SlideShare a Scribd company logo
By Harsh Madhani Computer Engineering  Steganography
cryptography κρυπό   ς hidden γραφία writing A secret manner of writing, … Generally, the art of writing or solving ciphers.  —  Oxford English Dictionary
cryptology κρυπός hidden λογια speaking 1967  D. Kahn,  Codebreakers  p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them.  —  Oxford English Dictionary
Steganography στεγανός covered γραφία writing The art of secret (hidden) writing
STEGANOGRAPHY PATS   A   HORNY   EGG
Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content persistent under transmission not encryption original image/file is intact not fingerprinting fingerprinting leaves separate file describing contents
Steganography includes the concealment of information within computer files. In digital Steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.  Media files are ideal for steganographic transmission because of their large size.  As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th  pixel  to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
Classic techniques Invisible ink (1st century AD - WW II) Tatoo message on head Overwrite select characters in printed type in pencil look for the gloss Pin punctures in type Microdots (WW II) Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
Digital Steganography Modern Steganography entered the world in 1985 with the advent of the personal computer being applied to classical Steganography problems. Over 925 digital  Steganography applications  have been identified by the Steganography Analysis and Research Center.Digital Steganography techniques include: Concealing messages within the lowest bits of  noisy  images or sound files. Chaffing and winnowing .
Concealed messages in tampered executable files, exploiting redundancy in the targeted  instruction set .  Pictures embedded in video material (optionally played at slower or faster speed).  Injecting imperceptible delays to packets sent over the network from the keyboard.  Delays in keypresses in some applications ( telnet  or  remote desktop software ) can mean a delay in packets, and the delays in the packets can be used to encode data.  Image  bit-plane complexity segmentation Steganography
Chaffing & Winnowing Separate good messages from the bad ones Stream of unencoded messages with signatures Some signatures are bogus Need key to test Alice Bob Irene ? ? ? ? × × × OK M 0 M 3 M 1 M 2 M 0 M 3 M 1 M 2 M 0 M 3 M 1 M 2
Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst
Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.
Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst B ig  r umble  i n  N ew  G uinea. T he  w ar  o n c elebrity  a cts  s hould  e nd  s oon. O ver  f our b ig  e cstatic  e lephants  r eplicated. Bring two cases of beer.
Network Steganography Network Steganography utilizes communication protocols' control elements and their basic intrinsic functionality. Typical network Steganography methods involve modification of the properties of a single network protocol. Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol Steganography. [14]
Steganophony - the concealment of messages in  Voice-over-IP  conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields.
Image watermarking Spatial domain watermarking bit flipping color separation Frequency domain watermarking embed signal in select frequency bands (e.g. high frequency areas) apply FFT/DCT transform first e.g. Digimarc watermark should alter the least perceptible bits these are the same bits targeted by lossy image compression software
UV Watermarking
Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/
Machine ID codes in laser printers
Machine ID codes in laser printers
Machine ID codes in laser printers
Text Text lines shifted up/down (40 lines text    2 40  codes) word space coding character encoding - minor changes to shapes of characters
Text Text lines shifted up/down (40 lines text    2 40  codes) word space coding character encoding - minor changes to shapes of characters works only on “images” of text e.g.,  PDF , postscript
Image Steganography Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant  bits  of each  color component  and a subsequent  normalization .  Image of a cat extracted from the tree image besides.
Audio Perceptual coding inject signal into areas that will not be detected by humans may be obliterated by compression Hardware with copy-protection not true watermarking - metadata present on media DAT minidisc presence of copy protection mechanisms often failed to give the media wide-spread acceptance
Video Coding still frames - spatial or frequency data encoded during refresh closed captioning visible watermarking used by most networks (logo at bottom-right)
Data Embedding Security Schemes One of the areas that improves steganographic robustness is usage of a key scheme for embedding messages.Key scheme term means a procedure of how to use key steganographic system based on the extent of its use. However, when the steganographic robustness is increased a bandwidth of the whole embedding system is decreased. Therefore the task of a scheme selection for achieving the optimal values of the steganographic system is not trivial.
The first level of protection is determined only by the choice of embedding algorithm. This may be the least significant bits modification algorithm, or algorithms for modifying the frequency or spatial-temporal characteristics of the container. The first level of protection is presented in any steganographic channel. Steganographic system in this case can be represented as shown at  The First Protection Level Scheme  figure.
The second protection level of the steganographic system, as well as all levels of protection of the higher orders, is characterized by the use of Key (password) via steganographic modification. An example of a simple key scheme, which provides a second level of protection, is to write the unmodified or modified password in the top or bottom of the message; or the distribution of the password sign on the entire length of the steganographic channel. Such key schemes do not affect the distribution of messages through the container and do not use a message preprocessing according to the defined key (see figure  The Second Protection Level Scheme ). This kind of steganographic systems are used in such tasks as, for instance, adding a digital signature for proof of copyright. Data embedding performance is not changed in comparison with the fastest approach of the first protection level usage.
Steganographic data channels that use key schemes based distribution of a message through the container and or preprocessing of an embedded message for data hiding are more secure. When the third protection level key scheme is used it affects the distribution of a message through the container (see figure  The Third Protection Level Scheme , where  F(P, L)  – distribution function of a message within a container;  P  – minimum number of container samples that are needed to embed one message sample;  L  – step of a message distribution within a container). Accordingly, the performance of container processing will be lower than in the case of the first and the second key schemes. Taking into account that  P≥L , the simplest representation of the  F(P, L)  function could be as following: F(P, L) = cycle*L + step*P,
The difference between the fourth protection level scheme and the third one is that in steganographic system there are two distribution functions of a message within a container are used. The first is responsible for a message samples selection according to some function  G(Q, N) , and the second function  F(P, L)  is responsible for position selection in a container for message sample hiding. Here  Q  – the size of message block to be inserted;  N  – the size (in bits) of one sample of the message file (see figure  The Fourth Protection Level Scheme ).
Countermeasures and detection In computing, detection of steganographically encoded packages is called  steganalysis . The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload.  Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications.All files on a suspect filesystem can be hashed using a  hash function  and then compared to a  hash table  of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information. A similar approach can be used to scan files over network links in real-time.
Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications.All files on a suspect filesystem can be hashed using a  hash function  and then compared to a  hash table  of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information.
Difference between Cryptography and Steganography & Watermarking Cryptography hides the content of the message, but not the existence of the message; steganography & watermarking hide both the contents and existence of the message.
Then what is the difference between Steganography and Watermarking? Steganography performs message hiding such that an attacker cannot detect the presence of the message in the image/video/audio; watermarking hides the message such that an attacker cannot tamper with the message contained within the image/video/audio.
Applications Used in modern printers Allegedly used by terrorists. e.g. It is alleged that Al-Queda used Chaffing to encrypt messages at time of 9/11 and exchanging images via ebay.com. Alleged use by intelligence services:  In 2010, the FBI revealed that the Russian foreign intelligence uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents“ stationed abroad. Digital Watermarking
The conclusion is that in this world there are still  setec astronomy The Conclusion too many secrets
IT MEANS: THANK YOU  Hanky Out

