There are many ways we hide our data in computer some people use encryption tools like Truecrypt, some hide there files in folders , some use folder lock etc.”Steganography “ ,I cannot say it as a new concept but it different from others(mentioned above)and has a wide range of application. Here I will discuss few basics aspects of this technique with few freeware tools for Windows OS available online
What is Steganography?
It is the art of hiding data or message in another file invisible to a targeted mass of people. Mostly people have a wrong concept that steganography is related to images only i.e. hiding messages in images only but actually that is not the case it can be done in other file formats also .We can also hide .RAR file in .DOCX formats etc.As mentioned above “Carrier file” is the file where we can hide the message or data, after that as you can see above the size of the file has increased .
Applications of Steganography
- This techniques is believed to be used by terrorists for sending confidential messages.
- Used by intelligence agencies for sending confidential data.
- Used by some website owners for marking their images.
- Used in digital water marking images.
- Used in laser printers for hiding the serial no of printers.
Procedure:
Here I will use few tools and commands to demonstrate the basics of steganography :Method 1
- Step 1.
- Step 2
- Step 3.
- Step 4
Method 2
- Step 1
- Step2
- Step 3
How to Detect Hidden messages?
The method of detection of hidden message in a steganographically encoded file is known as Steganalysis.Here I will bring out few of the basic techniques of steganalysis.
- Requirements
a) Stegdetect_0.4
b) Wordlist file
c) Rules.ini file
Method 1
- Step 1
Once you have downloaded the required file , now open up command prompt and change the path where you have downloaded Stegdetect_0.4(extracted).
- Step 2
Now put the required steganographically encoded file(Secret.jpg) generated from method 2.above in that folder where you have exracted Stegdetect_0.4.
- Step 3
- Step 4
Note:Always use the extension of the required file in the above command.
- Step 5
Having know the password open the file using Jphs_0.5 and then click seek on the top menu use the password (retrieved above) and save the file in the format of the data file.
Method 2
There is an online tool available called Mozaiq which does all the work that I described in method 1. above.Then you can use Mozaiq Decrypt for decrypting the steganographically encrypted file .
Certianly steganography is really a vast topic of discussion ,here I have tried to bring out few essential aspects of it .Hope you like it.
If you find this article worth reading then do drop a comment,it will be appreciated.
Subscribe To Get FREE Tutorials!
Respected Readers:
|
0 comments:
Confused? Feel free to ask
Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Post a CommentNote:-
Please do not spam Spam comments will be deleted immediately upon my review.
Regards,
XEO Hacker