- "Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection."
The practice of concealing a message, image or file within another message, image or file.
Cryptography: The study of techniques for secure communication in the presence of adversaries.
Information theory: The mathematical study of communication systems and the amount of information that can be transmitted.
Digital image processing: The manipulation of digital images to hide or embed messages or other data.
Binary encoding: The representation of letters, symbols or pictures in binary code to conceal data.
Data hiding techniques: The various strategies used to conceal data in digital media such as images, audio or videos.
Watermarking: The process of embedding information into digital media for identification or copyright purposes.
LSB steganography: The method of hiding information within the least significant bits of a digital image or audio file.
Password protection and encryption: The use of passwords and encryption to protect sensitive information.
Steganalysis: The techniques used to detect the presence of hidden data or messages.
Embedding in social media: The use of social media platforms like Twitter, Instagram or Facebook to hide messages in plain sight.
Image Steganography: Hiding data within image files by modifying the pixels.
Audio Steganography: Hiding data within audio files by modifying the sound spectrum.
Video Steganography: Hiding data within video files by altering frames or modifying the soundtrack.
Text Steganography: Hiding data within text by using symbols or characters that don't affect the meaning.
Morse Code Steganography: Hiding data within Morse code by using subtle modifications to the rhythm or timing.
Binary Steganography: Hiding data within binary code by changing bits in a way that doesn't affect the program's functionality.
Digital Watermarking: Embedding invisible codes within digital images that can be used to track ownership or authenticity.
Microdot Steganography: Hiding data within printed text by using dots so small they are invisible to the naked eye.
Covert Channels: Using seemingly legitimate communication channels (such as HTTP) to transmit hidden information.
Invisible Ink Steganography: Hiding data within plain sight by writing in invisible ink, which can only be revealed by certain methods.
- "The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning 'covered or concealed', and -graphia (γραφή) meaning 'writing'."
- "The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic."
- "Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text."
- "The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny."
- "Some implementations of steganography that lack a formal shared secret are forms of security through obscurity, while key-dependent steganographic schemes try to adhere to Kerckhoffs's principle."
- "Media files are ideal for steganographic transmission because of their large size."
- "For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet."
- "The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change."
- "In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video."
- "Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal."
- "Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing both the fact that a secret message is being sent and its contents."
- "In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program, or protocol."
- "Media files are ideal for steganographic transmission because of their large size."
- "The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change."
- "The hidden messages appear to be (or to be part of) something else."
- "Some implementations of steganography that lack a formal shared secret are forms of security through obscurity, while key-dependent steganographic schemes try to adhere to Kerckhoffs's principle."
- "Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing both the fact that a secret message is being sent and its contents."
- "For example, the hidden message may be in invisible ink between the visible lines of a private letter."
- "The intended secret message does not attract attention to itself as an object of scrutiny."