Investigating Steganography in Audio Stream for Network Forensic Investigations: Detection & Extraction

Total Page:16

File Type:pdf, Size:1020Kb

Investigating Steganography in Audio Stream for Network Forensic Investigations: Detection & Extraction Investigating Steganography in Audio Stream for Network Forensic Investigations: Detection & Extraction Yao Lu a thesis submitted to the graduate faculty of design and creative technologies AUT University In partial fulfillment of the Requirements for the degree of Master of Forensic Information Technology School of Computer and Mathematical Sciences Auckland, New Zealand 2014 i Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ……………………………. Yao Lu ii Acknowledgements This thesis was completed at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at Auckland University of Technology, New Zealand. Support was received from many people through the 2 years of study. Firstly, I would like to thank my family; my mother Xiangyan Xiao and my father Jianhua Lu who provided financial support. Also special thanks to my fiancée Natalie Ai who took care of my daily life so that I can focus on the thesis research. I would also like to thank my thesis supervisor, Prof. Brian O. Cusack who has provided valuable support and inspiration in the thesis project. With his support the project progressed smoothly. There are many other staff members at AUT that deserve thanking for their support. Jung Son for setting up EnCase for the research and Alastair Nisbet for managing the laboratory environment for the research testing. Other classmates supported the research with their knowledge and encouragement. Ting and Wei Li were always providing ideas in regards to the research project. Last but not least, thanks to the members of various open source communities. Specifically, thanks to Backbone Security for providing free trial version of StegAlyzerAS and StegAlyzerSS. Thanks to Chad Davis from Backbone Security who has answered my queries regarding to technical issues and thanks to the proof reader. iii Abstract There are more than 200 steganography tools have been developed by software developers for use in digital media. Multimedia technologies are readily available in the steganography field. They have complex encoding algorithms and compression methods to hide information. Audio is a common multimedia format that is widely used in the Internet. The uploading, downloading and transmission of audio files through the Internet is done through many different audio streams. Audio steganography activities could happen in any of those audio streams. The possibility puts challenges to traditional digital forensic investigation. In order to investigate audio streaming steganography, several steganography detection tools and network stream capture tools need to be involved and evaluated. The current academic literature has little support in this topic area for forensic investigation knowledge. Therefore, the main focus of the research project is to investigate steganography in audio streams as a forensic investigation. The research asked the question; What are the procedures and challenges when conducting digital forensic investigations for audio steganography? Five testing phases were designed. In phase 1, three audio steganography tools and two steganography detection tools were tested in order to determine suitable tools for conducting case scenario testing. Openpuff and StegAlyzerAS were found to be the best audio steganography embedding tool and detection tool respectively. WireShark was tested to evaluate audio streaming capture capability as well as packets analysis capability. Phase two involved conducting the case scenario simulating a criminal activity using audio steganography in which Openpuff was used to create four audio steganography files containing evidence. Phase 3 and phase 4 then used combinations of digital forensic tools and steganalysis tools to detect and extract the secret contents from audio streams using standard forensic procedures. iv The research findings showed that Openpuff was better than Mp3Stegz and S-Tools both in audio steganography embedding processes and audio steganography extraction processes. StegAlyzerAS was capable of detecting audio steganography tools after scanning while StegAlyzerSS was incapable of detection audio steganography contents during scanning. Additionally, WireShark successfully captured audio streaming packets. The analysis on these captured packets indicated that WireShark would not identify any steganography activities but the analysis could show information such as the type of files in the packet. This information was then used to reduce the scope of the forensic investigation and to better target audio steganography on a suspect’s hard drive. After comparative analysis on original evidence and extracted evidence, the extraction rate of audio steganography achieved 75% in the case simulation. The research has provided knowledge on audio steganography investigation methods and indicates that current forensic tools could cause problems for investigation unless correctly applied. Current steganalysis tools are designed for looking at particular algorithms in steganography but there are other algorithms that are used in audio steganography. This is the challenge for forensic investigators. Therefore, a possible design of an audio steganography tool within a logical flow chart diagram was proposed for future research (see Figure 6.1). v Table of Contents Declaration ........................................................................................................ i Acknowledgements .......................................................................................... ii Abstract ........................................................................................................... iii List of Tables ................................................................................................. viii List of Figures .................................................................................................. x List of Abbreviations ...................................................................................... xii Chapter 1: INTRODUCTION 1.0 BACKGROUND ................................................................................... 