Steganography
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) |
Parchivist (Talk | contribs) |
||
(15 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|formattype=electronic | |formattype=electronic | ||
|subcat=Encryption | |subcat=Encryption | ||
+ | |thiscat=Steganography | ||
}} | }} | ||
'''Steganography''' is a class of [[encryption]] in which the very fact that information exists is obscured. For example, an innocent-looking [[PNG]] image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key. | '''Steganography''' is a class of [[encryption]] in which the very fact that information exists is obscured. For example, an innocent-looking [[PNG]] image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key. | ||
Line 7: | Line 8: | ||
== Formats == | == Formats == | ||
For a list of formats, see [[Encryption#Steganography]]. | For a list of formats, see [[Encryption#Steganography]]. | ||
+ | |||
== Detection == | == Detection == | ||
− | * [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, [[Camouflage|Camouflage v1.2.1]] | + | * [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, [[Invisible Secrets|Invisible Secrets v4.0]], Fuse, [[Camouflage|Camouflage v1.2.1]] |
− | * [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects | + | * [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects [[JSteg]], [[JPHS (JPHide/JPSeek)]], [[Invisible Secrets]], [[OutGuess|OutGuess 01.3b]], [[F5]] (header analysis), appendX and [[Camouflage]] |
− | * [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], Invisible Secrets | + | * [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, [[Masker]], [[JPegX]], [[Invisible Secrets]] |
+ | * [https://github.com/zed-0xff/zsteg/ ZSteg] - Detects LSB steganography in PNG & BMP, zlib-compressed data, [[OpenStego]], [[Camouflage|Camouflage 1.2.1]], [https://wiki.cedricbonhomme.org/security:steganography LSB with the Eratosthenes set] | ||
+ | ** [https://wiki.bi0s.in/steganography/zsteg/ Tutorial] | ||
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid] | * [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid] | ||
− | ** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - | + | ** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - [[JSteg]], EZStego, [[OutGuess]] |
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code] | *** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code] | ||
− | ** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - | + | ** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - [[JSteg]], EZStego, [[OutGuess]] |
+ | |||
+ | |||
+ | == Cracking == | ||
+ | * [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against [[JSteg|JSteg-Shell]], [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]] | ||
+ | * [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against [[steghide]] | ||
+ | * [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against [[steghide]] | ||
+ | * [https://github.com/R4yGM/stegbrute StegBrute] - dictionary attacks against [[steghide]] | ||
+ | |||
+ | |||
+ | == General == | ||
+ | * [https://github.com/daniellerch/aletheia Aletheia] | ||
+ | ** Detects [[F5]], [[Steghide]], LSB replacement, LSB matching and some kind of adaptive schemes | ||
+ | ** Dictionary attacks on [[steghide]], [[OutGuess]], [[OpenStego]] | ||
+ | * [https://github.com/quangntenemy/Steganabara Steganabara] | ||
+ | ** bit mask filter, color map filter, color explorer, histogram, color table | ||
+ | * [[Stegano]] | ||
+ | ** steganalysis of LSB encoding in color images | ||
+ | ** statistical steganalysis | ||
+ | * [https://www.wetstonetech.com/products/stegohunt-steganography-detection/ StegoHunt MP] and [https://www.wetstonetech.com/products/stegocommand-steganography-detection/ StegoCommand] | ||
+ | ** StegoHunt: identifies thousands of steganography, stegware and data hiding applications | ||
+ | ** StegoAnalyst: DCT coefficients, color pairs, etc | ||
+ | ** StegoBreak: Dictionary attacks against many steganography programs | ||
+ | ** StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary | ||
+ | * [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image | ||
+ | * [https://codeberg.org/tob/Stegosuite-Analysis Stegosuite Analysis] - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack | ||
+ | * [http://www.caesum.com/handbook/stego.htm StegSolve] | ||
+ | ** Analyzes images in different planes by taking off bits of the image | ||
+ | ** Supports over 10 different planes (Alpha, Blue, Green, Red, XOR, etc) | ||
+ | ** [https://github.com/Giotino/stegsolve Modified version] | ||
+ | |||
+ | |||
+ | |||
+ | == Research == | ||
+ | |||
+ | === Filesystem === | ||
+ | * [http://www.cl.cam.ac.uk/ftp/users/rja14/sfs3.ps.gz The Steganographic File System] | ||
+ | * [https://web.archive.org/web/20030922071257/http://dataquality.i2r.a-star.edu.sg/hhpang/publications/StegFS-traffic.pdf Hiding Data Accesses in Steganographic File System] | ||
+ | * [https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2142&context=sis_research StegFS: A Steganographic File System] PANG, Hwee Hwa; TAN, Kian-Lee; and ZHOU, Xuan. (2003) | ||
+ | * [https://fengweiz.github.io/17fa-csc6991/slides/10-DEFY.pdf DEFY: A Deniable, Encrypted File System for Log Structured Storage] Peters, Timothy & Gondree, Mark & Peterson, Zachary. (2015) | ||
+ | * [https://en.wikipedia.org/wiki/Steganographic_file_system Wikipedia article] | ||
+ | |||
+ | |||
+ | == See also == | ||
+ | * [[Data Hiding/Embedding]] | ||
+ | * [[Digital watermark]] | ||
Latest revision as of 07:09, 5 November 2023
Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.
Contents |
[edit] Formats
For a list of formats, see Encryption#Steganography.
[edit] Detection
- Ben-4D Steganalysis Software - Detects JPHS (JPHide/JPSeek), LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
- Stegdetect - Detects JSteg, JPHS (JPHide/JPSeek), Invisible Secrets, OutGuess 01.3b, F5 (header analysis), appendX and Camouflage
- StegSpy - Detects JPHS (JPHide/JPSeek), Hiderman, Masker, JPegX, Invisible Secrets
- ZSteg - Detects LSB steganography in PNG & BMP, zlib-compressed data, OpenStego, Camouflage 1.2.1, LSB with the Eratosthenes set
- Steganalysis papers by Hany Farid
[edit] Cracking
- StegBreak (included with Stegdetect) - dictionary attacks against JSteg-Shell, JPHS (JPHide/JPSeek) and OutGuess 01.3b
- Stegseek - dictionary attacks against steghide
- StegCracker - dictionary attacks against steghide
- StegBrute - dictionary attacks against steghide
[edit] General
- Aletheia
- Steganabara
- bit mask filter, color map filter, color explorer, histogram, color table
- Stegano
- steganalysis of LSB encoding in color images
- statistical steganalysis
- StegoHunt MP and StegoCommand
- StegoHunt: identifies thousands of steganography, stegware and data hiding applications
- StegoAnalyst: DCT coefficients, color pairs, etc
- StegoBreak: Dictionary attacks against many steganography programs
- StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
- StegoSuit - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
- Stegosuite Analysis - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
- StegSolve
- Analyzes images in different planes by taking off bits of the image
- Supports over 10 different planes (Alpha, Blue, Green, Red, XOR, etc)
- Modified version
[edit] Research
[edit] Filesystem
- The Steganographic File System
- Hiding Data Accesses in Steganographic File System
- StegFS: A Steganographic File System PANG, Hwee Hwa; TAN, Kian-Lee; and ZHOU, Xuan. (2003)
- DEFY: A Deniable, Encrypted File System for Log Structured Storage Peters, Timothy & Gondree, Mark & Peterson, Zachary. (2015)
- Wikipedia article
[edit] See also