More Related Content

PPTX
Steganography
PPTX
Steganography in images
PPT
Steganography presentation
PPTX
Steganography
PPT
Steganography - The art of hiding data
PPTX
Steganography presentation
PPT
Steganography
Steganography
Steganography in images
Steganography presentation
Steganography
Steganography - The art of hiding data
Steganography presentation
Steganography

What's hot (20)

PDF
Steganography: LSB technique
PPTX
Image steganography and cryptography
PPTX
Steganography
DOCX
Audio Steganography synopsis
PPT
Steganography
PDF
Steganography
PDF
Image Steganography Project Report
PPTX
Image steganography
PPTX
About Steganography
PPTX
steganography
PPTX
PPT steganography
PPTX
SEMINAR ON staganography
PPTX
Steganography Project
PPTX
Steganography in images
PPT
Data hiding - Steganography
PPT
Steganography.
PDF
Presentation On Steganography
PPT
Steganography
PPTX
steganography
PPT
Steganography
Steganography: LSB technique
Image steganography and cryptography
Steganography
Audio Steganography synopsis
Steganography
Steganography
Image Steganography Project Report
Image steganography
About Steganography
steganography
PPT steganography
SEMINAR ON staganography
Steganography Project
Steganography in images
Data hiding - Steganography
Steganography.
Presentation On Steganography
Steganography
steganography
Steganography
Ad

Viewers also liked (16)