1 1.1 MOTIVATION ....................................................................................... 3 1.2 STUCTURE OF THESIS ...................................................................... 5 Chapter 2: LITERATURE REVIEW 2.0 INTRODUCTION ................................................................................. 8 2.1 STEGANOGRAPHY DEFINITION ..................................................... 9 2.2 STEGANOGRAPHY THROUGHOUT HISTORY .............................. 9 2.3 STEGANOGRAPHY TECHNOLOGY .............................................. 11 2.3.1 Categories of Steganography ..................................................... 12 2.3.2 Types of Steganography ............................................................ 16 2.4 ISSUES IN STEGANOGRAPHY ....................................................... 18 2.5 STEGANOGRAPHY TOOLS ............................................................. 19 2.5.1 BackYard ................................................................................... 19 2.5.2 BMP Secrets .............................................................................. 20 2.5.3 Info Stego .................................................................................. 20 2.5.4 MP3Stego .................................................................................. 21 2.5.5 F5 ............................................................................................... 22 2.6 AUDIO STEGANOGRAPHY ............................................................ 23 2.6.1 Embedding Methods in Audio Steganography .......................... 23 vi 2.7 STEGANOGRAPHY DETECTION ................................................. 30 2.8 STEGANOGRAPHY AND NETWORK AUDIO STREAMING FORENSICS ................................................................................................. 33 2.9 SUMMARY ISSUES AND PROBLEMS ........................................... 34 2.10 CONCLUSION .................................................................................... 36 Chapter 3: RESEARCH METHODOLOGY 3.0 INTRODUCTION ............................................................................... 38 3.1 REVIEW OF SIMILAR STUDIES ..................................................... 38 3.1.1 Feature Matching to Identify Steganography Software ............ 39 3.1.2 Information Hiding within Network Audio Streams ................. 41 3.1.3 Audio Steganalysis using GA .................................................... 43 3.1.4 Forensic and Anti-Forensic of Steganography .......................... 45 3.1.5 Network Forensic on Encrypted Skype Traffics ....................... 47 3.2 RESEARCH DESIGN ......................................................................... 49 3.2.1 Summary of Similar Studies ...................................................... 50 3.2.2 Review of Problem Areas .......................................................... 51 3.2.3 The Research Question .............................................................. 53 3.2.4 Research Model ........................................................................
Recommended publications
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • Cybersecurity, IT-Aided Education, and Teles: Nexus, Vistas & Realities
    CYBERSECURITY, IT-AIDED EDUCATION, AND TELES: NEXUS, VISTAS & REALITIES Emmanuel C. Ogu* Department of Computer Science, [email protected] School of Computing and Engineer- ing Sciences, Babcock University, Ilishan-Remo, Ogun State, Nigeria. Chiemela Ogu EMINDA Konsults, Yaba, Lagos, [email protected] Nigeria. * Corresponding author ABSTRACT Background The current decade has witnessed rising spates of threats and attacks that have threatened the safety and security of cyberspace, thereby giving rise to contem- porary discourses pertaining the realities that these ominous trends portend for technology innovation and digitalisation, in the emerging global digital society. In the process, the technological capabilities that have been used to effectively harness the efficiency that this virtual space provides for contemporary educa- tion and learning have been defamed. Aim/Purpose This exploratory research interrogates the possible relationships between the contemporary concerns of global cyber security, and the realities and prospects of IAE and TeLEs, while elucidating the crucial factors that impose on such relationship(s). Methodology This research adopts the qualitative research methodology with an exploratory approach to interrogate the various contemporary concerns of global cyberse- curity as contained in existing literature, especially as it affects the proliferation and adoption of IT-aided education and Technology-enhanced Learning Envi- ronments (TeLEs); based on a systematic correlational analysis of key interpos- ing concepts. Contribution The research presents an overview of the current status and prospects of de- velopment of IAE and TeLEs, as well as the nature of the realities associated with contemporary concerns of global cybersecurity; then also discussing how these cybersecurity concerns impact on the wider adoption and implementation of IAE and TeLEs.
