack
 Steganography only attack
 Known message attack
 Known steganography attack
Tools
 Steganography tools:
   Hiderman version 3.0
   Masker version 7.5
 Steganalysis tool: Stegspy version 2.0
 Hex Editor: Hex Editor Neo 4.95
Hiderman Analysis




1.   The truckfile content, which is unencrypted
2.   10 bytes data with unknown function, which the value depends on the password.
3.   The length of the hidden file name, which is unencrypted.
4.   The name of the hidden file, which is encrypted.
5.   The hidden file content, which is presented using this algorithm: For every 4 bytes
     data, the first 2 bytes are unencrypted, and the last 2 bytes are encrypted
Hiderman Analysis ( contd. )




6.   8 bytes data, which is almost same for every file. If it is changed /
     removed, then Hiderman will not authenticate user to recover the
     stego file, even tough the given password is correct.
7.   Stream of unknown bytes, which the length is not same for each file.
8.   The last 3 bytes (Hex value 43 44 4e) are the Hiderman signature.
Masker Analysis
Masker Analysis
1. The truckfile content, which is unencrypted.
2. The length of the hidden file content, which is
    unencrypted, presented twice, followed by blank character
    (Hex value 20), with total length 13 bytes.
3. The hidden file content, which is encrypted. After the
    encrypted bytes of the file content, there is stream of 0
    character (Hex value 30) followed by 12 blank characters
    and 0 character followed by 12 blank characters again.
    This pattern possible shows the end of the file content.
4. Stream of unknown bytes, which is possible contain the
    password and encryption algorithm used for
    steganography process. The length of this part depends on
    the length of the password.
5. The last 77 bytes are the Masker signature.
Stegspy’s Steganalysis
 Hiderman:Detecting the last 3 bytes of the stego file as
  Hiderman’s signature

 Masker: Stegspy cannot identify the stego file.
   According to documentation, Stegspy claims it can
    identify Masker’s stego file!
   It is possible to detect Masker by looking at last 77 bytes
    of stego file. It is Masker’s fingerprint and always same
    for every file.
Comparison Hiderman vs
                  Masker
            Comparison                 Hiderman                                 Masker

Encryption algorithm     Predictable encryption algorithm.       Standard encryption algorithm:

                                                                 Blowfish, DES, Cast5, Serpent-256,
                                                                 Rijndael-256, TripleDES, TWOFISH

Staganography recovery   •Truck file and hidden file can be •Hidden file can be recovered
                         recovered.                             •Truck file cannot be recovered.
                         •Although sometimes some of the bytes
                         change in the truckfile after recovery
                         process.


Staganoganalysis         •Stegspy and Hiderman use last 3 bytes •Stegspy cannot identify the stego file.
                         of the stego file.                     •Masker can identify the stego file even
                                                                some part of the last 77 bytes signature
                                                                is missing or changed.
Conclusion
 Hiderman and Masker can be classified as robust
  steganography type and use Binary File
  steganography techniques.
 Hiderman and Masker use encryption, but
  Masker’s encryption is stronger than Hiderman’s
  : Hiderman’s result is predictable compared to
  Masker’s.
 Masker provides various encryption algorithms.
 Hiderman and Masker leave signature in the
  stego file and it can be detected.
 Stegspy can recognize Hiderman’s stego but not
  Masker’s, and it just searches for the signature of
Future Work
 It is possible to make deeper analysis in order to
  understand the steganography process of Hiderman
  and Masker.

 The research can be expanded by doing analysis of
  steganography process of the other tools in the audio
  and video media file.

 Analysis of the other steganography-steganalysis
  techniques and tools.

Contenu connexe

Tendances

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Curve and text clipping
Curve and text clippingCurve and text clipping
Curve and text clippingArvind Kumar
 
Module 5 part1
Module 5 part1Module 5 part1
Module 5 part1cs19club
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aesMDKAWSARAHMEDSAGAR
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Unit 4 memory system
Unit 4   memory systemUnit 4   memory system
Unit 4 memory systemchidabdu
 
Peripheral Component Interconnect (PCI)
Peripheral Component Interconnect (PCI)Peripheral Component Interconnect (PCI)
Peripheral Component Interconnect (PCI)Suraj B.V.S.G
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 

Tendances (20)

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Curve and text clipping
Curve and text clippingCurve and text clipping
Curve and text clipping
 
Module 5 part1
Module 5 part1Module 5 part1
Module 5 part1
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
The origin and evaluation criteria of aes
The origin and evaluation criteria of aesThe origin and evaluation criteria of aes
The origin and evaluation criteria of aes
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Array Processor
Array ProcessorArray Processor
Array Processor
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Unit 4 memory system
Unit 4   memory systemUnit 4   memory system
Unit 4 memory system
 
Peripheral Component Interconnect (PCI)
Peripheral Component Interconnect (PCI)Peripheral Component Interconnect (PCI)
Peripheral Component Interconnect (PCI)
 
Amdahl`s law -Processor performance
Amdahl`s law -Processor performanceAmdahl`s law -Processor performance
Amdahl`s law -Processor performance
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
CO Module 5
CO Module 5CO Module 5
CO Module 5
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Spline representations
Spline representationsSpline representations
Spline representations
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Parallel Computing
Parallel ComputingParallel Computing
Parallel Computing
 
block ciphers
block ciphersblock ciphers
block ciphers
 

En vedette

Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret dataVema Reddy
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Alberto Villegas
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysisPrince Boonlia
 
Probabilistic Methods Of Signal And System Analysis, 3rd Edition
Probabilistic Methods Of Signal And System Analysis, 3rd EditionProbabilistic Methods Of Signal And System Analysis, 3rd Edition
Probabilistic Methods Of Signal And System Analysis, 3rd EditionPreston King
 
Intorduction to information theory and applications copy
Intorduction to information theory and applications   copyIntorduction to information theory and applications   copy
Intorduction to information theory and applications copyBikash Thapa
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information TheoryDarshan Bhatt
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 

En vedette (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography
Steganography Steganography
Steganography
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
File000133
File000133File000133
File000133
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Probabilistic Methods Of Signal And System Analysis, 3rd Edition
Probabilistic Methods Of Signal And System Analysis, 3rd EditionProbabilistic Methods Of Signal And System Analysis, 3rd Edition
Probabilistic Methods Of Signal And System Analysis, 3rd Edition
 
Intorduction to information theory and applications copy
Intorduction to information theory and applications   copyIntorduction to information theory and applications   copy
Intorduction to information theory and applications copy
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information Theory
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Information theory
Information theoryInformation theory
Information theory
 
Applications of random variable
Applications of random variableApplications of random variable
Applications of random variable
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Similaire à Steganography Tool & Steganography Detection Tool - Presentation

Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijdms
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
 

Similaire à Steganography Tool & Steganography Detection Tool - Presentation (20)

HACKING
HACKINGHACKING
HACKING
 
Steganography
SteganographySteganography
Steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
Steganography
SteganographySteganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
steganography
steganographysteganography
steganography
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
Stegnography
Stegnography Stegnography
Stegnography
 
Multimedia
MultimediaMultimedia
Multimedia
 
Steganography
SteganographySteganography
Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
 

Plus de Laili Aidi

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsLaili Aidi
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of NobelLaili Aidi
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and OpportunitiesLaili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0Laili Aidi
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationLaili Aidi
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportLaili Aidi
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListLaili Aidi
 

Plus de Laili Aidi (20)

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
 

Dernier

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 

Dernier (20)

