Monday, November 29, 2010

Digital Image Steganography.


Digital image steganography techniques have used old steganography techniques. They concealing messages within the lowest bits of noisy images or sound files. It also conceals data within encrypted data or within random data. The data to be concealed is first encrypted before being used to overwrite part of a much larger block of encrypted data. 
        Mimic functions convert one file to have the same statistical profile of another. Concealed messages in a tampered executable files, exploiting redundancy in the targeted instruction set. They also concealed messages in a tampered  executable file, exploiting redundancy in the targeted instruction set. It can change the order of elements in a set.









No comments:

Post a Comment