Remote Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 17 May 2011

Steganography

Posted on 00:26 by Unknown

Steganography is the art and science of hiding information by embedding messages within media like images. The main purpose of digital steganography is often to create a message that defies detection.

There are number of file formats in which data is redundant or some data is of little importance. Digital steganography exploits this fact and the hidden message does not cause noticeable changes to the file. It is used in graphics files, HTML, sound files, video, and text files.


Most common goal of steganography is to hide a file/data inside another file/data.

Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.

Steganography (covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, then shaving it again when he arrived at his contact point.

Special software is needed for steganography, and there are freeware versions available at any good download site.



This image contains important message.To see the message copy this image to your PC and open the image through: (Paswsword-dop)http://mozaiq.org/decrypt





The counterpart of digital steganography software is digital steganalysis technology and techniques. Digital steganalysis is the art of steganography detection and extraction. It is used by governments, intelligence agencies, law enforcement, and the military. Training for people who want to be certified in steganography detection and extraction is also available.
Anyone can hide information in a graphic if the quality of the graphic is good enough. To hide information, reduce the quality of the picture and then substitute information you want to hide bit by bit into the "left over" space. Consider the following scenario: You use 32bit graphics and the graphic containing 1000 pixels, you have 32K bits of information.


If you reduce the graphic to 8 bit quality, the other 24 bits (24K of data) can be used to store other information. This is enough space to store trojans or corporate secrets. All you need to do is embed the information into the graphic and send it via email. Someone at the other end can unencrypt the message.

Types Steganography :

* Physical steganography
* Digital steganography
* Network steganography
* Printed steganography
* Text steganography
* Steganography using Sudoku Puzzle

Tools that detect Steganography : System Scanner , Tripwire , Stegdetect , Stegbreak.

Tools that provide Steganography : 
OutGuess - tools that insert hidden information.
MP3Stego - utility that shares messages in MP3 files.

Applications :
Modern printers like HP and Xerox brand's color laser printers use steganography. Tiny yellow dots which are barely visible and contain encoded printer serial numbers, as well as date and time stamps are added to the prints.This helps track down some details from a print/image.

Printer may also add information like , name of printer , local or network , IP from which the print was given etc.

Difference between Cryptography and Steganography : 

More commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.

Cryptography is the art of protecting information by encrypting it into an unreadable format, called cipher text. Only those who possess a secret key can decrypt the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

The real difference between steganography and cryptology is that the messages don’t attract attention by being visible – for example, using invisible ink to write a message between the lines of a shopping list.

Advantages :

* Hides Information along with password to reach that Information.
* Difficult to detect unless you have the md5 hash of the orginal image.Only receiver can detect
* Can be used in different media forms like digital image, audio & video file.
* It can be done faster with the large no. of software’s.

Disadvantages:

* Huge number of data = huge file size, so some one can suspect about it.
* While sending and receiving, information can be leaked.
* The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over.
* Hackers, terrorist ,criminals exploit it for the bad of others/all.

Source: http://doputtur.blogspot.com/

Email ThisBlogThis!Share to XShare to Facebook
Posted in General Informations, Tips and Tricks | No comments
Newer Post Older Post Home
View mobile version

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows Server 2008 Core Command Guide
    Windows Server 2008 Core Command Guide What Command Set DNS IP Netsh int ipv4 set dns “local area connection” stat...
  • USB Disk Security 5.4.0.12
    USB Disk Security -  Download 100% protection against any threats via USB storage USB Disk Security is a top-rated antivirus utility that pr...
  • GDS COMMITTEE IMPLEMENTATION ORDERS RELEASED BY DIRECTORATE TODAY
    GDS COMMITTEE IMPLEMENTATION ORDERS RELEASED BY DIRECTORATE TODAY POSTAL DIRECTORATE ISSUED ORDERS TODAY FOR IMPLEMENTING THE GDS COMMITTEE ...
  • (no title)
    POSTAL RATES INDEX Letters / Book Post Registered Articl...
  • Most Useful Websites
           The list primarily highlights the lesser-known or undiscovered websites and misses out all-time favorites like Google Docs, Wikipedia...
  • Commands in Windows Vista
    Windows Vista Command Line List and Reference The list of commands available in the command line shell for Windows Vista is similar to that ...
  • Save queries in Windows Server 2003's Active Directory Users and Computers tool
    Windows Server 2003 administrators can’t live without the Active Directory Users and Computers tool. Here’s a quick look at the saved querie...
  • PDF into Word ( Document) converter
    PDF into Word ( Document) Converter         PDF2Word(pdf to word) software enable export the text, images and other contents from pdf docume...
  • THIRUKKURAL PDF DOWNLOAD (தமிழ் )
    CLICK HERE TO DOWNLOAD THIRUKKURAL (தமிழ்)    or CLICK HERE TO DOWNLOAD THIRUKKURAL (TAMIL & ENGLISH)    or CLICK HERE TO DOWNLOAD THIR...
  • How to shutdown computer automatically at a specific time
    Trick 1: Start > Run Type ' shutdown -s -t 1800 ' without quotes Click OK A dialog will appear showing the countdown t...

Categories

  • Computer Guidelines
  • Customer Care
  • DB Tools
  • Drivers
  • Entertainments
  • FAQ
  • For System Administrators
  • FTP
  • General Informations
  • General Knowledge
  • Guidelines
  • Hardwares
  • Health Tips
  • Internet Tips
  • Latest Software Updates
  • Network Trouble shooting
  • Printer Trouble shooting
  • Printing Tips
  • Recovery Tips
  • Registry Tips
  • Registry Tools
  • Security Guidelines
  • Security Tips
  • Software Tips
  • Softwares
  • SQL
  • Technology
  • Tips and Tricks
  • Tools
  • Trouble shooting
  • Useful Softwares
  • Utilities
  • Virus Solutions
  • Websites
  • windows 7
  • Windows Server
  • Windows Tips
  • Windows Vista
  • Windows XP FAQ

Blog Archive

  • ▼  2011 (138)
    • ▼  May (32)
      • Indian Acronyms and Abbreviations
      • Put all your Emails on a USB Drive for Offline Access
      • What is the difference between Cc and Bcc?
      • BSNL 3G Data Card Now at Rs. 1600
      • General Knowledge Questions and Answers
      • 5 Tips to Improve Your Windows 7 System’s Speed
      • SYS Informer v.1.0 Free ( PC Total Info)
      • 7Burn - Burning Studio v.2.0 Free
      • Steganography
      • Screen Resolution Changer
      • MailStore Home- Keep all your mails in one place
      • 5 Simple Tips to Fix a Slow Computer
      • Password Recovery Magic Products with Serial
      • Hiren’s Boot CD 13.2
      • Prime Minister and Council of Ministers - India ( ...
      • Put all your Emails on a USB Drive for Offline Access
      • Best Features of Google Chrome
      • What is the difference between Cc and Bcc?
      • Any Folder as a Photo Folder
      • SQL 2008 Express Editions and Service Packs
      • Put all your Emails on a USB Drive for Offline Access
      • Why Do We Love Skype?
      • Procedure for Schedule Backup in SQL 2008 Express ...
      • How to Make EXE Files Using Notepad
      • How to Protect your Data ?
      • Error in Opening database - Tables ( SQL 2000)
      • Icons, task bar disappears and Windows Explorer do...
      • Tips for Strong Password
      • Disable Network Search by XP
      • How To Change the Default Backup Path in SQL Server
      • How to Manually Uninstall SQL Server 2005
      • XP Services-Not Needed for All
    • ►  April (24)
    • ►  March (29)
    • ►  February (15)
    • ►  January (38)
  • ►  2010 (241)
    • ►  December (55)
    • ►  November (40)
    • ►  October (21)
    • ►  September (35)
    • ►  August (39)
    • ►  July (23)
    • ►  June (5)
    • ►  May (2)
    • ►  April (12)
    • ►  March (4)
    • ►  February (2)
    • ►  January (3)
  • ►  2009 (26)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (5)
    • ►  August (3)
    • ►  July (5)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile