From Cryptography To Steganography: Detecting Hidden Data in The Digital World
From Cryptography To Steganography: Detecting Hidden Data in The Digital World
Abstract:- Steganography is a method used to conceal strong protection, asymmetric encryption is often preferred in
information, while steganalysis focuses on detecting scenarios where secure key exchange is difficult.
hidden data. In today's digital landscape, steganography
is often used across open communication channels, However, cryptography alone may not always be
embedding files, videos, messages, and images within sufficient to protect sensitive data from more sophisticated
other files to obscure their content from unintended attacks. While cryptography obscures the content of
viewers. However, cybercriminals exploit these messages, it does not conceal the fact that communication is
techniques to covertly transmit data to various devices. taking place. This is where steganography comes into play as
Traditional endpoint antimalware tools are not typically an additional layer of security. Steganography, unlike
designed to search for hidden data, making the detection cryptography, hides the existence of the communication itself
of steganographic content challenging. The ease with by embedding hidden messages within seemingly innocuous
which cybercriminals can transmit data using this files, such as images, audio, or video files. This makes it far
method highlights its potential threat. This paper reviews less likely that an observer will even realize that sensitive
various steganalysis tools and explores the integration of information is being exchanged.
antivirus programs for real-time detection to enhance
data confidentiality. A proof-of-concept for one of the The increasing use of steganography by cybercriminals
steganalysis tools is also provided. has raised significant concerns in the field of cybersecurity.
Cybercriminals exploit steganography to transmit malicious
Keywords:- Steganographyt; Cryptography; Cryptanalysis; payloads, command-and-control instructions, or sensitive
Forensics. stolen data without triggering traditional detection
mechanisms. The covert nature of steganography makes it
I. INTRODUCTION especially difficult for traditional antimalware tools to detect
these hidden communications, further complicating the task
The confidentiality and integrity of data are paramount of securing digital environments. For this reason,
for both organizations and individuals. Secure data steganalysis—the study and practice of detecting
transmission methods are critical to preventing tampering, steganography—has become an essential component of
unauthorized exchange, or deletion of sensitive information. modern cybersecurity strategies.
The transfer of confidential data via unsecured internet
channels presents significant challenges in protecting this Steganalysis seeks to uncover hidden information by
information. Hackers often seek to break cryptographic analyzing the characteristics of digital files and identifying
protections to gain access to private data. Cryptography, by patterns or anomalies that indicate the presence of concealed
encoding information into ciphertext, makes it unreadable to data. Various tools and techniques have been developed to
unauthorized users, thus safeguarding sensitive data such as assist with this process, ranging from simple signature-based
credit card numbers, bank account details, and business detection methods to advanced statistical analysis. Despite
communications. This encrypted data can only be decrypted these advancements, detecting steganography remains a
with the appropriate key used during encryption [1], [2], [3], challenging task, particularly as cybercriminals continue to
[4], [5], [6], [7]. develop more sophisticated methods to embed data in ways
that evade detection.
Cryptographic methods can be classified into two main
types: symmetric key and asymmetric key approaches, both Given the rising threat posed by steganography in the
of which transform plaintext into ciphertext. Encryption is realm of cybersecurity, this paper aims to review existing
akin to using a secret language that only the sender and steganalysis tools and explore their effectiveness when
recipient can understand, ensuring privacy even if the combined with real-time antivirus solutions. The integration
message is intercepted (see Fig.1). In symmetric key of steganalysis and antivirus tools could significantly
cryptography, the same key is used for both encryption and improve an organization's ability to detect and respond to
decryption, while in asymmetric cryptography, different keys hidden threats, providing a more comprehensive approach to
are used—one for encryption (public key) and another for data confidentiality. Additionally, the paper presents a proof-
decryption (private key). Although both methods provide of-concept demonstration of one of the steganalysis tools in
action, showcasing its capabilities in uncovering hidden data One of the most common cryptanalysis techniques
within digital media files. includes brute force attacks, where every possible key
combination is tested until the correct key is found. Other
The goal of this paper is to review existing methods, such as differential cryptanalysis or linear
steganography detection techniques, examine various cryptanalysis, focus on analyzing patterns in the ciphertext
steganalysis tools, and explore how these tools can be that can reveal information about the encryption process
integrated with real-time antivirus programs to enhance data [11].
