Knowledge

Steganography

Source 📝

470: 813:. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known clean copies of the materials and then compare them against the current contents of the site. The differences, if the carrier is the same, comprise the payload. In general, using extremely high compression rates makes steganography difficult but not impossible. Compression errors provide a hiding place for data, but high compression reduces the amount of data available to hold the payload, raising the encoding density, which facilitates easier detection (in extreme cases, even by casual observation). 826:
an image the least significant bits of many images are actually not random. The camera sensor, especially lower-end sensors are not the best quality and can introduce some random bits. This can also be affected by the file compression done on the image. Secret messages can be introduced into the least significant bits in an image and then hidden. A steganography tool can be used to camouflage the secret message in the least significant bits but it can introduce a random area that is too perfect. This area of perfect randomization stands out and can be detected by comparing the least significant bits to the next-to-least significant bits on an image that hasn't been compressed.
482: 442: 215: 310: 98: 602: 3645: 822:
that were present. The size of the message that is being hidden is a factor in how difficult it is to detect. The overall size of the cover object also plays a factor as well. If the cover object is small and the message is large, this can distort the statistics and make it easier to detect. A larger cover object with a small message decreases the statistics and gives it a better chance of going unnoticed.
3106: 33: 834:. The term Stegware was first introduced in 2017 to describe any malicious operation involving steganography as a vehicle to conceal an attack. Detection of steganography is challenging, and because of that, not an adequate defence. Therefore, the only way of defeating the threat is to transform data in a way that destroys any hidden messages, a process called 455: 991:). In such a case, the technique of hiding the message (here, the watermark) must be robust to prevent tampering. However, digital watermarking sometimes requires a brittle watermark, which can be modified easily, to check whether the image has been tampered with. That is the key difference between steganography and digital watermarking. 456: 554:(IoT). Some techniques of CPS/IoT steganography overlap with network steganography, i.e. hiding data in communication protocols used in CPS/the IoT. However, specific techniques hide data in CPS components. For instance, data can be stored in unused registers of IoT/CPS components and in the states of IoT/CPS actuators. 665:
Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol steganography. Alternatively, multiple network protocols can be used simultaneously to transfer hidden information and
622:
In 2015, a taxonomy of 109 network hiding methods was presented by Steffen Wendzel, Sebastian Zander et al. that summarized core concepts used in network steganography research. The taxonomy was developed further in recent years by several publications and authors and adjusted to new domains, such as
825:
Steganalysis that targets a particular algorithm has much better success as it is able to key in on the anomalies that are left behind. This is because the analysis can perform a targeted search to discover known tendencies since it is aware of the behaviors that it commonly exhibits. When analyzing
821:
are visual or aural attacks, structural attacks, and statistical attacks. These approaches attempt to detect the steganographic algorithms that were used. These algorithms range from unsophisticated to very sophisticated, with early algorithms being much easier to detect due to statistical anomalies
597:
The ciphertext produced by most digital steganography methods, however, is not printable. Traditional digital methods rely on perturbing noise in the channel file to hide the message, and as such, the channel file must be transmitted to the recipient with no additional noise from the transmission.
193:
messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing both the fact that a secret
829:
Generally, though, there are many techniques known to be able to hide messages in data using steganographic techniques. None are, by definition, obvious when users employ standard applications, but some can be detected by specialist tools. Others, however, are resistant to detection—or rather it is
654:
All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003. Contrary to typical steganographic methods that
364:
In communities with social or government taboos or censorship, people use cultural steganography—hiding messages in idiom, pop culture references, and other messages they share publicly and assume are monitored. This relies on social context to make the underlying messages visible only to certain
912:
Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) because of the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible. The
529:
In 2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganography is the first-ever effort to improve the codebook partition by using Graph theory along with Quantization Index Modulation in low
1010:
On 23 April 2019 the U.S. Department of Justice unsealed an indictment charging Xiaoqing Zheng, a Chinese businessman and former Principal Engineer at General Electric, with 14 counts of conspiring to steal intellectual property and trade secrets from General Electric. Zheng had allegedly used
626:
In 1977, Kent concisely described the potential for covert channel signaling in general network communication protocols, even if the traffic is encrypted (in a footnote) in "Encryption-Based Protection for Interactive User/Computer Communication," Proceedings of the Fifth Data Communications
201:
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program, or protocol. Media files are ideal for steganographic
696:
Discussions of steganography generally use terminology analogous to and consistent with conventional radio and communications technology. However, some terms appear specifically in software and are easily confused. These are the most relevant ones to digital steganographic systems:
755:. It is a time-consuming process with obvious resource implications, even in countries that employ many people to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. 412:
Since the dawn of computers, techniques have been developed to embed messages in digital cover mediums. The message to conceal is often encrypted, then used to overwrite part of a much larger block of encrypted data or a block of random data (an unbreakable cipher like the
258:, by shaving the head of his most trusted servant, "marking" the message onto his scalp, then sending him on his way once his hair had regrown, with the instruction, "When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon." Additionally, 3231:. How-to articles on the subject of network steganography (Wireless LANs, VoIP – Steganophony, TCP/IP protocols and mechanisms, Steganographic Router, Inter-protocol steganography). By Krzysztof Szczypiorski and Wojciech Mazurczyk from Network Security Group. 609:
Although not classic steganography, some types of modern color laser printers integrate the model, serial number, and timestamps on each printout for traceability reasons using a dot-matrix code made of small, yellow dots not recognizable to the naked eye — see
830:
not possible to reliably distinguish data containing a hidden message from data containing just noise—even when the most sophisticated analysis is performed. Steganography is being used to conceal and deliver more effective cyber attacks, referred to as
2052:
Hildebrandt, Mario; Altschaffel, Robert; Lamshöft, Kevin; Lange, Matthias; Szemkus, Martin; Neubert, Tom; Vielhauer, Claus; Ding, Yongjian; Dittmann, Jana (2020). "Threat Analysis of Steganographic and Covert Communication in Nuclear I&C Systems".
630:
In 1987, Girling first studied covert channels on a local area network (LAN), identified and realised three obvious covert channels (two storage channels and one timing channel), and his research paper entitled “Covert channels in LAN’s” published in
117:) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/electronic contexts, a 816:
There are a variety of basic tests that can be done to identify whether or not a secret message exists. This process is not concerned with the extraction of the message, which is a different process and a separate step. The most basic approaches of
454: 1713:
Dittmann, Jana; Hesse, Danny; Hillert, Reyk (21 March 2005). Delp Iii, Edward J; Wong, Ping W (eds.). "Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set".
677:
conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK – Lost Audio Packets Steganography), or, alternatively, hiding information in unused header
655:
use digital media (images, audio and video files) to hide data, network steganography uses communication protocols' control elements and their intrinsic functionality. As a result, such methods can be harder to detect and eliminate.
1112:
There is the possibility of cataloging these algorithms based on the information held by the stegoanalyst in terms of clear and encrypted messages. It is a technique similar to cryptography, however, they have several differences:
169:
and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in
790:) were used to manufacture postcards and stationery provided to German prisoners of war in the US and Canada. If POWs tried to write a hidden message, the special paper rendered it visible. The US granted at least two 666:
so-called control protocols can be embedded into steganographic communications to extend their capabilities, e.g. to allow dynamic overlay routing or the switching of utilized hiding methods and network protocols.
99: 2881: 533:
In 2011 and 2012, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert VoIP steganography. Their findings were published in
1145:
Passive steganalysis: does not alter the target stego, therefore, it examines the target stego in order to establish whether it carries hidden information and recovers the hidden message, the key used or
1011:
steganography to exfiltrate 20,000 documents from General Electric to Tianyi Aviation Technology Co. in Nanjing, China, a company the FBI accused him of starting with backing from the Chinese government.
900:
can be used more or less undetectably for something else other than color information. If that is repeated for the green and the red elements of each pixel as well, it is possible to encode one letter of
457: 598:
Printing introduces much noise in the ciphertext, generally rendering the message unrecoverable. There are techniques that address this limitation, one notable example being ASCII Art Steganography.
1070:. This type of malware is called stegomalware. It can be activated by external code, which can be malicious or even non-malicious if some vulnerability in the software reading the file is exploited. 681:
WLAN Steganography – transmission of steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks)
979:
Although steganography and digital watermarking seem similar, they are not. In steganography, the hidden message should remain intact until it reaches its destination. Steganography can be used for
896:. The blue alone has 2 different levels of blue intensity. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the 1007:
uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents without diplomatic cover) stationed abroad.
1019:
There are distributed steganography methods, including methodologies that distribute the payload through multiple carrier files in diverse locations to make detection more difficult. For example,
1878:
Ghosal, Sudipta Kr; Mukhopadhyay, Souradeep; Hossain, Sabbir; Sarkar, Ram (2020). "Application of Lah transform for security and privacy of data through information hiding in telecommunication".
1077:(CDR) software, and it involves reprocessing the entire file or removing parts from it. Actually detecting stegomalware in a file can be difficult and may involve testing the file behaviour in 405: 3128: 385: 586:, or other characteristics of a cover text can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. 1779: 800:, "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented 18 July 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," 189:
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible
2147:
M. Wolf, “Covert channels in LAN protocols,” in Proceedings of the Workshop on Local Area Network Security (LANSEC’89) (T.A. Berson and T. Beth, eds.), pp. 91–102, 1989.
641:
In 1997, Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels.
4334: 865:
brand color laser printers. The printers add tiny yellow dots to each page. The barely-visible dots contain encoded printer serial numbers and date and time stamps.
806:, patented 20 July 1948. A similar strategy issues prisoners with writing paper ruled with a water-soluble ink that runs in contact with water-based invisible ink. 4547: 1511: 877:) relative to the hidden message, the easier it is to hide the hidden message (as an analogy, the larger the "haystack", the easier it is to hide a "needle"). So 4098: 3625: 3455: 3191:
Papers and information about steganography and steganalysis research from 1995 to the present. Includes Steganography Software Wiki list. Dr. Neil F. Johnson.
2011:
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof (27 August 2018). "Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach".
1829: 712:, which typically means the type of input, such as a JPEG image. The resulting signal, stream, or data file with the encoded payload is sometimes called the 3211: 1616: 4344: 1104:
Stegoanalytical algorithms can be cataloged in different ways, highlighting: according to the available information and according to the purpose sought.
206:
to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
1141:
The principal purpose of steganography is to transfer information unnoticed, however, it is possible for an attacker to have two different pretensions:
516:
Since the era of evolving network applications, steganography research has shifted from image steganography to steganography in streaming media such as
284: 1041:
incorporate steganography with cryptography and other solving techniques since 2012. Puzzles involving steganography have also been featured in other
2295: 1066:
It is possible to steganographically hide computer malware into digital images, videos, audio and various other files in order to evade detection by
638:
In 1989, Wolf implemented covert channels in LAN protocols, e.g. using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol.
2355: 1913:
Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg. "Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings".
658:
Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can be applied to the
968:. The noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition, 4641: 202:
transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth
2269: 3293: 1580:
Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2010). "Digital image steganography: Survey and analysis of current methods".
4477: 4141: 523:
In 2003, Giannoula et al. developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis.
4124: 4091: 3996: 3251: 2392: 751:
Detecting physical steganography requires a careful physical examination, including the use of magnification, developer chemicals, and
4580: 4540: 4181: 2479:
Bartosz Jankowski; Wojciech Mazurczyk & Krzysztof Szczypiorski (11 May 2010). "Information Hiding Using Improper Frame Padding".
917:
of the carrier. All media can be a carrier, but media with a large amount of redundant or compressible information is better suited.
1123:
Known stego attack: the stegoanalyst knows the initial carrier target and the final target stego, in addition to the algorithm used.
4636: 1563: 775: 388:
Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant
983:
in which a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified (for example,
1149:
Active steganalysis: changes the initial stego target, therefore, it seeks to suppress the transfer of information, if it exists.
26: 4369: 4339: 4084: 3979: 3935: 1485: 1073:
Stegomalware can be removed from certain files without knowing whether they contain stegomalware or not. This is done through
420:
Examples of this include changing pixels in image or sound files, properties of digital text such as spacing and font choice,
4522: 3063: 3044: 3011: 2978: 2752: 2553: 2519: 2455: 1765: 1004: 2882:
Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges
976:) always introduce some error to the decompressed data, and it is possible to exploit that for steganographic use, as well. 647:
In 2005, Steven J. Murdoch and Stephen Lewis contributed a chapter entitled "Embedding Covert Channels into TCP/IP" in the "
4171: 3930: 266:
before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for
138: 3685: 4115: 3084: 1527: 1074: 3174: 1460: 3831: 3286: 3154: 2224: 2028: 105: 4793: 4472: 4464: 3866: 3791: 397: 304: 2500:
Wendzel, Steffen; Keller, Joerg (20 October 2011). "Low-Attention Forwarding for Mobile Network Covert Channels".
1379: 4482: 3208: 1655: 1049: 1000: 937: 4413: 4238: 4153: 3733: 3504: 3435: 3224: 2686: 1689: 428:, modifying the echo of a sound file (Echo Steganography)., and including data in ignored sections of a file. 4839: 4573: 4107: 2915: 1117:
Chosen stego attack: the stegoanalyst perceives the final target stego and the steganographic algorithm used.
2683:"Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print" 2542:
Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof (2016).
2068:
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura; Wendzel, Steffen; Mazurczyk, Wojciech (May 2021).
3279: 3001: 2197:
Kamran Ahsan, “Covert Channel Analysis and Data Hiding in TCP/IP,” MSc Thesis, University of Toronto, 2002.
1132:
Known message attack: the stegoanalyst owns the stego target and the hidden message, which is known to him.
517: 3183: 2968: 2303: 778:
had Morris S. Kantrowitz describe in general terms the development of this paper. Three prototype papers (
724:. The proportion of bytes, samples, or other signal elements modified to encode the payload is called the 469: 372:
Misspelling names or words that are popular in the media in a given week, to suggest an alternate meaning.
4624: 4530: 3620: 3575: 3378: 933: 328:
Placing the message in a physical item has been widely used for centuries. Some notable examples include
2733:
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
2366: 1129:
Chosen message attack: the stegoanalyst, following a message selected by him, originates a stego target.
1120:
Known cover attack: the stegoanalyst comprises the initial conductive target and the final target stego.
174:
between the visible lines of a private letter. Some implementations of steganography that lack a formal
4788: 3499: 2570: 1548: 1252: 691: 246: 179: 2604:
In Proc. of: The Tenth International Multi-Conference on Advanced Computer Systems ACS'2003, pp. 31–40
1756:
B. Xiao, Y. Huang, and S. Tang, "An Approach to Information Hiding in Low Bit-Rate Speech Stream", in
262:
sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a
4715: 3615: 526:
In 2005, Dittmann et al. studied steganography and watermarking of multimedia contents such as VoIP.
320:
Numerous techniques throughout history have been developed to embed a message within another medium.
183: 148: 2543: 1430: 1410: 1322: 214: 4566: 4445: 4176: 3605: 3595: 3450: 3136: 3132: 3116: 2641: 1330:
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
481: 2428:
Wojciech Mazurczyk & Krzysztof Szczypiorski (November 2008). "Steganography of VoIP Streams".
4497: 4487: 4435: 4166: 3816: 3786: 3678: 3600: 3590: 3383: 3343: 3336: 3321: 3316: 3169:
An overview of digital steganography, particularly within images, for the computationally curious
1930:
Proceedings 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)
1228: 345: 2240: 885:
and on other digital communication media. It is not clear how common this practice actually is.
121:, message, image, or video is concealed within another file, message, image, or video. The word 4834: 4512: 4450: 4430: 4379: 4136: 3388: 3331: 3239: 1425: 1042: 835: 421: 4399: 4065: 3648: 3494: 3440: 3218: – 1996 paper by Craig Rowland detailing the hiding of data in TCP/IP packets. 2700: 2403: 2241:"Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System – HICCUPS" 957: 925: 897: 852: 611: 547: 36:
The same image viewed by white, blue, green, and red lights reveals different hidden numbers.
1213: – Encryption techniques where an adversary cannot prove that the plaintext data exists 4502: 4440: 4326: 4282: 4267: 4216: 4161: 3991: 3974: 3947: 3710: 3610: 3534: 3003:
Disappearing cryptography 3rd Edition: information hiding: steganography & watermarking
2326: 1962:
Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard; Herdin, Christian (16 April 2015).
1723: 1589: 1337: 1296: 1240: 1216: 988: 441: 2940: 2013:
Proceedings of the 13th International Conference on Availability, Reliability and Security
669:
Network steganography covers a broad spectrum of techniques, which include, among others:
8: 4766: 4740: 4535: 4409: 4226: 4199: 4053: 3957: 3705: 3363: 2717: 2596: 2478: 1549:
Social Steganography: how teens smuggle meaning past the authority figures in their lives
1321:
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (eds.).
1269: 1257: 1210: 280: 219: 156: 2545:
Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications
1727: 1593: 1560: 1341: 309: 4783: 4603: 4507: 4492: 4384: 4359: 4297: 4248: 4233: 3942: 3909: 3883: 3861: 3856: 3826: 3811: 3671: 3479: 3463: 3405: 3124: 3034: 2885: 2802: 2758: 2480: 2461: 2433: 2130: 2091: 2034: 1993: 1975: 1895: 1860: 1810: 1739: 1695: 1647: 1353: 1172: 1067: 921: 892:
uses 8 bits to represent each of the three color values (red, green, and blue) of each
659: 551: 491: 289:
Auctor Sapientissimus Conseruans Angelica Deferat Nobis Charitas Potentissimi Creatoris
275: 1181: 644:
In 2002, Kamran Ahsan made an excellent summary of research on network steganography.
4771: 4648: 4349: 4058: 3727: 3539: 3529: 3395: 3080: 3059: 3040: 3007: 2974: 2748: 2660: 2549: 2515: 2501: 2451: 2220: 2180: 2122: 2095: 2024: 1963: 1899: 1852: 1802: 1761: 1743: 1685: 1639: 1519: 1274: 984: 980: 969: 591: 562:
Digital steganography output may be in the form of printed documents. A message, the
500: 2762: 2568: 2465: 2207:
Murdoch, Steven J.; Lewis, Stephen (2005), "Embedding Covert Channels into TCP/IP",
2038: 1997: 1864: 1814: 1651: 475:
3. Finally, the audio is analysed through a spectrogram, revealing the initial image
4813: 4404: 4354: 4023: 3755: 3474: 3326: 2895: 2852: 2740: 2664: 2507: 2443: 2212: 2170: 2134: 2114: 2081: 2016: 1985: 1928:
Tuptuk, Nilufer; Hailes, Stephen. "Covert channel attacks in pervasive computing".
1887: 1844: 1794: 1731: 1677: 1672:
Giannoula, A.; Hatzinakos, D. (2003). "Compressive data hiding for video signals".
1631: 1597: 1435: 1357: 1345: 1225: – Substance used for writing which is invisible and can later be made visible 929: 708:
is the signal, stream, or data file that hides the payload, which differs from the
662:(PDU), to the time relations between the exchanged PDUs, or both (hybrid methods). 46: 2899: 2827: 2055:
International Conference on Nuclear Security: Sustaining and Strengthening Efforts
1944: 1699: 601: 4730: 4292: 4221: 4043: 4018: 3952: 3914: 3851: 3228: 3215: 3205:(San Diego, CA, 6–8 February 2002). NDSS 2002. Internet Society, Washington, D.C. 2777: 2511: 1674:
Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)
1601: 1567: 1263: 1234: 858: 731:
In a set of files, the files that are considered likely to contain a payload are
495: 393: 2682: 2668: 2447: 1277: – Field of the printing industry for banknotes and other security products 4761: 4653: 4589: 4389: 4209: 3721: 3549: 3469: 3425: 3368: 3353: 3056:
Information hiding: steganography and watermarking: attacks and countermeasures
2970:
Disappearing cryptography: information hiding: steganography & watermarking
2628:
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
2086: 2069: 1198: 1192: 1078: 425: 224: 161: 126: 3194: 3168: 2070:"Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels" 1964:"Pattern-Based Survey and Categorization of Network Covert Channel Techniques" 1848: 1798: 1681: 1021: 802: 796: 4828: 4808: 4287: 4272: 4001: 3969: 3846: 3765: 3585: 3544: 3524: 3415: 3373: 3348: 2880:
Chaganti, Raj; R, Vinayakumar; Alazab, Mamoun; Pham, Tuan (12 October 2021).