    [Show full text]
  • A Method for Automatic Identification of Signatures of Steganography Software 3
    SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 A Method for Automatic Identification of Signatures of Steganography Software Graeme Bell* and Yeuan-Kuen Lee Abstract—A fully automated, blind, media-type agnostic approach to research attention in steganalysis has been directed towards until now. steganalysis is presented here. Steganography may sometimes be exposed Implementation-induced artefacts are however a valid and interesting by detecting automatically-characterised regularities in output media target for steganalytic research, as the primary goal of steganography caused by weak implementations of steganography algorithms. Fast and accurate detection of steganography is demonstrated experimentally here (covert communication) is defeated whenever steganographic and across a range of media types and a variety of steganography approaches. non-steganographic media can be easily distinguished by any means. As Westfeld states in [2], Index Terms—blind, media-type agnostic, steganalysis, steganography, “The goal is to modify the carrier in an imperceptible way WAT-STEG only, so that it reveals nothing - neither the embedding of a message nor the embedded message itself.” I. INTRODUCTION In the past, discovery of implementation artefacts during research TEGANOGRAPHY is the field of research that studies how has occurred infrequently and on an ad-hoc basis. This paper dis- secret data can be hidden in carrier media, without being cusses a new steganalytic method by which the attempted discovery detectableS either to normal human observation or programmatic of these implementation-induced peculiarities can be automated. The scrutiny. Steganalysis [1]–[5] is the field of research that (primarily) method is applied in two stages. First, some known-stego training seeks methods to detect steganographic media.
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Defending Against Insider Use of Digital Steganography
    2007 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings Defending Against Insider Use of Digital Steganography James E. Wingate CISSP-ISSEP, CISM, IAM, Backbone Security, [email protected] Glenn D. Watt CISSP, CISM, IAM, IEM, Backbone Security, [email protected] Marc Kurtz CISSP, Backbone Security, [email protected] Chad W. Davis CCE, Backbone Security, [email protected] Robert Lipscomb Backbone Security, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Scholarly Commons Citation Wingate, James E.; Watt, Glenn D.; Kurtz, Marc; Davis, Chad W.; and Lipscomb, Robert, "Defending Against Insider Use of Digital Steganography" (2007). Annual ADFSL Conference on Digital Forensics, Security and Law. 1. https://commons.erau.edu/adfsl/2007/session-11/1 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Conference on Digital Forensics, Security and Law, 2007 Defending Against Insider Use of Digital Steganography James E. Wingate, CISSP-ISSEP, Glenn D. Watt, CISSP,
    [Show full text]
  • Image Steganography Applications for Secure Communication
    IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images.
