Steganography: The Art of Encrypting and Decrypting Information with Different Hiding Tools and Command Prompt

The concealing information within other non-secret data to hide its existence. It involves embedding secret messages or data within innocuous carriers, like images, audio files, or text. This hidden information is often encrypted to enhance security. Steganography focuses on maintaining the secrecy of the communication. The efficiency of two steganography tools Shusssh and SteganographX Plus freely available on internet. Different file format of images (JPEG, JPG and BMP) were analysed by Windows-based Command Prompt Utility and two different steganography tools (Shusssh! and SteganographX Plus).


Introduction
The term "covered writing" (steganography) is derived from the Greek terms "stegos," which means "cover," and "grafia," which means "writing".Information is only concealed in images with image steganography.Steganography is a type of anti-forensic technology that is used to hide sensitive information behind a cover medium.Steganography, which is the process of hiding tiny multimedia data in much larger multimedia data, such as an image, text, file, or video, can be defined.A method of hiding a picture inside another image is called image steganography.While using picture steganography, the cover image is modified so that the hidden information is not apparent, making it less suspect than when using cryptography.On the other hand, Steganalysis is used to find any hidden data that has been covered up by an image and to extract any hidden messages that may be present (Sumathi et al, 2013).

Steganography Mediums
There are many kinds of Steganography techniques available based on the type of thing that has to be secured.

Text Steganography
In this technique, for information hiding, capital letters, white spaces, the number of tabs, and many others are used.By using an embedding algorithm to create a stego-text, a secret message (or embedded data) will be hidden in a cover text.The stego text will subsequently be sent to a receiver via a communication channel, such as the Internet or a mobile device.The receiver must apply a recovery method that is parameterized by a stego-key to extract the secret message in order to recover the secret that was sent by the sender.To prevent unauthorized parties from discovering and/or recovering the embedded data, the hiding process is controlled by a stego-key (Por, 2008).

Image Steganography
The technique of hiding a picture inside another image is called image steganography.When using picture steganography, the cover image is modified so that the hidden information is not visible (Sindhu, 2020).

Video Steganography
Video steganography uses digital video formats to conceal all kinds of information.The discrete cosine transform (DCT) adjusts the value (for instance, from 7.667 to 8), which is undetectable to the human eye, in this method for concealing information in video image frames.Video steganography uses Mp4, AVI, etc. as its video formats.Most effective methods for blending data into images and audio are also applicable to video media because video files typically contain both images and sounds.When using video steganography, the sender uses a video sequence as the cover media to deliver the secret message to the recipient.In order to create a "stego-video," the optional secret key "K" can also be used when embedding the secret message into the cover media.Following that, the receiver receives the stego-video over a public channel.The secret message is extracted from the stego-object at the receiving end using the extracting algorithm and the secret key (Deshmukh and Rahangdale, 2014).

Audio Steganography
Voice Over Internet Protocol (VOIP) demand made audio steganography one of the most important mediums.Since audio is used to conceal information in this method, the term "audio steganography" has been coined.Digital audio formats like WAVE, MPEG, and others are used for audio steganography (Sindhu and Singh, 2020).

Network Steganography
These protocols are used as the carrier in this technique's cover object selection, which includes network protocols like UDP, ICMP, and others.Nowadays, almost everyone communicates online.Whether it be

Materials and Methodology
In the present study total 3 image sample belonging 3 different file formats (JPEG, JPG and BMP) were analysed by using two different steganography tools (Shusssh!and SteganographX Plus) and Command Prompt based on windows was used as.The message "My Name Is Pushpendra Saini" in the format of text was used as encryption in different image file.SteganographX Plus tool offer password protection feature to encrypt and decrypt during steganography.The encryption key "123456789" was used during analysis on SteganographX Plus tool.Shusssh! is a simple tool to hide a message inside any picture.Simply select "Encrypt Text" and load an image by clicking the "Load Image" button.Type your message in the "Insert Message:" text area and click Proceed button to save the image with a hidden message on the desired location.And for the decrypting text from the encrypted image; select "Decrypt Text" load the image and click Proceed button to view the hidden message.

Fig.3 SteganographX Plus Tool
Command Prompt is windows-based platform where any data in all formats can be hidden in any data (image, audio, video, etc.).But the data to be hidden must be compressed into a zip document.A txt extension file can be hidden in a video or audio file without zipping the text file and the secret txt file can be accessed by opening the video or audio file using a notepad (any text editor).

Results
The result of the present study has been summarised in the form of table 3- Whatsapp, email, video calls, or voice calls, all communication takes place over networks.P2P, TCP/IP, HTTP, and other protocols are all useful, but the best feature of network steganography is that it allows us to use any network protocol to transmit messages by hiding them in headers, packets, etc (Singh et al, 2017).

5 .
The result of the image encrypted by Shusssh!Tool, SteganographX Plus and Command Prompt shows difference in the size while other parameters remain same.