Articles about steganography

Apple Watch lineup

Apple Watch fanbois suffer PAINFUL RASH after sweaty wristjob action

Apple has been granted a couple of patents (here and there) on linking two devices using a moving graphic on the display of a watch. A camera on the device which is being paired reads an “invisible” image. The technology apes the 1994 Timex Datalink which employed flashing bars on the CRT of a computer running Windows 95 to …
Simon Rockman, 5 May 2015

Siri? Are you seeing another man?

A group of computer scientists from Italy and Poland reckon they can use steganography to hide covert messages in users' voice commands to Siri. What's interesting about the work, described in this paper at Arxiv, is that it doesn't involve installing new software on the target device. Rather, iStegSiri would exist as a man-in …
Nuclear bomb image

Intruder alert: Cyber thugs are using steganography to slip in malware badness

Common or garden cybercrooks have taken to using steganography – the art of hiding secret information within another image or message file – to run a click-fraud scam. Steganography has long been the stuff of spy trade-craft and cypherpunk novels, but now cybercrooks have made the practice downmarket by applying it to the Lurk …
John Leyden, 8 Aug 2014
Securus iFrame attack payload

iFrame attack injects code via PNGs

Security vendor Sucuri is warning that it's spotted an attack in the wild that embeds malicious code in PNG files. The iFrame injection attack loaded a valid jquery.js file with very little to alert even the researcher that something else was going on. As the company writes in this blog post, the only red flag in the code was …
The Register breaking news

Crypto boffins smuggle secret messages in silent Skype calls

Polish security researchers have come up with a cunning method to transmit hidden messages using the silence packets transmitted during a Skype call. The VoIP service transmits voice data in 130-byte packets, and silences in 70-byte packets, a difference that creates a potential means to conceal a hidden encrypted message in …
John Leyden, 9 Jan 2013

Boffins hide messages in Skype ‘silence packets’

A Warsaw-based security researcher says the packets that Skype sends during silence can be used to carry secret messages in a conversation. When participants in a call are speaking, Skype sends the audio in 130-byte packets, while during silence it sends 70-byte packets. According to New Scientist, Wojciech Mazurczyk of Warsaw …
The Register breaking news

New steganography technique relies on letter shapes

A trio of Indian researchers have proposed a method of steganography which hides messages in by using non-random distribution of letters with or without straight lines. Steganography is a group of techniques for hiding messages in plain sight. Microdots, tiny text written inside a full stop and only legible when magnified, are …
Simon Sharwood, 19 Mar 2012
The Register breaking news

Boffins devise way to hide secret data on hard drives

Computer scientists have developed software that hides sensitive data on hard drive, without the use of encryption, by controlling the precise disk locations containing the file's data fragments. The application, which the academic researchers said they would release as open-source software, makes use of steganography, or the …
Dan Goodin, 26 Apr 2011
The Register breaking news

Mysterious crypto-book dated to 15th century

A mysterious book written in a language or code that no cryptographer has ever managed to crack has been verified as being written in the early 15th century, which has upset some of the theories on its origin. Text from the 'Voynich manuscript' People were making up garble-languages well before J R R Tolkien came along The …
Lewis Page, 11 Feb 2011
The Register breaking news

Russian spies dumped in Vienna after swap

Russia and the US exchanged 14 agents at Vienna Airport in the biggest spy exchange since the end of the Cold War. The 10 Russians, members of the illegals network, including Anna Chapman, were deported from America after pleading guilty to acting as agents for Moscow. Money laundering charges were dropped. An eleventh suspect …
John Leyden, 9 Jul 2010
The Register breaking news

Software fraudster 'fooled CIA' into terror alert

A con man fooled US spooks into grounding international flights by selling them "technology" to decode al-Qaeda messages hidden in TV broadcasts, it's claimed. A long and highly entertaining Playboy article explains that in 2003, 50-year-old Dennis Montgomery was chief technology officer at Reno, Nevada-based eTreppid …
The Register breaking news

Botnet buries commands in image files

Security researchers have identified a botnet that borrows an idea from steganography by burying commands in jpg images. The DlKhora botnet, which is primarily geared towards downloading other strains of malware, encodes instructions so that the command and control server appears to be serving up image files, SecureWorks …
John Leyden, 1 Oct 2009
The Register breaking news

Hiding secret messages in internet traffic: a new how-to

Researchers have demonstrated a new way to hide secret messages in internet traffic that can elude even vigilant network operators. The process is a network application of steganography, which is the ancient science and art of hiding messages in documents, pictures and other media in a way that can be easily detected by the …
Dan Goodin, 28 May 2009
graph up

Hidden messages buried in VoIP chatter

Polish researchers have revealed the many ways you can hide messages within the bit stream of Voip phone calls. If secret policemen didn't like Skype and its IP telephony cousins before, they'll really hate it now. Burying hidden message in internet phone calls represents the latest evolution of steganography. Steganographic …
John Leyden, 3 Jun 2008
Privacy image

Bruce Schneier on crypto, the FBI, privacy and more

This is a special issue of Crypto-Gram, devoted to the September 11 terrorist attacks and their aftermath. Please distribute this issue widely. In this issue: The Attacks Airline Security Regulations Biometrics in Airports Diagnosing Intelligence Failures Regulating Cryptography Terrorists and Steganography News …

Create a news alert about steganography, or find more stories about steganography.

Biting the hand that feeds IT © 1998–2018