    [Show full text]
  • Hiding Images in Plain Sight: Deep Steganography
    Hiding Images in Plain Sight: Deep Steganography Shumeet Baluja Google Research Google, Inc. [email protected] Abstract Steganography is the practice of concealing a secret message within another, ordinary, message. Commonly, steganography is used to unobtrusively hide a small message within the noisy regions of a larger image. In this study, we attempt to place a full size color image within another image of the same size. Deep neural networks are simultaneously trained to create the hiding and revealing processes and are designed to specifically work as a pair. The system is trained on images drawn randomly from the ImageNet database, and works well on natural images from a wide variety of sources. Beyond demonstrating the successful application of deep learning to hiding images, we carefully examine how the result is achieved and explore extensions. Unlike many popular steganographic methods that encode the secret message within the least significant bits of the carrier image, our approach compresses and distributes the secret image’s representation across all of the available bits. 1 Introduction to Steganography Steganography is the art of covered or hidden writing; the term itself dates back to the 15th century, when messages were physically hidden. In modern steganography, the goal is to covertly communicate a digital message. The steganographic process places a hidden message in a transport medium, called the carrier. The carrier may be publicly visible. For added security, the hidden message can also be encrypted, thereby increasing the perceived randomness and decreasing the likelihood of content discovery even if the existence of the message detected. Good introductions to steganography and steganalysis (the process of discovering hidden messages) can be found in [1–5].
    [Show full text]
  • Data Hiding Using Steganography and Cryptography
    Varsha et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 802-805 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.802 – 805 REVIEW ARTICLE Data Hiding Using Steganography and Cryptography Varsha1, Dr. Rajender Singh Chhillar2 1M.Tech Student, Department of Computer Science & Application, M.D. University, Rohtak-124001 2Professor & Former Head, Department of Computer Science & Application, M.D. University, Rohtak-124001 1Email Id: [email protected] Abstract — Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it. Keywords— RSA algorithm, cryptography, steganography, LSB method I. INTRODUCTION The growing use of Internet among public masses and availability of public and private digital data and its sharing has driven industry professionals and researchers to pay a particular attention to information security. Internet users frequently need to store, send, or receive private information and this private information needs to be protected against unauthorized access and attacks. Presently, three main methods of information security being used: watermarking, cryptography and steganography. In watermarking, data are hidden to convey some information about the cover medium such as ownership and copyright.
    [Show full text]
  • Openpuff Steganography & Watermarking
    OPENPUFF V4.01 STEGANOGRAPHY & WATERMARKING Data hiding and watermarking made easy, safe and free EmbeddedSW © 2018 Send your suggestions, comments, bug reports, requests to [email protected] – Skype "embeddedsw.company" OPENPUFF HOMEPAGE LEGAL REMARKS P. 2 OPENPUFF INSTALLATION: WINDOWS P. 3 OPENPUFF INSTALLATION: LINUX P. 4 FEATURES: WHY IS THIS STEGANOGRAPHY TOOL DIFFERENT FROM THE OTHERS? P. 7 FEATURES: PROGRAM ARCHITECTURE P. 9 FEATURES: ADAPTIVE ENCODING AND STEGANALYSIS RESISTANCE P. 13 FEATURES: MULTI-CRYPTOGRAPHY & DATA OBFUSCATION P. 14 WHAT IS STEGANOGRAPHY? P. 15 WHAT IS DENIABLE STEGANOGRAPHY? P. 16 WHAT IS MARKING? P. 18 SUPPORTED FORMATS IN DETAIL P. 19 SUGGESTIONS FOR BETTER RESULTS P. 24 OPTIONS: BITS SELECTION LEVEL P. 26 STEP BY STEP DATA HIDING P. 27 STEP BY STEP DATA UNHIDING P. 31 STEP BY STEP MARK SETTING P. 34 STEP BY STEP MARK CHECKING P. 35 STEP BY STEP DATA & MARK ERASING P. 36 OPENPUFF V4.01 - ENGLISH - 11/JUL/2018 1 LEGAL REMARKS Remember: this program was not written for illegal use. Usage of this program that may violate your country's laws is severely forbidden. The author declines all responsibilities for improper use of this program. No patented code or format has been added to this program. THIS IS A FREE SOFTWARE: This software is released under LGPL 3.0 You’re free to copy, distribute, remix and make commercial use of this software under the following conditions: You have to cite the author (and copyright owner): WWW.EMBEDDEDSW.NET You have to provide a link to the author’s Homepage: WWW.EMBEDDEDSW.NET/OPENPUFF.HTML