confidentiality and security. Additionally, this paper presents
a proof-of-concept demonstration of one such steganalysis Mathematical and statistical tools are frequently used to
tool, showcasing its effectiveness in identifying hidden data carry out cryptanalysis. By understanding the structure and
within digital media. Through this study, we aim to characteristics of the cipher being used, cryptanalysts can
contribute to the growing field of cybersecurity by uncover subtle flaws or overlooked design weaknesses that
highlighting the importance of detecting steganography and make an algorithm vulnerable to attack. Advances in
offering solutions for strengthening organizational data quantum computing have posed a potential threat to
protection. traditional encryption algorithms, as quantum cryptanalysis
could break current standards like RSA and ECC much faster
A. Cryptography than classical computers [12].
Cryptography is the practice of securing data by
converting it into an unreadable format known as ciphertext. C. Steganography
This process ensures the confidentiality, integrity, and Steganography is a data-hiding technique that focuses
authenticity of sensitive information during transmission, on concealing the existence of information by embedding it
storage, or access. Cryptographic techniques are essential within other, typically innocuous, digital media files such as
for protecting communication over untrusted networks, like images, videos, audio files, and even text documents. Unlike
the internet, preventing unauthorized users from intercepting cryptography, which makes data unreadable but does not
or understanding the message. The two primary categories of conceal its existence, steganography hides the presence of the
cryptography are symmetric-key encryption, where a single data itself, making it more difficult for potential attackers to
key is used for both encryption and decryption, and detect that communication is taking place [13].
asymmetric-key encryption, which uses a pair of keys: a Steganography derives from the Greek words steganos
public key for encryption and a private key for decryption ("covered") and graphein ("writing"), which together mean
[8], [9] [10]. "concealed writing." The technique has a long history dating
back to ancient times. Early examples include hiding
Symmetric encryption methods, such as AES messages within wax tablets or shaving the head of a slave,
(Advanced Encryption Standard) and DES (Data Encryption tattooing a message on the scalp, and allowing the hair to
Standard), are efficient and widely used for encrypting large regrow, thereby concealing the message. The concept was
volumes of data. Asymmetric encryption algorithms, like formally documented by Johannes Trithemius in his 1499
RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve book Steganographia, which explored methods for hiding
Cryptography), are often employed for securing key secret messages [14][14], [15].
exchanges and digital signatures, ensuring both
confidentiality and integrity [10]. The effectiveness of steganography lies in its ability to
blend sensitive information with normal digital files without
Cryptography serves various purposes beyond just altering their outward appearance. For example, in image
securing communication. It plays a vital role in ensuring data steganography, data can be embedded in the least significant
authenticity through digital signatures and hashes, non- bits (LSB) of pixel values, which allows minor modifications
repudiation through public key infrastructure (PKI), and to the image without creating noticeable visual changes to the
secure storage through encrypted files and databases. human eye. This makes steganography ideal for use in covert
However, as encryption algorithms evolve, so too do the communications, especially over public and unsecured
methods that aim to break them, such as cryptanalysis [11]. networks [16]. Modern steganographic systems often embed
data in multimedia objects like images, audio, or video files,
B. Cryptanalysis which are frequently shared across the internet [17].
Cryptanalysis is the science of analyzing cryptographic Steganography can be classified into several categories based
algorithms and systems to discover weaknesses that can be on the type of cover medium used:
exploited. The ultimate goal of cryptanalysis is to decrypt the
ciphertext without having access to the secret key, thus Image Steganography
gaining unauthorized access to the original message. This method hides secret data within digital images. It is
Cryptanalysis often involves both theoretical and practical one of the most popular forms of steganography due to the
approaches to finding vulnerabilities in encryption methods, abundance of image files shared online. The least significant
such as weak key generation, algorithmic flaws, or improper bit (LSB) technique is commonly used, embedding hidden
implementation. information in the lower bits of each pixel, which minimally
affects the overall appearance of the image.
