
A
steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.
It is not necessary to conceal the message in the original file at all. Thus, it is not necessary to modify the original file and thus, it is difficult to detect anything. If a given section is subjected to successive bitwise manipulation to generate the cyphertext, then there is no evidence in the original file to show that it is being used to encrypt a file.
Architecture
Carrier
The
carrier
Carrier may refer to:
Entertainment
* ''Carrier'' (album), a 2013 album by The Dodos
* ''Carrier'' (board game), a South Pacific World War II board game
* ''Carrier'' (TV series), a ten-part documentary miniseries that aired on PBS in April 20 ...
is the signal, stream, or data file into which the hidden data is hidden by making subtle modifications. Examples include audio files, image files, documents, and executable files. In practice, the carrier should look and work the same as the original unmodified carrier, and should appear benign to anyone inspecting it.
Certain properties can raise suspicion that a file is carrying hidden data:
* If the hidden data is large relative to the carrier content, as in an empty document that is a megabyte in size.
* The use of obsolete formats or poorly-supported extensions which break commonly used tools.

It is a cryptographic requirement that the carrier (e.g. photo) is original, not a copy of something publicly available (e.g., downloaded). This is because the publicly available source data could be compared against the version with a hidden message embedded.
There is a weaker requirement that the embedded message not change the carrier's statistics (or other metrics) such that the presence of a message is detectable. For instance, if the least-significant-bits of the red camera-pixel channel of an image has a Gaussian distribution given a constant colored field, simple image steganography which produces a random distribution of these bits could allow discrimination of stego images from unchanged ones.
The sheer volume of modern (ca 2014) and inane high-bandwidth media (e.g., youtube.com, bittorrent sources. eBay, Facebook, spam, etc.) provides ample opportunity for covert information±.
Chain
Hidden data may be split among a set of files, producing a ''carrier chain'', which has the property that all the carriers must be available, unmodified, and processed in the correct order in order to retrieve the hidden data. This additional security feature usually is achieved by:
* using a different
initialization vector for each carrier and storing it inside processed carriers -> ''CryptedIVn = Crypt( IVn, CryptedIVn-1 )''
* using a different cryptography algorithm for each carrier and choosing it with a chain-order-dependent
equiprobabilistic algorithm
Robustness and cryptography
Steganography tools aim to ensure robustness against modern
forensic methods, such as statistical
steganalysis. Such robustness may be achieved by a balanced mix of:
* a stream-based cryptography process;
* a
data whitening process;
* an
encoding process.
If the data is detected, cryptography also helps to minimize the resulting damage, since the data is not exposed, only the fact that a secret was transmitted. The sender may be forced to decrypt the data once it is discovered, but
deniable encryption can be leveraged to make the decrypted data appear benign.
Strong steganography software relies on a
multi-layered architecture with a deep, documented
obfuscation
Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent u ...
process.
Carrier engine
The carrier engine is the core of any steganography tool. Different file formats are modified in different ways, in order to covertly insert hidden data inside them. Processing algorithms include:
* Injection (suspicious because of the content-unrelated file size increment)
* Generation (suspicious because of the traceability of the generated carriers)
*
Ancillary data Ancillary data is data that has been added to given data and uses the same form of transport. Common examples are cover art images for media files or streams, or digital data added to radio or television broadcasts.
Television
Ancillary data (commo ...
and
metadata
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including:
* Descriptive metadata – the descriptive ...
substitution
*
LSB or adaptive substitution
* Frequency space manipulation
See also
*
Steganography
*
BPCS-Steganography
*
Steganographic file system
*
Steganography detection
Articles
*
*
*
*
*
*
References
External links
Exhaustive directory of steganography softwareby Dr. Neil Johnson
{{DEFAULTSORT:Steganography Tools
Steganography
Espionage techniques
Applications of cryptography
Cryptographic software