Category: Steganography

Mimic function
A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that appro
Johannes Trithemius
Johannes Trithemius (/trɪˈθɛmiəs/; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a lexicographe
OutGuess is a steganographic software for hiding data in the most redundant content data bits of existing (media) files. It has handlers for image files in the common Netpbm and JPEG formats, so it ca
Canary trap
A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false
Bacon's cipher
Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.
StegoShare is a steganography tool that allows embedding of large files into multiple images. It may be used for anonymous file sharing.
Covert channel
In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the compute
BPCS-steganography (Bit-Plane Complexity Segmentation steganography) is a type of digital steganography. Digital steganography can hide confidential data (i.e. secret files) very securely by embedding
Security printing
Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stoc
Polyglot (computing)
In computing, a polyglot is a computer program or script written in a valid form of multiple programming languages or file formats. The name was coined by analogy to multilingualism. A polyglot file i
Rubberhose (file system)
In computing, rubberhose (also known by its development codename Marutukku) is a deniable encryption archive containing multiple file systems whose existence can only be verified using the appropriate
Steganographic file system
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size fi
Steganographia is a book on steganography, written in c. 1499 by the German Benedictine about and polymath Johannes Trithemius.
Polybius square
The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is
Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.
OpenPuff Steganography and Watermarking, sometimes abbreviated OpenPuff or Puff, is a free steganography tool for Microsoft Windows created by Cosimo Oliboni and still maintained as independent softwa
StegFS is a free steganographic file system for Linux based on the ext2 filesystem. It is licensed under the GPL. It was principally developed by and Markus G. Kuhn. The last version of StegFS is 1.1.
Aburidashi is a ninja technique of sending secret messages using a form of invisible ink. The technique uses ink made of juice extracted from soaked and crushed soybeans. The message becomes visible t
Microprinting is the production of recognizable patterns or characters in a printed medium at a scale that requires magnification to read with the naked eye. To the unaided eye, the text may appear as
Machine Identification Code
A Machine Identification Code (MIC), also known as printer steganography, yellow dots, tracking dots or secret dots, is a digital watermark which certain color laser printers and copiers leave on ever
Steganography tools
A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data. It is not necessary to conceal the message in the origin
40-track mode
40-track mode is a steganographic technique that allows for hidden data on a 3.5 inch floppy diskette.
Steganography (/ˌstɛɡəˈnɒɡrəfi/ STEG-ə-NOG-rə-fee) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not e
Invisible ink
Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means,
A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around 1 millimetre (0.039 in) in diameter but can be ma
Null cipher
A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steg