Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Michael T. Raggo, Chet Hosmer
Format: PDF / Kindle (mobi) / ePub
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
- Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7
- Dives deep into the less known approaches to data hiding, covert communications, and advanced malware
- Includes never before published information about next generation methods of data hiding
- Outlines a well-defined methodology for countering threats
- Looks ahead at future predictions for data hiding
where you have a Red, Green, and Blue cable delivering the video signal to your television. In an image’s 24-bit color palette, 8-bits are assigned to each of the three colors, essentially providing 256 shades of Red, 256 shades of Green, and 256 shades of Blue, as represented in Figure 3.5. FIGURE 3.5 24-Bit Color Palette Since our eyes can only interpret Red, Green, and Blue, it is the combination of these three colors that provides the color for each pixel that makes up the 24-bit image.
skipped (false positive likely) The output lists the analysis for each JPEG file in the directory. The stegdetect utility indicates the accuracy of the detection with a number of stars next to the detected steganography program. In the previous example, stegdetect detected jphide invisible in some of the images. It also indicated the probability for some files with two asterix and others with three. The Stegdetect tarball or zip also includes a GUI version of the program called XSteg. All of the
contained information not random noise. For example, if we were to extract out the LSB values of each sample the values would contain some remnant of the music. Therefore, the key to detecting LSB Wave file embedding is to determine if the LSB’s values in the Wave file under examination contain information or simply random noise. A common method for making this determination is to estimate the compressibility of the resulting bit stream. In the case of wave audio files you would extract the LSB
make the file size inconsistent with the descriptor file size parameter. Per sunbarrow.com, dsfi uses the following syntax: dsfi
piece of paper, and when it dries it’s invisible to the naked eye. But put the paper to warm source such as a light bulb, and the message will slowly appear. Many other acid based substances will oxidize and reveal themselves when exposed to heat include; urine, vinegar, wine, onion juice, milk, and even rain water combined with sulfuric acid. Samuel Rubin’s 1987 book, “The Secret Science of Covert Inks”9 is probably the most comprehensive book on the subject. It details supposedly secret CIA