Steganography

Steganography is the art and science of hiding a secret message, file, or data within an ordinary, non-secret file or message, known as the carrier or covertext. Unlike cryptography, which scrambles a message to make it unreadable but does not hide its existence, steganography's primary goal is to conceal the very fact that a secret communication is occurring. This is often achieved by subtly altering the data of a carrier file, such as an image, audio, or video file, in ways that are imperceptible to human senses, for instance, by modifying the least significant bits of pixel data in a picture. In cybersecurity, this technique can be used by malicious actors to exfiltrate data or deliver malware undetected, or by legitimate parties to protect sensitive communications from surveillance.

  1. Introduction to Steganography
    1. Defining Steganography
      1. Etymology and Historical Context
      2. Core Principles
        1. Secrecy of Communication
          1. Concealment vs. Encryption
            1. Covert Communication Channels
            2. Imperceptibility
              1. Human Perception Limitations
                1. Visual Perception Thresholds
                  1. Auditory Perception Limits
                    1. Cognitive Processing Constraints
                    2. Statistical Indistinguishability
                      1. First-Order Statistics
                        1. Higher-Order Statistics
                          1. Distribution Preservation
                        2. Capacity
                          1. Trade-offs with Imperceptibility
                            1. Measuring Payload Size
                              1. Absolute Capacity
                                1. Relative Capacity
                                  1. Effective Capacity
                                  2. Capacity Bounds
                                  3. Robustness
                                    1. Resistance to Modification
                                      1. Intentional Attacks
                                        1. Unintentional Modifications
                                        2. Resilience to Compression and Noise
                                          1. Lossy Compression Effects
                                            1. Channel Noise Impact
                                              1. Signal Processing Operations
                                          2. Steganography vs. Cryptography
                                            1. Goals and Objectives
                                              1. Confidentiality
                                                1. Concealment of Existence
                                                  1. Authentication
                                                    1. Integrity
                                                    2. Visibility of Communication
                                                      1. Detectability of Encrypted vs. Hidden Data
                                                        1. Suspicion Avoidance
                                                        2. Combined Usage
                                                          1. Crypto-Steganography Concepts
                                                            1. Layered Security Approaches
                                                              1. Defense in Depth
                                                            2. Key Terminology
                                                              1. Cover Medium
                                                                1. Covertext
                                                                  1. Cover File
                                                                    1. Cover Object Properties
                                                                    2. Stego-Medium
                                                                      1. Stegotext
                                                                        1. Stego File
                                                                          1. Stego Object Characteristics
                                                                          2. Payload
                                                                            1. Secret Message Types
                                                                              1. Text Messages
                                                                                1. Binary Data
                                                                                  1. Executable Code
                                                                                    1. Multimedia Content
                                                                                    2. Payload Size Considerations
                                                                                      1. Maximum Capacity
                                                                                        1. Optimal Payload Size
                                                                                      2. Steganographic Key
                                                                                        1. Key Generation
                                                                                          1. Random Key Generation
                                                                                            1. Deterministic Key Derivation
                                                                                            2. Key Distribution
                                                                                              1. Secure Key Exchange
                                                                                                1. Key Management Protocols
                                                                                              2. Embedding Algorithm
                                                                                                1. Embedding Process Overview
                                                                                                  1. Embedding Strategies
                                                                                                    1. Error Correction Integration
                                                                                                    2. Extraction Algorithm
                                                                                                      1. Extraction Process Overview
                                                                                                        1. Blind vs. Non-blind Extraction
                                                                                                          1. Error Detection and Correction