2. What is Steganography?
Steganography is the technique of hiding secret data within an ordinary,
non-secret, file or message in order to avoid detection; the secret data is
then extracted at its destination.
The use of steganography can be combined with encryption as an extra
step for hiding or protecting data.
The word steganography is derived from the Greek words steganos
(meaning hidden or covered) and the Greek root graph (meaning to
write).
3. Steganography techniques
In modern digital steganography, data is first encrypted or obfuscated in some other way and
then inserted, using a special algorithm, into data that is part of a particular file format such as a
JPEG image, audio or video file. The secret message can be embedded into ordinary data files in
many different ways.
One technique is to hide data in bits that represent the same color pixels repeated in a row in an
image file. By applying the encrypted data to this redundant data in some inconspicuous way, the
result will be an image file that appears identical to the original image but that has "noise"
patterns of regular, unencrypted data.
4. Text
By using text or sending a normal message but
some sentence structure in advance, fills in the
empty location by arranged words or hides the
information in the manner of text overwriting and
words
5. Audio
Using DeepSound to add secret files to the
audio file so that the receiver will only know that
they need to extract the secret files and nobody
will notice about the file.
6. Images
By using https://futureboy.us/stegano/ hiding
message in a photo makes it visible to people
so that it looks normal but its already make it
into stego image, only receiver knows that they
have to decrypt the secret data
8. Steps of Crime
Identities. The identities of communicating parties are hidden by anonymization
techniques.
Communication. The fact that a communication is taking place is hidden by
steganography techniques. The characteristics of a network conversation (for example,
a packet flow) can be concealed using traffic-type obfuscation methods.
Content. Hiding the content of data but not the transmission or presence of the data
itself is achieved by applying cryptographic algorithms.
Code. The structure of (executable) code is hidden by (binary) code obfuscation and
masquerading techniques.