Useful Links
Computer Science
Cybersecurity
Steganography
1. Introduction to Steganography
2. Historical Overview of Steganography
3. Steganographic Techniques by Carrier Medium
4. Steganalysis: The Art of Detection
5. Evaluating Steganographic Systems
6. Applications and Use Cases
7. Tools and Implementation
8. Advanced and Modern Concepts
Applications and Use Cases
Legitimate and Defensive Uses
Protecting Sensitive Communications
Diplomatic Messaging
Embassy Communications
International Negotiations
Crisis Communication
Personal Privacy
Journalist Source Protection
Whistleblower Communications
Activist Coordination
Corporate Communications
Trade Secret Protection
Merger and Acquisition Discussions
Competitive Intelligence
Digital Watermarking for Copyright Protection
Ownership Verification
Author Attribution
Creation Timestamp
Distribution Tracking
Tamper Detection
Integrity Verification
Modification Detection
Authentication
Broadcast Monitoring
Content Usage Tracking
Royalty Collection
Data Annotation and Metadata Tagging
Medical Imaging
Patient Information Embedding
Diagnostic Data Annotation
Treatment History
Scientific Data
Experimental Parameters
Calibration Information
Processing History
Digital Archives
Provenance Information
Cataloging Data
Access Control
Medical Record Privacy
Patient Data Protection
HIPAA Compliance
Cross-Border Data Transfer
Research Data Anonymization
Military and Intelligence
Operational Security
Covert Operations
Intelligence Gathering
Law Enforcement
Undercover Operations
Evidence Protection
Witness Protection
Malicious and Offensive Uses
Data Exfiltration by Insiders or Malware
Corporate Espionage
Intellectual Property Theft
Customer Data Theft
Financial Information
Data Breach Techniques
Slow Data Leakage
Detection Evasion
Attribution Avoidance
Advanced Persistent Threats
Long-Term Infiltration
Lateral Movement
Data Staging
Command and Control (C2) Communication for Botnets
Steganographic C2 Channels
Social Media Platforms
Image Hosting Services
Video Streaming Sites
Botnet Coordination
Task Distribution
Update Delivery
Status Reporting
Malware Payload Delivery
Concealed Code Distribution
Executable Hiding
Script Embedding
Library Injection
Multi-Stage Attacks
Dropper Mechanisms
Payload Decryption
Sandbox Evasion
Covert Communication for Criminal/Terrorist Activities
Evasion of Surveillance
Law Enforcement Monitoring
Intelligence Agency Detection
Network Traffic Analysis
Coordination and Planning
Attack Coordination
Resource Distribution
Operational Security
Emerging Applications
Internet of Things (IoT) Security
Blockchain and Cryptocurrency
Cloud Computing Security
Mobile Device Security
Previous
5. Evaluating Steganographic Systems
Go to top
Next
7. Tools and Implementation