CONCEALING TEXT AND EXECUTABLE FILES IN JPG FORMAT FILES WITH A STEGANOGRAPHIC COMMAND-LINE TOOL IN THE OPERATING SYSTEM KALI LINUX

CONCEALING TEXT AND EXECUTABLE FILES IN JPG FORMAT FILES WITH A STEGANOGRAPHIC COMMAND-LINE TOOL IN THE OPERATING SYSTEM KALI LINUX

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v26i1.394

Keywords:

Algorithms, Integrity, BMP, JPG, Crack, Linux, LSB, Kali, Privacy, Python3, Security, Steganalysis, Steganography, Stegcracker, Steghide, Wordlists

Abstract

In this scientific paper concealing text and executable files in JPG format files with a steganographic command-line tool in the Kali Linux operating system is presented. Among the myriad of steganographic tools, Steghide has gained prominence for its robust features and ease of use. Primarily focused on embedding and extracting secret messages within image files, the software tool Steghide enables users to encode text data within JPEG and BMP image formats while maintaining data integrity and minimizing visual alterations. This paper provides an in-depth examination of Steghide’s functionality, workflow, and security considerations in the context of digital steganography. It is also discussed the algorithms underpinning Steghide’s operations, its strengths, limitations and common use cases.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria, e-mail: petar.boyanov@shu.bg

References

Alani, N., & Qasim, A. (2016). "Image Steganalysis and Detection of Steganographic Content: A Forensic Approach." Digital Investigation, 17, 1-10. ISSN: 1742-2876.

Ahmed, F., Khatr, P., Surange, G. and Agrawal, A., 2023. SearchOL: A Tool for Reconnaissance. Journal of Network and Innovative Computing, ISSN 2160-2174, Volume 11(2023) pp. 021-029.

Bedzhev, B., Trıfonov, T., & Nıkolov, N. (2010). A multicore computer system for design of stream ciphers based on random feedback shift registers. İstanbul Aydın Üniversitesi Dergisi, Turkey, 2(7), 1-15., https://dergipark.org.tr/en/download/article-file/319309. [Last accessed on 25 September 2024]

Bhuva, B. D., Zavarsky, P., & Butakov, S. (2021, May). An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools. In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 208-211). IEEE.

Boyanov, P., Using modified sniffer scripts, implementing linear algorithms for detection of network port scan attacks in Linux based operating systems. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 24, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 78-88, DOI: https://doi.org/10.46687/jsar.v24i1.371.

Boyanov, P., Investigating the network traffic using the command-line packets sniffer Tcpdump in Kali Linux. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 25, Shumen, 2023, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 31-44, DOI: https://doi.org/10.46687/jsar.v25i1.378.

Boehm, B. (2004). Steganography in digital media: Principles, algorithms, and applications. Cambridge University Press. ISBN: 978-0521516049.

Cachin, C. (1998). An information-theoretic model for steganography. In Proceedings of the 2nd International Workshop on Information Hiding, pp. 306-318. ISBN: 978-3540656976.

Channalli, S. S., & Jadhav, A. A. (2018). "Steganography and Steganalysis: An Overview." International Journal of Computer Science and Information Security, 6(3), 244-246. ISSN: 1947-5500.

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). "Digital image steganography: Survey and analysis of current methods." Signal Processing, 90(3), 727-752. ISSN: 0165-1684.

Djebali, A., & Talhi, M. (2020). "Analysis of Steganographic Tools in Cybersecurity: From Embedding to Detection." In Handbook of Research on Multimedia Cyber Security, 251-267. ISBN: 978-1799842034.

Fridrich, J., Goljan, M., & Du, R. (2001). "Reliable detection of LSB steganography in color and grayscale images." In Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges (pp. 27-30). ISBN: 978-1581133947.

Garg, N., & Garg, S. (2022). "A survey on image steganography techniques with focus on security and robustness." Journal of Information Security and Applications, 67, 103183. ISSN: 2214-2126.

Gueorguiev N.L., Nesterov K.N., Minev S., An approach to information exchange management in multimodule multi-position security systems. International Scientific Journal "Security & Future", Vol. 6, Issue 1, pp: 28-31, STUME, 2022, WEB ISSN 2535-082X; PRINT ISSN 2535-0668.

Gutub, A., & Al-Shaikh, A. (2019). "Security Enhancement of Data Hiding in JPEG Images: A Comparative Study of Steganography Techniques." In Advances in Cybersecurity and Internet of Things, 231-244. ISBN: 978-9811397364.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp.13-24,https://doi.org/10.1007/

-3-030-65722-2.

Iliev, R., Kochankov, M., A Generalized Net Model of Command and Control System. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 127-131, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8035.

Ivanov, I., & Aleksandrova, K. (2024, June). Design and Implementation of Software-Defined Doppler Radar. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume III, pp. 105-108, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol3.8159.

Johnson, N. F., & Jajodia, S. (1998). "Exploring steganography: Seeing the unseen." Computer, 31(2), 26-34. ISSN: 0018-9162.

Kaur, G., & Kumar, A. (2018). "Comparative Analysis of Steganographic Tools Based on Least Significant Bit (LSB) Method." International Journal of Computer Science and Mobile Computing, 7(7), 134-140. ISSN: 2320-088X.

Kharrazi, M., Sencar, H. T., & Memon, N. (2004). "Image steganography: Concepts and practice." In Proceedings of the International Workshop on Digital Watermarking, pp. 42-57. ISBN: 978-3540253328.

