Email:-anil1268@gmail.com
chelukalaashish@yahoo.com
Steganography is the art and science of writing hidden messages in such a way that no
one apart from the intended recipient knows of the existence of the message.The word
in cipher, or in characters, which are not intelligible except to persons who have the key;
cryptography".
Some techniques are Concealing messages within the lowest bits of noisy images or
sound files. Hidden messages in wax tablets. Steganography is used by some modern
printers, including HP and Xerox brand color laser printers and in digital watermarking.It
The advantage of steganography over cryptography alone is that messages do not attract
Steganographic techniques:
• Invisible ink
• Null ciphers
packets sent over the network from the keyboard. Content-Aware Steganography
Steganography has been widely used in historical times, especially before cryptographic
• Hidden messages on paper written in secret inks under other messages or on the
• During and after World War II, espionage agents used photographically produced
microdots to send information back and forth. Since the dots were typically
extremely small -- the size of a period produced by a typewriter or even smaller --
• Counter-propaganda
Ambigram:
An ambigram, also sometimes known as an inversion, is a graphical figure that spells out
a word not only in its form as presented, but also in another direction or orientation.
Rotational:A design that presents several instances of words when rotated through a fixed
angle..
Mirror :A design that can be read when reflected or viewed through a mirror, usually as
Figure-ground:A design in which the spaces between the letters of one word form another
word.
Chain:A design where a word (or sometimes words) are interlinked forming a repeating
chain. Letters are usually overlapped meaning that a word will start partway through
another word. Sometimes chain ambigrams are presented in the form of a circle.
3-dimensional
Ambigrams are exercises in graphic design that play with optical illusions, symmetry and
visual perception.
Numerology:
digit summing, then reach conclusions based on the single digit that is produced.
Digit summing, as the name implies, involves taking the sum of all of the digits in a
number, and repeating the process as necessary until a single-digit answer is produced.
For a word, the values corresponding to each letter's place in the alphabet (e.g., A=1,
Examples:
346->3+4+6=13->1+3=4.
HAI->6+1+9=16->1+6=7
A quicker way to arrive at a single-digit "summation" is simply to take the value modulo
AJAY-> 1+10+1+25=37
Chinese numerology:
Some Chinese assign a different set of meanings to the numbers and certain number
combinations are considered luckier then others. In general, even numbers are
Cantonese frequently assign the following definitions, which may differ in other forms of
Chinese:
Astrology
Science
Bible
of writing in cipher, or in characters, which are not intelligible except to persons who
popular freeware tools out now: F5, then moved to a tool called SecurEngine, which
hides text files within larger text files, and lastly a tool that hides files in MP3s called
F5 was developed by Andreas Westfield, and runs as a DOS client. I found it very easy to
encode a message into a JPEG file, even if the buttons in the GUI are written in German!
Users can simply do this by following the buttons, inputting the JPEG file path, then the
location of the data that is being hidden (in my case, I used a simple text file created in
Notepad), at which point the program prompts the user for a pass phrase.
SecurEngine doesn't seem to be as foolproof as the tools that hide text within pictures.
When I hid my small text file in a bigger text file, I found an odd character at the bottom
of the encoded file ("ÿ"). This character was not in the original file. SecurEngine gives
users the option of just hiding the image, hiding the image as well as encrypting it, or
both.
MP3Stego, a tool that hides data in MP3 files worked very well. How the process works
is like this: you encode a file, a text file for example, with a .WAV file, in order for it to
be compressed into MP3 format. One problem that I ran into was that in order to hide
data of any size, I had to find a file that was proportional in size.
Steganos Suite is a commercial software package of numerous stego tools all rolled into
one. In addition to a nifty Internet trace destructor function and a computer file shredder,
it has a function called the File Manager. This allows users to encrypt and hide files on
their hard drive. The user selects a file or folder to hide, and then selects a "carrier" file,
This would require the implementation of company-wide acceptable use policies that
normal traffic in and around your network and can thus assist in detecting any type of
anomaly, especially with any changes in the behavior of increased movement of large
computers may also help to identify anomalous storage of image and/or video files.
