Susmita: Oh, damn! Ankush didn't send the information that I asked him to send!
Zain: Look Susmita here is the most wanted document!
Susmita: What? Where? it's a cartoon image Zain! Are you kidding me?
Zain: No ma'am! He sent the most credential file keeping them inside such an ordinary file!
Susmita: But....... Why did he do this, and how????
Hey buddy, read the rest later! Are you extremely curious like Susmita too to know about hiding information? But what's the fact? To grasp this matter, you need to analyze the term Steganography. It is derived from Greek words. Stegano means concealed and graphein means writing. Let's understand this simple scenario.
Steganography is nothing but the practice of concealing messages, files, images, or any kind of data within another message, files, images, or another data without using an encryption method.
"It is the art and science of embedding secret messages in cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message."
Let's throw a look at its historical view. The first recorded uses of Steganography can be traced back to 440 BC when Herodotus mentions two examples in his history. Histiaeus sent a message to his vassal, Aristagoras, by shaving the head of his most trusted servant, "marking" the message onto his scalp. Then sent him on his way once his hair had regrown, with the instruction, "When thou art come to Miletus, bid Aristagoras shave thy head and look thereon."
The ancient practices of these techniques are – wax tablets, invisible ink, null cipher, microdots, semagrams, etc. Historical happenings surely attract you. So, let's find out what happened.
Now, steganography is evolved as a multimedia object and has been majorly used digitally.
There are 4 popular types of steganography.
Let me give you some basic ideas about these four techniques.
This kind of steganography is a mechanism for hiding private text messages inside another text as a covering message. There are three main categories used in text steganography.
Some of you may not be familiar with semantic algorithms and white-space steganography.
Semantic algorithm: It is such an analysis which helps to find out the actual meaning of the text. It is considered a crucial part of NLP. This algorithm allows machines to grasp and expound sentences or entire documents by figuring out their grammatical structure and recognizing relationships between individual words in a specific context. Semantic analysis is based on hyponyms, meronomy, polysemy, synonyms, antonyms, and homonyms.
White-space steganography: It is used to hide messages in ASCII text by conjoining whitespace to the end of lines, spaces or tabs.
Now let's come to other parts of steganography.
In this type of steganography, hidden data is implanted into an image by changing the values of digital representation. There are a lot of ways used here. One common approach is – LSB steganography, masking and filtering, and many others.
Want to know about LSB (Least Significant Bit) steganography? Cool Boss! Before that, let me give you a basic idea about the colour model. What is colour model, sir?
It is a method for creating a whole range of colours from a set of primary colours.
In computer graphics, one of the most additive colour models is RGB (Red, Green, Blue) colour model. It is used in display monitors.
We are working with RGB here. Pixel is nothing but the smallest addressable element in a raster image. Each pixel has its colour and individual digital representation.
Another popular model is – CMY (Cyan, Magenta, Yellow) colour model which is used in the printer. CMYK (Cyan, Magenta, Yellow, and Key (Black)) model works partially or entirely masking colours on a lighter e.g., white background.
Hope you will not have any problems this time in understanding LSB Steganography.
LSB stands for Least Significant Bit. Computer information is stored in bits that make up bytes and only significant means that we are going to choose to change or modify the bit at least affect the image. We can take an example!
Suppose, 10101001. So, here are multiple bits where,
So, what are we doing with these two last bits? That's the main part of Least Bit Steganography.
Say, if you have an image and this has a lot of pixels where each pixel has colour. This image may follow any colour model. Let's take RGB Colour Model. Using this model, we can get any colour.
Using this, we can get multiple complexes of colours by adjusting the values. This is the fundamental idea behind understanding LSB Steganography. Let's take an example!
You may find similarities between these two images from the angle of their colour. But if you look at their colour values, you will notice a slight change in the green parameter.
It is 252 instead of 255, so this is not a pure green colour. Here, in the second image's colour value, 00 is the Least Significant Bit.
So, what can we do with these two bits? We can use this for storing the information. The image may be the same but hidden messages are in these two portions. We can also reserve these two bits in the red parameter as well as in the blue parameter. So, we can store data in this place and that's why the Steganographic technique involves this idea called LSB Steganography.
We can modify the Least Significant Bits so that viewers won't find many colour differences but still data is hidden! There is also a Palette-Based Technique that relies on images. Crackers embed this technique as GIF files.
Here, the secret video is hidden inside the cover video to produce the steganographic video.
Secret message in audio! Maybe you have a lot of thoughts running through your head at once.
How to hide any secret data in any audio file?
How to view secret data hidden in an audio file?
How to decrypt the secret data? ….. and many more. Not you!
Yes, you can apply this technique too! It's not that you are changing the file extension. There must be audio and secret data inside it.
As you learn about Steganography, know its advantages and disadvantages thoroughly!
Steganography is completely a part of Ethical Hacking. A solid and easy technique for hiding secret any kind of data or message overlaying it with a funky or noisy message, image, audio, or video. It's nothing but a hint to let you know. Hushhh! Hackers are watching and may even be listening
UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.
Read DetailsThe recent pandemic was unexpected and unknown to most part of the world. It has changed our life and we are slowly adapting to our new lifestyle. The risks associated with the new lifestyle, both personal & corporate, are unknown to most of us.
Read Details