Steganography (pronounced: steh·guh·naa·gruh·fee) is the technique of hiding data secretly within one ordinary, non-secret, document or message in stimulate to prevent detection. The usage of steganography have the right to be linked with encryption as an extra step for hiding or protecting data. Steganography deserve to be used to conceal virtually any form of digital content, consisting of text, image, video or audio content; the data to it is in hidden deserve to be hidden inside nearly any other form of digital content.

You are watching: Which areas of a file cannot be used by steganography to hide data?

In modern-day digital steganography, data is frequently encrypted and then inserted, utilizing a special algorithm, right into data the is component of a particular file such together a JPEG image, audio, or video file. The mystery message can be installed into plain data records in plenty of different ways. One method is come hide data in bits that stand for the same color pixels repeated in a row in picture file. By applying the encrypted data to this redundant data in part inconspicuous way, the result will it is in an image file that shows up identical come the original image but that has actually “noise” fads of regular, unencrypted data.

The exercise of including a watermark, a trademark or various other identifying data surprise in multimedia or various other content files, is one usual legitimate use of steganography. Watermarking is a technique often provided by digital publishers to identify their own source material in media files that have been found shared without your permission.

Illegitimate uses of steganography encompass hiding illegal pornographic contents inside innocuous image files, moving malware hidden inside otherwise for sure files, or ex-filtrating stolen intellectual property indigenous a company inside unauthorized looking photo files.

See more: The “An It Harm None Do What Thou Wilt But Harm None, The Wiccan Rede

Source: SearchSecurity

Additional Reading: Malware distribution Reboot with Steganography

How to send message that also the NSA, FBI, and also CIA cannot read

Related Terms: Cryptography, Encryption


 

For the average SMB, steganography go not carry out a quantifiable risk to your organization. The exploration of steganographic file usage is very difficult, expensive, and does not frequently yield the outcomes of what to be encrypted and embedded in ~ the records in question. Due to the fact that most SMB’s have many much larger holes with which their data have the right to flow, the is advisable simply to be aware that this technology and an approach exists. SMBs should emphasis their very restricted resources on the largest threats they face: a lack of training employee on common strike vectors favor phishing attacks and also weak or negative password hygiene. Deal with these two vital issues and your SMB will have addressed the two largest risks involved in, by part accounts, 92% of all SMB breaches.