Stefan Hetzel cites two methods of attacking steganography, which really are also
methods of detecting it. They are the visual attack (actually seeing the differences in the
to make data unreadable by a third party, the goal of steganography is to hide the data
• There are a large number of steganographic methods ranging from invisible ink
and microdots to secreting a hidden message in the second letter of each word of a
such as:
• Encryption The encrypted data can only be read by parties who have been given
the necessary key to decrypt the ciphertext back into its original plaintext form.
users to hide files. Using this feature is as easy as changing the properties of a
directory to "hidden", and hoping that no one displays all types of files in their
explorer. In existing directories that have a lot of files, such as in the /dev
• Covert channels - Some tools can be used to transmit valuable data in seemingly
normal network traffic. One such tool is Loki. Loki is a tool that hides data in
• Hiding files in "plain sight" (e.g., what better place to "hide" a file than with an
• Null ciphers (e.g., using the first letter of each word to form a hidden message in
and audio files. These forms of steganography often are used in conjunction with
cryptography so that the information is doubly protected; first it is encrypted and then
hidden so that an adversary has to first find the information (an often difficult task in and
The simplest approach to hiding data within an image file is called least significant bit
(LSB) insertion. In this method, we can take the binary representation of the hidden_data
and overwrite the LSB of each byte within the cover_image. As an example, suppose that
we have three adjacent pixels (nine bytes) with the following RGB encoding:
Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually
compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of
the 9 bytes above, we get the following (where bits in bold have been changed):
One common, almost obvious, form of steganography is called a null cipher. In this type
of stego, the hidden message is formed by taking the first (or other fixed) letter of each
word in the cover message. Consider this cablegram that might have been sent by a
GRAVE
FORESHADOWS RUIN
EXCITEMENT
IMMENSELY.
Another form of steganography uses a template (e.g., a piece of paper with holes cut in it)
or a set of preselected locations on the page to hide a message. In this case, obviously, the
APPLICATIONS:
brand color laser printers. Tiny yellow dots are added to each page. The dots are barely
visible and contain encoded printer serial numbers, as well as date and time stamps.
The larger the cover message is (in data content terms — number of bits) relative to the
hidden message, the easier it is to hide the latter. For this reason, digital pictures (which
contain large amounts of data) are used to hide messages on the Internet and on other
communication media.
Steganography can be used for digital watermarking, where a message (being simply an
In the era of Digital video recorder and devices like TiVo, TV commercials authors have
figured out how to make use of such devices as well - by putting a hidden message which
becomes visible when played at frame-by-frame speed (see KFC Unveils 'TiVo-proof'
Ad).
A citation from the USA Today article: "Lately, al-Qaeda operatives have been sending
hundreds of encrypted messages that have been hidden in files on digital photographs on
A hidden message is a message that is not immediately noticeable, and that must be
discovered before it can be known. Hidden messages include backwards audio messages
A backward message in an audio recording is only fully apparent when the recording is
while others are simply phonetic reversals resulting from random combinations of words.
Backmasking
Backmasking is an audio technique in which sounds are recorded backwards onto a track
that is meant to be played forwards. Many musicians are known to have backmasked, for
purposes including: avoiding censorship; making artistic or social statements; having fun
Phonetic reversals:
Some phrases will produce a message when listened to backwards. For example, "kiss"
backwards sounds like "sick," and so the title of Yoko Ono's Kiss Kiss Kiss
Non-musical messages:
Backward messages also exist in mediums outside of music. In the computer game Doom
II, a garbled message played at the start of Map 30, spoken by the "Icon of Sin", can be
played backwards to hear "To win the game, you must kill me, John Romero."
When rotated a certain way, an early 1990s Pepsi can will read "SEX." And if the Coca-
Cola logo is flipped, the result is supposedly an Arabic word debasing Allah. These are
Lucky Strike's old cigarette packaging, when rotated, supposedly shows a burning house,
accompanying the Red Dot of Japan's flag and the trademark phrase "it's toasted".
The $20 bill allegedly contains a prediction of the September 11 terrorist attacks. When
folded as shown, an image can be seen that resembles the Twin Towers in flames.
Conclusions :
Steganography is a fascinating and effective method of hiding data that has been used
throughout history. Methods that can be employed to uncover such devious tactics, but
the first step are awareness that such methods even exist. There are many good reasons as
well to use this type of data hiding, including watermarking or a more secure central
storage method for such things as passwords, or key processes. Regardless, the
technology is easy to use and difficult to detect. The more that you know about its
features and functionality, the more ahead you will be in the game.