s of each
color component and a subsequent
normalization. The hidden image is shown below. • Concealing messages within the lowest bits of
noisy images or sound files. A survey and evaluation of relevant literature/techniques on the topic of digital image steganography can be found here. • Concealing data within encrypted data or within random data. The message to conceal is encrypted, then used to overwrite part of a much larger block of encrypted data or a block of random data (an unbreakable cipher like the
one-time pad generates ciphertexts that look perfectly random without the private key). •
Chaffing and winnowing. •
Mimic functions convert one file to have the statistical profile of another. This can thwart statistical methods that help brute-force attacks identify the right solution in a
ciphertext-only attack. • Concealed messages in tampered executable files, exploiting redundancy in the targeted
instruction set. • Pictures embedded in video material (optionally played at a slower or faster speed). • Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications (
telnet or
remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data. • Changing the order of elements in a set. • Content-Aware Steganography hides information in the semantics a human user assigns to a
datagram. These systems offer security against a nonhuman adversary/warden. •
Blog-Steganography. Messages are
fractionalized and the (encrypted) pieces are added as comments of orphaned web-logs (or pin boards on social network platforms). In this case, the selection of blogs is the symmetric key that sender and recipient are using; the carrier of the hidden message is the whole
blogosphere. • Modifying the echo of a sound file (Echo Steganography). • Steganography for audio signals. • Image
bit-plane complexity segmentation steganography • Including data in ignored sections of a file, such as after the logical end of the carrier file. • Adaptive steganography: Skin tone based steganography using a secret embedding angle. • Embedding data within the
control-flow diagram of a program subjected to
control flow analysis • The text or multimedia output of some
generative artificial intelligence programs, such as
ChatGPT, can be altered to include steganographic data that is impossible to detect, even in theory, when compared with the natural output of the program.
Digital text • Using non-printing Unicode characters
Zero-Width Joiner (ZWJ) and
Zero-Width Non-Joiner (ZWNJ). These characters are used for joining and disjoining letters in Arabic and Persian, but can be used in Roman alphabets for hiding information because they have no meaning in Roman alphabets: because they are "zero-width" they are not displayed. ZWJ and ZWNJ can represent "1" and "0". This may also be done with
en space,
figure space and
whitespace characters. • Embedding a secret message in the pattern of deliberate errors and marked corrections in a word processing document, using the word processor's change tracking feature. • In 2020, Zhongliang Yang et al. discovered that for text generative steganography, when the quality of the generated steganographic text is optimized to a certain extent, it may make the overall statistical distribution characteristics of the generated steganographic text more different from the normal text, making it easier to be recognized. They named this phenomenon Perceptual-Statistical Imperceptibility Conflict Effect (Psic Effect).
Hiding an image within a soundfile An image or a text can be converted into a soundfile, which is then analysed with a
spectrogram to reveal the image. Various artists have used this method to conceal hidden pictures in their songs, such as
Aphex Twin in "
Windowlicker" or
Nine Inch Nails in their album
Year Zero.
Streaming media Since the era of evolving network applications, steganography research has shifted from image steganography to steganography in
streaming media such as
Voice over Internet Protocol (VoIP). • In 2003, Giannoula et al. developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis. • In 2005, Dittmann et al. studied steganography and watermarking of multimedia contents such as VoIP. • In 2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganography is the first-ever effort to improve the codebook partition by using
Graph theory along with Quantization Index Modulation in low bit-rate streaming media. • In 2011 and 2012, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert VoIP steganography. Their findings were published in
IEEE Transactions on Information Forensics and Security.
Cyber-physical systems/Internet of Things Academic work since 2012 demonstrated the feasibility of steganography for
cyber-physical systems (CPS)/the
Internet of Things (IoT). Some techniques of CPS/IoT steganography overlap with network steganography, i.e. hiding data in communication protocols used in CPS/the IoT. However, specific techniques hide data in CPS components. For instance, data can be stored in unused registers of IoT/CPS components and in the states of IoT/CPS actuators.
Network All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003. Contrary to typical steganographic methods that use digital media (images, audio and video files) to hide data, network steganography uses communication protocols' control elements and their intrinsic functionality. As a result, such methods can be harder to detect and eliminate. Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can be applied to the
protocol data unit (PDU), to the time relations between the exchanged PDUs, or both (hybrid methods). Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol steganography. Alternatively, multiple network protocols can be used simultaneously to transfer hidden information and so-called control protocols can be embedded into steganographic communications to extend their capabilities, e.g. to allow dynamic overlay routing or the switching of utilized hiding methods and network protocols. • In 1977,
Kent concisely described the potential for covert channel signaling in general network communication protocols, even if the traffic is encrypted (in a footnote) in "Encryption-Based Protection for Interactive User/Computer Communication," Proceedings of the Fifth Data Communications Symposium, September 1977. • In 1987,
Girling first studied covert channels on a
local area network (LAN), identified and realised three obvious covert channels (two storage channels and one timing channel), and his research paper entitled “Covert channels in LAN’s” published in
IEEE Transactions on Software Engineering, vol. SE-13 of 2, in February 1987. • In 1989,
Wolf implemented covert channels in LAN protocols, e.g. using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol. • In 1997,
Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels. • In 2002,
Kamran Ahsan made an excellent summary of research on network steganography. • In 2005, Steven J.
Murdoch and Stephen
Lewis contributed a chapter entitled "Embedding Covert Channels into TCP/IP" in the "
Information Hiding" book published by Springer. • Steganophony – the concealment of messages in
Voice-over-IP conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK – Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields. • WLAN Steganography – transmission of steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks) ==References==