2184: 2126: 1856: 1806: 1643: 1523: 1243: – Process of incorporating security controls into an information system 1222: 1160: 1082: 1026: 961: 953: 945: 878: 767: 739:
identified through some type of statistical analysis can be referred to as a
674: 587: 375:
Hiding a picture that can be traced by using Paint or any other drawing tool.
329: 175: 171: 118: 3072: 3032: 2118: 2020: 4689: 4631: 4394: 4312: 4302: 4243: 4048: 3836: 3821: 3760: 3745: 3738: 3580: 3420: 3410: 3400: 3358: 3302: 3198: 2744: 1204: 1126:
Stego only attack: the stegoanalyst perceives exclusively the stego target.
1094: 1061: 818: 810: 759: 546:
Academic work since 2012 demonstrated the feasibility of steganography for
417:
generates ciphertexts that look perfectly random without the private key).
414: 349: 166: 4076: 2701:"Criminal complaint by Special Agent Ricci against alleged Russian agents" 2569:
Józef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski (February 2010).
1780:"Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec" 1486:"The Wartime Spies Who Used Knitting as an Espionage Tool – Atlas Obscura" 578:
is modified in some way so as to contain the ciphertext, resulting in the
404: 4710: 4619: 4204: 4038: 3904: 3750: 3559: 2432:. Lecture Notes in Computer Science. Vol. 5332. pp. 1001–1018. 1186: 1038: 914: 752: 487: 384: 353: 255: 236:
The first recorded uses of steganography can be traced back to 440 BC in
229: 22: 3245: 3053: 3036:
Information Hiding Techniques for Steganography and Digital Watermarking
2731:
Liao, Xin; Wen, Qiao-yan; Shi, Sha (2011). "Distributed Steganography".
2427: 2216: 2175: 2158: 1828:
Huang, Yongfeng; Liu, Chenghao; Tang, Shanyu; Bai, Sen (December 2012).
1635: 4803: 4798: 4725: 4720: 4684: 4679: 4674: 4669: 4277: 4033: 4013: 4006: 3986: 3893: 3519: 3489: 3484: 3445: 2506:. Lecture Notes in Computer Science. Vol. 7025. pp. 122–133. 1387: 1332:. Security, Steganography, and Watermarking of Multimedia Contents VI. 965: 570: 333: 263: 1735: 1349: 881:, which contain much data, are sometimes used to hide messages on the 4756: 4258: 4253: 4191: 4028: 3841: 3770: 3694: 3509: 1891: 1439: 1246: 949: 809:
In computing, steganographically encoded package detection is called
564: 369:
Hiding a message in the title and context of a shared video or image.
267: 259: 251: 241: 190: 3221: 3203:
Proceedings of the Network and Distributed System Security Symposium
3188: 1989: 1716:
Security, Steganography, and Watermarking of Multimedia Contents VII
4262: 3876: 3554: 3514: 3261: 3135:
external links, and converting useful links where appropriate into
3074: 2890: 2051: 1383: 1166: 1052:
incorporate steganography and other solving techniques since 1981.
882: 583: 341: 4558: 2485: 2438: 2270:"Steganography 2.0: Digital Resistance against Repressive Regimes" 1980: 1512:"How a Saxophonist Tricked the KGB by Encrypting Secrets in Music" 4776: 3962: 2642:"What's Hidden in That Picture Online? Seeing Through "Stegware"" 3017: 2541: 1260: – Software for embedding hidden data inside a carrier file 32: 3430: 3254:
2006 paper by Konakhovich G. F., Puzyrenko A. Yu. published in
3178: 2984: 2645: 1877: 889: 791: 237: 3252:
Computer steganography. Theory and practice with Mathcad (Rus)
2324: 182:, while key-dependent steganographic schemes try to adhere to 4705: 3234: 3189:
Information Hiding: Steganography & Digital Watermarking.
2597:"HICCUPS: Hidden Communication System for Corrupted Networks" 1915:
Proceedings of the 2017 IEEE Security & Privacy Workshops
1579: 1207: – Practice and study of secure communication techniques 941: 906: 902: 893: 862: 763: 203: 3663: 2916:"Finding a Content Disarm & Reconstruction (CDR) Vendor" 2067: 1830:"Steganography Integration Into a Low-Bit Rate Speech Codec" 1408: 873:
The larger the cover message (in binary data, the number of
541: 2736: 2109:
Girling, C.G. (February 1987). "Covert Channels in LAN's".
1380:"Confounding Carnivore: How to Protect Your Online Privacy" 973: 857:
Some modern computer printers use steganography, including
568:, may be first encrypted by traditional means, producing a 337: 88: 82: 64: 58: 1961: 1320: 73: 2718:"GE Engineer Charged in Elaborate Theft of Trade Secrets" 1266: – Electronic identifier embedded in an audio signal 1107: 874: 762:, prisoner of war camps gave prisoners specially-treated 389: 76: 61: 2353: 1880:
Transactions on Emerging Telecommunications Technologies
1778:
Huang, Yong Feng; Tang, Shanyu; Yuan, Jian (June 2011).
728:
and is typically expressed as a number between 0 and 1.
447:
1. The word "Knowledge" is drawn using computer software
4548:
Counterintelligence and counter-terrorism organizations
3073:
Petitcolas, Fabien A.P.; Katzenbeisser, Stefan (2016).
3033:
Petitcolas, Fabien A.P.; Katzenbeisser, Stefan (2000).
1837:
IEEE Transactions on Information Forensics and Security
1787:
IEEE Transactions on Information Forensics and Security
994: 536:
IEEE Transactions on Information Forensics and Security
287:" that can hide information in a Latin praise of God. " 3456:
Cryptographically secure pseudorandom number generator
2594: 2267: 2238: 3054:
Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001).
2393:"Practical Internet Steganography: Data Hiding in IP" 2010: 1614: 1195: – Method of indirect notification of a subpoena 106: 85: 70: 52: 49: 3267: 2430:
On the Move to Meaningful Internet Systems: OTM 2008
1712: 1615:
Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. (1996).
1177:
Pages displaying wikidata descriptions as a fallback
952:
equipment. In general, electronics that digitize an
79: 55: 2879: 1671: 1551:, Boing Boing, 22 May 2013. Retrieved 7 June 2014. 511: 494:encoded as sound in the song "My Violent Heart" by 408:
Image of a cat extracted from the tree image above.
67: 25:. For the prefix "Stego-" as used in taxonomy, see 1136: 155:The first recorded use of the term was in 1499 by 3264:a Free and Open Source steganography web service. 3195:Detecting Steganographic Content on the Internet. 3119:may not follow Knowledge's policies or guidelines 2778:"Cicada 3301: The darknet treasure trail reopens" 2630:, Morgan Kaufmann Publishers, Amsterdam; Boston 2390: 2354:Kamran Ahsan & Deepa Kundur (December 2002). 4826: 2875: 2873: 2211:, Springer Berlin Heidelberg, pp. 247–261, 1912: 746: 1827: 1189: – Method for exposing an information leak 1175: – computer message obfuscation technology 1163: – Method for hiding data on a floppy disk 987:) or even just to identify an image (as in the 948:, it may be noise from recording techniques or 868: 3184:Examples showing images hidden in other images 2941:"Content Disarm and Reconstruct – SecureIQLab" 2775: 2325:Steven J. Murdoch & Stephen Lewis (2005). 2159:"Covert channels in the TCP/IP protocol suite" 1409:Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). 1169: – Text formed from parts of another text 794:related to the technology, one to Kantrowitz, 673:Steganophony – the concealment of messages in 4574: 4092: 3679: 3287: 3171:by Chris League, Long Island University, 2015 2999: 2966: 2870: 2622: 2620: 2571:"Vice Over IP: The VoIP Steganography Threat" 2499: 2293: 1777: 1099: 21:For the process of writing in shorthand, see 3006:. Amsterdam: MK/Morgan Kaufmann Publishers. 2973:. Amsterdam: MK/Morgan Kaufmann Publishers. 2206: 1219: – Marker covertly embedded in a signal 1014: 463:2. The image is converted into an audio file 4106: 3246:File Format Extension Through Steganography 2400:Texas Wksp. Security of Information Systems 956:suffer from several noise sources, such as 4581: 4567: 4099: 4085: 3686: 3672: 3294: 3280: 2730: 2617: 2535: 2239:Krzysztof Szczypiorski (4 November 2003). 770:. An article in the 24 June 1948 issue of 291:" for example contains the concealed word 3155:Learn how and when to remove this message 2889: 2484: 2437: 2174: 2111:IEEE Transactions on Software Engineering 2085: 1979: 1429: 1249: – Study of signs and sign processes 1231:– Hiding a message using musical notation 846: 685: 633:IEEE Transactions on Software Engineering 582:. For example, the letter size, spacing, 542:Cyber-physical systems/Internet of Things 2639: 1927: 1676:. Vol. 1. IEEE. pp. I–529–32. 776:United States Government Printing Office 600: 403: 383: 308: 213: 31: 4513:Scientific & Technical intelligence 2658: 2595:Krzysztof Szczypiorski (October 2003). 2391:Kundur D. & Ahsan K. (April 2003). 2327:"Embedding Covert Channels into TCP/IP" 2248:Institute of Telecommunications Seminar 2156: 2108: 1942: 1314: 913:changes are indistinguishable from the 704:is the data covertly communicated. The 359: 142:), meaning "covered or concealed", and 27:List of commonly used taxonomic affixes 4827: 3936:Chinese espionage in the United States 3222:Network Steganography Centre Tutorials 2913: 2706:. United States Department of Justice. 2503:Communications and Multimedia Security 2268:Patrick Philippe Meier (5 June 2009). 1949:Pictureworthsthousandwords.appspot.com 1480: 1478: 1377: 1108:According to the information available 4562: 4080: 3667: 3275: 2296:"Covert Channels in the TCP/IP Suite" 635:, vol. SE-13 of 2, in February 1987. 4335:By alliances, nations and industries 3931:Chinese intelligence activity abroad 3248:by Blake W. Ford and Khosrow Kaikhah 3099: 2640:Lancioni, German (16 October 2017). 1005:Russian foreign intelligence service 995:Alleged use by intelligence services 4588: 3997:Interpersonal (HUMINT) intelligence 3209:Covert Channels in the TCP/IP Suite 1475: 1055: 1032: 924:point of view, that means that the 379: 13: 1509: 1037:The puzzles that are presented by 1025:by cryptographer William Easttom ( 400:. The hidden image is shown below. 14: 4851: 3832:Computer and network surveillance 3240:Steganography by Michael T. Raggo 3235:Invitation to BPCS-Steganography. 3095: 2776:Jane Wakefield (9 January 2014). 2356:"Practical Data Hiding in TCP/IP" 1075:content disarm and reconstruction 940:. For a digital image, it may be 774:by the Technical Director of the 16:Hiding messages in other messages 3867:Short-range agent communications 3644: 3643: 3301: 3201:and Peter Honeyman published in 3104: 2661:Defenders Guide to Steganography 2157:Rowland, Craig H. (5 May 1997). 1463:(in German). Digitale Sammlungen 1201: – Computer security attack 605:Yellow dots from a laser printer 512:Steganography in streaming media 480: 468: 452: 440: 305:List of steganography techniques 45: 4483:Words of estimative probability 4345:Operational platforms by nation 2933: 2907: 2845: 2820: 2795: 2769: 2724: 2710: 2693: 2675: 2652: 2633: 2588: 2562: 2493: 2472: 2421: 2384: 2347: 2318: 2287: 2261: 2232: 2200: 2191: 2150: 2141: 2102: 2061: 2045: 2004: 1955: 1936: 1921: 1906: 1871: 1821: 1771: 1750: 1706: 1665: 1608: 1573: 1378:Pahati, OJ (29 November 2001). 1137:According to the purpose sought 1088: 1001:Federal Bureau of Investigation 841: 332:on paper, writing a message in 3505:Information-theoretic security 2904:(pre-print, not peer reviewed) 2687:Electronic Frontier Foundation 1554: 1542: 1503: 1453: 1411:"Information Hiding: A survey" 1402: 1371: 1289: 944:from the imaging element; for 651:" book published by Springer. 254:sent a message to his vassal, 1: 3693: 2900:10.36227/techrxiv.16755457.v1 2363:ACM Wksp. Multimedia Security 1323:"Searching for the Stego Key" 1297:"Definition of STEGANOGRAPHY" 1282: 747:Countermeasures and detection 298: 244:mentions two examples in his 2512:10.1007/978-3-642-24712-5_10 1617:"Techniques for data hiding" 1602:10.1016/j.sigpro.2009.08.010 869:Example from modern practice 518:Voice over Internet Protocol 434:Images hidden in sound files 7: 4531:Intelligence cycle security 3621:Message authentication code 3576:Cryptographic hash function 3379:Cryptographic hash function 3242:, DefCon 12 (1 August 2004) 3079:. Artech House Publishers. 3039:. Artech House Publishers. 2914:Votiro (30 November 2021). 2669:10.13140/RG.2.2.21608.98561 2448:10.1007/978-3-540-88873-4_6 2334:Information Hiding Workshop 1760:, IEEE, pp. 371–375, 2008. 1630:(3.4). IBM Corp.: 313–336. 1461:"Polygraphiae (cf. p. 71f)" 1153: 627:Symposium, September 1977. 365:readers. Examples include: 323: 132:, which combines the words 10: 4856: 4789:Observer-expectancy effect 3500:Harvest now, decrypt later 2959: 2548:(1 ed.). Wiley-IEEE. 2294:Craig Rowland (May 1997). 2087:10.1016/j.cose.2021.102207 1570:, Scenario Magazine, 2013. 1253:Steganographic file system 1100:Stegoanalytical algorithms 1092: 1059: 850: 692:Security through obscurity 689: 617: 557: 530:bit-rate streaming media. 302: 209: 180:security through obscurity 20: 4749: 4716:Paranoiac-critical method 4698: 4662: 4612: 4596: 4521: 4463: 4423: 4368: 4325: 4190: 4152: 4132: 4123: 4114: 3923: 3892: 3802: 3779: 3701: 3639: 3616:Post-quantum cryptography 3568: 3309: 3271: 2720:. Twinstate Technologies. 2274:irevolution.wordpress.com 1945:"ASCII Art Steganography" 1849:10.1109/tifs.2012.2218599 1799:10.1109/tifs.2011.2108649 1682:10.1109/icip.2003.1247015 1015:Distributed steganography 283:developed his so-called " 147: 137: 3606:Quantum key distribution 3596:Authenticated encryption 3451:Random number generation 3227:16 December 2017 at the 2074:Computers & Security 936:requires. There must be 4498:Intelligence assessment 4488:All-source intelligence 4108:Intelligence management 3817:Covert listening device 3787:Intelligence assessment 3601:Public-key cryptography 3591:Symmetric-key algorithm 3384:Key derivation function 3344:Cryptographic primitive 3337:Authentication protocol 3322:Outline of cryptography 3317:History of cryptography 3214:23 October 2012 at the 2659:Wiseman, Simon (2017). 2119:10.1109/tse.1987.233153 2021:10.1145/3230833.3233261 1418:Proceedings of the IEEE 1043:alternate reality games 922:information theoretical 4182:Operational techniques 4137:Special reconnaissance 3389:Secure Hash Algorithms 3332:Cryptographic protocol 3000:Wayner, Peter (2009). 2967:Wayner, Peter (2002). 2745:10.1109/IIHMSP.2011.20 2626:Wayner, Peter (2009). 2113:. SE-13 (2): 292–296. 1085:analysis of the file. 1048:The communications of 888:For example, a 24-bit 847:Use in modern printers 836:Content Threat Removal 686:Additional terminology 606: 548:cyber-physical systems 422:Chaffing and winnowing 409: 401: 317: 313:Deciphering the code. 233: 194:message is being sent 184:Kerckhoffs's principle 37: 4066:Targeted surveillance 3495:End-to-end encryption 3441:Cryptojacking malware 1968:ACM Computing Surveys 1229:Musical Steganography 1022:U.S. patent 8,527,779 905:text for every three 898:least significant bit 853:Printer steganography 803:U.S. patent 2,445,586 797:U.S. patent 2,515,232 690:Further information: 612:printer steganography 604: 594:as such a technique. 