CINXE.COM

Steganography - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Steganography - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"4a2a3b97-3655-4dde-8fb5-d324d703713f","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Steganography","wgTitle":"Steganography","wgCurRevisionId":1259461847,"wgRevisionId":1259461847,"wgArticleId":28733,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Pages using the Phonos extension","CS1 German-language sources (de)","Webarchive template wayback links","CS1: long volume value","Pages with missing ISBNs","Articles with short description","Short description matches Wikidata","Use dmy dates from November 2023","Pages including recorded pronunciations","All articles with unsourced statements","Articles with unsourced statements from December 2016","Articles with unsourced statements from April 2024", "Pages displaying wikidata descriptions as a fallback via Module:Annotated link","Wikipedia external links cleanup from May 2024","Commons category link from Wikidata","Steganography","Espionage techniques"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Steganography","wgRelevantArticleId":28733,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":50000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain": false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q15032","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.phonos.styles":"ready","ext.phonos.icons":"ready","ext.cite.styles":"ready","ext.tmh.player.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready", "ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.phonos.init","ext.cite.ux-enhancements","mediawiki.page.media","ext.tmh.player","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.phonos.icons%2Cstyles%7Cext.tmh.player.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Steganography - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Steganography"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Steganography&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Steganography"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Steganography rootpage-Steganography skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Steganography" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Steganography" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Steganography" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Steganography" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Techniques" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Techniques"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Techniques</span> </div> </a> <button aria-controls="toc-Techniques-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Techniques subsection</span> </button> <ul id="toc-Techniques-sublist" class="vector-toc-list"> <li id="toc-Physical" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Physical"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Physical</span> </div> </a> <ul id="toc-Physical-sublist" class="vector-toc-list"> <li id="toc-Social_steganography" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Social_steganography"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1.1</span> <span>Social steganography</span> </div> </a> <ul id="toc-Social_steganography-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Digital_messages" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Digital_messages"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Digital messages</span> </div> </a> <ul id="toc-Digital_messages-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Steganography_in_streaming_media" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Steganography_in_streaming_media"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>Steganography in streaming media</span> </div> </a> <ul id="toc-Steganography_in_streaming_media-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Adaptive-Steganography" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Adaptive-Steganography"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>Adaptive-Steganography</span> </div> </a> <ul id="toc-Adaptive-Steganography-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cyber-physical_systems/Internet_of_Things" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cyber-physical_systems/Internet_of_Things"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.5</span> <span>Cyber-physical systems/Internet of Things</span> </div> </a> <ul id="toc-Cyber-physical_systems/Internet_of_Things-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Printed" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Printed"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.6</span> <span>Printed</span> </div> </a> <ul id="toc-Printed-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Network" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Network"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.7</span> <span>Network</span> </div> </a> <ul id="toc-Network-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Additional_terminology" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Additional_terminology"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Additional terminology</span> </div> </a> <ul id="toc-Additional_terminology-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Countermeasures_and_detection" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Countermeasures_and_detection"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Countermeasures and detection</span> </div> </a> <ul id="toc-Countermeasures_and_detection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Applications" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Applications"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Applications</span> </div> </a> <button aria-controls="toc-Applications-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Applications subsection</span> </button> <ul id="toc-Applications-sublist" class="vector-toc-list"> <li id="toc-Use_in_modern_printers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Use_in_modern_printers"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Use in modern printers</span> </div> </a> <ul id="toc-Use_in_modern_printers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Example_from_modern_practice" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Example_from_modern_practice"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>Example from modern practice</span> </div> </a> <ul id="toc-Example_from_modern_practice-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Alleged_use_by_intelligence_services" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Alleged_use_by_intelligence_services"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>Alleged use by intelligence services</span> </div> </a> <ul id="toc-Alleged_use_by_intelligence_services-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Distributed_steganography" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Distributed_steganography"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.4</span> <span>Distributed steganography</span> </div> </a> <ul id="toc-Distributed_steganography-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Online_challenge" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Online_challenge"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.5</span> <span>Online challenge</span> </div> </a> <ul id="toc-Online_challenge-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Computer_malware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Computer_malware"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.6</span> <span>Computer malware</span> </div> </a> <ul id="toc-Computer_malware-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Steganalysis" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Steganalysis"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Steganalysis</span> </div> </a> <button aria-controls="toc-Steganalysis-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Steganalysis subsection</span> </button> <ul id="toc-Steganalysis-sublist" class="vector-toc-list"> <li id="toc-Stegoanalytical_algorithms" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Stegoanalytical_algorithms"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>Stegoanalytical algorithms</span> </div> </a> <ul id="toc-Stegoanalytical_algorithms-sublist" class="vector-toc-list"> <li id="toc-According_to_the_information_available" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#According_to_the_information_available"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1.1</span> <span>According to the information available</span> </div> </a> <ul id="toc-According_to_the_information_available-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-According_to_the_purpose_sought" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#According_to_the_purpose_sought"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1.2</span> <span>According to the purpose sought</span> </div> </a> <ul id="toc-According_to_the_purpose_sought-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sources" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Sources"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Sources</span> </div> </a> <ul id="toc-Sources-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Steganography</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 48 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-48" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">48 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AA%D9%88%D8%B1%D9%8A%D8%A9_(%D8%AD%D9%88%D8%B3%D8%A8%D8%A9)" title="تورية (حوسبة) – Arabic" lang="ar" hreflang="ar" data-title="تورية (حوسبة)" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Steqanoqrafiya" title="Steqanoqrafiya – Azerbaijani" lang="az" hreflang="az" data-title="Steqanoqrafiya" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%B8%E0%A7%8D%E0%A6%9F%E0%A7%87%E0%A6%97%E0%A6%A8%E0%A7%8B%E0%A6%97%E0%A7%8D%E0%A6%B0%E0%A6%BE%E0%A6%AB%E0%A6%BF" title="স্টেগনোগ্রাফি – Bangla" lang="bn" hreflang="bn" data-title="স্টেগনোগ্রাফি" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-be-x-old mw-list-item"><a href="https://be-tarask.wikipedia.org/wiki/%D0%A2%D0%B0%D0%B9%D0%BD%D0%B0%D0%BF%D1%96%D1%81" title="Тайнапіс – Belarusian (Taraškievica orthography)" lang="be-tarask" hreflang="be-tarask" data-title="Тайнапіс" data-language-autonym="Беларуская (тарашкевіца)" data-language-local-name="Belarusian (Taraškievica orthography)" class="interlanguage-link-target"><span>Беларуская (тарашкевіца)</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%A1%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D0%B8%D1%8F" title="Стеганография – Bulgarian" lang="bg" hreflang="bg" data-title="Стеганография" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/Steganografija" title="Steganografija – Bosnian" lang="bs" hreflang="bs" data-title="Steganografija" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Esteganografia" title="Esteganografia – Catalan" lang="ca" hreflang="ca" data-title="Esteganografia" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Steganografie" title="Steganografie – Czech" lang="cs" hreflang="cs" data-title="Steganografie" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Steganografi" title="Steganografi – Danish" lang="da" hreflang="da" data-title="Steganografi" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de badge-Q17437798 badge-goodarticle mw-list-item" title="good article badge"><a href="https://de.wikipedia.org/wiki/Steganographie" title="Steganographie – German" lang="de" hreflang="de" data-title="Steganographie" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Steganograafia" title="Steganograafia – Estonian" lang="et" hreflang="et" data-title="Steganograafia" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%A3%CF%84%CE%B5%CE%B3%CE%B1%CE%BD%CE%BF%CE%B3%CF%81%CE%B1%CF%86%CE%AF%CE%B1" title="Στεγανογραφία – Greek" lang="el" hreflang="el" data-title="Στεγανογραφία" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Esteganograf%C3%ADa" title="Esteganografía – Spanish" lang="es" hreflang="es" data-title="Esteganografía" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Esteganografia" title="Esteganografia – Basque" lang="eu" hreflang="eu" data-title="Esteganografia" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%BE%D9%86%D9%87%D8%A7%D9%86%E2%80%8C%D9%86%DA%AF%D8%A7%D8%B1%DB%8C" title="پنهان‌نگاری – Persian" lang="fa" hreflang="fa" data-title="پنهان‌نگاری" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/St%C3%A9ganographie" title="Stéganographie – French" lang="fr" hreflang="fr" data-title="Stéganographie" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%8A%A4%ED%85%8C%EA%B0%80%EB%85%B8%EA%B7%B8%EB%9E%98%ED%94%BC" title="스테가노그래피 – Korean" lang="ko" hreflang="ko" data-title="스테가노그래피" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D4%BE%D5%A1%D5%AE%D5%AF%D5%A1%D5%A3%D6%80%D5%B8%D6%82%D5%A9%D5%B5%D5%B8%D6%82%D5%B6" title="Ծածկագրություն – Armenian" lang="hy" hreflang="hy" data-title="Ծածկագրություն" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%B8%E0%A5%8D%E0%A4%9F%E0%A5%87%E0%A4%97%E0%A5%8D%E0%A4%A8%E0%A5%8B%E0%A4%97%E0%A5%8D%E0%A4%B0%E0%A4%BE%E0%A4%AB%E0%A4%BC%E0%A5%80" title="स्टेग्नोग्राफ़ी – Hindi" lang="hi" hreflang="hi" data-title="स्टेग्नोग्राफ़ी" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Steganografi" title="Steganografi – Indonesian" lang="id" hreflang="id" data-title="Steganografi" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Steganografia" title="Steganografia – Italian" lang="it" hreflang="it" data-title="Steganografia" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A1%D7%98%D7%92%D7%A0%D7%95%D7%92%D7%A8%D7%A4%D7%99%D7%94" title="סטגנוגרפיה – Hebrew" lang="he" hreflang="he" data-title="סטגנוגרפיה" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-la mw-list-item"><a href="https://la.wikipedia.org/wiki/Steganographia" title="Steganographia – Latin" lang="la" hreflang="la" data-title="Steganographia" data-language-autonym="Latina" data-language-local-name="Latin" class="interlanguage-link-target"><span>Latina</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Steganografia" title="Steganografia – Lombard" lang="lmo" hreflang="lmo" data-title="Steganografia" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Szteganogr%C3%A1fia" title="Szteganográfia – Hungarian" lang="hu" hreflang="hu" data-title="Szteganográfia" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%B8%E0%B5%8D%E0%B4%B1%E0%B5%8D%E0%B4%B1%E0%B5%86%E0%B4%97%E0%B4%A8%E0%B5%8B%E0%B4%97%E0%B5%8D%E0%B4%B0%E0%B4%BE%E0%B4%AB%E0%B4%BF" title="സ്റ്റെഗനോഗ്രാഫി – Malayalam" lang="ml" hreflang="ml" data-title="സ്റ്റെഗനോഗ്രാഫി" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Steganografi" title="Steganografi – Malay" lang="ms" hreflang="ms" data-title="Steganografi" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/%D0%A1%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D0%B8%D0%BA" title="Стеганографик – Mongolian" lang="mn" hreflang="mn" data-title="Стеганографик" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Steganografie" title="Steganografie – Dutch" lang="nl" hreflang="nl" data-title="Steganografie" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%B9%E3%83%86%E3%82%AC%E3%83%8E%E3%82%B0%E3%83%A9%E3%83%95%E3%82%A3%E3%83%BC" title="ステガノグラフィー – Japanese" lang="ja" hreflang="ja" data-title="ステガノグラフィー" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Steganografi" title="Steganografi – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Steganografi" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%B8%E0%A8%A4%E0%A9%87%E0%A8%97%E0%A8%A8%E0%A9%8B%E0%A8%97%E0%A9%8D%E0%A8%B0%E0%A8%BE%E0%A8%AB%E0%A9%80" title="ਸਤੇਗਨੋਗ੍ਰਾਫੀ – Punjabi" lang="pa" hreflang="pa" data-title="ਸਤੇਗਨੋਗ੍ਰਾਫੀ" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Steganografia" title="Steganografia – Polish" lang="pl" hreflang="pl" data-title="Steganografia" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Esteganografia" title="Esteganografia – Portuguese" lang="pt" hreflang="pt" data-title="Esteganografia" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%A1%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D0%B8%D1%8F" title="Стеганография – Russian" lang="ru" hreflang="ru" data-title="Стеганография" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Steganografia" title="Steganografia – Slovak" lang="sk" hreflang="sk" data-title="Steganografia" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Steganografija" title="Steganografija – Slovenian" lang="sl" hreflang="sl" data-title="Steganografija" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%A1%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D0%B8%D1%98%D0%B0" title="Стеганографија – Serbian" lang="sr" hreflang="sr" data-title="Стеганографија" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Steganografia" title="Steganografia – Finnish" lang="fi" hreflang="fi" data-title="Steganografia" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Steganografi" title="Steganografi – Swedish" lang="sv" hreflang="sv" data-title="Steganografi" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%AE%E0%AE%B1%E0%AF%88%E0%AE%9A%E0%AF%86%E0%AE%AF%E0%AF%8D%E0%AE%A4%E0%AE%BF%E0%AE%AF%E0%AE%BF%E0%AE%AF%E0%AE%B2%E0%AF%8D" title="மறைசெய்தியியல் – Tamil" lang="ta" hreflang="ta" data-title="மறைசெய்தியியல்" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%A7%E0%B8%B4%E0%B8%97%E0%B8%A2%E0%B8%B2%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B8%AD%E0%B8%B3%E0%B8%9E%E0%B8%A3%E0%B8%B2%E0%B8%87%E0%B8%82%E0%B9%89%E0%B8%AD%E0%B8%A1%E0%B8%B9%E0%B8%A5" title="วิทยาการอำพรางข้อมูล – Thai" lang="th" hreflang="th" data-title="วิทยาการอำพรางข้อมูล" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tg mw-list-item"><a href="https://tg.wikipedia.org/wiki/%D0%9D%D0%B8%D2%B3%D0%BE%D0%BD%D0%BD%D0%B8%D0%B3%D0%BE%D1%80%D3%A3" title="Ниҳоннигорӣ – Tajik" lang="tg" hreflang="tg" data-title="Ниҳоннигорӣ" data-language-autonym="Тоҷикӣ" data-language-local-name="Tajik" class="interlanguage-link-target"><span>Тоҷикӣ</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Steganografi" title="Steganografi – Turkish" lang="tr" hreflang="tr" data-title="Steganografi" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A1%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D1%96%D1%8F" title="Стеганографія – Ukrainian" lang="uk" hreflang="uk" data-title="Стеганографія" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/K%E1%BB%B9_thu%E1%BA%ADt_gi%E1%BA%A5u_tin" title="Kỹ thuật giấu tin – Vietnamese" lang="vi" hreflang="vi" data-title="Kỹ thuật giấu tin" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E9%9A%B1%E5%AF%AB%E8%A1%93" title="隱寫術 – Cantonese" lang="yue" hreflang="yue" data-title="隱寫術" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E9%9A%90%E5%86%99%E6%9C%AF" title="隐写术 – Chinese" lang="zh" hreflang="zh" data-title="隐写术" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q15032#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Steganography" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Steganography" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Steganography"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Steganography&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Steganography&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Steganography"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Steganography&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Steganography&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Steganography" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Steganography" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Steganography&amp;oldid=1259461847" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Steganography&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Steganography&amp;id=1259461847&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSteganography"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FSteganography"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Steganography&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Steganography&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Steganography" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q15032" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Hiding messages in other messages</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">For the process of writing in shorthand, see <a href="/wiki/Stenography" class="mw-redirect" title="Stenography">Stenography</a>. For the prefix "Stego-" as used in taxonomy, see <a href="/wiki/List_of_commonly_used_taxonomic_affixes" title="List of commonly used taxonomic affixes">List of commonly used taxonomic affixes</a>.</div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Steganography.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/9/9c/Steganography.png/310px-Steganography.png" decoding="async" width="310" height="78" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/9c/Steganography.png/465px-Steganography.png 1.5x, //upload.wikimedia.org/wikipedia/commons/9/9c/Steganography.png 2x" data-file-width="480" data-file-height="120" /></a><figcaption>The same image viewed by white, blue, green, and red lights reveals different hidden numbers.</figcaption></figure> <p><b>Steganography</b> (<span class="rt-commentedText nowrap"><span class="IPA nopopups noexcerpt" lang="en-fonipa"><a href="/wiki/Help:IPA/English" title="Help:IPA/English">/<span style="border-bottom:1px dotted"><span title="/ˌ/: secondary stress follows">ˌ</span><span title="&#39;s&#39; in &#39;sigh&#39;">s</span><span title="&#39;t&#39; in &#39;tie&#39;">t</span><span title="/ɛ/: &#39;e&#39; in &#39;dress&#39;">ɛ</span><span title="/ɡ/: &#39;g&#39; in &#39;guy&#39;">ɡ</span><span title="/ə/: &#39;a&#39; in &#39;about&#39;">ə</span><span title="/ˈ/: primary stress follows">ˈ</span><span title="&#39;n&#39; in &#39;nigh&#39;">n</span><span title="/ɒ/: &#39;o&#39; in &#39;body&#39;">ɒ</span><span title="/ɡ/: &#39;g&#39; in &#39;guy&#39;">ɡ</span><span title="&#39;r&#39; in &#39;rye&#39;">r</span><span title="/ə/: &#39;a&#39; in &#39;about&#39;">ə</span><span title="&#39;f&#39; in &#39;find&#39;">f</span><span title="/i/: &#39;y&#39; in &#39;happy&#39;">i</span></span>/</a></span>&#32;<span class="noprint"><span class="ext-phonos"><span data-nosnippet="" id="ooui-php-1" class="ext-phonos-PhonosButton noexcerpt ext-phonos-PhonosButton-emptylabel oo-ui-widget oo-ui-widget-enabled oo-ui-buttonElement oo-ui-buttonElement-frameless oo-ui-iconElement oo-ui-buttonWidget" data-ooui="{&quot;_&quot;:&quot;mw.Phonos.PhonosButton&quot;,&quot;href&quot;:&quot;\/\/upload.wikimedia.org\/wikipedia\/commons\/transcoded\/b\/b8\/En-us-steganography.ogg\/En-us-steganography.ogg.mp3&quot;,&quot;rel&quot;:[&quot;nofollow&quot;],&quot;framed&quot;:false,&quot;icon&quot;:&quot;volumeUp&quot;,&quot;data&quot;:{&quot;ipa&quot;:&quot;&quot;,&quot;text&quot;:&quot;&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;wikibase&quot;:&quot;&quot;,&quot;file&quot;:&quot;En-us-steganography.ogg&quot;},&quot;classes&quot;:[&quot;ext-phonos-PhonosButton&quot;,&quot;noexcerpt&quot;,&quot;ext-phonos-PhonosButton-emptylabel&quot;]}"><a role="button" tabindex="0" href="//upload.wikimedia.org/wikipedia/commons/transcoded/b/b8/En-us-steganography.ogg/En-us-steganography.ogg.mp3" rel="nofollow" aria-label="Play audio" title="Play audio" class="oo-ui-buttonElement-button"><span class="oo-ui-iconElement-icon oo-ui-icon-volumeUp"></span><span class="oo-ui-labelElement-label"></span><span class="oo-ui-indicatorElement-indicator oo-ui-indicatorElement-noIndicator"></span></a></span><sup class="ext-phonos-attribution noexcerpt navigation-not-searchable"><a href="/wiki/File:En-us-steganography.ogg" title="File:En-us-steganography.ogg">ⓘ</a></sup></span></span></span> <a href="/wiki/Help:Pronunciation_respelling_key" title="Help:Pronunciation respelling key"><i title="English pronunciation respelling"><span style="font-size:90%">STEG</span>-ə-<span