Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Steganography Techniques

29

Flashcards

0/29

Still learning
StarStarStarStar

Mimic Functions

StarStarStarStar

Mimic functions make data mimic other kinds of data, such as formatting a secret message to look like regular HTTP traffic to prevent detection by network monitors.

StarStarStarStar

Header Manipulation Steganography

StarStarStarStar

Header manipulation steganography hides messages within the header information of data packets or files. Extra information can be added to packet headers or file headers without altering the actual data.

StarStarStarStar

Spread Spectrum Technique

StarStarStarStar

Spread spectrum steganography spreads the secret message across the frequency spectrum. This method makes the message less detectable by spreading it thinly.

StarStarStarStar

Van Eck Phreaking

StarStarStarStar

Van Eck phreaking is a form of eavesdropping where electromagnetic emissions of a compute device are captured to reconstruct data. It's an unintentional form of data leakage rather than an active steganography method.

StarStarStarStar

Steganographic File Systems

StarStarStarStar

A steganographic file system is a data storage system that is designed to be undetectable. Files are hidden within other files, making them appear as noise or unallocated disk space.

StarStarStarStar

Subliminal Channels

StarStarStarStar

Subliminal channels in cryptography enable hidden messages to be communicated within a secure communication channel without the knowledge of the channel's interceptor.

StarStarStarStar

Transient Steganography

StarStarStarStar

Transient steganography involves hiding a message in transient states that exist temporarily during the execution of a digital process or communication.

StarStarStarStar

Algorithms and Transformation Techniques

StarStarStarStar

This involves using mathematical algorithms, like Discrete Cosine Transform (DCT), to hide information in the transformed coefficients of a file's data.

StarStarStarStar

Image Metadata

StarStarStarStar

Image metadata steganography hides information in the metadata of an image file, such as in EXIF data. This can include camera settings, timestamps, or locations, to which additional information can be appended.

StarStarStarStar

Parity Coding

StarStarStarStar

Parity coding hides information by adjusting the parity of selected portions of data, such as the parity bit of a network packet or a group of pixels in an image, to match the hidden bits.

StarStarStarStar

Audio Steganography

StarStarStarStar

Audio steganography hides information within sounds. Techniques include LSB coding in audio signals, phase coding, and spread spectrum.

StarStarStarStar

Video Steganography

StarStarStarStar

Video steganography hides data within video files. Techniques can be used from image steganography for each frame, or the concealment can occur in the motion vectors or other components of the video stream.

StarStarStarStar

Quick Response (QR) Codes Steganography

StarStarStarStar

QR codes steganography involves embedding data within the QR code without disrupting its readability by a QR scanner. This can be done by manipulating contrast or embedding in error correction spaces.

StarStarStarStar

Echo Data Hiding

StarStarStarStar

In echo data hiding, information is embedded in an audio file by introducing an echo into the discrete signal. The delay and amplitude of the echo can encode data.

StarStarStarStar

Chaffing and Winnowing

StarStarStarStar

Chaffing and winnowing are methods of sending a message along with a large number of decoy packets. The receiver can distinguish between message and decoy packets using a shared secret.

StarStarStarStar

Text Steganography

StarStarStarStar

Text steganography hides information within text by manipulating various attributes of the text, such as altering character encoding, whitespace usage, or using synonyms.

StarStarStarStar

Digital Watermarking

StarStarStarStar

Digital watermarking involves embedding information into a digital signal in a way that is difficult to remove. This is often used for copyright protection and content authentication.

StarStarStarStar

Cryptography with Steganography

StarStarStarStar

Combining cryptography with steganography adds an additional layer of secrecy by not only hiding the message but also encrypting it. Thus, even if the steganography is compromised, deciphering the content remains hard.

StarStarStarStar

Masking and Filtering

StarStarStarStar

Masking and filtering are techniques used in image steganography that hide information by marking an image in a way similar to watermarks on actual paper. These are more robust to compression than LSB.

StarStarStarStar

LSB (Least Significant Bit) Steganography

StarStarStarStar

LSB steganography involves hiding information by replacing the least significant bit of each pixel in an image with a bit of the secret message. This technique is hard to detect because the change is minimal.

StarStarStarStar

Palette-Based Steganography

StarStarStarStar

Palette-based steganography works by modifying the color palette of an image. The secret message alters the order of colors in the palette, which is then used to color the image.

StarStarStarStar

Redundancy-Based Methods

StarStarStarStar

Redundancy-based methods hide messages in redundant data of a medium. For instance, in digital images, this could be adding a concealed message within the noise.

StarStarStarStar

NULL Cipher

StarStarStarStar

NULL cipher is a form of steganography where the plaintext is hidden as every nth letter or word in an otherwise innocuous text. It's a very simple and easily decrypted method.

StarStarStarStar

Perturbed Quantization

StarStarStarStar

Perturbed quantization steganography involves slightly altering the quantization process of media encoding to embed secret messages within the quantized data stream.

StarStarStarStar

Thermal Imaging Steganography

StarStarStarStar

Thermal imaging steganography hides messages in thermal images. Variations in heat patterns can encode data without being visible to the naked eye.

StarStarStarStar

Content-Aware Steganography

StarStarStarStar

Content-aware steganography involves analyzing the multimedia container's elements and injecting the steganographic content in a way that does not cause noticeable alterations.

StarStarStarStar

End-to-End Encryption with Steganography

StarStarStarStar

End-to-end encryption with steganography involves encrypting messages between two communicating parties in such a way that only the communicating users can read the messages, with the added obfuscation of steganography.

StarStarStarStar

Steganography in Cybersecurity

StarStarStarStar

Steganography is used in cybersecurity for covert communication. It safeguards data by hiding its existence, thereby providing another layer of security in conjunction with encryption.

StarStarStarStar

Document Steganography

StarStarStarStar

Document steganography conceals a secret message within a document by manipulating its structure or formatting. Examples include altering font sizes, margins, or the positioning of elements.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.