Two primary types of steganalysis exist: signature- For instance, by analyzing the natural statistics of an
based and statistical-based techniques. The distinction lies image and comparing them with the altered statistics after
in the method used for detection: either by identifying data embedding, universal statistical methods can expose
specific signatures left by steganography tools or by hidden information. Such approaches are versatile and can be
analyzing statistical anomalies in the media. applied to various media types (e.g., images, audio, video),
making them a critical tool for steganalysis in general-
A. Signature Steganalysis purpose cybersecurity applications.[8], [9], [11], [16], [17],
Signature-based steganalysis detects hidden messages [19], [20], [22], [24], [25].
by identifying specific signatures or patterns introduced into
the digital media by steganographic algorithms. When data is III. STEGANOGRAPHY TOOLS AND
embedded within an image, audio, or video file, certain TECHNIQUES
steganography tools leave identifiable markers, such as
degradation of the file quality or repeated patterns at the end Steganography involves embedding secret information
of the file. These markers can be detected using signature- within seemingly harmless files. The goal is to prevent third
based steganalysis tools, making it possible to determine parties from realizing that any hidden data exists at all. A
whether steganography was employed. variety of techniques and tools have been developed to
achieve this, allowing users to hide data in images, audio
For instance, some tools may append a specific string of files, videos, and other digital formats.
characters to the end of a file when injecting hidden data.
These signature strings act as flags, enabling forensic A. Steganography Techniques
investigators to uncover hidden messages. By comparing Digital steganography conceals information by
known signatures from different steganographic methods embedding it within a carrier file, which could be an image,
with the target media, the detection process can be audio clip, video file, or even a simple text document. The
automated. Signature-based detection methods are efficient, cover file remains functional and retains its original
but they depend heavily on the availability of known appearance, making it difficult to detect without specialized
signatures and may be ineffective against steganographic analysis. Fig 3 provides an illustration of how digital
methods that leave no visible trace [19], [20] (see Fig.2). steganography works [12], [13], [14], [21], [23], [26], [27].
Statistical Methods
These methods hide data by manipulating the statistical
properties of the media file, such as changing the distribution
of pixel values in an image or altering the bitrates in an audio
file.
B. Steganography Tools
Several software tools have been developed to facilitate
the embedding of hidden data in various types of files. Table
I lists some of the most common steganography tools and the
file formats they support:
[3]. E. Y. Daraghmi, C. H. Hsiao, and S. M. Yuan, “A New [15]. E.-Y. Daraghmi and A. Hamoudi, “THE
Cloud Storage Support and Facebook Enabled Moodle DEVELOPMENT OF A BLOCKCHAIN-BASED
Module,” in 2014 7th International Conference on Ubi- SYSTEM FOR ELECTRONIC VOTING,” . Vol., no.
Media Computing and Workshops, Ulaanbaatar, 17.
Mongolia: IEEE, Jul. 2014, pp. 78–83. doi: 10.1109/u- [16]. Y. Castelan and B. Khodja, “MP3 Steganography
media.2014.12. Techniques,” in Proceedings of the 4th Annual ACM
[4]. E. Y. Daraghmi and Y. S. Ming, “Using graph theory to Conference on Research in Information Technology
re-verify the small world theory in an online social (RIIT 2015), 2015, pp. 51–54. doi:
network word,” in Proceedings of the 14th International 10.1145/2808062.2808074.
Conference on Information Integration and Web-based [17]. A. El-Sayed, G. Attiya, and A. Fkirin, “Steganography
Applications & Services, Bali Indonesia: ACM, Dec. Literature Survey, Classification and Comparative
2012, pp. 407–410. doi: 10.1145/2428736.2428811. Study,” Commun. Appl. Electron., vol. 5, no. 10, pp.
[5]. E. Daraghmi, C.-P. Zhang, and S.-M. Yuan, “Enhancing 13–22, 2016, doi: 10.5120/cae2016652384.
Saga Pattern for Distributed Transactions within a [18]. E. Daraghmi, “Augmented Reality Based Mobile App
Microservices Architecture,” Appl. Sci., vol. 12, no. 12, for a University Campus,” 2017, doi:
p. 6242, Jun. 2022, doi: 10.3390/app12126242. 10.13140/RG.2.2.36356.24962.