style="font-size:90%">NOG</span>-rə-fee</i></a>) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/electronic contexts, a <a href="/wiki/Computer_file" title="Computer file">computer file</a>, message, image, or video is concealed within another file, message, image, or video. The word <i>steganography</i> comes from <a href="/wiki/Greek_language" title="Greek language">Greek</a> <i>steganographia</i>, which combines the words <i>steganós</i> (<span lang="el"><a href="https://en.wiktionary.org/wiki/%CF%83%CF%84%CE%B5%CE%B3%CE%B1%CE%BD%CF%8C%CF%82#Greek" class="extiw" title="wikt:στεγανός">στεγανός</a></span>), meaning "covered or concealed", and <i>-graphia</i> (<span lang="el"><a href="https://en.wiktionary.org/wiki/%CE%B3%CF%81%CE%B1%CF%86%CE%AE#Greek" class="extiw" title="wikt:γραφή">γραφή</a></span>) meaning "writing".<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p><p>The first recorded use of the term was in 1499 by <a href="/wiki/Johannes_Trithemius" title="Johannes Trithemius">Johannes Trithemius</a> in his <i><a href="/wiki/Steganographia" title="Steganographia">Steganographia</a></i>, a treatise on <a href="/wiki/Cryptography" title="Cryptography">cryptography</a> and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in <a href="/wiki/Invisible_ink" title="Invisible ink">invisible ink</a> between the visible lines of a private letter. Some implementations of steganography that lack a formal <a href="/wiki/Shared_secret" title="Shared secret">shared secret</a> are forms of <a href="/wiki/Security_through_obscurity" title="Security through obscurity">security through obscurity</a>, while key-dependent steganographic schemes try to adhere to <a href="/wiki/Kerckhoffs%27s_principle" title="Kerckhoffs&#39;s principle">Kerckhoffs's principle</a>.<sup id="cite_ref-stegokey_2-0" class="reference"><a href="#cite_note-stegokey-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> </p><p>The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible <a href="/wiki/Encrypted" class="mw-redirect" title="Encrypted">encrypted</a> messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing both the fact that a secret message is being sent <i>and</i> its contents. </p><p>Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program, or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth <a href="/wiki/Pixel" title="Pixel">pixel</a> to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png/220px-Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png" decoding="async" width="220" height="184" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png/330px-Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png/440px-Chart_in_the_hand_of_Dr_John_Dee._Steganographiae.png 2x" data-file-width="889" data-file-height="745" /></a><figcaption>A chart from <a href="/wiki/Johannes_Trithemius" title="Johannes Trithemius">Johannes Trithemius</a>'s <i><a href="/wiki/Steganographia" title="Steganographia">Steganographia</a></i> copied by <a href="/wiki/Dr_John_Dee" class="mw-redirect" title="Dr John Dee">Dr John Dee</a> in 1591</figcaption></figure> <p>The first recorded uses of steganography can be traced back to 440 BC in <a href="/wiki/Greece" title="Greece">Greece</a>, when <a href="/wiki/Herodotus" title="Herodotus">Herodotus</a> mentions two examples in his <i><a href="/wiki/The_Histories_of_Herodotus" class="mw-redirect" title="The Histories of Herodotus">Histories</a></i>.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Histiaeus" title="Histiaeus">Histiaeus</a> sent a message to his vassal, <a href="/wiki/Aristagoras" title="Aristagoras">Aristagoras</a>, by shaving the head of his most trusted servant, "marking" the message onto his scalp, then sending him on his way once his hair had regrown, with the instruction, "When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon." Additionally, <a href="/wiki/Demaratus" title="Demaratus">Demaratus</a> sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a <a href="/wiki/Wax_tablet" title="Wax tablet">wax tablet</a> before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for <a href="/wiki/Shorthand" title="Shorthand">shorthand</a>. </p><p>In his work <i><a href="/wiki/Polygraphia_(book)" title="Polygraphia (book)">Polygraphiae</a>,</i> <a href="/wiki/Johannes_Trithemius" title="Johannes Trithemius">Johannes Trithemius</a> developed his so-called "<a href="/w/index.php?title=Ave_Maria_Cipher&amp;action=edit&amp;redlink=1" class="new" title="Ave Maria Cipher (page does not exist)">Ave-Maria-Cipher</a>" that can hide information in a Latin praise of God. "<i>Auctor Sapientissimus Conseruans Angelica Deferat Nobis Charitas Potentissimi Creatoris</i>" for example contains the concealed word <i>VICIPEDIA</i>.