Главная Случайная страница


Полезное:

Как сделать разговор полезным и приятным Как сделать объемную звезду своими руками Как сделать то, что делать не хочется? Как сделать погремушку Как сделать так чтобы женщины сами знакомились с вами Как сделать идею коммерческой Как сделать хорошую растяжку ног? Как сделать наш разум здоровым? Как сделать, чтобы люди обманывали меньше Вопрос 4. Как сделать так, чтобы вас уважали и ценили? Как сделать лучше себе и другим людям Как сделать свидание интересным?


Категории:

АрхитектураАстрономияБиологияГеографияГеологияИнформатикаИскусствоИсторияКулинарияКультураМаркетингМатематикаМедицинаМенеджментОхрана трудаПравоПроизводствоПсихологияРелигияСоциологияСпортТехникаФизикаФилософияХимияЭкологияЭкономикаЭлектроника






Steganography Tools





There are a vast number of tools that are available for stegano

graphy. An important distinction that should be made among

the tools available today is the difference between tools that do

steganography, and tools that do steganalysis, which is the method

of detecting steganography and destroying the original message.

Steganalysis focuses on this aspect, as opposed to simply discovering

and decrypting the message, because this can be difficult to do unless

the encryption keys are known.


 

 

A comprehensive discussion of steganography tools is beyond

the scope of this article. However, there are many good places to

find steganography tools on the Net. One good place to start your

search for stego tools is on Neil Johnson’s Steganography and Digital

Watermarking Web site. The site includes an extensive list of

steganography tools. Another comprehensive tools site is located at

the StegoArchive.com. For steganalysis tools, a good site to start

with is Neil Johnson’s Steganalysis site. Niels Provos’s site, is also

a great reference site, but is currently being relocated, so keep

checking back on its progress.

The plethora of tools available also tends to span the spectrum

of operating systems. Windows, DOS, Linux, Mac, Unix: you name

it, and you can probably find it.

 

How Do Steganography Tools Work?

To show how easy steganography is, I started out by downloading

one of the more popular freeware tools out now: F5, then moved to

a tool called SecurEngine, which hides text files within larger text

files, and lastly a tool that hides files in MP3s called MP3Stego. I also

tested one commercial steganography product, Steganos Suite.

F5 was developed by Andreas Westfield, and runs as a DOS

client. A couple of GUIs were later developed: one named “Frontend”,

developed by Christian Wohne and the other, named “Stegano”, by

Thomas Biel. I tried F5, beta version 12. I found it very easy to encode

a message into a JPEG file, even if the buttons in the GUI are written

in German! Users can simply do this by following the buttons,

inputting the JPEG file path, then the location of the data that is

being hidden (in my case, I used a simple text file created in Notepad),

at which point the program prompts the user for a pass phrase. As

you can see by the before and after pictures below, it is very hard to

tell them apart, embedded message or not.

Granted, the file that I embedded here was very small (it included

one line of text: “This is a test. This is only a test”.), so not that many

pixels had to be replaced to hide my message. But what if I tried to

hide a larger file? F5 only hides text files. I tried to hide a larger

word document and although it did hide the file, when I tried to

decrypt it, it came out as garbage. However, larger text files seemed

to hide in the picture just as well as my small, one line message.


 

 

SecurEngine doesn’t seem to be as foolproof as the tools that

hide text within pictures. When I hid my small text file in a bigger

text file, I found an odd character at the bottom of the encoded file

(“y”). This character was not in the original file. SecurEngine gives

users the option of just hiding the image, hiding the image as well as

encrypting it, or both. The test message was encrypted and decrypted

without issue. SecurEngine also has a feature that helps to “wipe”

files (to delete them more securely).

MP3Stego, a tool that hides data in MP3 files worked very well.

How the process works is like this: you encode a file, a text file for

example, with a.WAV file, in order for it to be compressed into MP3

format. One problem that I ran into was that in order to hide data of

any size, I had to find a file that was proportional in size. So, for

instance, my small text message from the previous exercise was too

big to hide in a.WAV file (the one that I originally tried was 121KB,

and the text file was around 36 bytes). In order to ultimately hide

a file that was 5 bytes (only bearing the message “test”.), I found

a.WAV file that was 627 KB. The ultimate MP3 file size was 57KB.

Steganos Suite is a commercial software package of numerous

stego tools all rolled into one. In addition to a nifty Internet trace

destructor function and a computer file shredder, it has a function

called the File Manager. This allows users to encrypt and hide files

on their hard drive. The user selects a file or folder to hide, and then

selects a “carrier” file, which is defined as a graphic or sound file.

It will also create one for you if you prefer, if you have a scanner or

microphone available. If you don’t have a file handy or if you want to

create one, the File Manager will search your hard drive for an

appropriate carrier. This tool looks for a wider variety of file types

than the majority of the freeware tools that I perused (such as.DLL

and.DIB files), so if you intend to do quite a bit of file hiding, you

might want to invest in a commercial package.

 

Date: 2015-12-13; view: 769; Нарушение авторских прав; Помощь в написании работы --> СЮДА...



mydocx.ru - 2015-2024 year. (0.006 sec.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав - Пожаловаться на публикацию