| .oO Phrack 49 Oo. | |
| Volume Seven, Issue Forty-Nine | |
| 10 of 16 | |
| A Steganography Implementation Improvement Proposal | |
| by: cjm1@concentric.net | |
| [ For those of you who do not know, steganography is cryptographic | |
| technique that simply hides messages inside of messages. The sender composes | |
| an innocuous message and then, using one of many tactics, injects the secret | |
| message into it. Some techniques involve: invisible inks, character | |
| distortion, handwriting differences, word/letter frequency doping, bit | |
| flipping, etc... The method the author discusses hinges upon a well known | |
| steganographic implementation, low-order bit flipping in graphic images. -d9 ] | |
| Steganography is a technique for hiding data in other data. The | |
| general method is to flip bits so that reading the low-order bit of each of | |
| 8-bytes gets one a character. This allows one to use a picture or a sound | |
| file and hide data, resulting in a small bit of hopefully unnoticeable noise | |
| in the data and a safely hidden cache of data that can later be extracted. | |
| This paper details a method for making steganographically hidden data more | |
| safe, by using pseudo-random dispersion. | |
| Ordinarily, if someone suspects that you have data hidden in, say, a | |
| GIF file, they can simply run the appropriate extractor and find the data. If | |
| the data is not encrypted, it will be plain for anyone to see. This can be | |
| ameliorated by using a simple password protection scheme, hiding the password | |
| in the GIF as a header, encrypting it first with itself. If someone does not | |
| know the password, they cannot extract the data. This is of course reasonably | |
| safe, depending on the encryption scheme used, and I recommend it. But, the | |
| hidden data can be made even safer. | |
| Pseudo-random dispersion works by hiding a password, and a seed for a | |
| random-number-generator in the encrypted header. then, a random number of bytes | |
| are passed by, before a low-order bit is flipped. | |
| To do this, one must first calculate how many bytes a bit can take up | |
| for itself. For instance, to hide an 800 character message in a GIF would | |
| mean each character needs 8 bytes (8 bits per character, 1 byte per low-order | |
| bit), so you need 6,400 bytes of data to hide the message in, 8 bytes per | |
| character. Let's say we have a GIF that is 10 times this size: 64,000 bytes. | |
| Thus we have 80 bytes per character to hide data in. Since each bit takes a | |
| byte, we have 10 bytes per bit to hide data in! Therefore, if we take a | |
| pseudo-random number between 1 and 10, and use that byte to hide our low-order | |
| bit in, we have achieved a message dispersed through the GIF in a pseudo-random | |
| fashion, much harder to extract. A message in which each byte has a bit which | |
| is significant to the steganographically hidden message can be extracted with | |
| ease relative to a message in which there are 10 possible bytes for each bit | |
| of each character. The later is exponentially harder to extract, given no | |
| esoteric knowledge. | |
| A slight improvement can be made to this algorithm. By re-calculating | |
| the number of available bytes left for each bit after each bit is hidden, the | |
| data is dispersed more evenly throughout the file, instead of being bunched up | |
| at the start, which would be a normal occurrence. If you use pseudo-random | |
| number generator, picking numbers from 0-9, over time, the values will smooth | |
| to 5. This will cause the hidden message to be clustered at the beginning | |
| of the GIF. By re-calculating each time the number of available bytes left | |
| we spread the data out throughout the file, with the added bonus that later | |
| bits will be further spread apart than earlier ones, resulting in possible | |
| search spaces of 20, 30, 100, or even 1,000 possible bytes per bit. This too | |
| serves to make the data much harder to extract. | |
| I recommend a header large enough for an 8 character ASCII password, | |
| an integral random-number seed, an integral version number, and an place | |
| holder left for future uses. The version number allows us to tweak the | |
| algorithm and still be able to be compatible with past versions of the | |
| program. The header should be encrypted and undispersed (ie: 1 byte per | |
| bit of data) since we haven't seeded the random-number generator yet for | |
| dispersion purposes. | |
| It is useful to make the extractor in such a way that it always | |
| extracts something, regardless of the password being correct or not. Doing | |
| this means that it is impossible to tell if you have guessed a correct password | |
| and gotten encrypted data out, or merely gotten out garbage that looks like | |
| encrypted data. Use of a password can also be made optional, so that none is | |
| necessary for extraction. A simple default password can be used in these | |
| cases. When hiding encrypted data, there is no difference to the naked | |
| eye between what is extracted and what is garbage, so no password is | |
| strictly necessary. This means no password has to be remembered, or | |
| transmitted to other parties. A third party cannot tell if a real password | |
| has been used or not. It is important for safety purposes to not hide the | |
| default password in the header if no password is used. Otherwise, a simple | |
| match can be made by anyone who knows the default password. | |