SlideShare a Scribd company logo
Analyzing the file hidden by the
 steganography tool and how
 the steganography detection
         tool detects it


                Group 6
 Ahmet Aydin - Arman Güngör - Laili Aidi
Background
 Steganography is hiding secret message into cover
  media, no one suspects from the presence of hidden
  message.

 Steganalysis is the art of revealing hidden message in
  a cover media.

 Keywords: Stego file, truck file (cover media)
Goal
 Figuring out the pattern of the bytes in the stego file.
 How steganalysis tool (Stegspy) identify the bytes
  appended to the cover media.

 Comparing steganography tools: Hiderman and Masker
Limitation of Study
 The analysis is only done with the text and JPEG
  files, not with audio or video file.

 There are parts of the stego files that cannot be
  analyzed yet, because the encryption that is used in the
  steganography process make these bytes complicated
  to be analyzed.
Steganography Type
 Robust steganography: involves embedding
  information into a file, cannot easily be destroyed.
   Fingerprinting
   Watermarking
 Fragile steganography: involves embedding information
  into cover media, destroyed if that media is modified.
Steganography Technique
 Binary File Techniques
 Plaintext Steganography Techniques
 Still imagery Steganography Techniques
 Audio and Video Steganography
 IP datagram steganography / Network Covert Channel /
  Network steganography
Steganalysis Technique
 Based on unusual pattern in the media or visual
  detection of the same.

 This can be done because the properties of electronic
  media are changed after it is used to hide any
  object, result degradation in terms of quality or unusual
  characteristics of the media.
Steganography Attacks
 Known carrier attack
 Steganography only attack
 Known message attack
 Known steganography attack
Tools
 Steganography tools:
   Hiderman version 3.0
   Masker version 7.5
 Steganalysis tool: Stegspy version 2.0
 Hex Editor: Hex Editor Neo 4.95
Hiderman Analysis




1.   The truckfile content, which is unencrypted
2.   10 bytes data with unknown function, which the value depends on the password.
3.   The length of the hidden file name, which is unencrypted.
4.   The name of the hidden file, which is encrypted.
5.   The hidden file content, which is presented using this algorithm: For every 4 bytes
     data, the first 2 bytes are unencrypted, and the last 2 bytes are encrypted
Hiderman Analysis ( contd. )




6.   8 bytes data, which is almost same for every file. If it is changed /
     removed, then Hiderman will not authenticate user to recover the
     stego file, even tough the given password is correct.
7.   Stream of unknown bytes, which the length is not same for each file.
8.   The last 3 bytes (Hex value 43 44 4e) are the Hiderman signature.
Masker Analysis
Masker Analysis
1. The truckfile content, which is unencrypted.
2. The length of the hidden file content, which is
    unencrypted, presented twice, followed by blank character
    (Hex value 20), with total length 13 bytes.
3. The hidden file content, which is encrypted. After the
    encrypted bytes of the file content, there is stream of 0
    character (Hex value 30) followed by 12 blank characters
    and 0 character followed by 12 blank characters again.
    This pattern possible shows the end of the file content.
4. Stream of unknown bytes, which is possible contain the
    password and encryption algorithm used for
    steganography process. The length of this part depends on
    the length of the password.
5. The last 77 bytes are the Masker signature.
Stegspy’s Steganalysis
 Hiderman:Detecting the last 3 bytes of the stego file as
  Hiderman’s signature

 Masker: Stegspy cannot identify the stego file.
   According to documentation, Stegspy claims it can
    identify Masker’s stego file!
   It is possible to detect Masker by looking at last 77 bytes
    of stego file. It is Masker’s fingerprint and always same
    for every file.
Comparison Hiderman vs
                  Masker
            Comparison                 Hiderman                                 Masker

Encryption algorithm     Predictable encryption algorithm.       Standard encryption algorithm:

                                                                 Blowfish, DES, Cast5, Serpent-256,
                                                                 Rijndael-256, TripleDES, TWOFISH

Staganography recovery   •Truck file and hidden file can be •Hidden file can be recovered
                         recovered.                             •Truck file cannot be recovered.
                         •Although sometimes some of the bytes
                         change in the truckfile after recovery
                         process.


