Explore tens of thousands of sets crafted by our community.
Steganography Techniques
29
Flashcards
0/29
Mimic Functions
Mimic functions make data mimic other kinds of data, such as formatting a secret message to look like regular HTTP traffic to prevent detection by network monitors.
Header Manipulation Steganography
Header manipulation steganography hides messages within the header information of data packets or files. Extra information can be added to packet headers or file headers without altering the actual data.
Spread Spectrum Technique
Spread spectrum steganography spreads the secret message across the frequency spectrum. This method makes the message less detectable by spreading it thinly.
Van Eck Phreaking
Van Eck phreaking is a form of eavesdropping where electromagnetic emissions of a compute device are captured to reconstruct data. It's an unintentional form of data leakage rather than an active steganography method.
Steganographic File Systems
A steganographic file system is a data storage system that is designed to be undetectable. Files are hidden within other files, making them appear as noise or unallocated disk space.
Subliminal Channels
Subliminal channels in cryptography enable hidden messages to be communicated within a secure communication channel without the knowledge of the channel's interceptor.
Transient Steganography
Transient steganography involves hiding a message in transient states that exist temporarily during the execution of a digital process or communication.
Algorithms and Transformation Techniques
This involves using mathematical algorithms, like Discrete Cosine Transform (DCT), to hide information in the transformed coefficients of a file's data.
Image Metadata
Image metadata steganography hides information in the metadata of an image file, such as in EXIF data. This can include camera settings, timestamps, or locations, to which additional information can be appended.
Parity Coding
Parity coding hides information by adjusting the parity of selected portions of data, such as the parity bit of a network packet or a group of pixels in an image, to match the hidden bits.
Audio Steganography
Audio steganography hides information within sounds. Techniques include LSB coding in audio signals, phase coding, and spread spectrum.
Video Steganography
Video steganography hides data within video files. Techniques can be used from image steganography for each frame, or the concealment can occur in the motion vectors or other components of the video stream.
Quick Response (QR) Codes Steganography
QR codes steganography involves embedding data within the QR code without disrupting its readability by a QR scanner. This can be done by manipulating contrast or embedding in error correction spaces.
Echo Data Hiding
In echo data hiding, information is embedded in an audio file by introducing an echo into the discrete signal. The delay and amplitude of the echo can encode data.
Chaffing and Winnowing
Chaffing and winnowing are methods of sending a message along with a large number of decoy packets. The receiver can distinguish between message and decoy packets using a shared secret.
Text Steganography
Text steganography hides information within text by manipulating various attributes of the text, such as altering character encoding, whitespace usage, or using synonyms.
Digital Watermarking
Digital watermarking involves embedding information into a digital signal in a way that is difficult to remove. This is often used for copyright protection and content authentication.
Cryptography with Steganography
Combining cryptography with steganography adds an additional layer of secrecy by not only hiding the message but also encrypting it. Thus, even if the steganography is compromised, deciphering the content remains hard.
Masking and Filtering
Masking and filtering are techniques used in image steganography that hide information by marking an image in a way similar to watermarks on actual paper. These are more robust to compression than LSB.
LSB (Least Significant Bit) Steganography
LSB steganography involves hiding information by replacing the least significant bit of each pixel in an image with a bit of the secret message. This technique is hard to detect because the change is minimal.
Palette-Based Steganography
Palette-based steganography works by modifying the color palette of an image. The secret message alters the order of colors in the palette, which is then used to color the image.
Redundancy-Based Methods
Redundancy-based methods hide messages in redundant data of a medium. For instance, in digital images, this could be adding a concealed message within the noise.
NULL Cipher
NULL cipher is a form of steganography where the plaintext is hidden as every nth letter or word in an otherwise innocuous text. It's a very simple and easily decrypted method.
Perturbed Quantization
Perturbed quantization steganography involves slightly altering the quantization process of media encoding to embed secret messages within the quantized data stream.
Thermal Imaging Steganography
Thermal imaging steganography hides messages in thermal images. Variations in heat patterns can encode data without being visible to the naked eye.
Content-Aware Steganography
Content-aware steganography involves analyzing the multimedia container's elements and injecting the steganographic content in a way that does not cause noticeable alterations.
End-to-End Encryption with Steganography
End-to-end encryption with steganography involves encrypting messages between two communicating parties in such a way that only the communicating users can read the messages, with the added obfuscation of steganography.
Steganography in Cybersecurity
Steganography is used in cybersecurity for covert communication. It safeguards data by hiding its existence, thereby providing another layer of security in conjunction with encryption.
Document Steganography
Document steganography conceals a secret message within a document by manipulating its structure or formatting. Examples include altering font sizes, margins, or the positioning of elements.
© Hypatia.Tech. 2024 All rights reserved.