Questions tagged [steganography]

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. While cryptography protects the contents of a communication, steganography aims to prevent others from learning that a communication even occurred.

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. While cryptography protects the contents of a communication, steganography aims to prevent others from learning that a communication even occurred. The word steganography itself is of Greek origin and means "concealed writing" from the Greek words steganos (στεγανός) meaning "covered or protected", and graphei (γραφή) meaning "writing".

97 questions
19
votes
1 answer

What systems of robust steganography are out there?

By robust, I mean resistant to common image transforms (reversal, crop a non-multiple of 8 pixels off and recompress, blur, solarize to 64 levels, then interpolate, and sharpen, change compression levels, optimize for download, scale... Suppose…
17
votes
4 answers

Why doesn't steganography increase the size of an uncompressed image?

So I have this question. I downloaded a .BMP off google due to .BMPs being not compressed. Just a 1024x768 .BMP image which its size os of 2.25Mb. I put the image in a steganography application.. inserted hidden text within it, encrypted and…
Matthew Goodlip
  • 199
  • 1
  • 3
  • 5
13
votes
7 answers

Any efficient text-based steganographic schemes?

Sophisticated and efficient steganographic schemes with images as cover are available. However, I wonder: are there any that use texts as cover instead? If one could only transfer a few printable natural language texts due to constraints, using…
Mok-Kong Shen
  • 1,302
  • 1
  • 11
  • 15
12
votes
2 answers

Why did Histiaeus tattoo his slave's head?

The story is often told that Histiaeus tattooed a secret message on his slave's head, waited for his hair to grow back, then sent him off to Miletus. Why would he have done this? The story is usually cited as an early historical example of…
TypeIA
  • 231
  • 2
  • 8
10
votes
2 answers

Perfect Steganography

History contain many example of old steganography. We also have digital steganography. Is there any kind of “Perfect Steganography”, in a sense that only the designer can extract the concealed message? Update Is there a (formal?) definition of…
kelalaka
  • 49,797
  • 12
  • 123
  • 211
8
votes
2 answers

Determine whether bit sequence is hash?

I would like to know whether it is possible to determine whether a value of for example 256 bit length is a SHA-256 hash or a random, equally distributed value. Is there any research related to common hash functions? Can this property be derived…
8
votes
2 answers

Maximum steganographic embedding rate not detectable by steganalysis?

When using advanced steganographic methods (like F5) what is the approximate maximum embedding rate when advanced Steganalysis (like a machine learning approach) can no longer reliably detect it? I have searched for papers dealing with this topic…
7
votes
2 answers

How secure is it to use password as AES key?

I am developing a steganography app where user encrypt any file into an audio file. The user can enter a password to protect the hidden data. The same password is converted as a 256 bit key and the hidden data is encrypted using AES. I was…
Gerard Jean
  • 71
  • 1
  • 2
5
votes
2 answers

Steganography in speech by adding extra "filler" syllables

PREAMBLE About 20 years ago, when reading a novel (set in late 1800) by some classic Russian writer I came across very curious example of steganography. The two main characters were peasants who got lost in the woods. Suddenly they come across wood…
Dimitry K
  • 153
  • 4
5
votes
1 answer

Binary format of encrypted PGP private key?

Short Version of the Question: I would like to remove any predictable information from an encrypted private keys binary representation. Does anyone have a hint where the binary format for encrypted GnuPG private keys (.gpg) is documented? Longer…
5
votes
5 answers

How to disguise ciphertext

If I want to have a secret conversation, then I can encrypt it (with OTR etc). However, since big brother watches all communication, sending encrypted data will likely raise flags. Does anyone know of an algorithm to take ciphertext and convert it…
John Henckel
  • 161
  • 7
5
votes
3 answers

Digital identification using steganography, can it be broken?

Digital identification using steganography, can it be broken? I have read a few articles saying that using an I.D. embedded in video, audio, etc can help track down the origin of a copyright violation. OK, then they said it can't be broken, so I got…
4
votes
1 answer

Making my steganography code more hard to detect and crack

I'm doing a college project about digital image steganography on MATLAB. So far i've been able to get the help i needed from cool guys on stackoverflow but i now need to make my algorithm more hard to detect. This is what i have so far: My main…
3
votes
3 answers

Message Hiding Using Keyed Steganography

i would like to know what are the danger can be occur by performing steganography without a key? Please kindly explain to me.
3
votes
1 answer

Hide Randomness in Ciphertext

Ciphertext has the property to appear random. As a matter of fact, randomness is the first test, an encryption algorithm must pass. However, there are various setups, which monitor the incoming/ outgoing traffic and can easily identify Random Bits…
R. Sam
  • 389
  • 2
  • 7
1
2 3 4 5 6 7