574:. Then, an innocuous 407: 387: 312: 217: 152:) meaning "writing". 35: 4840:Espionage techniques 4503:Medical intelligence 4473:Competing hypotheses 4283:Industrial espionage 4268:Denial and deception 3992:Industrial espionage 3792:competing hypotheses 3611:Quantum cryptography 3535:Trusted timestamping 3125:improve this article 2739:. pp. 153–156. 2300:First Monday Journal 1566:14 July 2014 at the 1561:Social Steganography 1241:Security engineering 1237: – Type of code 1217:Digital watermarking 989:EURion constellation 981:digital watermarking 360:Social steganography 348:to hide messages as 340:worn by a courier, 4794:Pattern recognition 4767:Clustering illusion 4741:Visual cryptography 4536:Counterintelligence 4451:Technical (TECHINT) 4446:Open-source (OSINT) 4436:Geospatial (GEOINT) 4410:Casualty estimation 3364:Cryptographic nonce 3137:footnote references 3020:on 24 December 2010 2987:on 24 December 2010 2217:10.1007/11558859_19 2176:10.5210/fm.v2i5.528 1728:2005SPIE.5681..607D 1636:10.1147/sj.353.0313 1624:IBM Systems Journal 1594:2010SigPr..90..727C 1342:2004SPIE.5306...70F 1301:Merriam-webster.com 1270:Visual cryptography 1258:Steganography tools 1211:Deniable encryption 1050:The May Day mystery 932:than the "surface" 772:Paper Trade Journal 623:CPS steganography. 281:Johannes Trithemius 220:Johannes Trithemius 157:Johannes Trithemius 4604:Subliminal message 4508:Military geography 4493:Basic intelligence 4431:Financial (FININT) 4372:signature (MASINT) 4298:One-way voice link 4234:Concealment device 3943:Cold War espionage 3910:Front organization 3884:Surveillance tools 3862:Phone surveillance 3857:One-way voice link 3812:Concealment device 3480:Subliminal channel 3464:Pseudorandom noise 3406:Key (cryptography) 3076:Information Hiding 2689:. 16 October 2005. 2409:on 29 October 2012 2372:on 29 October 2012 2306:on 26 January 2013 2209:Information Hiding 1758:IEEE GLOBECOM 2008 1510:Newman, Lily Hay. 1173:BPCS-Steganography 1068:antivirus software 766:that would reveal 660:protocol data unit 649:Information Hiding 607: 552:Internet of Things 410: 402: 318: 234: 38: 4822: 4821: 4772:Cryptic crossword 4649:Phonetic reversal 4556: 4555: 4459: 4458: 4350:Direction finding 4340:In modern history 4321: 4320: 4074: 4073: 3728:Agent provocateur 3661: 3660: 3657: 3656: 3540:Key-based routing 3530:Trapdoor function 3396:Digital signature 3165: 3164: 3157: 3065:978-0-792-37204-2 3046:978-1-580-53035-4 3013:978-0-123-74479-1 2980:978-1-558-60769-9 2857:Maydaymystery.org 2832:Maydaymystery.org 2807:Maydaymystery.org 2754:978-1-4577-1397-2 2555:978-1-118-86169-1 2521:978-3-642-24711-8 2457:978-3-540-88872-7 2015:. pp. 1–10. 1766:978-1-4244-2324-8 1736:10.1117/12.586579 1582:Signal Processing 1350:10.1117/12.521353 1275:Security printing 1003:alleged that the 985:Coded Anti-Piracy 972:schemes (such as 970:lossy compression 753:ultraviolet light 458: 396:and a subsequent 4847: 4814:Unconscious mind 4583: 4576: 4569: 4560: 4559: 4355:Traffic analysis 4327:Signals (SIGINT) 4162:Asset recruiting 4130: 4129: 4121: 4120: 4101: 4094: 4087: 4078: 4077: 3688: 3681: 3674: 3665: 3664: 3647: 3646: 3475:Insecure channel 3327:Classical cipher 3296: 3289: 3282: 3273: 3272: 3269: 3268: 3160: 3153: 3149: 3146: 3140: 3108: 3107: 3100: 3090: 3069: 3050: 3029: 3027: 3025: 3016:. Archived from 2996: 2994: 2992: 2983:. Archived from 2953: 2952: 2950: 2948: 2937: 2931: 2930: 2928: 2926: 2911: 2905: 2903: 2893: 2877: 2868: 2867: 2865: 2863: 2849: 2843: 2842: 2840: 2838: 2824: 2818: 2817: 2815: 2813: 2799: 2793: 2792: 2790: 2788: 2773: 2767: 2766: 2728: 2722: 2721: 2714: 2708: 2707: 2705: 2697: 2691: 2690: 2679: 2673: 2672: 2656: 2650: 2649: 2637: 2631: 2624: 2615: 2614: 2612: 2610: 2601: 2592: 2586: 2585: 2583: 2581: 2566: 2560: 2559: 2539: 2533: 2532: 2530: 2528: 2497: 2491: 2490: 2488: 2476: 2470: 2469: 2441: 2425: 2419: 2418: 2416: 2414: 2408: 2402:. Archived from 2397: 2388: 2382: 2381: 2379: 2377: 2371: 2365:. Archived from 2360: 2351: 2345: 2344: 2342: 2340: 2331: 2322: 2316: 2315: 2313: 2311: 2302:. Archived from 2291: 2285: 2284: 2282: 2280: 2265: 2259: 2258: 2256: 2254: 2245: 2236: 2230: 2229: 2204: 2198: 2195: 2189: 2188: 2178: 2154: 2148: 2145: 2139: 2138: 2106: 2100: 2099: 2089: 2065: 2059: 2058: 2049: 2043: 2042: 2008: 2002: 2001: 1983: 1959: 1953: 1952: 1940: 1934: 1933: 1925: 1919: 1918: 1910: 1904: 1903: 1892:10.1002/ett.3984 1875: 1869: 1868: 1843:(6): 1865–1875. 1834: 1825: 1819: 1818: 1784: 1775: 1769: 1754: 1748: 1747: 1710: 1704: 1703: 1669: 1663: 1662: 1661:on 11 June 2020. 1660: 1654:. Archived from 1621: 1612: 1606: 1605: 1577: 1571: 1558: 1552: 1546: 1540: 1539: 1537: 1535: 1526:. Archived from 1507: 1501: 1500: 1498: 1496: 1482: 1473: 1472: 1470: 1468: 1457: 1451: 1450: 1448: 1446: 1440:10.1109/5.771065 1433: 1415: 1406: 1400: 1399: 1397: 1395: 1386:. Archived from 1375: 1369: 1368: 1366: 1364: 1327: 1318: 1312: 1311: 1309: 1307: 1293: 1178: 1081:environments or 1056:Computer malware 1033:Online challenge 1024: 879:digital pictures 805: 799: 726:encoding density 484: 472: 460: 459: 444: 380:Digital messages 285:Ave-Maria-Cipher 165:, a treatise on 151: 141: 113: 109: 104: 103: 102: 101: 94: 91: 90: 87: 84: 81: 78: 75: 72: 69: 66: 63: 60: 57: 54: 51: 4855: 4854: 4850: 4849: 4848: 4846: 4845: 4844: 4825: 4824: 4823: 4818: 4745: 4731:Sacred geometry 4694: 4658: 4608: 4592: 4590:Hidden messages 4587: 4557: 4552: 4517: 4455: 4441:Imagery (IMINT) 4419: 4380:Electro-optical 4371: 4370:Measurement and 4364: 4317: 4293:Numbers station 4222:Black operation 4186: 4148: 4110: 4105: 4075: 4070: 4044:Sting operation 3953:Black operation 3919: 3915:Limited hangout 3897: 3888: 3852:Numbers station 3804: 3798: 3775: 3715: 3697: 3692: 3662: 3653: 3635: 3564: 3305: 3300: 3229:Wayback Machine 3216:Wayback Machine 3161: 3150: 3144: 3141: 3122: 3113:This section's 3109: 3105: 3098: 3093: 3087: 3066: 3047: 3023: 3021: 3014: 2990: 2988: 2981: 2962: 2957: 2956: 2946: 2944: 2943:. 12 April 2022 2939: 2938: 2934: 2924: 2922: 2912: 2908: 2878: 2871: 2861: 2859: 2851: 2850: 2846: 2836: 2834: 2828:"Recent things" 2826: 2825: 2821: 2811: 2809: 2801: 2800: 2796: 2786: 2784: 2774: 2770: 2755: 2729: 2725: 2716: 2715: 2711: 2703: 2699: 2698: 2694: 2681: 2680: 2676: 2657: 2653: 2638: 2634: 2625: 2618: 2608: 2606: 2599: 2593: 2589: 2579: 2577: 2567: 2563: 2556: 2540: 2536: 2526: 2524: 2522: 2498: 2494: 2477: 2473: 2458: 2426: 2422: 2412: 2410: 2406: 2395: 2389: 2385: 2375: 2373: 2369: 2358: 2352: 2348: 2338: 2336: 2329: 2323: 2319: 2309: 2307: 2292: 2288: 2278: 2276: 2266: 2262: 2252: 2250: 2243: 2237: 2233: 2227: 2205: 2201: 2196: 2192: 2155: 2151: 2146: 2142: 2107: 2103: 2066: 2062: 2050: 2046: 2031: 2009: 2005: 1990:10.1145/2684195 1960: 1956: 1941: 1937: 1926: 1922: 1911: 1907: 1876: 1872: 1832: 1826: 1822: 1782: 1776: 1772: 1755: 1751: 1711: 1707: 1692: 1670: 1666: 1658: 1619: 1613: 1609: 1578: 1574: 1568:Wayback Machine 1559: 1555: 1547: 1543: 1533: 1531: 1508: 1504: 1494: 1492: 1484: 1483: 1476: 1466: 1464: 1459: 1458: 1454: 1444: 1442: 1431:10.1.1.333.9397 1413: 1407: 1403: 1393: 1391: 1390:on 