If there’s one thing that history and popular culture has taught us about spies and secrets, it’s that often, the best hiding spot is the one in plain sight. After all, if an intruder is searching for valuable information, surely the last place he would check is right under his own nose, right?
A Little Get to Know
This logic forms the basis for steganography, itself an ancient historical practice of concealing information within images. This practice differs greatly in purpose from cryptography. The latter employs code to hide a message, this appears as jumbled letters and numbers, unless a cipher(or key) was used to decrypt the information back into its readable state. However, while cryptography is a great for sending messages securely across unsafe channels, the very nature of the encrypted message will tip-off anyone is its true form. In short, just because its hard to break into, doesn’t mean you want to leave it in plain sight. What if sending encrypting messages itself is against the law?
This is where steganography comes in. Using basic freeware tools like OpenPuff, It is possible to hide audio files, videos, messages and images within a file (usually an image).
Now comes the Action : Hide
You can download OpenPuff from here. After downloading and installing OpenPuff you’ll see two primary options for steganography: Hide and Unhide.
Select Hide, and you will be taken to a menu divided into four steps.
- The first step entails entering up to three different passwords to secure your data. You can choose to enter only one password as well, if keeping up with them all becomes tough.
- Then you will have to select your target file that you’ll be transferring.Use the Browse button, and select the target to see its overall size in a bar below the name.
- In this third step, you will have to choose a carrier. Keep in mind that the carrier can’t be smaller that the target (it may become suspicious).
You can attach multiple carrier bits if one file isn’t big enough. Hit the Add Button to navigate to files designated as the carrier space is greater, the red status bar will turn green.
The Bit Selection Option allows you to properly encode the carrier’s size until it matches with the target. Keep in mind that some formats would be better suited than others. OpenPuff will alert you if the file type isn’t supported for being a carrier.
After Bit Selection, hit “Hide Data” and a new file will be created. On the outside, the carrier will look like a normal image file.
Navigate to the Unhide option in the main menu and proceed to enter all the relevant details used for encrypting the file. Ensure that the passwords and bit Selection option are exactly the same as those used before, or else the file won’t open. Select your carrier file then, hit “Unhide” and Bam!! The target is now revealed.
You can also choose to fool any attackers by using the “Add Decoy” option. Simply head over the Hide menu, and after the previous four steps, select “Add Decoy”. You can add a file, just like when adding the target, and set multiple passwords for it. When you’re done, hit “Hide Data”.
Selecting the SetMark option, and adding a mark to a specified carrier can add watermarks. Similarly, CheckMark allows you to verify the watermark by selecting the carrier in question. You can also use CleanUp to remove a watermark from an image.
In the End
Steganography has its disadvantages and controversies but when used effectively, it becomes an invaluable tool for covert transmissions. Not to mention those times when you just want to claim right to your work.