scholarly journals Stegarmory: Offensive Cyber Security Software for Embedding Shellcode in Images

Author(s):  
Mark R. Hedrick ◽  
Justin Holman

Abstract The paper introduces StegArmory, a new open source software package with practical applications for offensive cyber security operators. StegArmory uses steganography techniques to embed machine code, or shellcode, in images. Shellcode is typically flagged as malicious by antivirus software due to the payloads they often contain, but detection becomes more difficult when shellcode is embedded in a common image file. Using steganography to embed shellcode within portable network graphic (PNG) images, StegArmory provides a new way to avoid detection of potentially malicious payloads while ensuring reliable transmission. In this paper, the StegArmory software development process is described, performance benchmarks are established and detection metrics are measured using sample cover images. Two image-based steganography techniques are utilized, least significant bit (LSB) and pixel value differencing (PVD). Test results indicate the software effectively produces PNG image files, using both LSBand PVD approaches, with embedded shellcode capable of avoiding malicious payload detection. The LSB method is faster but the PVD method handles larger payloads and image modifications are more difficult to detect.

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Gandharba Swain

The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives higher capacity and lesser distortion. However, there are three issues to be taken into account: (i) fall off boundary problem (FOBP), (ii) pixel difference histogram (PDH) analysis, and (iii) RS analysis. This paper proposes a steganography technique in two variants using combination of modified LSB substitution and PVD by taking care of these three issues. The first variant operates on 2 × 3 pixel blocks and the second technique operates on 3 × 3 pixel blocks. In one of the pixels of a block, embedding is performed using modified LSB substitution. Based on the new value of this pixel, difference values with other neighboring pixels are calculated. Using these differences, PVD approach is applied. The edges in multiple directions are exploited, so PDH analysis cannot detect this steganography. The LSB substitution is performed in only one pixel of the block, so RS analysis also cannot detect this steganography. To address the FOBP, suitable equations are used during embedding procedure. The experimental results such as bit rate and distortion measure are satisfactory.


2021 ◽  
Author(s):  
Wen-Bin Lin ◽  
Tai-Hung Lai ◽  
Ko-Chin Chang

Abstract The security and embedding capacity of pixel-value differencing (PVD) steganography is superior to that of least significant bit replacement steganography. Several studies have proposed extended PVD steganography methods that use the original concept of PVD steganography. The majority of the studies have verified their security against regular-singular detection analysis or pixel difference histogram attacks. Weighted stego image steganalysis is the state-of-the-art technology for PVD steganography. This study proposed a suitable parameter for the estimator based on different relative embedding ratios and the size of normal embedding blocks. The experimental results revealed that the proposed technology does not require advance knowledge of the original image. In addition, the proposed method is accurate and precise at any embedding ratio. In the future, this method may be utilized to analyze the security of extended PVD steganography.


Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain

<p>There has been a tremendous growth in Information and Communication technologies during the last decade. Internet has become the dominant media for data communication. But the secrecy of the data is to be taken care. Steganography is a technique for achieving secrecy for the data communicated in Internet. This paper presents a review of the steganography techniques based on least significant bit (LSB) substitution and pixel value differencing (PVD). The various techniques proposed in the literature are discussed and possible comparison is done along with their respective merits. The comparison parameters considered are, (i) hiding capacity, (ii) distortion measure, (iii) security, and (iv) computational complexity.</p>


2018 ◽  
Vol 7 (3.27) ◽  
pp. 488
Author(s):  
D Saravanan ◽  
N Sivaprasad ◽  
Dennis Joseph

The least-significant-bit based approach is a popular type of stenographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover audio mainly depends on a pseudorandom number generator without considering the relationship between the audio content itself and the size of the secret message. In this paper, we expand the least significant bit matching revisited audio stegnography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover audio. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. New scheme can enhance the security significantly compared with typical least significant bit-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stegno audios at the same time.  


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Gandharba Swain

The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditional pixel value differencing (PVD) approaches are detected by pixel difference histogram (PDH) analysis. The PVD steganography can escape from PDH analysis by using the edges in multiple directions. This paper proposes a steganography technique by exploiting the edges in eight directions and also using LSB substitution to resist from both RS analysis and PDH analysis. For every 3×3 pixel block the central pixel is embedded with 3 or 4 bits of data by modified LSB substitution technique. Then this new value of the central pixel is utilized to calculate eight difference values with eight neighboring pixels. These eight difference values are used to hide the data. There are two types with regard to two different range tables. Type 1 uses 3 bit modified LSB substitution and range table 1. Type 2 uses 4 bit modified LSB substitution and range table 2. Type 1 and type 2 are also known as variant 1 and variant 2, respectively. Type 1 possesses higher PSNR and type 2 possesses higher hiding capacity.


2021 ◽  
Vol 8 (9) ◽  
pp. 373-377
Author(s):  
Alade Oluwaseun. Modupe ◽  
Amusan Elizabeth Adedoyin ◽  
Adedeji Oluyinka Titilayo

Steganography is the art and science of hiding information by embedding data into cover media. Numerous techniques are designed to provide the security for the communication of data over the Internet. A good steganographic algorithm is recognized by the performance of the techniques measured with the support of the performance metrics among which are PSNR, MSE, SSIM, robustness and capacity to hide the information in the cover image. In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. Three different cover images was used to hide secret message. A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index (SSIM) as performance metrics. LSB technique gives higher PSNR and SSIM values than MSB and PVD method with lower MSE than the other two techniques. Future research can be geared towards investigating the embedding capacity, security, and computational complexity of each technique. Keywords: Least Significant Bit (LSB), Most Significant Bit (MSB), Pixel value differencing (PVD), PSNR, SSIM and MSE,


Sign in / Sign up

Export Citation Format

Share Document