Concealing secrets in plain sight

Nothing Here

© Photo by Wes Hicks on Unsplash

© Photo by Wes Hicks on Unsplash

Article from Issue 287/2024
Author(s):

Intruders and spies have ways of concealing information in image files, doc files, and other innocuous locations. Welcome to the sneaky art of steganography.

Steganography is the art of passing secret information. Kapersky puts it this way: "Steganography is the practice of concealing information within another message or physical object to avoid detection. Steganography can be used to hide virtually any type of digital content, including text, image, video, or audio content. That hidden data is then extracted at its destination" [1].

This secretive process, which apparently dates back to ancient Greece, appears to have been named much later. The first recorded use of the term steganography was in 1499 by Johannes Trithemius in his Steganographia, "a treatise on cryptography and steganography, disguised as a book about magic" [2].

This article describes how attackers hide and extract potentially sensitive data. I will start by covering a sample of the types of steganography before looking at common ways of concealing information online. One common technique I'll describe in this article requires two message types: a container and a secret. The container conceals the secret from interception and ideally even conceals its existence.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News