16 July 2007 1376: 1372: 1362: 1360: 1325: 1319: 1315: 1305: 1303: 1295: 1294: 1290: 1285: 1280: 1264:Audio watermark 1235:Polybius square 1176: 1156: 1139: 1110: 1102: 1097: 1091: 1064: 1058: 1035: 1020: 1017: 997: 928:must have more 871: 859:Hewlett-Packard 855: 849: 844: 801: 795: 749: 694: 688: 620: 560: 544: 514: 509: 508: 507: 506: 505: 496:Nine Inch Nails 485: 477: 476: 473: 465: 464: 461: 453: 449: 448: 445: 436: 435: 426:Mimic functions 394:color component 382: 362: 326: 307: 301: 212: 111: 107: 97: 96: 48: 44: 30: 17: 12: 11: 5: 4853: 4843: 4842: 4837: 4820: 4819: 4817: 4816: 4811: 4806: 4801: 4796: 4791: 4786: 4781: 4780: 4779: 4769: 4764: 4762:Asemic writing 4759: 4753: 4751: 4747: 4746: 4744: 4743: 4738: 4733: 4728: 4723: 4718: 4713: 4708: 4702: 4700: 4696: 4695: 4693: 4692: 4687: 4682: 4677: 4672: 4666: 4664: 4660: 4659: 4657: 4656: 4654:Reverse speech 4651: 4646: 4645: 4644: 4639: 4629: 4628: 4627: 4616: 4614: 4610: 4609: 4607: 4606: 4600: 4598: 4594: 4593: 4586: 4585: 4578: 4571: 4563: 4554: 4553: 4551: 4550: 4545: 4544: 4543: 4533: 4527: 4525: 4519: 4518: 4516: 4515: 4510: 4505: 4500: 4495: 4490: 4485: 4480: 4478:Target-centric 4475: 4469: 4467: 4461: 4460: 4457: 4456: 4454: 4453: 4448: 4443: 4438: 4433: 4427: 4425: 4421: 4420: 4418: 4417: 4407: 4402: 4400:Radiofrequency 4397: 4392: 4387: 4382: 4376: 4374: 4366: 4365: 4363: 4362: 4357: 4352: 4347: 4342: 4337: 4331: 4329: 4323: 4322: 4319: 4318: 4316: 4315: 4310: 4305: 4300: 4295: 4290: 4285: 4280: 4275: 4270: 4265: 4256: 4251: 4246: 4241: 4236: 4231: 4230: 4229: 4219: 4214: 4213: 4212: 4207: 4196: 4194: 4188: 4187: 4185: 4184: 4179: 4174: 4169: 4164: 4158: 4156: 4150: 4149: 4147: 4146: 4145: 4144: 4133: 4127: 4125:Human (HUMINT) 4118: 4112: 4111: 4104: 4103: 4096: 4089: 4081: 4072: 4071: 4069: 4068: 4063: 4062: 4061: 4056: 4046: 4041: 4036: 4031: 4026: 4021: 4016: 4011: 4010: 4009: 4004: 3994: 3989: 3984: 3983: 3982: 3977: 3967: 3966: 3965: 3960: 3950: 3945: 3940: 3939: 3938: 3927: 3925: 3921: 3920: 3918: 3917: 3912: 3907: 3901: 3899: 3890: 3889: 3887: 3886: 3881: 3880: 3879: 3869: 3864: 3859: 3854: 3849: 3844: 3839: 3834: 3829: 3824: 3819: 3814: 3808: 3806: 3805:communications 3800: 3799: 3797: 3796: 3795: 3794: 3783: 3781: 3777: 3776: 3774: 3773: 3768: 3763: 3758: 3753: 3748: 3743: 3742: 3741: 3731: 3724: 3722:Agent handling 3718: 3716: 3714: 3713: 3708: 3702: 3699: 3698: 3691: 3690: 3683: 3676: 3668: 3659: 3658: 3655: 3654: 3652: 3651: 3640: 3637: 3636: 3634: 3633: 3628: 3626:Random numbers 3623: 3618: 3613: 3608: 3603: 3598: 3593: 3588: 3583: 3578: 3572: 3570: 3566: 3565: 3563: 3562: 3557: 3552: 3550:Garlic routing 3547: 3542: 3537: 3532: 3527: 3522: 3517: 3512: 3507: 3502: 3497: 3492: 3487: 3482: 3477: 3472: 3470:Secure channel 3467: 3461: 3460: 3459: 3448: 3443: 3438: 3433: 3428: 3426:Key stretching 3423: 3418: 3413: 3408: 3403: 3398: 3393: 3392: 3391: 3386: 3381: 3371: 3369:Cryptovirology 3366: 3361: 3356: 3354:Cryptocurrency 3351: 3346: 3341: 3340: 3339: 3329: 3324: 3319: 3313: 3311: 3307: 3306: 3299: 3298: 3291: 3284: 3276: 3266: 3265: 3259: 3249: 3243: 3237: 3232: 3219: 3206: 3197:2002 paper by 3192: 3186: 3181: 3172: 3163: 3162: 3117:external links 3112: 3110: 3103: 3097: 3096:External links 3094: 3092: 3091: 3086:978-1608079285 3085: 3070: 3064: 3051: 3045: 3030: 3012: 2997: 2979: 2963: 2961: 2958: 2955: 2954: 2932: 2906: 2869: 2844: 2819: 2794: 2768: 2753: 2723: 2709: 2692: 2674: 2651: 2632: 2616: 2587: 2561: 2554: 2534: 2520: 2492: 2471: 2456: 2420: 2383: 2346: 2317: 2286: 2260: 2231: 2225: 2199: 2190: 2149: 2140: 2101: 2060: 2044: 2029: 2003: 1954: 1935: 1920: 1905: 1870: 1820: 1793:(2): 296–306. 1770: 1749: 1705: 1690: 1664: 1607: 1588:(3): 727–752. 1572: 1553: 1541: 1530:on 8 June 2022 1502: 1474: 1452: 1424:(7): 1062–78. 1401: 1370: 1313: 1287: 1286: 1284: 1281: 1279: 1278: 1272: 1267: 1261: 1255: 1250: 1244: 1238: 1232: 1226: 1220: 1214: 1208: 1202: 1199:Covert channel 1196: 1193:Warrant canary 1190: 1184: 1179: 1170: 1164: 1157: 1155: 1152: 1151: 1150: 1147: 1138: 1135: 1134: 1133: 1130: 1127: 1124: 1121: 1118: 1109: 1106: 1101: 1098: 1093:Main article: 1090: 1087: 1060:Main article: 1057: 1054: 1034: 1031: 1016: 1013: 996: 993: 870: 867: 851:Main article: 848: 845: 843: 840: 748: 745: 722:covert message 687: 684: 683: 682: 679: 619: 616: 592:Bacon's cipher 559: 556: 543: 540: 513: 510: 486: 479: 478: 474: 467: 466: 462: 451: 450: 446: 439: 438: 437: 433: 432: 431: 430: 381: 378: 377: 376: 373: 370: 361: 358: 325: 322: 315:Steganographia 303:Main article: 300: 297: 225:Steganographia 211: 208: 198:its contents. 162:Steganographia 130:steganographia 15: 9: 6: 4: 3: 2: 4852: 4841: 4838: 4836: 4835:Steganography 4833: 4832: 4830: 4815: 4812: 4810: 4809:Synchronicity 4807: 4805: 4802: 4800: 4797: 4795: 4792: 4790: 4787: 4785: 4782: 4778: 4775: 4774: 4773: 4770: 4768: 4765: 4763: 4760: 4758: 4755: 4754: 4752: 4748: 4742: 4739: 4737: 4736:Steganography 4734: 4732: 4729: 4727: 4724: 4722: 4719: 4717: 4714: 4712: 4709: 4707: 4704: 4703: 4701: 4697: 4691: 4688: 4686: 4683: 4681: 4678: 4676: 4673: 4671: 4668: 4667: 4665: 4661: 4655: 4652: 4650: 4647: 4643: 4640: 4638: 4635: 4634: 4633: 4630: 4626: 4623: 4622: 4621: 4618: 4617: 4615: 4611: 4605: 4602: 4601: 4599: 4595: 4591: 4584: 4579: 4577: 4572: 4570: 4565: 4564: 4561: 4549: 4546: 4542: 4541:organizations 4539: 4538: 4537: 4534: 4532: 4529: 4528: 4526: 4524: 4523:Dissemination 4520: 4514: 4511: 4509: 4506: 4504: 4501: 4499: 4496: 4494: 4491: 4489: 4486: 4484: 4481: 4479: 4476: 4474: 4471: 4470: 4468: 4466: 4462: 4452: 4449: 4447: 4444: 4442: 4439: 4437: 4434: 4432: 4429: 4428: 4426: 4422: 4415: 4411: 4408: 4406: 4403: 4401: 4398: 4396: 4393: 4391: 4388: 4386: 4383: 4381: 4378: 4377: 4375: 4373: 4367: 4361: 4358: 4356: 4353: 4351: 4348: 4346: 4343: 4341: 4338: 4336: 4333: 4332: 4330: 4328: 4324: 4314: 4311: 4309: 4308:Steganography 4306: 4304: 4301: 4299: 4296: 4294: 4291: 4289: 4288:Interrogation 4286: 4284: 4281: 4279: 4276: 4274: 4273:Eavesdropping 4271: 4269: 4266: 4264: 4260: 4257: 4255: 4252: 4250: 4247: 4245: 4242: 4240: 4237: 4235: 4232: 4228: 4225: 4224: 4223: 4220: 4218: 4215: 4211: 4208: 4206: 4203: 4202: 4201: 4198: 4197: 4195: 4193: 4189: 4183: 4180: 4178: 4177:Direct action 4175: 4173: 4172:Covert action 4170: 4168: 4165: 4163: 4160: 4159: 4157: 4155: 4151: 4143: 4142:organizations 4140: 4139: 4138: 4135: 4134: 4131: 4128: 4126: 4122: 4119: 4117: 4113: 4109: 4102: 4097: 4095: 4090: 4088: 4083: 4082: 4079: 4067: 4064: 4060: 4057: 4055: 4052: 4051: 4050: 4047: 4045: 4042: 4040: 4037: 4035: 4032: 4030: 4027: 4025: 4022: 4020: 4017: 4015: 4012: 4008: 4005: 4003: 4002:interrogation 4000: 3999: 3998: 3995: 3993: 3990: 3988: 3985: 3981: 3978: 3976: 3973: 3972: 3971: 3970:Eavesdropping 3968: 3964: 3961: 3959: 3956: 3955: 3954: 3951: 3949: 3946: 3944: 3941: 3937: 3934: 3933: 3932: 3929: 3928: 3926: 3922: 3916: 3913: 3911: 3908: 3906: 3903: 3902: 3900: 3895: 3891: 3885: 3882: 3878: 3875: 3874: 3873: 3872:Steganography 3870: 3868: 3865: 3863: 3860: 3858: 3855: 3853: 3850: 3848: 3847:Invisible ink 3845: 3843: 3840: 3838: 3835: 3833: 3830: 3828: 3825: 3823: 3820: 3818: 3815: 3813: 3810: 3809: 3807: 3801: 3793: 3790: 3789: 3788: 3785: 3784: 3782: 3778: 3772: 3769: 3767: 3766:Sleeper agent 3764: 3762: 3759: 3757: 3754: 3752: 3749: 3747: 3744: 3740: 3737: 3736: 3735: 3732: 3730: 3729: 3725: 3723: 3720: 3719: 3717: 3712: 3709: 3707: 3704: 3703: 3700: 3696: 3689: 3684: 3682: 3677: 3675: 3670: 3669: 3666: 3650: 3642: 3641: 3638: 3632: 3631:Steganography 3629: 3627: 3624: 3622: 3619: 3617: 3614: 3612: 3609: 3607: 3604: 3602: 3599: 3597: 3594: 3592: 3589: 3587: 3586:Stream cipher 3584: 3582: 3579: 3577: 3574: 3573: 3571: 3567: 3561: 3558: 3556: 3553: 3551: 3548: 3546: 3545:Onion routing 3543: 3541: 3538: 3536: 3533: 3531: 3528: 3526: 3525:Shared secret 3523: 3521: 3518: 3516: 3513: 3511: 3508: 3506: 3503: 3501: 3498: 3496: 3493: 3491: 3488: 3486: 3483: 3481: 3478: 3476: 3473: 3471: 3468: 3465: 3462: 3457: 3454: 3453: 3452: 3449: 3447: 3444: 3442: 3439: 3437: 3434: 3432: 3429: 3427: 3424: 3422: 3419: 3417: 3416:Key generator 3414: 3412: 3409: 3407: 3404: 3402: 3399: 3397: 3394: 3390: 3387: 3385: 3382: 3380: 3377: 3376: 3375: 3374:Hash function 3372: 3370: 3367: 3365: 3362: 3360: 3357: 3355: 3352: 3350: 3349:Cryptanalysis 3347: 3345: 3342: 3338: 3335: 3334: 3333: 3330: 3328: 3325: 3323: 3320: 3318: 3315: 3314: 3312: 3308: 3304: 3297: 3292: 3290: 3285: 3283: 3278: 3277: 3274: 3270: 3263: 3260: 3258:Kyiv, Ukraine 3257: 3253: 3250: 3247: 3244: 3241: 3238: 3236: 3233: 3230: 3226: 3223: 3220: 3217: 3213: 3210: 3207: 3204: 3200: 3196: 3193: 3190: 3187: 3185: 3182: 3180: 3176: 3175:Steganography 3173: 3170: 3167: 3166: 3159: 3156: 3148: 3138: 3134: 3133:inappropriate 3130: 3126: 3120: 3118: 3111: 3102: 3101: 3088: 3082: 3078: 3077: 3071: 3067: 3061: 3057: 3052: 3048: 3042: 3038: 3037: 3031: 3019: 3015: 3009: 3005: 3004: 2998: 2986: 2982: 2976: 2972: 2971: 2965: 2964: 2942: 2936: 2921: 2917: 2910: 2901: 2897: 2892: 2887: 2883: 2876: 2874: 2858: 2854: 2853:"The Mystery" 2848: 2833: 2829: 2823: 2808: 2804: 2798: 2783: 2779: 2772: 2764: 2760: 2756: 2750: 2746: 2742: 2738: 2734: 2727: 2719: 2713: 2702: 2696: 2688: 2684: 2678: 2670: 2666: 2662: 2655: 2647: 2643: 2636: 2629: 2623: 2621: 2605: 2598: 2591: 2576: 2575:IEEE Spectrum 2572: 2565: 2557: 2551: 2547: 2546: 2538: 2523: 2517: 2513: 2509: 2505: 2504: 2496: 2487: 2482: 2475: 2467: 2463: 2459: 2453: 2449: 2445: 2440: 2435: 2431: 2424: 2405: 2401: 2394: 2387: 2368: 2364: 2357: 2350: 2335: 2328: 2321: 2305: 2301: 2297: 2290: 2275: 2271: 2264: 2249: 2242: 2235: 2228: 2226:9783540290391 2222: 2218: 2214: 2210: 2203: 2194: 2186: 2182: 2177: 2172: 2168: 2164: 2160: 2153: 2144: 2136: 2132: 2128: 2124: 2120: 2116: 2112: 2105: 2097: 2093: 2088: 2083: 2079: 2075: 2071: 2064: 2056: 2048: 2040: 2036: 2032: 2030:9781450364485 2026: 2022: 2018: 2014: 2007: 1999: 1995: 1991: 1987: 1982: 1977: 1973: 1969: 1965: 1958: 1950: 1946: 1943:Vincent Chu. 1939: 1931: 1924: 1916: 1909: 1901: 1897: 1893: 1889: 1885: 1881: 1874: 1866: 1862: 1858: 1854: 1850: 1846: 1842: 1838: 1831: 1824: 1816: 1812: 1808: 1804: 1800: 1796: 1792: 1788: 1781: 1774: 1767: 1763: 1759: 1753: 1745: 1741: 1737: 1733: 1729: 1725: 1722:. SPIE: 607. 1721: 1717: 1709: 1701: 1697: 1693: 1687: 1683: 1679: 1675: 1668: 1657: 1653: 1649: 1645: 1641: 1637: 1633: 1629: 1625: 1618: 1611: 1603: 1599: 1595: 1591: 1587: 1583: 1576: 1569: 1565: 1562: 1557: 1550: 1545: 1529: 1525: 1521: 1517: 1513: 1506: 1491: 1487: 1481: 1479: 1462: 1456: 1441: 1437: 1432: 1427: 1423: 1419: 1412: 1405: 1389: 1385: 1381: 1374: 1359: 1355: 1351: 1347: 1343: 1339: 1335: 1331: 1324: 1317: 1302: 1298: 1292: 1288: 1276: 1273: 1271: 1268: 1265: 1262: 1259: 1256: 1254: 1251: 1248: 1245: 1242: 1239: 1236: 1233: 1230: 1227: 1224: 1223:Invisible ink 1221: 1218: 1215: 1212: 1209: 1206: 1203: 1200: 1197: 1194: 1191: 1188: 1185: 1183: 1180: 1174: 1171: 1168: 1165: 1162: 1161:40-track mode 1159: 1158: 1148: 1144: 1143: 1142: 1131: 1128: 1125: 1122: 1119: 1116: 1115: 1114: 1105: 1096: 1086: 1084: 1083:deep learning 1080: 1076: 1071: 1069: 1063: 1053: 1051: 1046: 1044: 1040: 1030: 1028: 1027:Chuck Easttom 1023: 1012: 1008: 1006: 1002: 999:In 2010, the 992: 990: 986: 982: 977: 975: 971: 967: 963: 962:flicker noise 959: 958:thermal noise 955: 954:analog signal 951: 950:amplification 947: 946:digital audio 943: 939: 935: 931: 927: 923: 918: 916: 910: 908: 904: 899: 895: 891: 886: 884: 880: 876: 866: 864: 860: 854: 839: 837: 833: 827: 823: 820: 814: 812: 807: 804: 798: 793: 789: 785: 781: 777: 773: 769: 768:invisible ink 765: 761: 756: 754: 744: 742: 738: 734: 729: 727: 723: 719: 715: 711: 707: 703: 698: 693: 680: 676: 675:Voice-over-IP 672: 671: 670: 667: 663: 661: 656: 652: 650: 645: 642: 639: 636: 634: 628: 624: 615: 614:for details. 613: 603: 599: 595: 593: 589: 588:Francis Bacon 585: 581: 577: 573: 572: 567: 566: 555: 553: 549: 539: 537: 531: 527: 524: 521: 519: 503: 502: 497: 493: 489: 483: 471: 443: 429: 427: 423: 418: 416: 406: 399: 398:normalization 395: 391: 386: 374: 371: 368: 367: 366: 357: 355: 351: 350:musical notes 347: 344:, or using a 343: 339: 335: 331: 330:invisible ink 321: 316: 311: 306: 296: 294: 290: 286: 282: 279: 277: 271: 269: 265: 261: 257: 253: 249: 248: 243: 239: 231: 227: 226: 221: 218:A chart from 216: 207: 205: 199: 197: 192: 187: 185: 181: 178:are forms of 177: 176:shared secret 173: 172:invisible ink 168: 164: 163: 158: 153: 150: 145: 140: 135: 131: 128: 124: 123:steganography 120: 119:computer file 116: 115: 100: 93: 42: 41:Steganography 34: 28: 24: 19: 4735: 4632:Hidden track 4313:Surveillance 4307: 4303:Resident spy 4244:Cryptography 4049:Surveillance 3871: 3837:Cyber spying 3822:Cryptography 3761:Resident spy 3746:Double agent 3726: 3630: 3581:Block cipher 3421:Key schedule 3411:Key exchange 3401:Kleptography 3359:Cryptosystem 3303:Cryptography 3255: 3202: 3199:Niels Provos 3151: 3142: 3127:by removing 3114: 3075: 3058:. Springer. 3055: 3035: 3022:. Retrieved 3018:the original 3002: 2989:. Retrieved 2985:the original 2969: 2945:. Retrieved 2935: 2923:. Retrieved 2919: 2909: 2860:. Retrieved 2856: 2847: 2835:. Retrieved 2831: 2822: 2810:. Retrieved 2806: 2797: 2785:. Retrieved 2781: 2771: 2732: 2726: 2712: 2695: 2677: 2654: 2635: 2627: 2607:. Retrieved 2603: 2590: 2578:. Retrieved 2574: 2564: 2544: 2537: 2525:. Retrieved 2502: 2495: 2474: 2429: 2423: 2411:. Retrieved 2404:the original 2399: 2386: 2374:. Retrieved 2367:the original 2362: 2349: 2337:. Retrieved 2333: 2320: 2308:. Retrieved 2304:the original 2299: 2289: 2277:. Retrieved 2273: 2263: 2251:. Retrieved 2247: 2234: 2208: 2202: 2193: 2166: 2163:First Monday 2162: 2152: 2143: 2110: 2104: 2077: 2073: 2063: 2054: 2047: 2012: 2006: 1971: 1967: 1957: 1948: 1938: 1929: 1923: 1914: 1908: 1883: 1879: 1873: 1840: 1836: 1823: 1790: 1786: 1773: 1757: 1752: 1719: 1715: 1708: 1673: 1667: 1656:the original 1627: 1623: 1610: 1585: 1581: 1575: 1556: 1544: 1532:. Retrieved 1528:the original 1515: 1505: 1493:. Retrieved 1489: 1465:. Retrieved 1455: 1443:. Retrieved 1421: 1417: 1404: 1392:. Retrieved 1388:the original 1373: 1361:. Retrieved 1333: 1329: 1316: 1304:. Retrieved 1300: 1291: 1205:Cryptography 1140: 1111: 1103: 1095:Steganalysis 1089:Steganalysis 1072: 1065: 1062:Stegomalware 1047: 1036: 1018: 1009: 998: 978: 919: 911: 887: 872: 856: 842:Applications 831: 828: 824: 819:steganalysis 815: 811:steganalysis 808: 787: 783: 779: 771: 760:World War II 757: 750: 740: 736: 732: 730: 725: 721: 717: 713: 709: 705: 701: 699: 695: 668: 664: 657: 653: 648: 646: 643: 640: 637: 632: 629: 625: 621: 608: 596: 579: 575: 569: 563: 561: 545: 535: 532: 528: 525: 522: 515: 504:album (2007) 499: 492:hidden image 419: 415:one-time pad 411: 363: 346:music cipher 327: 319: 314: 292: 288: 276:Polygraphiae 274: 273:In his work 272: 245: 235: 223: 200: 195: 188: 167:cryptography 160: 154: 143: 133: 129: 122: 40: 39: 18: 4711:Hidden text 4642:pregap list 4620:Backmasking 4385:Geophysical 4167:Cell system 4154:Clandestine 4039:Stay-behind 3948:Recruitment 3905:Canary trap 3803:Devices and 3751:Field agent 3569:Mathematics 3560:Mix network 2862:23 November 2837:23 November 2812:23 November 2803:"The texts" 2609:11 February 2580:11 February 2527:4 September 1974:(3): 1–26. 