Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

Sunday, December 19, 2010

How to hide sensitive data - Steganography


How to hide data

There are many ways we hide our data in computer some people use encryption tools like Truecrypt, some hide there files in folders , some use folder lock etc.”Steganography “ ,I cannot say it as a new concept but it different from others(mentioned above)and has a wide range of application. Here I will discuss few basics aspects of this technique with few freeware tools for Windows OS available online

What is Steganography?

It is the art of hiding data or message in another file invisible to a targeted mass of people. Mostly people have a wrong concept that steganography is related to images only i.e. hiding messages in images only but actually that is not the case it can be done in other file formats also .We can also hide .RAR file in .DOCX formats etc.

  •  Carrier file(Size:23kb) + Message = Stego File(Size:More than 23kb)

As mentioned above “Carrier file” is the file where we can hide the message or data, after that as you can see above the size of the file has increased .

Applications of Steganography

  • This techniques is believed to be used by terrorists for sending confidential messages.
  • Used by intelligence agencies for sending confidential data.
  • Used by some website owners for marking their images.
  • Used in digital water marking images.
  • Used in laser printers for hiding the serial no of printers.
You can find wide range of Steganography Tools here for download

Procedure:

Here I will use few tools and commands to demonstrate the basics of steganography :

Method 1

  • Step 1.
Open up command prompt from the start button on the taskbar.

  • Step 2
Suppose you have an image file Compufreaks.jpg (carrier file) and you want to hide a file called RHA.rar(message) in that.

  • Step 3.
You have to keep both the files in the same folder and change the path of the drive to that folder in command prompt.

  • Step 4
Then use the command ”copy /b Compufreaks.jpeg+RHA.rar Secret.jpeg “ and check the size of the files as shown below, now you have sucessfully hided computerfreaks.jpeg in to RHA.rar

How to hide data

Method 2

The tools we will be using here is Jphs_0.5. 
  • Step 1
Having downloaded the required files open up Jphs_0.5.(click on Jphswin.exe) in the extracted folder.

  • Step2
Click on the “open jpeg” on the top menu and browse to find the required file and click open.

  • Step 3
Now click on hide on the top and enter the password then click ok to select the required message file and save it.

How to hide data



How to Detect Hidden messages?


The method of detection of hidden message in a steganographically encoded file is known as Steganalysis.Here I will bring out few of the basic techniques of steganalysis.

  • Requirements

a) Stegdetect_0.4
b) Wordlist file
c) Rules.ini file

Method 1

  • Step 1

Once you have downloaded the required file , now open up command prompt and change the path where you have downloaded Stegdetect_0.4(extracted).

  • Step 2

Now put the required steganographically encoded file(Secret.jpg) generated from method 2.above in that folder where you have exracted Stegdetect_0.4.

How to hide data

  • Step 3
In the command prompt use the command stegdetect –t p secret.jpg and hit enter,then it will show the show the steganography tool used and password as <******>.
  • Step 4
Now use the command stegbreak –r rules.ini –f words.txt –t p secrect.jpg and hit enter it will show the password and no . of embeddings.



Note:Always use the extension of the required file in the above command.

  • Step 5

Having know the password open the file using Jphs_0.5 and then click seek on the top menu use the password (retrieved above) and save the file in the format of the data file.

Method 2

There is an online tool available called Mozaiq which does all the work that I described in method 1. above.
Then you can use Mozaiq Decrypt for decrypting the steganographically encrypted file .

Certianly steganography is really a vast topic of discussion ,here I have tried to bring out few essential aspects of it .Hope you like it.

If you find this article worth reading then do drop a comment,it will be appreciated.

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.

0 comments:

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers