|
- Steganography - Wikipedia
Steganography includes the concealment of information within computer files In digital steganography, electronic communications may include steganographic coding inside a transport layer, such as a document file, image file, program, or protocol Media files are ideal for steganographic transmission because of their large size
- OpenPuff - Wikipedia
OpenPuff Steganography and Watermarking, sometimes abbreviated OpenPuff or Puff, is a free steganography tool for Microsoft Windows created by Cosimo Oliboni and still maintained as independent software
- Steganography tools - Wikipedia
Steganography architecture example - OpenPuff A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data It is not necessary to conceal the message in the original file at all
- List of steganography techniques - Wikipedia
List of steganography techniques Steganography ( ˌstɛɡəˈnɒɡrəfi ⓘ STEG-ə-NOG-rə-fee) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection
- Steganographic file system - Wikipedia
The final product is a file system that is hardly detected (depending on the steganographic layer) that can store any kind of file in a regular file system hierarchy TrueCrypt allows for "hidden volumes" - two or more passwords open different volumes in the same file, but only one of the volumes contains secret data
- Steganalysis - Wikipedia
Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography
- Stegomalware - Wikipedia
Stegomalware is a type of malware that uses steganography to hinder detection Steganography is the practice of concealing a file, message, image, or video within another file, message, image, video or network traffic This type of malware operates by building a steganographic system to hide malicious data within its resources and then extracts and executes them dynamically It is considered
- Digital watermarking - Wikipedia
Both steganography and digital watermarking employ steganographic techniques to embed data covertly in noisy signals While steganography aims for imperceptibility to human senses, digital watermarking tries to control the robustness as top priority
|
|
|