0% found this document useful (0 votes)
5 views8 pages

Attack SteganographyPartOne

Uploaded by

Shaiza Akhtar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Attack SteganographyPartOne

Uploaded by

Shaiza Akhtar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Military College of Signals, NUST

INFORMATION SECURITY
ASSIGNMENT

----------------------------------------------------------

Submitted to: Ma’am Anum Hassan


Group Members:
Yashfa Haroon
Shaiza Akhtar
Samraat Nadeem
Batch: BESE 27 C

--------------------------------------------------------------

DEPARTMENT OF COMPUTER SOFTWARE ENGINEERING


Military College of Signals
National University of Sciences and Technology
Alternate Data Streams: A Practical Steganography
Experiment

STEGANOGRAPHY:
The practice of hiding a secret message inside of something that is not secret to avoid detection.
Some examples of steganography involve embedding a secret piece of text inside of a picture, or in
other cases, audio files.

What is Alternate Data Streams(ADS)?


Alternate Data Streams allow hidden metadata or additional data (“steganography part one”) to
be appended to a file without affecting its size or functionality. ADS works only for NTFS file system in
Windows’s modern versions.

1) “Secret.txt” file: Contains our secret message.


2) “image.JPG” file: Contains the image in which our secret message will be hidden.

3) Place both files in the same folder:


4) Open command prompt(cmd): Type “cmd” in the highlighted Address bar.

5) Type in the following command: To hide the secret message in secret.txt into our
image.JPG file. “Hidden.txt” is the alternate hidden stream attached to “image.JPG” file.

6) Type in the “/r” command: To view all streams, including the hidden stream. There are
three streams visible here. The “image”, the “secret” file, and the “hidden” data stream.
7) Type in the “/r image.jpg” command: To view ADS attached to image.jpg file.
8) “image.JPG” file AFTER hiding secret message: Visually there is no change in
resolution or size of this image. Since the hidden data is stored as a separate stream in the file system.
Detecting Hidden Data
9) Type in the “more < image.jpg:hidden.txt” command: To view hidden
secret in “hidden.txt” alternate stream file.

You might also like