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Techniques">Techniques</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=2" title="Edit section: Techniques"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/List_of_steganography_techniques" title="List of steganography techniques">List of steganography techniques</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Steganography_in_the_hand_of_John_Dee.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a0/Steganography_in_the_hand_of_John_Dee.png/220px-Steganography_in_the_hand_of_John_Dee.png" decoding="async" width="220" height="184" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a0/Steganography_in_the_hand_of_John_Dee.png/330px-Steganography_in_the_hand_of_John_Dee.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a0/Steganography_in_the_hand_of_John_Dee.png/440px-Steganography_in_the_hand_of_John_Dee.png 2x" data-file-width="883" data-file-height="740" /></a><figcaption>Deciphering the code. <i>Steganographia</i></figcaption></figure> <p>Numerous techniques throughout history have been developed to embed a message within another medium. </p> <div class="mw-heading mw-heading3"><h3 id="Physical">Physical</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=3" title="Edit section: Physical"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Placing the message in a physical item has been widely used for centuries.<sup id="cite_ref-knit_6-0" class="reference"><a href="#cite_note-knit-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> Some notable examples include <a href="/wiki/Invisible_ink" title="Invisible ink">invisible ink</a> on paper, writing a message in <a href="/wiki/Morse_code" title="Morse code">Morse code</a> on <a href="/wiki/Yarn" title="Yarn">yarn</a> worn by a courier,<sup id="cite_ref-knit_6-1" class="reference"><a href="#cite_note-knit-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Microdot" title="Microdot">microdots</a>, or using a <a href="/wiki/Music_cipher#Musical_Steganography" title="Music cipher">music cipher</a> to hide messages as <a href="/wiki/Musical_note" title="Musical note">musical notes</a> in <a href="/wiki/Sheet_music" title="Sheet music">sheet music</a>.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Social_steganography">Social steganography</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=4" title="Edit section: Social steganography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In communities with social or government taboos or censorship, people use cultural steganography—hiding messages in idiom, pop culture references, and other messages they share publicly and assume are monitored. This relies on social context to make the underlying messages visible only to certain readers.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> Examples include: </p> <ul><li>Hiding a message in the title and context of a shared video or image.</li> <li>Misspelling names or words that are popular in the media in a given week, to suggest an alternate meaning.</li> <li>Hiding a picture that can be traced by using Paint or any other drawing tool.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (December 2016)">citation needed</span></a></i>&#93;</sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Digital_messages">Digital messages</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=5" title="Edit section: Digital messages"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure typeof="mw:File/Frame"><a href="/wiki/File:Steganography_original.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/a/a8/Steganography_original.png" decoding="async" width="200" height="200" class="mw-file-element" data-file-width="200" data-file-height="200" /></a><figcaption>Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant <a href="/wiki/Bit" title="Bit">bits</a> of each <a href="/wiki/Color_component" class="mw-redirect" title="Color component">color component</a> and a subsequent <a href="/wiki/Normalization_(image_processing)" title="Normalization (image processing)">normalization</a>. The hidden image is shown below.</figcaption></figure> <figure typeof="mw:File/Frame"><a href="/wiki/File:Steganography_recovered.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/c/c3/Steganography_recovered.png" decoding="async" width="200" height="200" class="mw-file-element" data-file-width="200" data-file-height="200" /></a><figcaption>Image of a cat extracted from the tree image above.</figcaption></figure> <p>Since the dawn of computers, techniques have been developed to embed messages in digital cover mediums. The message to conceal is often encrypted, then used to overwrite part of a much larger block of encrypted data or a block of random data (an unbreakable cipher like the <a href="/wiki/One-time_pad" title="One-time pad">one-time pad</a> generates ciphertexts that look perfectly random without the private key). </p><p>Examples of this include changing pixels in image or sound files,<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> properties of digital text such as spacing and font choice, <a href="/wiki/Chaffing_and_winnowing" title="Chaffing and winnowing">Chaffing and winnowing</a>, <a href="/wiki/Mimic_function" title="Mimic function">Mimic functions</a>, modifying the echo of a sound file (Echo Steganography).