Staganoganalysis         •Stegspy and Hiderman use last 3 bytes •Stegspy cannot identify the stego file.
                         of the stego file.                     •Masker can identify the stego file even
                                                                some part of the last 77 bytes signature
                                                                is missing or changed.
Conclusion
 Hiderman and Masker can be classified as robust
  steganography type and use Binary File
  steganography techniques.
 Hiderman and Masker use encryption, but
  Masker’s encryption is stronger than Hiderman’s
  : Hiderman’s result is predictable compared to
  Masker’s.
 Masker provides various encryption algorithms.
 Hiderman and Masker leave signature in the
  stego file and it can be detected.
 Stegspy can recognize Hiderman’s stego but not
  Masker’s, and it just searches for the signature of
Future Work
 It is possible to make deeper analysis in order to
  understand the steganography process of Hiderman
  and Masker.

 The research can be expanded by doing analysis of
  steganography process of the other tools in the audio
  and video media file.

 Analysis of the other steganography-steganalysis
  techniques and tools.

More Related Content

PDF
Video Steganography
PPT
Stegnography
PPTX
Symmetric encryption and message confidentiality
 
PPT
Steganalysis of lsb matching steganography
DOC
Audio Steganography java project
PPTX
Project presentation - Steganographic Application of improved Genetic Shifti...
PPT
4.3 multimedia datamining
PPTX
Stego.ppt
Video Steganography
Stegnography
Symmetric encryption and message confidentiality
 
Steganalysis of lsb matching steganography
Audio Steganography java project
Project presentation - Steganographic Application of improved Genetic Shifti...
4.3 multimedia datamining
Stego.ppt

What's hot (20)

PPT
Steganography ppt
PPTX
SEMINAR ON staganography
PPTX
Advanced persistent threat (apt)
PPTX
Big data ppt
PDF
Noise Models
PPT
sharing the data using audio and image Steganography-
PPTX
Steganography
PPTX
Term weighting
PPT
Chapter10 image segmentation
PPTX
Cryptography and Network Security
PPTX
Steganography
PPT
Message authentication and hash function
PPT
Inverted index
PDF
CNS - Unit - 10 - Web Security Threats and Approaches
PPTX
Encryption algorithms
PPT
Hash mac algorithms
PPTX
Blow fish final ppt
PPTX
Elgamal & schnorr digital signature scheme copy
Steganography ppt
SEMINAR ON staganography
Advanced persistent threat (apt)
Big data ppt
Noise Models
sharing the data using audio and image Steganography-
Steganography
Term weighting
Chapter10 image segmentation
Cryptography and Network Security
Steganography
Message authentication and hash function
Inverted index
CNS - Unit - 10 - Web Security Threats and Approaches
Encryption algorithms
Hash mac algorithms
Blow fish final ppt
Elgamal & schnorr digital signature scheme copy
Ad

Viewers also liked (20)

PPTX
PPT steganography
PPT
Image Steganography
PPTX
Art of Steganography
PPTX
Steganography and Steganalysis
PPTX
Steganalysis ppt
PPTX
Cryptography & Steganography
PPTX
analysis on concealing information within non secret data
PDF
File000133
PPTX
Image steganography
PDF
Steganography: Hiding information in past, present and future.
PPT
Image stegnography and steganalysis
PDF
Probabilistic Methods Of Signal And System Analysis, 3rd Edition
DOCX
Intorduction to information theory and applications copy
PPTX
Audio steganography - LSB
PPTX
Applications of Information Theory
PPTX
Image Steganography using LSB
PDF
Information theory
PPTX
Applications of random variable
PPT
Steganography presentation
PDF
Introduction to random variables
PPT steganography
Image Steganography
Art of Steganography
Steganography and Steganalysis
Steganalysis ppt
Cryptography & Steganography
analysis on concealing information within non secret data
File000133
Image steganography
Steganography: Hiding information in past, present and future.
Image stegnography and steganalysis
Probabilistic Methods Of Signal And System Analysis, 3rd Edition
Intorduction to information theory and applications copy
Audio steganography - LSB
Applications of Information Theory
Image Steganography using LSB
Information theory
Applications of random variable
Steganography presentation
Introduction to random variables
Ad

