Steganographic techniques

·

There are following Steganographic techniques:-

* Concealing messages within the lowest bits of noisy images or sound files.

* Concealing data within encrypted data. The data to be concealed is first
encrypted before being used to overwrite part of a much larger block of
encrypted data.

* Chaffing and winnowing is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel. The name is derived from agriculture: after grain has been harvested and threshed, it remains mixed together with inedible fibrous chaff. The chaff and grain are then separated by winnowing, and the chaff is discarded.

* Invisible ink is a substance used for writing, which is either invisible on application, or soon thereafter, and which later on can be made visible by some means. The use of invisible ink is a form of steganography, and has been used in espionage. Other uses may include anticounterfeiting, property marking, hand stamping for readmission, children's games, and marking for the purpose of identification in manufacturing.

* Null ciphers is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. It would today be regarded as a simple form of steganography. Null ciphers can also be used to hide ciphertext, as part of a more complex system.

* Concealed messages in tampered executable files, exploiting redundancy in the i386 instruction set

* Embedded pictures in video material (optionally played at slower or faster speed).

* A new steganographic technique involves injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications (telnet or remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data.

* Content-Aware Steganography hides information in the semantics a human user assigns a datagram; these systems offer security against a non-human adversary/warden.

* BPCS-Steganography - a very large embedding capacity steganography.

* Blog-Steganography. Messages are fractionalyzed and the (encrypted) pieces are added as comments of orphaned web-logs (or pin boards on social network platforms). In this case the selection of blogs is the symmetric key that sender and recipient are using. The carrier of the hidden message is the whole blogosphere.

About Me

Blog Archive