In this video, Lisa Bock explains the principles behind Steganography, or hiding something in plain sight. Explore the three basic elements of steganography, the carrier, the payload, and the hidden message. Dissect an example to better understand how image steganography is used to hide a message using subtle changes in the color of pixels.
- [Voiceover] Steganography is hiding in plain sight.…Now how this works is we need a carrier,…maybe an image or a music file,…and then we need a payload.…That could be a secret document or an Excel spreadsheet.…And then using the Steganography software,…that creates a hidden message.…Now let's take an example of how this works…using image steganography.…The image on the left has a secret message…embedded using steganography.…
I put it on top here so you can actually see…this is a secret message.…Over on the right, this is a plain image.…Now we see the two images side by side.…On the left, you can see the image…with the secret message obscured.…So side by side, you see one, the image with the message,…and then on the right, a plain image.…They shouldn't look any different to you,…and that's because the human eye…can only detect so many colors.…So when we're talking about each color pixel,…each pixel has a red, green, and blue value.…
And each red, green, and blue value…is represented by eight binary bits.…The low-order bits are generally used…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
1. System Hacking Overview
2. Gaining Access
3. Privilege Escalation
6. Hiding in Plain Sight
7. Cover Your Tracks
How to cover your tracks2m 34s
Next steps1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.