Steganography, the art of digital hiding
Summary

Have you ever thought that the digital files you usually handle might carry more than they were intended to? It might be a picture you share on social media, a video, or even a song… How do people conceal information in a seemingly harmless file? And why? Welcome to the world of secret messages and steganography

What is steganography?

Steganography is an ancient technique that was already in use in Ancient Greece. Hidden messages were tattooed on a slave’s scalp and concealed by regrown hair for secret communication. In World War II, invisible inks and microdots were used by spies to carry tactical messages. 

In the modern era, these techniques have evolved to the digital world: digital files such as images, audio, videos, or even network traffic are used as carriers of hidden messages or other files entirely. 

Key concepts of steganography
Types of steganography

Steganography can be of different types, depending on the type of carrier used for concealing the payload:

Image steganography
This is the most common form of steganography. It hides information in the Least Significant Bits (LSB) of pixel values. PNG and BMP are preferred due to lossless compression.
Audio steganography
Uses LSB of audio samples, phase coding, or echo hiding. MP3 and WAV formats are often targeted.
Video steganography
It combines image and audio steganography across video frames. It exploits redundancy in video compression (e.g., in AVI, MP4).
Text steganography
It hides data by manipulating formatting (e.g., whitespaces, font styles) or using linguistic methods like acronym substitution.
Network steganography
It hides data in protocol headers, timing, or packet padding within network traffic (e.g., TCP/IP packets). Used in covert channels or command and control communications.
Filesystem steganography
It uses hidden partitions or alternate data streams (especially in NTFS file systems).
Tools for steganography
Steganography or cryptography?

Steganography and cryptography often work together. Steganography hides the existence of a message, while cryptography protects the contents of the message. Steganography is hard to detect if done well, while cryptography is obvious once it’s intercepted. 

Many modern threat actors combine steganography with encryption, creating layers of concealment (e.g., malware hidden inside an encrypted image). 

Steganography and cybersecurity

Some notable examples of the use of steganography to carry out attacks are found in cyberwarfare and crimes against the machine. For example, the Turla APT group used PNG files to hide encrypted commands, and APT29 (Cozy Bear) used steganography in malware campaigns targeting governments.

Detecting steganography: Steganalysis

Is it possible to detect messages hidden through steganography? Different techniques can be used for these purposes, and they go under the name of steganalysis. 

Steganalysis can be effective under certain conditions: if the hiding technique is known or weak, if the stego object shows anomalies, when comparative analysis is possible, or if automated tools are successful. 

It becomes complicated when the payload is small and well distributed, when advanced techniques are used, when there is layered encryption, or when the payload is embedded in metadata

Share this post :

PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.