    [Show full text]
  • JPEG Versus GIF Images in Forms of LSB Steganography JPEG Versus
    IJCSN International Journal of Computer Science and Network, Volume 2, Issue 6, December 2013 ISSN (Online) : 2277-5420 www.IJCSN.org 86 JPEG versus GIF Images in forms of LSB Steganography 1 ELTYEB E. ABED ELGABAR, 2 FAKHRELDEEN A. MOHAMMED 1, 2 Information Technology, College of Computer Science and Information Technology - Khulais, King Abdul Aziz University, Jeddah, Khulais, Saudi Arabia Abstract - Steganography (from Greek steganos, or "covered," message within another message called cover message and graphie, or "writing") is the hiding of undisclosed message such as text, image video and audio, so steganography can (such as text, image, audio and video) within an ordinary be seen as the complement of cryptography whose goal is message (such as text, image, audio and video) and the to hide the content of a message. extraction of it at its target (receiver). Steganography takes cryptography a step farther by hiding an encrypted Steganography message so that no one suspects it exists. This paper compares and analyses Least Significant Bit (LSB) algorithm using the cover object as an image with a focus on two types: JPEG and GIF. The comparison and analysis are done with deference Text Image Audio/video Protocol number of criteria (Robustness against statistical attacks, Invisibility, Steganalysis detection, Robustness against image manipulation, Efficient when amount of data reasonable, Fig1. Categories of Steganography Payload capacity, Unsuspicious files and Amount of embedded data) to understand their strengths and weaknesses. 1.1 Types of Steganography Keywords - Steganography, Steganographic, Least significant Steganography can be classified into various types bit (LSB), Lossless, lossy (General types) [30]: 1.
    [Show full text]
  • An Approach for Stego-Insider Detection Based on a Hybrid Nosql Database †
    Journal of Sensor and Actuator Networks Article An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database † Igor Kotenko 1,* , Andrey Krasov 2 , Igor Ushakov 2 and Konstantin Izrailov 1,2 1 St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, Russia; [email protected] 2 Department of Secured Communication Systems, The Bonch-Bruevich State University of Telecommunications, 199178 St. Petersburg, Russia; [email protected] (A.K.); [email protected] (I.U.) * Correspondence: [email protected] † This paper is an extended version of the conference paper: Igor Kotenko, Andrey Krasov, Igor Ushakov and Konstantin Izrailov. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model. The 4th International Conference on Future Networks and Distributed Systems (ICFNDS 2020). Saint-Petersburg, Russia, 26–27 November 2020. Abstract: One of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information across the organization’s perimeter. Especially presently, with great popularity of wireless sensor networks (WSNs) and Internet of Things (IoT) devices, there is a big variety of information that could be gathered and processed by stego-insiders. Consequently, the problem arises of identifying such intruders and their transmission channels. The paper proposes an approach to solving this Citation: Kotenko, I.; Krasov, A.; problem. The paper provides a review of the related works in terms of insider models and methods Ushakov I.; Izrailov K.
    [Show full text]
  • Steganography FAQ
    Steganography FAQ Aelphaeis Mangarae [Zone-H.Org] March 18th 2006 http://zone-h.org © Copyright Zone-H.Org 2006 Zone-H.Org Table Of Contents Introduction What Is Steganography? Steganography Terms History Of Steganography How Does It Work? Steganography In Images Steganography In Audio Steganography In Video Steganography In Documents Detecting Steganography Could Steganography Be Used By Terrorists? Steganography Tools Steganalysis Tools Conclusion About The Author Greetz To Zone-H.Org Introduction Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts. Most people don't see Steganography has a potential threat, some people don't even know what Steganography is. With this FAQ I hope to answer any questions anyone may want to ask about Steganography, and to educate people so they can understand what exactly Steganography is. Is Steganography a potential threat? Well your about to find out. What Is Steganography? Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing).
    [Show full text]