

Stegspy and Hiderman use last 3 bytes.

Although sometimes some of the bytes change in the truckfile after recovery process.Staganoganalysis.Hidden file can be recovered recovered.Standard encryption algorithm: Blowfish, DES, Cast5, Serpent-256, Rijndael-256, TripleDES, TWOFISHStaganography recovery It is Masker’s fingerprint and always same for every file.Ĭomparison Hiderman vs Masker Comparison Hiderman MaskerEncryption algorithm Predictable encryption algorithm. According to documentation, Stegspy claims it can identify Masker’s stego file! It is possible to detect Masker by looking at last 77 bytes of stego file. Stegspy’s Steganalysis Hiderman:Detecting the last 3 bytes of the stego file as Hiderman’s signature Masker: Stegspy cannot identify the stego file. The last 77 bytes are the Masker signature. The length of this part depends on the length of the password.5.
#STEGANOGRAPHY DETECTION TOOL PASSWORD#
Stream of unknown bytes, which is possible contain the password and encryption algorithm used for steganography process. This pattern possible shows the end of the file content.4. After the encrypted bytes of the file content, there is stream of 0 character (Hex value 30) followed by 12 blank characters and 0 character followed by 12 blank characters again. The hidden file content, which is encrypted. The length of the hidden file content, which is unencrypted, presented twice, followed by blank character (Hex value 20), with total length 13 bytes.3. The truckfile content, which is unencrypted.2. The last 3 bytes (Hex value 43 44 4e) are the Hiderman signature. Stream of unknown bytes, which the length is not same for each file.8. If it is changed / removed, then Hiderman will not authenticate user to recover the stego file, even tough the given password is correct.7. 8 bytes data, which is almost same for every file.

The hidden file content, which is presented using this algorithm: For every 4 bytes data, the first 2 bytes are unencrypted, and the last 2 bytes are encrypted The name of the hidden file, which is encrypted.5. The length of the hidden file name, which is unencrypted.4. 10 bytes data with unknown function, which the value depends on the password.3. The truckfile content, which is unencrypted2. Tools Steganography tools: Hiderman version 3.0 Masker version 7.5 Steganalysis tool: Stegspy version 2.0 Hex Editor: Hex Editor Neo 4.95 Steganography Attacks Known carrier attack Steganography only attack Known message attack Known steganography attack

Steganalysis Technique Based on unusual pattern in the media or visual detection of the same. This can be done because the properties of electronic media are changed after it is used to hide any object, result degradation in terms of quality or unusual characteristics of the media. Steganography Technique Binary File Techniques Plaintext Steganography Techniques Still imagery Steganography Techniques Audio and Video Steganography IP datagram steganography / Network Covert Channel / Network steganography Fingerprinting Watermarking Fragile steganography: involves embedding information into cover media, destroyed if that media is modified. Steganography Type Robust steganography: involves embedding information into a file, cannot easily be destroyed. Limitation of Study The analysis is only done with the text and JPEG files, not with audio or video file. There are parts of the stego files that cannot be analyzed yet, because the encryption that is used in the steganography process make these bytes complicated to be analyzed. Goal Figuring out the pattern of the bytes in the stego file. How steganalysis tool (Stegspy) identify the bytes appended to the cover media. Comparing steganography tools: Hiderman and Masker Steganography Tool & Steganography Detection Tool - PresentationĪnalyzing the file hidden by the steganography tool and how the steganography detection tool detects it Group 6 Ahmet Aydin - Arman Güngör - Laili Aidiīackground Steganography is hiding secret message into cover media, no one suspects from the presence of hidden message. Steganalysis is the art of revealing hidden message in a cover media. Keywords: Stego file, truck file (cover media)
