Steganography

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
 
(6 intermediate revisions by one user not shown)
Line 12: Line 12:
 
== Detection ==
 
== Detection ==
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, [[Invisible Secrets|Invisible Secrets v4.0]], Fuse, [[Camouflage|Camouflage v1.2.1]]
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, [[Invisible Secrets|Invisible Secrets v4.0]], Fuse, [[Camouflage|Camouflage v1.2.1]]
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], [[Invisible Secrets]], [[OutGuess|OutGuess 01.3b]], [[F5]] (header analysis), appendX and [[Camouflage]]
+
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects [[JSteg]], [[JPHS (JPHide/JPSeek)]], [[Invisible Secrets]], [[OutGuess|OutGuess 01.3b]], [[F5]] (header analysis), appendX and [[Camouflage]]
* [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], [[Invisible Secrets]]
+
* [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, [[Masker]], [[JPegX]], [[Invisible Secrets]]
 +
* [https://github.com/zed-0xff/zsteg/ ZSteg] - Detects LSB steganography in PNG & BMP, zlib-compressed data, [[OpenStego]], [[Camouflage|Camouflage 1.2.1]], [https://wiki.cedricbonhomme.org/security:steganography LSB with the Eratosthenes set]
 +
** [https://wiki.bi0s.in/steganography/zsteg/ Tutorial]
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - Jsteg, EZStego, [[OutGuess]]
+
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - [[JSteg]], EZStego, [[OutGuess]]
 
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code]
 
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code]
** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - Jsteg, EZStego, [[OutGuess]]
+
** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - [[JSteg]], EZStego, [[OutGuess]]
  
  
 
== Cracking ==
 
== Cracking ==
* [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against JSteg-Shell, [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]]
+
* [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against [[JSteg|JSteg-Shell]], [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]]
 
* [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against [[steghide]]
 
* [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against [[steghide]]
 
* [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against [[steghide]]
 
* [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against [[steghide]]
Line 31: Line 33:
 
** Detects [[F5]], [[Steghide]], LSB replacement, LSB matching and some kind of adaptive schemes
 
** Detects [[F5]], [[Steghide]], LSB replacement, LSB matching and some kind of adaptive schemes
 
** Dictionary attacks on [[steghide]], [[OutGuess]], [[OpenStego]]
 
** Dictionary attacks on [[steghide]], [[OutGuess]], [[OpenStego]]
 +
* [https://github.com/quangntenemy/Steganabara Steganabara]
 +
** bit mask filter, color map filter, color explorer, histogram, color table
 +
* [[Stegano]]
 +
** steganalysis of LSB encoding in color images
 +
** statistical steganalysis
 
* [https://www.wetstonetech.com/products/stegohunt-steganography-detection/ StegoHunt MP] and [https://www.wetstonetech.com/products/stegocommand-steganography-detection/ StegoCommand]
 
* [https://www.wetstonetech.com/products/stegohunt-steganography-detection/ StegoHunt MP] and [https://www.wetstonetech.com/products/stegocommand-steganography-detection/ StegoCommand]
 
** StegoHunt: identifies thousands of steganography, stegware and data hiding applications
 
** StegoHunt: identifies thousands of steganography, stegware and data hiding applications
Line 38: Line 45:
 
* [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 
* [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 
* [https://codeberg.org/tob/Stegosuite-Analysis Stegosuite Analysis] - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
 
* [https://codeberg.org/tob/Stegosuite-Analysis Stegosuite Analysis] - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
 +
* [http://www.caesum.com/handbook/stego.htm StegSolve]
 +
** Analyzes images in different planes by taking off bits of the image
 +
** Supports over 10 different planes (Alpha, Blue, Green, Red, XOR, etc)
 +
** [https://github.com/Giotino/stegsolve Modified version]
  
 +
 +
 +
== Research ==
 +
 +
=== Filesystem ===
 +
* [http://www.cl.cam.ac.uk/ftp/users/rja14/sfs3.ps.gz The Steganographic File System]
 +
* [https://web.archive.org/web/20030922071257/http://dataquality.i2r.a-star.edu.sg/hhpang/publications/StegFS-traffic.pdf Hiding Data Accesses in Steganographic File System]
 +
* [https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2142&context=sis_research StegFS: A Steganographic File System] PANG, Hwee Hwa; TAN, Kian-Lee; and ZHOU, Xuan. (2003)
 +
* [https://fengweiz.github.io/17fa-csc6991/slides/10-DEFY.pdf DEFY: A Deniable, Encrypted File System for Log Structured Storage] Peters, Timothy & Gondree, Mark & Peterson, Zachary. (2015)
 +
* [https://en.wikipedia.org/wiki/Steganographic_file_system Wikipedia article]
  
  

Latest revision as of 07:09, 5 November 2023

File Format
Name Steganography
Ontology

Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.

Contents

[edit] Formats

For a list of formats, see Encryption#Steganography.


[edit] Detection


[edit] Cracking


[edit] General

  • Aletheia
  • Steganabara
    • bit mask filter, color map filter, color explorer, histogram, color table
  • Stegano
    • steganalysis of LSB encoding in color images
    • statistical steganalysis
  • StegoHunt MP and StegoCommand
    • StegoHunt: identifies thousands of steganography, stegware and data hiding applications
    • StegoAnalyst: DCT coefficients, color pairs, etc
    • StegoBreak: Dictionary attacks against many steganography programs
    • StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
  • StegoSuit - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
  • Stegosuite Analysis - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
  • StegSolve
    • Analyzes images in different planes by taking off bits of the image
    • Supports over 10 different planes (Alpha, Blue, Green, Red, XOR, etc)
    • Modified version


[edit] Research

[edit] Filesystem


[edit] See also


[edit] Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox