Steganography is the art of hiding something inside something else, for example, A text message inside a jpg file, or a binary inside a png file. Steganography has been used since ancient times to deliver messages that they don’t want others seeing. In the modern-day, it’s used for the same purpose, But today we have much more advanced tools to do Steganography.
Best Tools to Perform Steganography
Steghide
Steghide is one of the most famous steganography tools, and for good reason. It’s a classic method, hiding a message inside an image, and steghide does it effectively and efficiently. A downside of steghide is that it only works on jpg images; however, that means that if you believe there is a hidden message inside a jpg, then steghide is a probable option.
if they don’t have the password then they can’t extract any data.
Steghide can be used on JPEG and BMP image files and WAV and AU audio files.
Passphrases can be brute-force attacked by an attacker to extract any data in a file.
Features:
- compression of embedded data.
- encryption of embedded data.
- embedding of a checksum to verify the integrity of the extracted data.
- support for JPEG, BMP, WAV and AU files.
Run sudo apt install steghide command to install steghide in Linux
Run steghide embed -ef (jpg file name) -cf (embed into the file) -p (password) to embed a file in a jpg image
Ex steghide embed -ef image.jpg -cf text.txt -p password123
Run steghide extract -sf (jpg file name) -p (password) to extract a embed file in jpg image using password
Ex steghide extract -sf image.jpg -p password123
Usage:
Zsteg
zsteg is a Ruby steganography tool that supports various techniques to detect and extract hidden data from png files.
Detects:
- LSB steganography in PNG & BMP
- zlib-compressed data
- OpenStego
- Camouflage 1.2.1
Usage:
Note: zsteg also supports BMP files, but it is primarily used for png’s.
Run gem install zsteg to install zsteg in Linux
Exiftool
Exiftool is a tool that allows you to view and edit image metadata While this in itself is not a stego tool but it is one of the most popular forms of image stego is to hide messages in the metadata.
Run sudo apt install libimage-exiftool-perl to install Exiftool in Linux
Usage: exiftool (filename)
Stegoveritas
Stegoveritas supports every image file and is able to extract all types of data from it. It is an incredibly useful tool if you don’t know exactly what you’re looking for, as it has a myriad of built-in tests to extract all data.
StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp) and will attempt to run on any file.
Run pip3 install stegoveritas ; stegoveritas_install_deps to install stegoveritas.
Usage:
Binwalk
Binwalk is a great tool when we have a binary image and have to extract embedded files and executable codes out of them. It is even used to identify the files and codes which are embedded inside the firmware images. Binwalk is compatible with magic signatures for UNIX file utility as it uses libmagic library
Run apt-get install binwalk to install Binwalk
Usage:
Spectrograms
Spectrogram steganography is the art of hiding hidden an image inside an audio file’s spectrogram. Therefore whenever dealing with audio stego it is always worth analyzing the spectrogram of the audio. To do this task we will be using Sonic Visualizer.
Usage:
When you open Sonic Visualizer you should see this screen:
From there click File->Open and then select the included wav1 file and you should see a screen similar to this:
From there click Layer->Add Spectrogram and you should see this:
There are so tools are available for Steganography like:
- StegoSuite.
- Stego-Toolkit.
- Stegsolve.
- StegCracker.
written by: Sahil Gupta
Reviewed By: Sayan Chatterjee
If you are Interested In Machine Learning You Can Check Machine Learning Internship Program
Also Check Other Technical And Non Technical Internship Programs