Steganography

BPCS-steganography

BPCS-steganography (Bit-Plane Complexity Segmentation steganography) is a type of digital steganography. Digital steganography can hide confidential data (i.e. secret files) very securely by embedding them into some media data called "vessel data." The vessel data is also referred to as "carrier, cover, or dummy data". In BPCS-steganography true color images (i.e., 24-bit color images) are mostly used for vessel data. The embedding operation in practice is to replace the "complex areas" on the bit planes of the vessel image with the confidential data. The most important aspect of BPCS-steganography is that the embedding capacity is very large. In comparison to simple image based steganography which uses solely the least important bit of data, and thus (for a 24-bit color image) can only embed data equivalent to 1/8 of the total size, BPCS-steganography uses multiple bit-planes, and so can embed a much higher amount of data, though this is dependent on the individual image. For a 'normal' image, roughly 50% of the data might be replaceable with secret data before image degradation becomes apparent. (Wikipedia).

Video thumbnail

CERIAS Security: John Oritz: Steganography 2/6

Clip 2/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks,

From playlist The CERIAS Security Seminars 2008

Video thumbnail

CERIAS Security: John Oritz: Steganography 3/6

Clip 3/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks,

From playlist The CERIAS Security Seminars 2008

Video thumbnail

CERIAS Security: John Oritz: Steganography 6/6

Clip 6/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networ

From playlist The CERIAS Security Seminars 2008

Video thumbnail

CERIAS Security: John Oritz: Steganography 4/6

Clip 4/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks,

From playlist The CERIAS Security Seminars 2008

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

CERIAS Security: John Oritz: Steganography 5/6

Clip 5/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networ

From playlist The CERIAS Security Seminars 2008

Video thumbnail

Motorcycle camera - Raw footage 1/2

Raw footage from Dr Alex Stedmon's motorcycle camera test. One of two videos. For more information about Dr Stedmon's work and research, visit http://www.test-tube.org.uk/morestuff/bikesim_index.htm As part of his research into motorcycle ergonomics, Dr Alex Stedmon has been experimenti

From playlist Motorcycle research

Video thumbnail

Motorcycle camera - Raw footage 2/2

Raw footage from Dr Alex Stedmon's motorcycle camera test. One of two videos. For more information about Dr Stedmon's work and research, visit http://www.test-tube.org.uk/morestuff/bikesim_index.htm As part of his research into motorcycle ergonomics, Dr Alex Stedmon has been experimenti

From playlist Motorcycle research

Video thumbnail

GCSE Science Revision Chemistry "Chromatography"

Find my revision workbook here: https://www.freesciencelessons.co.uk/workbooks Image credit: Coloured pens By RRRST (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons

From playlist 9-1 GCSE Chemistry Paper 2 Chemical Analysis

Video thumbnail

Constructing The Second Largest Ship In The French Navy | Extreme Constructions | Spark

The Thunder Boat (Tonnerre) is the second-largest ship of the Marine Nationale. The structure is fitted with revolutionary equipment, with a range of high technologies, and is able to operate in a range of situations, as it did during Cyclone Irma in 2017 and Beirut in August 2020. This s

From playlist Documentaries To Fall Asleep To

Video thumbnail

CERIAS Security: John Oritz: Steganography 1/6

Clip 1/6 Speaker: John Oritz · SRA International Steganography is a discipline of computer science whose aim is to conceal the existence of information. Steganography synergizes various technologies including data compression, digital signal processing, information theory, data networks,

From playlist The CERIAS Security Seminars 2008

Video thumbnail

DEFCON 15: Real-time Steganography with RTP

Speaker: I)ruid Computer Academic Underground Real-time Transfer Protocol (RTP) is used almost ubiquitously by Voice over IP technologies to provide an audio channel for calls. As such, it provides ample opportunity for creation of a covert communications channel due to it's very nature a

From playlist DEFCON 15

Video thumbnail

Lecture 32: Steganography (hidden messages) - Richard Buckland UNSW

Extension lecture introducing steganography (hidden messages). Security via obscurity. Hidden messages in book Godel Escher Bach. In film Starship Troopers. In games. In cryptography. In teaching. Digital watermarking. SETI. Are we in a simulation? Extension lectures are for firs

From playlist CS1: Higher Computing - Richard Buckland UNSW

Video thumbnail

Blackhat Europe 2010: Steganography and Vulnerabilities in Popular Archives Formats 1/8

Clip 1/8 Speakers: Mario Vuksan, Tomislav Pericin & Brian Karney Exploiting archive formats can lead to steganographic data hiding and to processing errors with serious forensic consequences. These formats are very interesting as they are commonly found on every PC, Apple or Linux machine

From playlist Black Hat Europe 2010

Video thumbnail

!!Con 2022 - Shhh, Meet Me at Midnight!!! (Audio Steganography in Python) by Marlene Mhangami

Shhh, Meet Me at Midnight!!! (Audio Steganography in Python) The term ‘Audio Steganography’ is derived from the Greek words steganos, meaning “covered,” and graphein, meaning “to write”. It refers to the art of enabling secret communication that uses interesting methods to hide informatio

From playlist !!Con 2022

Related pages

Bit plane | Steganalysis | Steganography | Steganographic file system | Algorithm | Steganography tools