PPTX
Cryptography
PPTX
Cryptography Presentation
PPTX
Cryptography
PPT
Cryptography
PPTX
Cryptography by Afroz haider mir
PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography Intro
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Introduction to Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography
PPTX
cryptography
PPTX
Cryptography
Cryptography
Cryptography Presentation
Cryptography
Cryptography
Cryptography by Afroz haider mir
Cryptography
Cryptography
Cryptography Intro
Cryptography
Introduction to Cryptography
Introduction to Cryptography
Cryptography
Cryptography
Cryptography
cryptography
Cryptography
Ad

Similar to Steganography (20)

PDF
Hiding Text within Image Using LSB Replacement
PDF
Hiding Image within Video Clip
PDF
Stegonoraphy
PDF
A Secure Data Communication System Using Cryptography and Steganography
PDF
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
PPTX
Steganography - Hiding in plain sight.pptx
PPTX
Steganography and its techniques
PPTX
Steganography
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
B03208016
PDF
Secure data transmission by using steganography
PDF
11.secure data transmission by using steganography
PPTX
Steganoghraphy
PDF
A Review Paper On Steganography Techniques
PDF
Securing Web Communication Using Three Layer Image Shielding
PDF
Blind Key Steganography Based on Multilevel Wavelet and CSF
DOCX
Steganography using visual cryptography: Report
PDF
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PDF
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Hiding Text within Image Using LSB Replacement
Hiding Image within Video Clip
Stegonoraphy
A Secure Data Communication System Using Cryptography and Steganography
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
Steganography - Hiding in plain sight.pptx
Steganography and its techniques
Steganography
International Journal of Computational Engineering Research(IJCER)
B03208016
Secure data transmission by using steganography
11.secure data transmission by using steganography
Steganoghraphy
A Review Paper On Steganography Techniques
Securing Web Communication Using Three Layer Image Shielding
Blind Key Steganography Based on Multilevel Wavelet and CSF
Steganography using visual cryptography: Report
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
AUDIO STEGANOGRAPHY PRESENTATION
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
A Presentation on Artificial Intelligence
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.

