Time
4 hours 15 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:01
Hi. Welcome back to the course in this multi. We're going to learn what's steganography is on how to implement it to hide information in five. So let's begin.
00:13
According to some experts, stenography is the technique off hiring secret data within an ordinary known secret file or message. In order to avoid detection, the secret data is destructed at its destination.
00:30
The world to steganography comes from the Greek word. Stay on if meaning hidden or covered on the Greek root graph, meaning right,
00:41
there are no terrific abused toe conf you almost any type of digital content, including text image video or out your contents. The data to be hearing come behavior inside. I must any other type off the metal content
00:58
the counter to be concealed. Twist. Iconography is often created before being incorporated into the Nokia *** cover text file or data stream.
01:07
If not in Crete, the hidden text is commonly processed in some way to increase the difficulty off. Detecting the secret message.
01:15
There are 13 output is called the steak a text.
01:19
However, the area office steganography is too high data rather than in cretin it why there are many legitimate uses for steganography mayor, where developers have also be found to use a steganography to obscure the transmission off malicious cold
01:38
e mortar digital steganography. The data is first in Crete. It or office skated in some other way on, then inserted using a special algorithm into data that it's part of a particular file format. So Chas J. P g mash audio or video file.
01:57
The secret message can be embedded in tow. Ordinary data files in many different ways.
02:04
One technique is to hide data in beads that represent the same color. Picks is repeated in a row in Anne Must Fight by applying the in Crete a data tow this resident on Zeta in some Inco speak this way,
02:20
there soon will be any much file. There appears identical to do originally much,
02:24
but that has noise partners off free with our own encrypted data.
02:30
The practice off arena, watermark, trademark or other identifying data here in multimedia or other content files. It's one common use office. There are no Rafi
02:44
water. Market is a technique often used by online publishers to identify the source off media fires that have be found being shared without permission.
02:54
Why there are many different uses office steganography, including M bearing sensitive information into five types. One off the most common techniques is to embed a text file into any much file. When this is done, anyone viewing the image file,
03:13
you know, be able to see a difference between the original image file
03:16
under in Crete. That file This is accomplished by story in the message, with less significant beats in the data file. This process can be completed manually or with the youth off a steganography tool.
03:31
The primary advantage off Houston steganography to hide data over encryption is that it helps obscure the fact that very sensitive data hearing in the file or content car in the hearing text. Where us on in Crete it file
03:50
message or network packet payload
03:53
is clearly market on. Identifiable as such, you see Listerine honorific techniques. Health so skewed the presence off this accused channel
04:02
steganography is the state from cryptography, but you still both together Come hell. Improved the security off the protected information on prevent detection off the secret communication.
04:15
If he learnt data is us in created, the data might still be safe from detection, though they Tiana will no longer be safe from detection. Their advantages to using steganography, combined with correction over encryption on Lee communication
04:32
stenography so for is used to perform our area off functions to hide data, including encoding the day you have to prepare it to be here and inside another file
04:45
keeping track off wisp. Ease off the court text file contained here and data in Crete in the data to be hearing on extracted here and data by its intended recipient,
04:57
then our proprietary a swell as open source are free to use programs available for dinner. Stenography
05:05
Open stable is an open source. Tell Refugee program. Other programs can be characterized by the tight off data that can be hearing as well as what types off fires the day that can be heating inside.
05:19
Some online Stan refuse. So for tools include chow steganography, usedto hide secret files in BMP matches or W A V fires.
05:31
Another one is E. Muster nor a fee, a Java script tool that highest images inside other much fice
05:41
on Creature, a common line tool that is used to perform steganography
05:47
before finishing. Here's a quick question for you.
05:51
What does the worst they're gonna refugees.
05:55
Do you think it's a hit and fire
05:57
or be here and writing or see here and mash? Or maybe D? He didn't rock.
06:03
The answer here is be the war to sentinel graffiti comes from Greek history. I mean hidden writing.
06:14
To sum up daily office steganography is to hide data rather than in cretin it. This is becoming more and more important because users come before to reveal their passwords.
06:26
If there is no way for another sorry to prove they're increasing data insist on even more importance. No way for the owner of the data to prove that they can reveal all password. Then they can effectively the night they were in possession often create the data.
06:44
Please check the references for more information on Join me in the next video, where we will do a Hansel practice honest and or a fee

Up Next

Windows Forensics and Tools

The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.

Instructed By

Instructor Profile Image
Adalberto Jose Garcia
Information Security Analyst at Bigazi
Instructor