1445:2 September 1394:2 September 1306:14 December 1187:Canary trap 1039:Cicada 3301 915:noise floor 488:Spectrogram 354:sheet music 256:Aristagoras 230:Dr John Dee 125:comes from 23:Stenography 4829:Categories 4804:Simulacrum 4799:Palindrome 4784:Easter egg 4726:Psychorama 4721:Pareidolia 4690:Cryptology 4685:Bible code 4680:Theomatics 4675:Numerology 4670:Chronogram 4414:earthquake 4278:False flag 4116:Collection 4034:Sexpionage 4014:COINTELPRO 4007:safe house 3987:False flag 3924:Operations 3898:techniques 3894:Tradecraft 3520:Ciphertext 3490:Decryption 3485:Encryption 3446:Ransomware 3024:4 November 2991:4 November 2947:11 January 2925:11 January 2891:2110.02504 2884:(Report). 2787:11 January 2663:(Report). 2080:: 102207. 1691:0780377508 1363:23 January 1283:References 1182:Camera/Shy 966:shot noise 938:redundancy 718:stego file 590:developed 576:cover text 571:ciphertext 550:(CPS)/the 334:Morse code 299:Techniques 264:wax tablet 228:copied by 4757:Apophenia 4405:Materials 4259:Defection 4254:Dead drop 4227:black bag 4192:Espionage 3958:black bag 3842:Dead drop 3771:Spymaster 3695:Espionage 3510:Plaintext 3129:excessive 2486:1005.1925 2439:0805.2938 2185:1396-0466 2127:0098-5589 2096:232342523 1981:1406.2901 1900:225866797 1857:1556-6013 1807:1556-6013 1744:206413447 1644:0018-8670 1524:1059-1028 1426:CiteSeerX 1336:: 70–82. 1247:Semiotics 788:Coatalith 780:Sensicoat 741:candidate 580:stegotext 565:plaintext 501:Year Zero 498:from the 342:microdots 293:VICIPEDIA 268:shorthand 260:Demaratus 252:Histiaeus 247:Histories 242:Herodotus 191:encrypted 4465:Analysis 4263:Turncoat 4210:handling 4024:SHAMROCK 3877:microdot 3780:Analysis 3649:Category 3555:Kademlia 3515:Codetext 3458:(CSPRNG) 3436:Machines 3256:MK-Press 3225:Archived 3212:Archived 3145:May 2024 2782:BBC News 2763:17769131 2466:14336157 2039:51976841 1998:14654993 1865:16539562 1815:15096702 1652:16672162 1564:Archived 1384:AlterNet 1167:Acrostic 1154:See also 930:capacity 920:From an 883:Internet 832:Stegware 733:suspects 584:typeface 520:(VoIP). 392:of each 324:Physical 144:-graphia 139:στεγανός 134:steganós 4777:Anagram 4663:Numeric 4412: ( 4390:Nuclear 4360:TEMPEST 4019:MINARET 3963:wetwork 3310:General 3262:stegano 3123:Please 3115:use of 2960:Sources 2413:16 June 2376:16 June 2339:16 June 2310:16 June 2279:17 June 2253:17 June 2135:3042941 1917:. IEEE. 1724:Bibcode 1590:Bibcode 1495:4 March 1358:6773772 1338:Bibcode 1079:virtual 926:channel 792:patents 784:Anilith 758:During 737:suspect 714:package 710:channel 706:carrier 702:payload 678:fields. 618:Network 558:Printed 240:, when 232:in 1591 210:History 159:in his 114:-rə-fee 4699:Visual 4249:Cutout 4200:Agents 4054:Global 3980:MASINT 3975:SIGINT 3827:Cutout 3711:Assets 3706:Agents 3431:Keygen 3179:Curlie 3083:  3062:  3043:  3010:  2977:  2920:Votiro 2761:  2751:  2646:McAfee 2552:  2518:  2464:  2454:  2223:  2183:  2133:  2125:  2094:  2037:  2027:  1996:  1898:  1863:  1855:  1813:  1805:  1764:  1742:  1700:361883 1698:  1688:  1650:  1642:  1534:9 June 1522:  1490:Pocket 1467:27 May 1428:  1356:  964:, and 934:signal 907:pixels 890:bitmap 786:, and 238:Greece 4750:Other 4706:Fnord 4613:Audio 4424:Other 4395:Radar 4239:Cover 4217:Asset 4205:field 3739:Agent 3734:Cover 3466:(PRN) 2886:arXiv 2759:S2CID 2704:(PDF) 2600:(PDF) 2481:arXiv 2462:S2CID 2434:arXiv 2407:(PDF) 2396:(PDF) 2370:(PDF) 2359:(PDF) 2330:(PDF) 2244:(PDF) 2169:(5). 2131:S2CID 2092:S2CID 2035:S2CID 1994:S2CID 1976:arXiv 1896:S2CID 1886:(2). 1861:S2CID 1833:(PDF) 1811:S2CID 1783:(PDF) 1740:S2CID 1696:S2CID 1659:(PDF) 1648:S2CID 1620:(PDF) 1516:Wired 1414:(PDF) 1354:S2CID 1326:(PDF) 1146:both. 942:noise 903:ASCII 894:pixel 863:Xerox 764:paper 720:, or 490:of a 204:pixel 149:γραφή 127:Greek 95: 4637:list 4625:list 4597:Main 4059:Mass 4029:FVEY 3756:Mole 3081:ISBN 3060:ISBN 3041:ISBN 3026:2010 3008:ISBN 2993:2010 2975:ISBN 2949:2023 2927:2023 2864:2017 2839:2017 2814:2017 2789:2014 2749:ISBN 2737:IEEE 2611:2010 2582:2010 2550:ISBN 2529:2016 2516:ISBN 2452:ISBN 2415:2010 2378:2010 2341:2010 2312:2010 2281:2010 2255:2010 2221:ISBN 2181:ISSN 2123:ISSN 2025:ISBN 1853:ISSN 1803:ISSN 1762:ISBN 1720:5681 1686:ISBN 1640:ISSN 1536:2022 1520:ISSN 1497:2020 1469:2015 1447:2008 1396:2008 1365:2014 1334:5306 1308:2021 974:JPEG 875:bits 861:and 735:. A 700:The 390:bits 338:yarn 108:STEG 3896:and 3177:at 3131:or 2896:doi 2741:doi 2665:doi 2508:doi 2444:doi 2213:doi 2171:doi 2115:doi 2082:doi 2078:104 2017:doi 1986:doi 1888:doi 1845:doi 1795:doi 1732:doi 1678:doi 1632:doi 1598:doi 1436:doi 1346:doi 1029:). 352:in 336:on 222:'s 196:and 112:NOG 110:-ə- 4831:: 4261:/ 2918:. 2894:. 2872:^ 2855:. 2830:. 2805:. 2780:. 2757:. 2747:. 2735:. 2685:. 2644:. 2619:^ 2602:. 2573:. 2514:. 2460:. 2450:. 2442:. 2398:. 2361:. 2332:. 2298:. 2272:. 2246:. 2219:, 2179:. 2165:. 2161:. 2129:. 2121:. 2090:. 2076:. 2072:. 2033:. 2023:. 1992:. 1984:. 1972:47 1970:. 1966:. 1947:. 1894:. 1884:32 1882:. 1859:. 1851:. 1839:. 1835:. 1809:. 1801:. 1789:. 1785:. 1738:. 1730:. 1718:. 1694:. 1684:. 1646:. 1638:. 1628:35 1626:. 1622:. 1596:. 1586:90 1584:. 1518:. 1514:. 1488:. 1477:^ 1434:. 1422:87 1420:. 1416:. 1382:. 1352:. 1344:. 1328:. 1299:. 1045:. 960:, 909:. 838:. 782:, 743:. 716:, 538:. 424:, 356:. 295:. 270:. 250:. 186:. 4582:e 4575:t 4568:v 4416:) 4100:e 4093:t 4086:v 3687:e 3680:t 3673:v 3295:e 3288:t 3281:v 3158:) 3152:( 3147:) 3143:( 3139:. 3121:. 3089:. 3068:. 3049:. 3028:. 2995:. 2951:. 2929:. 2902:. 2898:: 2888:: 2866:. 2841:. 2816:. 2791:. 2765:. 2743:: 2671:. 2667:: 2648:. 2613:. 2584:. 2558:. 2531:. 2510:: 2489:. 2483:: 2468:. 2446:: 2436:: 2417:. 2380:. 2343:. 2314:. 2283:. 2257:. 2215:: 2187:. 2173:: 2167:2 2137:. 2117:: 2098:. 2084:: 2057:. 2041:. 2019:: 2000:. 1988:: 1978:: 1951:. 1932:. 1902:. 1890:: 1867:. 1847:: 1841:7 1817:. 1797:: 1791:6 1768:. 1746:. 1734:: 1726:: 1702:. 1680:: 1634:: 1604:. 1600:: 1592:: 1538:. 1499:. 1471:. 1449:. 1438:: 1398:. 1367:. 1348:: 1340:: 1310:. 278:, 146:( 136:( 92:/ 89:i 86:f 83:ə 80:r 77:ɡ 74:ɒ 71:n 68:ˈ 65:ə 62:ɡ 59:ɛ 56:t 53:s 50:ˌ 47:/ 43:( 29:.

Index

Stenography
List of commonly used taxonomic affixes

/ˌstɛɡəˈnɒɡrəfi/

STEG-ə-NOG-rə-fee
computer file
Greek
στεγανός
γραφή
Johannes Trithemius
Steganographia
cryptography
invisible ink
shared secret
security through obscurity
Kerckhoffs's principle
encrypted
pixel

Johannes Trithemius
Steganographia
Dr John Dee
Greece
Herodotus
Histories
Histiaeus
Aristagoras
Demaratus
wax tablet

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.