Steganography

  • 1. By Harsh Madhani Computer Engineering Steganography
  • 2. cryptography κρυπό ς hidden γραφία writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary
  • 3. cryptology κρυπός hidden λογια speaking 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary
  • 4. Steganography στεγανός covered γραφία writing The art of secret (hidden) writing
  • 5. STEGANOGRAPHY PATS A HORNY EGG
  • 6. Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content persistent under transmission not encryption original image/file is intact not fingerprinting fingerprinting leaves separate file describing contents
  • 7. Steganography includes the concealment of information within computer files. In digital Steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
  • 8. Classic techniques Invisible ink (1st century AD - WW II) Tatoo message on head Overwrite select characters in printed type in pencil look for the gloss Pin punctures in type Microdots (WW II) Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
  • 9. Digital Steganography Modern Steganography entered the world in 1985 with the advent of the personal computer being applied to classical Steganography problems. Over 925 digital Steganography applications have been identified by the Steganography Analysis and Research Center.Digital Steganography techniques include: Concealing messages within the lowest bits of noisy images or sound files. Chaffing and winnowing .
  • 10. Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set . Pictures embedded in video material (optionally played at slower or faster speed). Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications ( telnet or remote desktop software ) can mean a delay in packets, and the delays in the packets can be used to encode data. Image bit-plane complexity segmentation Steganography
  • 11. Chaffing & Winnowing Separate good messages from the bad ones Stream of unencoded messages with signatures Some signatures are bogus Need key to test Alice Bob Irene ? ? ? ? × × × OK M 0 M 3 M 1 M 2 M 0 M 3 M 1 M 2 M 0 M 3 M 1 M 2
  • 12. Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst
  • 13. Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.
  • 14. Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst B ig r umble i n N ew G uinea. T he w ar o n c elebrity a cts s hould e nd s oon. O ver f our b ig e cstatic e lephants r eplicated. Bring two cases of beer.
  • 15. Network Steganography Network Steganography utilizes communication protocols' control elements and their basic intrinsic functionality. Typical network Steganography methods involve modification of the properties of a single network protocol. Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol Steganography. [14]
  • 16. Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields.
  • 17. Image watermarking Spatial domain watermarking bit flipping color separation Frequency domain watermarking embed signal in select frequency bands (e.g. high frequency areas) apply FFT/DCT transform first e.g. Digimarc watermark should alter the least perceptible bits these are the same bits targeted by lossy image compression software
  • 19. Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/
  • 20. Machine ID codes in laser printers
  • 21. Machine ID codes in laser printers
  • 22. Machine ID codes in laser printers
  • 23. Text Text lines shifted up/down (40 lines text  2 40 codes) word space coding character encoding - minor changes to shapes of characters
  • 24. Text Text lines shifted up/down (40 lines text  2 40 codes) word space coding character encoding - minor changes to shapes of characters works only on “images” of text e.g., PDF , postscript
  • 25. Image Steganography Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization . Image of a cat extracted from the tree image besides.
  • 26. Audio Perceptual coding inject signal into areas that will not be detected by humans may be obliterated by compression Hardware with copy-protection not true watermarking - metadata present on media DAT minidisc presence of copy protection mechanisms often failed to give the media wide-spread acceptance
  • 27. Video Coding still frames - spatial or frequency data encoded during refresh closed captioning visible watermarking used by most networks (logo at bottom-right)
  • 28. Data Embedding Security Schemes One of the areas that improves steganographic robustness is usage of a key scheme for embedding messages.Key scheme term means a procedure of how to use key steganographic system based on the extent of its use. However, when the steganographic robustness is increased a bandwidth of the whole embedding system is decreased. Therefore the task of a scheme selection for achieving the optimal values of the steganographic system is not trivial.
  • 29. The first level of protection is determined only by the choice of embedding algorithm. This may be the least significant bits modification algorithm, or algorithms for modifying the frequency or spatial-temporal characteristics of the container. The first level of protection is presented in any steganographic channel. Steganographic system in this case can be represented as shown at The First Protection Level Scheme figure.
  • 30. The second protection level of the steganographic system, as well as all levels of protection of the higher orders, is characterized by the use of Key (password) via steganographic modification. An example of a simple key scheme, which provides a second level of protection, is to write the unmodified or modified password in the top or bottom of the message; or the distribution of the password sign on the entire length of the steganographic channel. Such key schemes do not affect the distribution of messages through the container and do not use a message preprocessing according to the defined key (see figure The Second Protection Level Scheme ). This kind of steganographic systems are used in such tasks as, for instance, adding a digital signature for proof of copyright. Data embedding performance is not changed in comparison with the fastest approach of the first protection level usage.
  • 31. Steganographic data channels that use key schemes based distribution of a message through the container and or preprocessing of an embedded message for data hiding are more secure. When the third protection level key scheme is used it affects the distribution of a message through the container (see figure The Third Protection Level Scheme , where F(P, L) – distribution function of a message within a container; P – minimum number of container samples that are needed to embed one message sample; L – step of a message distribution within a container). Accordingly, the performance of container processing will be lower than in the case of the first and the second key schemes. Taking into account that P≥L , the simplest representation of the F(P, L) function could be as following: F(P, L) = cycle*L + step*P,
  • 32. The difference between the fourth protection level scheme and the third one is that in steganographic system there are two distribution functions of a message within a container are used. The first is responsible for a message samples selection according to some function G(Q, N) , and the second function F(P, L) is responsible for position selection in a container for message sample hiding. Here Q – the size of message block to be inserted; N – the size (in bits) of one sample of the message file (see figure The Fourth Protection Level Scheme ).
  • 33. Countermeasures and detection In computing, detection of steganographically encoded packages is called steganalysis . The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications.All files on a suspect filesystem can be hashed using a hash function and then compared to a hash table of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information. A similar approach can be used to scan files over network links in real-time.
  • 34. Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications.All files on a suspect filesystem can be hashed using a hash function and then compared to a hash table of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information.
  • 35. Difference between Cryptography and Steganography & Watermarking Cryptography hides the content of the message, but not the existence of the message; steganography & watermarking hide both the contents and existence of the message.
  • 36. Then what is the difference between Steganography and Watermarking? Steganography performs message hiding such that an attacker cannot detect the presence of the message in the image/video/audio; watermarking hides the message such that an attacker cannot tamper with the message contained within the image/video/audio.
  • 37. Applications Used in modern printers Allegedly used by terrorists. e.g. It is alleged that Al-Queda used Chaffing to encrypt messages at time of 9/11 and exchanging images via ebay.com. Alleged use by intelligence services: In 2010, the FBI revealed that the Russian foreign intelligence uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents“ stationed abroad. Digital Watermarking
  • 38. The conclusion is that in this world there are still setec astronomy The Conclusion too many secrets
  • 39. IT MEANS: THANK YOU Hanky Out