Steganography Documentation

What is steganography?

Steganography is the technique of embedding secret information within an ordinary object, such as an image or audio file, ensuring the hidden message remains undetectable to those unaware of its presence. For instance, a message can be concealed within the pixels of an image or the sound waves of an audio file. This wallet further employs advanced algorithms to make extracting concealed information computationally infeasible for unauthorized parties.

Once the hidden file reaches its destination, the secret data can be extracted using specialized tools or techniques. To enhance security, steganography is often combined with encryption, where the hidden message is encrypted before embedding. This combination makes the concealed information both harder to detect and more secure.

How It Works
Steganography works by concealing information in a way that avoids suspicion. One of the most common techniques is known as ‘Least Significant Bit’ (LSB) steganography, which embeds secret information in the least significant bits of a media file. 
We use images as the digital medium to hide the message. Each pixel typically comprises three bytes, representing the red, green, and blue color channels (RGB). LSB steganography works by modifying the last bit of each byte to encode the hidden data. Altering the last bit of a pixel value results in a small change that is invisible to the human eye, meaning the original and modified images look identical to anyone viewing them.
Most public steganography libraries are vulnerable to reverse-engineering tools that exploit predictable embedding patterns, such as sequential RGB and single-channel methods (e.g., B-only or R-only). Our solution addresses these weaknesses by employing pseudo-random placement to embed data bit-by-bit into an image, ensuring an unpredictable distribution of the hidden message. Furthermore, we introduce a frequency obfuscation technique that overwrites the entire LSB of the image’s RGB, B-only, or R-only pixels with random noise. This, combined with the pseudo-random placement of the message, adds a layer of security, making detection significantly more challenging.

Workflow of the Steganography Process

The detail of the embedding algorithm
  1. Message Preparation:

    1. A user selects a message to embed within an image.

    2. The user decides whether to encrypt the message before embedding.

  2. Determining the Embedding Strategy:

    1. The application determines the most suitable hiding method based on the data size and the image’s capacity. This can involve using all RGB channels or selectively choosing specific channels like R, G, or B.

    2. The user chooses between two embedding modes: sequential or pseudo-random.

      1. Sequential mode: The message is stored sequentially in each pixel, following a straightforward and linear pattern.

      2. Pseudo-random mode: The message is embedded at random pixel locations, guided by the output of an HMAC function. This method is designed to enhance security by obfuscating the bit locations, making it more difficult to detect or extract the data.

  3. Encryption for Enhanced Security

    1. The user selects an encryption mode to add a layer of security.

    2. The application derives the encryption key from the user’s seed phrase, which the user is responsible for storing and backing up.

    3. At the destination, the receiver must use the corresponding decryption key to retrieve the hidden message.

  4. Secure key management via MPC (Multi-Party Computation) mode

    1. In MPC mode, the mobile device and the cloud hold shares of the master encryption key, which derives from the user's seed phrase. 

    2. For encryption:

      1. The cloud computes partial encryption using its key share and sends the result to the mobile device.

      2. The mobile device combines this with its own share to construct the full encryption key and finalize encryption.

    3. The master key is never fully rebuilt, ensuring maximum security.

  5. Embedded the message into the image

Security features
Encryption:
  • The message is encrypted before embedding to ensure its confidentiality.

  • A unique encryption key is derived from the user’s seed phrase, which serves as the root for secure key management.

    • Why it is secure:

      • Ensures that the hidden message cannot be accessed without the correct decryption key.

      • Even if the steganographic embedding is detected, the encrypted message remains unintelligible to unauthorized users.

Pseudo-random placement:
  • The embedding locations are determined using a cryptographically secure HMAC function.

  • Data is embedded bit-by-bit at random pixel locations, avoiding sequential or predictable patterns.

    • Why it is secure:

      • Prevents detection by obfuscating embedding patterns, making it resistant to steganalysis techniques that rely on spatial or statistical analyses.

      • The randomness ensures unpredictability in data placement, thwarting reverse engineering tools.

Frequency Obfuscation:
  • Random noise is added to the LSBs of non-embedded pixels.

  • This creates a uniformly altered image, masking the presence of hidden data.

    • Why it is secure:

      • Masks embed locations by adding random noise to unused pixels, creating a uniformly modified image.

      • This makes it nearly impossible for attackers to distinguish between regions with hidden data and regions with noise.

Secure Key Management via MPC
  • The master encryption key is split into shares held by the mobile device and the cloud.

  • The cloud performs partial encryption using its share, and the mobile device finalizes encryption with its own share.

  • The master key is never fully constructed, ensuring it remains secure.

    • Why it is secure:

      • The master encryption key is securely managed by splitting it into shares, preventing any single entity from accessing the full key.

      • Even if one share is compromised, the complete encryption key remains secure.

      • The master key is never rebuilt, eliminating a critical attack vector.

mosu.meme

Stay in the loop on

Website Disclaimers

By using this website or interacting with $Mosu, you acknowledge that you have read, understood, and agree to these disclaimers.

Last updated: December 3, 2024

mosu.meme

Stay in the loop on

Website Disclaimers

By using this website or interacting with $Mosu, you acknowledge that you have read, understood, and agree to these disclaimers.

Last updated: December 3, 2024

mosu.meme

Stay in the loop on

Website Disclaimers

By using this website or interacting with $Mosu, you acknowledge that you have read, understood, and agree to these disclaimers.

Last updated: December 3, 2024