Similar to Steganography Tool & Steganography Detection Tool - Presentation (20)

PPTX
Steganography
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PPT
Steganography.
PPTX
Steganography by Satyajit Debnath
PPTX
steganography
PDF
International Journal of Engineering Research and Development
PPTX
Steganography
PDF
An Infallible Method to Transfer Confidential Data using Delta Steganography
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
PDF
Steganalysis Using Colour Model Conversion
PDF
Steganography
DOC
Steganography
PDF
Stegnography Systems for Securing DataFile in Image
PPTX
Steganography
PDF
F1803023843
PPTX
Steganoghraphy
PDF
K0815660
PPTX
Steganography - Hiding in plain sight.pptx
PPT
83747965 steganography
Steganography
“Multimedia Steganography with Cipher Text and Compression ppt.
Steganography.
Steganography by Satyajit Debnath
steganography
International Journal of Engineering Research and Development
Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
Steganalysis Using Colour Model Conversion
Steganography
Steganography
Stegnography Systems for Securing DataFile in Image
Steganography
F1803023843
Steganoghraphy
K0815660
Steganography - Hiding in plain sight.pptx
83747965 steganography

More from Laili Aidi (20)

PDF
Mobile Music Business Models in Asia's Emerging Markets
PDF
Stream Control Transmission Protocol (SCTP) - Introduction
PDF
Internet of Things
PDF
Study Abroad in the Land of Nobel
PDF
Go International: Challenges and Opportunities
PDF
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
PDF
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
PPT
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
PDF
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
PDF
Music Service Monetization 2.0
PDF
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
PDF
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
PPTX
Delay Tolerant Network - Presentation
PDF
Delay Tolerant Network - Journal
PDF
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
PDF
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
PDF
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
PDF
Sweden’s Telecom Markets, Actors & Roles - Presentation
PDF
Condroid KTH Summer CSD 2011 - Final Report
PDF
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Mobile Music Business Models in Asia's Emerging Markets
Stream Control Transmission Protocol (SCTP) - Introduction
Internet of Things
Study Abroad in the Land of Nobel
Go International: Challenges and Opportunities
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Music Service Monetization 2.0
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Delay Tolerant Network - Presentation
Delay Tolerant Network - Journal
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
Sweden’s Telecom Markets, Actors & Roles - Presentation
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.

Steganography Tool & Steganography Detection Tool - Presentation

  • 1. Analyzing the file hidden by the steganography tool and how the steganography detection tool detects it Group 6 Ahmet Aydin - Arman Güngör - Laili Aidi
  • 2. Background  Steganography is hiding secret message into cover media, no one suspects from the presence of hidden message.  Steganalysis is the art of revealing hidden message in a cover media.  Keywords: Stego file, truck file (cover media)
  • 3. Goal  Figuring out the pattern of the bytes in the stego file.  How steganalysis tool (Stegspy) identify the bytes appended to the cover media.  Comparing steganography tools: Hiderman and Masker
  • 4. Limitation of Study  The analysis is only done with the text and JPEG files, not with audio or video file.  There are parts of the stego files that cannot be analyzed yet, because the encryption that is used in the steganography process make these bytes complicated to be analyzed.
  • 5. Steganography Type  Robust steganography: involves embedding information into a file, cannot easily be destroyed.  Fingerprinting  Watermarking  Fragile steganography: involves embedding information into cover media, destroyed if that media is modified.
  • 6. Steganography Technique  Binary File Techniques  Plaintext Steganography Techniques  Still imagery Steganography Techniques  Audio and Video Steganography  IP datagram steganography / Network Covert Channel / Network steganography
  • 7. Steganalysis Technique  Based on unusual pattern in the media or visual detection of the same.  This can be done because the properties of electronic media are changed after it is used to hide any object, result degradation in terms of quality or unusual characteristics of the media.
  • 8. Steganography Attacks  Known carrier attack  Steganography only attack  Known message attack  Known steganography attack
  • 9. Tools  Steganography tools:  Hiderman version 3.0  Masker version 7.5  Steganalysis tool: Stegspy version 2.0  Hex Editor: Hex Editor Neo 4.95
  • 10. Hiderman Analysis 1. The truckfile content, which is unencrypted 2. 10 bytes data with unknown function, which the value depends on the password. 3. The length of the hidden file name, which is unencrypted. 4. The name of the hidden file, which is encrypted. 5. The hidden file content, which is presented using this algorithm: For every 4 bytes data, the first 2 bytes are unencrypted, and the last 2 bytes are encrypted
  • 11. Hiderman Analysis ( contd. ) 6. 8 bytes data, which is almost same for every file. If it is changed / removed, then Hiderman will not authenticate user to recover the stego file, even tough the given password is correct. 7. Stream of unknown bytes, which the length is not same for each file. 8. The last 3 bytes (Hex value 43 44 4e) are the Hiderman signature.
  • 13. Masker Analysis 1. The truckfile content, which is unencrypted. 2. The length of the hidden file content, which is unencrypted, presented twice, followed by blank character (Hex value 20), with total length 13 bytes. 3. The hidden file content, which is encrypted. After the encrypted bytes of the file content, there is stream of 0 character (Hex value 30) followed by 12 blank characters and 0 character followed by 12 blank characters again. This pattern possible shows the end of the file content. 4. Stream of unknown bytes, which is possible contain the password and encryption algorithm used for steganography process. The length of this part depends on the length of the password. 5. The last 77 bytes are the Masker signature.
  • 14. Stegspy’s Steganalysis  Hiderman:Detecting the last 3 bytes of the stego file as Hiderman’s signature  Masker: Stegspy cannot identify the stego file.  According to documentation, Stegspy claims it can identify Masker’s stego file!  It is possible to detect Masker by looking at last 77 bytes of stego file. It is Masker’s fingerprint and always same for every file.
  • 15. Comparison Hiderman vs Masker Comparison Hiderman Masker Encryption algorithm Predictable encryption algorithm. Standard encryption algorithm: Blowfish, DES, Cast5, Serpent-256, Rijndael-256, TripleDES, TWOFISH Staganography recovery •Truck file and hidden file can be •Hidden file can be recovered recovered. •Truck file cannot be recovered. •Although sometimes some of the bytes change in the truckfile after recovery process. Staganoganalysis •Stegspy and Hiderman use last 3 bytes •Stegspy cannot identify the stego file. of the stego file. •Masker can identify the stego file even some part of the last 77 bytes signature is missing or changed.
  • 16. Conclusion  Hiderman and Masker can be classified as robust steganography type and use Binary File steganography techniques.  Hiderman and Masker use encryption, but Masker’s encryption is stronger than Hiderman’s : Hiderman’s result is predictable compared to Masker’s.  Masker provides various encryption algorithms.  Hiderman and Masker leave signature in the stego file and it can be detected.  Stegspy can recognize Hiderman’s stego but not Masker’s, and it just searches for the signature of
  • 17. Future Work  It is possible to make deeper analysis in order to understand the steganography process of Hiderman and Masker.  The research can be expanded by doing analysis of steganography process of the other tools in the audio and video media file.  Analysis of the other steganography-steganalysis techniques and tools.