Kochankov, M., & Iliev, R. (2024, June). A Generalized Net Model for Accessing Information Resources in a Secure Environment. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 175-178, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/

17770/etr2024vol2.8034.

Kolev, Alexander, Nikolova, Pavlina. Instrumental Equipment for Cyberattack Prevention. Information & Security: An International Journal 47, no. 3 (2020):285-299. https://doi.org/10.11610/isij.4720.

Komínková Oplatková, Z., Hološka, J., Zelinka, I., & Šenkeřík, R. (2009). Detection of steganography inserted by OutGuess and steghide by means of neural networks. In 2009 Third Asia International Conference on Modelling & Simulation, Vols 1 and 2. The Institute of Electrical and Electronics Engineers (IEEE).

Kothari, A., & Deshmukh, R. (2023). "Improving security in image steganography with advanced LSB techniques and steganalysis-resistant approaches." International Journal of Image and Data Fusion, 14(2), 127-141. ISSN: 1947-9895.

Kumar, M., & Reddy, B. V. (2017). "A robust and secure steganographic method using dynamic LSB technique." International Journal of Advanced Research in Computer Science and Software Engineering, 7(2), 79-84. ISSN: 2277-128X.

Kunčický, R., Ličev, L., & Hendrych, J. (2017). Statistical analysis of steganalztical mothod for Steghide Detection. In 17th International Multidisciplinary Scientific Geoconference Sgem 2017 (pp. 611-616).

Leila, Benarous., Mohamed, Djoudi., & Ahmed, Bouridane. (2016). A comparatives study of steganography and steganalysis tools. Algerian Journal of Signals and Systems, 1(2), 92-98.

Lyu, S., & Farid, H. (2004). "Steganalysis using color wavelet statistics and one-class support vector machines." In Proceedings of the 2004 SPIE Electronic Imaging, pp. 35-46. ISBN: 978-0819453072.

Mirtcheva-Ivanova, D., Application of electronic platforms to increase the knowledge of learners. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 448-452, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8090.

Mirtcheva-Ivanova, D., Application of Artificial Intelligence in E-Learning. In Proceedings of the 15th International Scientific and Practical Conference, Environment. Technology. Resources. Rezekne, Latvia, Volume II, pp. 208-211, Print ISSN 1691-5402, Online ISSN 2256-070X, https://doi.org/10.17770/etr2024vol2.8053.

Nishimura, A. (2019). A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform. In Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings 17 (pp. 69-82). Springer International Publishing.

Oplatková, Z., Holoska, J., Zelinka, I., & Senkerik, R. (2009, May). Detection of steganography inserted by outguess and steghide by means of neural networks. In 2009 Third Asia International Conference on Modelling & Simulation (pp. 7-12). IEEE.

Pavlov, G., Kolev. Al., A place of GIS technologies in information Systems for crisis prevention, ICAICTSEE – 2016, December 2-3rd, 2016, UNWE, Sofia, Bulgaria, ISSN 2367-7635 (print), ISSN 2367-7643 (online), pp. 452-457.

Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). "Information hiding - a survey." Proceedings of the IEEE, 87(7), 1062-1078. ISSN: 0018-9219.

Provos, N., & Honeyman, P. (2003). "Hide and seek: An introduction to steganography." IEEE Security & Privacy, 1(3), 32-44. ISSN: 1540-7993.

Qureshi, M. A., Ahmed, S., Mehmood, A., Shaheen, R., & Dildar, M. S. (2024). Vulnerability assessment of operating systems in healthcare: exploitation implications techniques and security. Health Sciences Journal, 2(2), 104-111, ISSN (Online): 2959-2259, ISSN (Print): 2959-2240, https://doi.org/10.59365/hsj.2(2).2024.98.

Ru, X. M., Zhang, H. J., & Huang, X. (2005, August). Steganalysis of audio: Attacking the steghide. In 2005 International Conference on Machine Learning and Cybernetics (Vol. 7, pp. 3937-3942). IEEE.

Sahu, A., & Verma, A. (2019). "A novel approach for steganography in images using enhanced LSB technique." Journal of Discrete Mathematical Sciences and Cryptography, 22(1), 107-119. ISSN: 0972-0529.

Shaikh, S. A., & Patil, A. A. (2020). "Image Steganography: Advances and Future Research Challenges." In Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1477-1481. ISBN: 978-1728145868.

Twain, M. (2018). Section 10.1. Accuracy and Precision. Principles and Practice of Big Data: Preparing, Sharing, and Analyzing Complex Information, 207.

Tzschoppe, R., Dittmann, J., Fridrich, J., & Goljan, M. (2001). "Modeling the security of steganographic systems." In Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, pp. 16-29. ISBN: 978-0819440355.

Zhang, Z., & Xie, Y. (2021). "Steganography in Digital Images and Deep Learning-Based Detection Approaches: A Survey." IEEE Access, 9, 59582-59600. ISSN: 2169-3536.

Downloads

Published

12.11.2024

How to Cite

Boyanov, P. (2024). CONCEALING TEXT AND EXECUTABLE FILES IN JPG FORMAT FILES WITH A STEGANOGRAPHIC COMMAND-LINE TOOL IN THE OPERATING SYSTEM KALI LINUX: CONCEALING TEXT AND EXECUTABLE FILES IN JPG FORMAT FILES WITH A STEGANOGRAPHIC COMMAND-LINE TOOL IN THE OPERATING SYSTEM KALI LINUX. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 26(1), 50–66. https://doi.org/10.46687/jsar.v26i1.394

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8 9 > >>