Hide information in images using Steg

Slashdot it! Delicious Share on Facebook Tweet! Digg!

Even before the revelations by Edward Snowden, many users worried about how to effectively protect their private databases stored locally or in the cloud. Since minor weaknesses became apparent in the well-known TrueCrypt encryption software in a large-scale audit [1], many people have been searching for alternatives. Steganography is a little-known technology that not only protects data from prying eyes but also obfuscates its very existence.

Basics

The technique of steganography relies on hiding sets of data in a carrier medium. An image or audio file in which the message is embedded in the form of a text file is usually used for this purpose. With steganographically modified carrier media (unlike with encrypted files or encrypted file containers), it isn't usually possible for outsiders to detect that it contains a message – this significantly reduces the risk of a possible attack.

Some steganographic tools offer an extra option for particularly cautious individuals; you can, for example, encrypt the data before embedding it and add password protection. Then, the embedded content cannot be read by the attacker even after a successful attack on the data carrier and a second cryptographic attack would be needed.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF

Pages: 4

Price $0.99
(incl. VAT)

Buy Ubuntu User

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Use the Internet without leaving a trace with Tails 1.5

    Those wanting to surf the Internet incognito need a lot of expertise and time to secure their system. Tails saves you much of this work and lets you be online securely and anonymously.

  • Encrypt your important files using Tomb

    Important data can easily be protected against unauthorized access using encrypted containers. Tomb is a potential replacement for the now discontinued TrueCrypt, and it performs its job elegantly just using Linux's onboard tools and standard processes.

  • Protecting your personal privacy

    Your privacy is threatened left, right and center. And it is not only online criminals snooping on your data, but also meddling government agencies and unscrupulous companies. Either way, there are still things you can do to fight back.

  • Learn how to encrypt your data and keep it private

    You don't have to be paranoid to realise that there is a war on privacy. Unless you protect yourself you have a lot to lose. Ubuntu and the stories in the Features section of this issue can help you beef up your defences.

  • Encrypted ZFS with Ubuntu

    ZFS is one of the most advanced filesystems, and now it can be used natively on Linux. One drawback is that native ZFS encryption is not available, but this article shows how use Linux's disk encryption to install Ubuntu onto an encrypted disk with ZFS.