[6]. E.-Y. Daraghmi, M.-C. Wu, and S.-M. Yuan, “A [19]. K. Karampidis, E. Kavallieratou, and G. Papadourakis,
Multilayer Data Processing and Aggregating Fog-Based “A Review of Image Steganalysis Techniques for
Framework for Latency-Sensitive IoT Services,” Appl. Digital Forensics,” J. Inf. Secur. Appl., vol. 40, pp.
Sci., vol. 11, no. 4, p. 1374, Feb. 2021, doi: 217–235, 2018, doi: 10.1016/j.jisa.2018.04.005.
10.3390/app11041374. [20]. M. Kaur and G. Kaur, “Review of Various Steganalysis
[7]. Y. Salem and E. Daraghmi, “GDPR-BLOCKCHAIN Techniques,” Int. J. Comput. Appl., vol. 5, no. 2, pp.
COMPLIANCE FOR PERSONAL DATA,” J. Theor. 1744–1747, 2014.
Appl. Inf. Technol., vol. 99, no. 24, pp. 5867–5877, [21]. J. Makwana and S. G. Chudasama, “Dual
2021. Steganography: A New Hiding,” Int. J. Adv. Res.
[8]. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Electr. Electron. Instrum. Eng., vol. 5, no. 4, pp. 3184–
Symmetric and Asymmetric Cryptography with 3188, 2016, doi: 10.15662/IJAREEIE.2016.0504109.
Existing Vulnerabilities and Countermeasures,” [22]. P. Hayati, V. Potdar, and E. Chang, “A Survey of
IJCSMS Int. J. Comput. Sci. Manag. Stud., vol. 11, no. Steganographic and Steganalytic Tools for the Digital
03, pp. 2231–5268, 2011. Forensic Investigator,” in Proceedings of the Workshop
[9]. R. Gupta, “Information Hiding and Attacks: Review,” of Information Hiding and Digital Watermarking in
Int. J. Comput. Trends Technol., vol. 10, no. 1, pp. 21– Conjunction with IFIPTM, New Brunswick, Canada,
24, 2014, doi: 10.14445/22312803/ijcttv10p105. 2007.
[10]. E. Y. Daraghmi, C.-F. Lin, and S. M. Yuan, “Mobile [23]. Shawahniibrahim, “Directory-watcher.” 2020. [Online].
Phone Enabled Barcode Recognition for Preferences Available:
Monitoring,” in Advances in Computer Science and https://github.com/shawahniibrahim/Directory-watcher
Education Applications, vol. 202, M. Zhou and H. Tan, [24]. DominicBreuker, “Steganography Toolkit.” 2020.
Eds., in Communications in Computer and Information [Online]. Available:
Science, vol. 202. , Berlin, Heidelberg: Springer Berlin https://github.com/DominicBreuker/stego-toolkit
Heidelberg, 2011, pp. 297–302. doi: 10.1007/978-3- [25]. Bannsec, “StegoVeritas.” 2020. [Online]. Available:
642-22456-0_43. https://github.com/bannsec/stegoVeritas
[11]. T. W. Edgar and D. O. Manz, “Science and Cyber [26]. A. Latham, “Steganography.” 1999. [Online].
Security,” in Research Methods for Cyber Security, Available: http://linux01.gwdg.de/ alatham/stego.html
Elsevier, 2017, pp. 33–62. doi: 10.1016/b978-0-12- [27]. S. A. Laskar and K. Hemachandran, “A Review on
805349-2.00002-9. Image Steganalysis Techniques for Attacking
[12]. A. Salem, M. Sabbih, H. Al-tamimi, and A. Ahmed, Steganography,” Int. J. Eng. Res. Technol., vol. 3, no. 1,
“Secure Image Steganography Through Multilevel pp. 3400–3410, 2014.
Security,” Int. J. Comput. Sci. Inf. Secur., vol. 11, no. 1,
pp. 80–103, 2020.
[13]. Y. Zheng, F. Liu, X. Luo, and C. Yang, “A Method
Based on Feature Matching to Identify Steganography
Software,” in 2012 4th International Conference on
Multimedia and Security (MINES 2012), 2012, pp.
989–994. doi: 10.1109/MINES.2012.26.
[14]. Merriam-Webster, “Definition of steganography.” 2020.
[Online]. Available: https://www.merriam-
webster.com/dictionary/steganography