Escolar Documentos
Profissional Documentos
Cultura Documentos
Suhas Desai
2
Crypto – Steganography Overview
Steganography and Cryptography are two important technologies used to secure data. It
has gained major attention since Second World War. In Second World War it has been
widely used to hide and send sensitive information of military operations.
Steganography differs from cryptography in the sense that where cryptography focuses on
keeping the contents of a message secret, Steganography focuses on keeping the
existence of message secret.
3
Open Source and Cryptography
4
Open Source and Steganography
1. Steghide
To use Steghide to embed the file secret.txt into example.bmp, you'd use the
following command:
If you have received a cover file that contains a file that has been embedded with
Steghide, use the extract command to reveal the hidden file with an -sf argument:
Web: http://steghide.sourceforge.net/
5
Open Source and Steganography Contd..
2. MP3stego
MP3Stego is another open source Steganography program that uses MP3 music files as a
preferred cover file format.
To embed the file secret.txt into stego.mp3 using stego.wav as input use the command:
It is virtually impossible to find any differences in the audio of the normal file and the
same file with Steganography embedded
Web: http://www.petitcolas.net/fabien/steganography/mp3stego/
6
Example - MP3Stego
7
Open Source and Steganography Contd..
3. Stepic
It allows storing the text or image data within an existing image without original image
being affected.
8
Crypto-Steganography Together? Why?
Why?
If the hidden message is discovered by an eavesdropper, they still have the burden of
trying to decrypt the message.
9
Crypto-Steganography Together? How?
Steganography &
Software Requirement Steganography Encode/Decode
Cryptography
Display Extracted
EzPyCrypto data with &
without decryption
Create Stegano
Compare Original Image having
and Stegano Images Encrypted Data
Stepic
10
Python Image Library (PIL)
Python, xv and the PIL package are essential packages to perform image processing in
python.
11
Image processing with Python
12
Data Hiding
13
Comparison: Original Image and Hidden Data Image
14
Combine ezPyCrypto with Stepic
Instead of hiding plain data inside images, if you encrypt that data with some
key and then hide it inside image then that is more secure.
As stepic doesn‟t support encryption or compression of data while hiding it inside images,
you can use ezPyCrypto tool of python along with stepic class for hiding encrypted data
inside images to obtain more security.
Stepic class hides data in ASCII format. So after encrypting data you have to convert it to
ASCII format. You can use encStringToAscii () and encStringFromAscii() methods with
stepic class to convert this data in ASCII format.
15
Stegano - Image
16
Display Extracted data with & without decryption
17
Demonstration
18
Summary
19
References
20
Thank You !!