Ethical Hacking Project of Final Year

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

UNIVERSITY OF MUMBAI

PROJECT ENTITLED
“Steganography with Steghide”

SUBMITTED BY
Miss.Vaishali Singh

UNDER GUIDANCE OF
Prof. Simran Shinde Ma’am

Submitted partial full fillment of the requirement for the third year
project of Bachelor in

Computer Science

PILLAI COLLEGE OF ARTS, COMMERCE & SCIENCE, NEW


PANVEL

2022-2023
CERTIFICATE

This is to certify that MISS. VAISHALI SINGH of T.Y

B.Sc. C.S. Semester VI has completed the project work in the Subject of

SOFTWARE TESTING during the academic year 2022-2023 under the

Guidance of Prof. Simran Shinde being the partial requirement for the
fulfillment of the curriculum of Degree of Bachelor of Science in Computer

Science, University of Mumbai.

Place:

Date:

Name & Signature of faculty Name & Signature of external


Acknowledgement

I am Vaishali Singh student of Pillai College of Arts, Commerce & Science would
like to express my sincere gratitude towards Computer Science Department.
I would like to thank lecturer Prof. Simran Shinde Ma’am and for their constant
support during the project. Last but not least I thank all my classmates for being
with me throughout the project, which leads to a successful completion of my
project.
The project would not have been completed without creativity and energy, which
our friends provided.
Introduction

A steganography technique involves hiding sensitive information within


an ordinary, non-secret file or message, so that it will not be detected.
The sensitive information will then be extracted from the ordinary file or
message at its destination, thus avoiding detection. Steganography is an
additional step that can be used in conjunction with encryption in order
to conceal or protect data.

Steganography is a means of concealing secret information within (or


even on top of) an otherwise mundane, non-secret document or other
media to avoid detection. It comes from the Greek words steganos,
which means “covered” or “hidden,” and graph, which means “to write.”
Hence, “hidden writing.”

You can use steganography to hide text, video, images, or even audio
data. It’s a helpful bit of knowledge, limited only by the type of medium
and the author’s imagination.

Different Types of Steganography

1. Text Steganography − There is steganography in text files, which entails secretly


storing information. In this method, the hidden data is encoded into the letter of
each word.

2. Image Steganography − The second type of steganography is image


steganography, which entails concealing data by using an image of a different
object as a cover. Pixel intensities are the key to data concealment in image
steganography.

3. Audio Steganography − It is the science of hiding data in sound. Used digitally,


it protects against unauthorized reproduction. Watermarking is a technique that
encrypts one piece of data (the message) within another (the "carrier"). Its typical
uses involve media playback, primarily audio clips.

4. Video Steganography − Video steganography is a method of secretly embedding


data or other files within a video file on a computer. Video (a collection of still
images) can function as the "carrier" in this scheme. Discrete cosine transform
(DCT) is commonly used to insert values that can be used to hide the data in each
image in the video, which is undetectable to the naked eye. Video steganography
typically employs the following file formats: H.264, MP4, MPEG, and AVI.

Steganography Examples Include


 Writing with invisible ink
 Embedding text in a picture (like an artist hiding their initials in a painting they’ve done)
 Concealing information in either metadata or within a file header
 Hiding an image in a video, viewable only if the video is played at a particular frame rate
 Embedding a secret message in either the green, blue, or red channels of an RRB image

Steganography Tools
 Steghide: Steghide is a free tool that uses steganography to conceal information in other files,
such as media or text.
 Stegosuite: It is a Java-based, free steganography tool. Stegosuite makes it simple to obfuscate
data in pictures for covert purposes.
 OpenPuff: It is a high-quality steganographic tool that allows you to conceal data in other
media types like images, videos, and Flash animations.
 Xiao Steganography: To conceal information in BMP images or WAV files, use the free Xiao
Steganography tool.
 SSuite Picsel: The free portable program SSuite Picsel is yet another option for hiding text
within an image file; however, it uses a somewhat different method than other programs.
Advantages of Steganography

 Unlike other methods, steganography has the added benefit of hiding


communications so well that they receive no attention. However, in countries
where encryption is illegal, sending an encrypted message that you can easily
decipher will raise suspicion and may be risky.
 Steganography is a form of encryption that protects the information within a
message and the connections between sender and receiver.
 The three essential elements of steganography—security, capacity, and
robustness—make it worthwhile to covert information transfer via text files and
develop covert communication channels.
 You can store an encrypted copy of a file containing sensitive information on
the server without fear of unauthorized parties gaining access to the data.
 Government and law enforcement agencies can communicate secretly with the
help of steganography corporations
Steps to Perform Attack
1) Installation of kali Linux in VMware workstation.

Path the ISO file.

Install Kali
Successfully install kali Linux

2) Go to the system root terminal --Password --ok


Set the path – Update the system by using sudo apt update command

3) Install steghide on the system using command –apt install steghide


4) You can see the description of what the program are going to do and many other
features in steghide with simple command –man steghide.

5) If any help required to operate the file command –steghide --help


6) Now embed the image file and text file though some command given below

After done we can see the image with slight or minor change in it
7) In order to see the file embed properly we have to check though extraction .

You can see Data successfully stored in secrets.txt file though same authentication.

CONCLUSION

Steganography can protect data by hiding it but using it alone may not guarantee total protection.
It is possible that by using a stenography technique, enemy defects presence of text message in
the image file and then he/she may succeed in extracting information from the picture, which can
be disastrous in real life situations. This is same for plain encryption. In this case by seeing the
meaningless appearing sequence of bits enemy can detect that some illegal message is being sent
(unless he/she is a fool), and we may land – up in a problematic situation. However, if one uses
both methods, this will lead to ‘security in depth’. The message should first be encoded using a
strong encryption algorithm and then embedded into a carrier.

THANKYOU 

You might also like