{"id":357,"date":"2015-10-19T20:27:00","date_gmt":"2015-10-19T12:27:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=357"},"modified":"2023-10-30T20:33:50","modified_gmt":"2023-10-30T12:33:50","slug":"steganography","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/357","title":{"rendered":"Steganography"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Steganography Techniques&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong>Steganography<\/strong><br>hiding information within other file like pictures,audio,text,&#8230;etc<\/p>\n\n\n\n<p><strong>Classification of steganography<\/strong><br>technical: using physical or chemical means to hide the existence of a message<br>linguistic: utilizing natural language to hide the message<\/p>\n\n\n\n<p><strong>Technical steganography<\/strong><br>invisible ink<br>microdots<br>computer-based methods<\/p>\n\n\n\n<p><strong>Linguistic steganography<\/strong><br>semagrams: utilizing visual symbols or signs to hide secret messages<br>open codes: utilizing a designed pattern on the document to hides the secret message<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Semagrams<\/strong><br><strong><br>visual semagrams:<\/strong>&nbsp;using innocent-looking or everyday physical objects to convey a message<br>ex:<br>symbols, doodles or the positioning of items on a desk or Website<br><strong>text semagrams:<\/strong>&nbsp;hides a message by modifying the appearance of the carrier text<br>ex:<br>subtle changes in font size or type, adding extra spaces, or different flourishes in letters or handwritten text.<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Open codes<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>jargon code<\/strong>: using a language that a group of people can understand<br>ex:<br>define: eat=email to, cow=raymond<br>message: eat cow<br>plaintext: email to raymond<br><strong>covered ciphers<\/strong>: the message is hidden openly in the carrier medium<br>\u3000null ciphers<br>\u3000grille ciphers<\/p>\n\n\n\n<p><strong>&nbsp;<\/strong><br><strong>null ciphers<\/strong>:<br>plaintext is mixed with a large amount of material<br>ex:<br>key: 1,2,3,1,2,3,1,2,3,1,2 [each letter in each word]<br>message: Susan sAys GaIl Lies. MAtt leTs Susan fEel joVial. Elated (or) aNgry?<br>plaintext: Sail at seven.<\/p>\n\n\n\n<p><strong>grille ciphers<\/strong>:<br>looking plaintext by cutting holes in a piece of paper with a large amount of maerial<\/p>\n\n\n\n<p><br>refer<br>www.garykessler.net\/library\/fsc_stego.html<br>https:\/\/en.wikipedia.org\/wiki\/Null_cipher<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><strong>Common type of steganography<\/strong><br>image steganography<br>document steganography<br>audio steganography: it is hard to find secret message<br>video steganography: it is hard to find secret message<\/p>\n\n\n\n<p><strong>Audio steganography method<\/strong><br>echo data hiding<br>spread spectrum method<br>Low Bit encoding<br>Phase coding<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Common tool<\/strong><br>Fort Knox<br>Blindside &#8211; \u5c07\u4efb\u4f55\u6a94\u6848\u85cf\u5728Bitmap<br>S-Tools<br>Steghide &#8211; \u58d3\u7e2e ,\u52a0\u5bc6,checksum<br>Digital Identity<br>Stegowatch &#8211; \u5075\u6e2c\u662f\u5426\u6709\u85cf\u8cc7\u6599<br>Image Hide &#8211; \u6a94\u6848\u5927\u5c0f\u4e0d\u6703\u6539\u8b8a<br>Mp3Stego &#8211; \u5c07\u8cc7\u6599\u85cf\u5728\u58d3\u7e2e\u7684mp3<br>snow &#8211; \u5c07\u8cc7\u6599\u85cf\u5728\u7a7a\u767d\u8655<\/p>\n\n\n\n<p>refer<br>http:\/\/wenku.baidu.com\/view\/da7fbcd0360cba1aa811da11.html?re=view<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Image Steganography<\/strong><\/h2>\n\n\n\n<p><strong>BMP tool&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>tool: stool.exe<\/strong><br>insert secret text in BMP by LSB<br>reveal:get secret<\/p>\n\n\n\n<p>ps:<br>orginal bmp and new bmp:size is same,hash is not same<\/p>\n\n\n\n<p><br><strong>LSB\u6f14\u7b97\u6cd5<\/strong><br>\u5927\u5c0f\u4e0d\u6703\u589e\u52a0,\u56e0\u70ba\u662f\u53d6\u4ee3\u5c11\u90e8\u4efd\u5b57\u5143<br>\u5e38\u7528\u5728BMP<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.&nbsp;<\/p>\n\n\n\n<p><strong>JPG tool<\/strong><\/p>\n\n\n\n<p><strong>tool: jphide&nbsp;<\/strong>&nbsp;<br>\u52a0\u5167\u5bb9\u9032jpeg by DCT<br>jphide.exe &lt; secret file&gt; &lt; original file&gt;<br>ex:<br>jpseek.exe xx.jpg<br><strong>tool: jpseek&nbsp;<\/strong><br>\u89e3\u5167\u5bb9from jpeg<br>jpseek.exe &lt; new file&gt; &lt; secret file&gt;<\/p>\n\n\n\n<p><strong>DCT<\/strong>(Discrete cosine transform,\u96e2\u6563\u9918\u5f26\u8b8a\u63db\uff09<br>a technique is used by JPEGs for compression<\/p>\n\n\n\n<p>ps:<br>orginal jpg and new jpg:size is not same<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>Detection tool<\/strong><\/p>\n\n\n\n<p><strong>tool: stegdetect<\/strong><br>\u5075\u6e2c\u6709\u6c92\u6709screat\u5728\u88e1\u9762<br>stegdetect [parameter] &lt; file path&gt;<br>ex:<br>stegdetect -t p xx.jpg<br>stegdetect *.jpg<\/p>\n\n\n\n<p><strong>tool: stegbreak<\/strong><br>\u7528\u5b57\u5178\u6a94\u89e3\u5bc6\u4e26\u8f38\u51fascreat<br>ex:<br>stegbreak -r rules.ini -f password.lst xx.jpg<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<p><strong>Image compression<\/strong><br>lossy compression&nbsp;:\u7834\u58de\u6027\u8cc7\u6599\u58d3\u7e2e<br>lossless compression: \u975e\u7834\u58de\u6027\u8cc7\u6599\u58d3\u7e2e<\/p>\n\n\n\n<p><strong>Image type<\/strong><br><strong>raster image<\/strong>:&nbsp;it is made of up pixels, each a different color, arranged to display an image.<br>ex: BMP,PNG,JPG<br><strong>vector image:<\/strong>&nbsp;it is made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.<br>ex:SVG<br><strong>Metafile image<\/strong>: a formats containing both pixel and vector data<br>ex:EPS, PDF<\/p>\n\n\n\n<p>refer<br>https:\/\/www.psprint.com\/resources\/difference-between-raster-vector\/<br>https:\/\/en.wikipedia.org\/wiki\/Image_file_formats<\/p>\n\n\n\n<p><br><strong>Common graph file<\/strong><br>BMP &#8211; Microsoft Windows bitmap<br>DIB &#8211; Microsoft Windows Device Independent Bitmap<br>EPI &#8211; Adobe Encapsulated PostScript Interchange format<br>EPS &#8211; Adobe Encapsulated PostScript<br>GIF &#8211; CompuServe Graphics Interchange Format<br>JPC &#8211; JPEG-2000 Code Stream Syntax<br>JPEG &#8211; Joint Photographic Experts Group JFIF format<br>PCD &#8211; Photo CD<br>PCX &#8211; IBM PC Paintbrush file<br>PDB &#8211; Palm Database ImageViewer Format<br>PDF &#8211; Portable Document Format<br>PGM &#8211; Portable graymap format (gray scale)<br>PICT &#8211; Apple Macintosh QuickDraw\/PICT file<br>PNG &#8211; Portable Network Graphics<br>PSD &#8211; Adobe Photoshop bitmap file<br>SVG &#8211; Scalable Vector Graphics<br>TGA &#8211; Truevision Targa image<br>refer<br>http:\/\/www.online-utility.org\/image_converter.jsp<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<p><strong>GIF<\/strong><br>8bit RGB bitmap image format<br>up to 256 distinct colors<br>lossless compression<br>refer<br>https:\/\/zh.wikipedia.org\/wiki\/GIF<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>BMP(Bitmap)<\/strong><br>a Raster image<br>https:\/\/zh.wikipedia.org\/wiki\/BMP<\/p>\n\n\n\n<p><strong>bitmap contains below<\/strong><br>file header<br>color table\/RGBQUAD array:specifies the dimensions,compression type,color format,&#8230;etc<br>information header<br>image data<br>&#8230;<\/p>\n\n\n\n<p><strong>JPG(Joint Photographic Experts Group)<\/strong><br>\u4e00\u7a2e\u91dd\u5c0d\u76f8\u7247\u5f71\u50cf\u800c\u5ee3\u6cdb\u4f7f\u7528\u7684\u4e00\u7a2e\u5931\u771f\u58d3\u7e2e\u6a19\u6e96\u65b9\u6cd5<br>refer<br>https:\/\/zh.wikipedia.org\/wiki\/JPEG<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steganography Techniques&nbsp; &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-forensics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}