Questions tagged [steganography]
Steganography is the art of hiding data within other data. Ann sends a message to Bob. With encryption Eve could see the message but not read it. With steganography Eve would not see the message.
128
questions
0
votes
0
answers
53
views
EEPROM with HDD calibration data
I understand that in a Hard Disk Drive (HDD) there is EEPROM which stores calibration data. This is not directly accessible by any ring-3 (usermode) or ring-0 (kernel mode) programs.
I was curious as ...
2
votes
1
answer
268
views
Is hiding passwords in an image file a safe place to store them?
I don't even know if this counts as steganography, but I have some passwords that are randomly generated characters. I have saved them by simply opening a picture file using a text viewer and pasting ...
0
votes
1
answer
124
views
Covert channel definition conflicts regarding steganography
I'm under the impression that stegonographic manipulation of file names or packet timing would qualify as a storage covert channel and a timing covert channel respectively.
I came across this ...
4
votes
0
answers
337
views
Detecting messages embedded in a jpg image with OutGuess
To begin, please someone correct me if I am wrong, but I believe OutGuess was definitively broken in the paper "Attacking the OutGuess" in 2002 and this attack was never patched. It seems ...
1
vote
1
answer
146
views
Secrecy of the method in steganography
Is it considered a bad practice to use a secret method to encode data in steganography? We all know that it is a bad practice in cryptography, for at least two reasons:
A public method can be checked ...
-1
votes
1
answer
251
views
Steganographically hide encrypted packets for VPN, Tor, etc?
We all know about different encryption methods used today in secured connections like VPN, Tor, etc.
However, there is an issue with usage of those. Even if the outsider can not decrypt the message, ...
1
vote
0
answers
526
views
How to encrypt and hide a GNU/Linux operating system and create a decoy system?
My goal is to be protected against key disclosure laws and possible extortion. I know dm-crypt can be used to perform full disk encryption for GNU/Linux distros. However, it is not enough. I want to ...
1
vote
1
answer
243
views
Real-world application of network steganography
I recently came across a topic of network steganography, mostly connected with modifying the headers of IP, TCP, ICMP. I was looking for some real-world examples of malware that uses it. I only found ...
0
votes
0
answers
229
views
Are any social media sites sanitizing images?
I'm new to steganography. I have some questions about images on social media sites.
I saw that Facebook recently patched a vulnerability on Instagram, but I was wondering whether any of the major ...
1
vote
2
answers
670
views
Hiding text string with steganographic method - practical problem
I'd like to ask for small hint with following problem:
Using the steganographic method of the least significant bits, hide
the text string "Kra" in four pixels of color with RGB code
. Hide ...
0
votes
1
answer
715
views
Steganography CTF question
I have recently participated in a CTF competition and failed in the following stage where the solution was never revealed.
After a really hard job I got access to a text file that contains a really ...
0
votes
0
answers
41
views
What can a jpg with a small width and height hide? [duplicate]
I'm new to cybersecurity. I am participating in the cybersec challenge.
I have an image to analyze. This image is small but super heavy. I thought that there was a message hidden behind but all my ...
0
votes
0
answers
55
views
How to analyze files for malware using steganography? [duplicate]
There are ways that a file [.jpg, .pdf, .png, etc..] can contain a malware using steganography.
How can a file be analyze in order to verify it doesn't contain any malware?
0
votes
1
answer
2k
views
How to detect malware in images
Do commercial AV suites examine image files (pictures) for potential malware that might be imbedded via steganography? Is this a concern for most?
I deal with a lot of imagery data and am wondering ...
0
votes
2
answers
3k
views
Which would be the best "keyfile" for KeepassXC and/or Veracrypt?
I am a Mac user. I opened a keyfile generated by Veracrypt and one generated by KeepassXC. The texts in both of them were quite short. Which keyfile is best (i.e., most random and harder to break ...