

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A concise overview of various steganography techniques, including image, document, folder, video, audio, whitespace, web, and c++ source code steganography. It also mentions different steganography scenarios, such as stego-only, known-stego, known message, known-cover, and chosen-message. Finally, it lists a steganography detection tool, gargoyle investigator forensic pro.
Typology: Exams
1 / 2
This page cannot be seen from the preview
Don't miss anything!
Image Steganography ✔✔Hiding information in image files Document steganography ✔✔Adds white spaces and tabs to the ends of the lines Folder Steganography ✔✔Hiding one or more files in a folder Video steganography ✔✔Hiding files in a video file Audio Steganography ✔✔Hidden messages in digital sound White space steganography ✔✔User hides messages in ASCII text Web steganography ✔✔Hides objects dehind ither objects and uploads to web server C++ Source code steganography ✔✔Hides a set of tools in the files
Stego-only ✔✔Access to only stego medium or stego object Known-stego ✔✔Knows the algorithm and stego ibject Known Message ✔✔Message and stego medium are available Known-cover ✔✔Both stego object and original cover-medium Chosen- message ✔✔Uses known message to generate a stego object Chosen-stego ✔✔Knows bith stego object and tool or algorithm Gargoyle Investigator Forensic Pro ✔✔Steganography detection tool