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 

Steganography Tool & Steganography Detection Tool - Presentation

  • 1. Analyzing the file hidden by the steganography tool and how the steganography detection tool detects it Group 6 Ahmet Aydin - Arman Güngör - Laili Aidi
  • 2. Background  Steganography is hiding secret message into cover media, no one suspects from the presence of hidden message.  Steganalysis is the art of revealing hidden message in a cover media.  Keywords: Stego file, truck file (cover media)
  • 3. Goal  Figuring out the pattern of the bytes in the stego file.  How steganalysis tool (Stegspy) identify the bytes appended to the cover media.  Comparing steganography tools: Hiderman and Masker
  • 4. Limitation of Study  The analysis is only done with the text and JPEG files, not with audio or video file.  There are parts of the stego files that cannot be analyzed yet, because the encryption that is used in the steganography process make these bytes complicated to be analyzed.
  • 5. Steganography Type  Robust steganography: involves embedding information into a file, cannot easily be destroyed.  Fingerprinting  Watermarking  Fragile steganography: involves embedding information into cover media, destroyed if that media is modified.
  • 6. Steganography Technique  Binary File Techniques  Plaintext Steganography Techniques  Still imagery Steganography Techniques  Audio and Video Steganography  IP datagram steganography / Network Covert Channel / Network steganography
  • 7. Steganalysis Technique  Based on unusual pattern in the media or visual detection of the same.  This can be done because the properties of electronic media are changed after it is used to hide any object, result degradation in terms of quality or unusual characteristics of the media.
  • 8. Steganography Attacks  Known carrier attack  Steganography only attack  Known message attack  Known steganography attack
  • 9. Tools  Steganography tools:  Hiderman version 3.0  Masker version 7.5  Steganalysis tool: Stegspy version 2.0  Hex Editor: Hex Editor Neo 4.95
  • 10. Hiderman Analysis 1. The truckfile content, which is unencrypted 2. 10 bytes data with unknown function, which the value depends on the password. 3. The length of the hidden file name, which is unencrypted. 4. The name of the hidden file, which is encrypted. 5. The hidden file content, which is presented using this algorithm: For every 4 bytes data, the first 2 bytes are unencrypted, and the last 2 bytes are encrypted
  • 11. Hiderman Analysis ( contd. ) 6. 8 bytes data, which is almost same for every file. If it is changed / removed, then Hiderman will not authenticate user to recover the stego file, even tough the given password is correct. 7. Stream of unknown bytes, which the length is not same for each file. 8. The last 3 bytes (Hex value 43 44 4e) are the Hiderman signature.
  • 13. Masker Analysis 1. The truckfile content, which is unencrypted. 2. The length of the hidden file content, which is unencrypted, presented twice, followed by blank character (Hex value 20), with total length 13 bytes. 3. The hidden file content, which is encrypted. After the encrypted bytes of the file content, there is stream of 0 character (Hex value 30) followed by 12 blank characters and 0 character followed by 12 blank characters again. This pattern possible shows the end of the file content. 4. Stream of unknown bytes, which is possible contain the password and encryption algorithm used for steganography process. The length of this part depends on the length of the password. 5. The last 77 bytes are the Masker signature.
  • 14. Stegspy’s Steganalysis  Hiderman:Detecting the last 3 bytes of the stego file as Hiderman’s signature  Masker: Stegspy cannot identify the stego file.  According to documentation, Stegspy claims it can identify Masker’s stego file!  It is possible to detect Masker by looking at last 77 bytes of stego file. It is Masker’s fingerprint and always same for every file.
  • 15. Comparison Hiderman vs Masker Comparison Hiderman Masker Encryption algorithm Predictable encryption algorithm. Standard encryption algorithm: Blowfish, DES, Cast5, Serpent-256, Rijndael-256, TripleDES, TWOFISH Staganography recovery •Truck file and hidden file can be •Hidden file can be recovered recovered. •Truck file cannot be recovered. •Although sometimes some of the bytes change in the truckfile after recovery process. Staganoganalysis •Stegspy and Hiderman use last 3 bytes •Stegspy cannot identify the stego file. of the stego file. •Masker can identify the stego file even some part of the last 77 bytes signature is missing or changed.
  • 16. Conclusion  Hiderman and Masker can be classified as robust steganography type and use Binary File steganography techniques.  Hiderman and Masker use encryption, but Masker’s encryption is stronger than Hiderman’s : Hiderman’s result is predictable compared to Masker’s.  Masker provides various encryption algorithms.  Hiderman and Masker leave signature in the stego file and it can be detected.  Stegspy can recognize Hiderman’s stego but not Masker’s, and it just searches for the signature of
  • 17. Future Work  It is possible to make deeper analysis in order to understand the steganography process of Hiderman and Masker.  The research can be expanded by doing analysis of steganography process of the other tools in the audio and video media file.  Analysis of the other steganography-steganalysis techniques and tools.