From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding steganography

Understanding steganography

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Understanding steganography

- [Instructor] Steganography is hiding in plain sight. Now how this works is we need a carrier, maybe an image or a music file, and then we need a payload, that could be a secret document or an Excel spreadsheet, and then using a steganography software that creates a hidden message. Now let's take an example of how this works using image steganography. The image on the left has the secret message embedded using steganography. I put it on top here so you can actually see this is a secret message. Over on the right, this is a plain image. Now we see the two images side-by-side. On the left, you can see the image with the secret message obscured. So side-by-side, you see one, the image with the message, and then on the right, a plain image. They shouldn't look any different to you, and that's because the human eye can only detect so many colors. So when we're talking about each color pixel, each pixel has a red, green…

Contents