<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (April 2024)">citation needed</span></a></i>&#93;</sup>, and including data in ignored sections of a file.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> </p> <style data-mw-deduplicate="TemplateStyles:r1237032888/mw-parser-output/.tmulti">.mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}</style><div class="thumb tmulti tnone center"><div class="thumbinner multiimageinner" style="width:916px;max-width:916px"><div class="trow"><div class="theader">Images hidden in sound files</div></div><div class="trow"><div class="tsingle" style="width:252px;max-width:252px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:Drawing_of_the_word_Wikipedia_in_Coagula.jpg" class="mw-file-description"><img alt="The word &quot;Wikipedia&quot; written in green and red on black background" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/59/Drawing_of_the_word_Wikipedia_in_Coagula.jpg/250px-Drawing_of_the_word_Wikipedia_in_Coagula.jpg" decoding="async" width="250" height="125" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/59/Drawing_of_the_word_Wikipedia_in_Coagula.jpg/375px-Drawing_of_the_word_Wikipedia_in_Coagula.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/59/Drawing_of_the_word_Wikipedia_in_Coagula.jpg/500px-Drawing_of_the_word_Wikipedia_in_Coagula.jpg 2x" data-file-width="600" data-file-height="300" /></a></span></div><div class="thumbcaption">1. The word "Wikipedia" is drawn using computer software</div></div><div class="tsingle" style="width:202px;max-width:202px"><div class="thumbimage"><span typeof="mw:File"><span><audio id="mwe_player_0" controls="" preload="none" data-mw-tmh="" class="mw-file-element" width="200" style="width:200px;" data-durationhint="5" data-mwtitle="Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_(Coagula_software).wav" data-mwprovider="wikimediacommons"><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/2/29/Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_%28Coagula_software%29.wav/Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_%28Coagula_software%29.wav.ogg" type="audio/ogg; codecs=&quot;vorbis&quot;" data-transcodekey="ogg" data-width="0" data-height="0" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/2/29/Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_%28Coagula_software%29.wav/Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_%28Coagula_software%29.wav.mp3" type="audio/mpeg" data-transcodekey="mp3" data-width="0" data-height="0" /><source src="//upload.wikimedia.org/wikipedia/commons/2/29/Drawing_of_the_word_Wikipedia_transformed_into_a_wav_file_%28Coagula_software%29.wav" type="audio/wav" data-width="0" data-height="0" /></audio></span></span></div><div class="thumbcaption">2. The image is converted into an audio file</div></div><div class="tsingle" style="width:252px;max-width:252px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg" class="mw-file-description"><img alt="The word &quot;Wikipedia&quot; in yellow over a dark blue/black background" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/57/Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg/250px-Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg.png" decoding="async" width="250" height="225" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/57/Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg/375px-Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/57/Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg/500px-Wikipedia_wavefile_by_Coagula_-_logarihtmic_spectrogram.svg.png 2x" data-file-width="792" data-file-height="712" /></a></span></div><div class="thumbcaption">3. Finally, the audio is analysed through a spectrogram, revealing the initial image</div></div><div class="tsingle" style="width:202px;max-width:202px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png" class="mw-file-description"><img alt="image of a blue arm and hand over white, pixelated dots" src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a9/Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png/200px-Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png" decoding="async" width="200" height="217" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a9/Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png/300px-Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a9/Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png/400px-Spectrogram_-_Nine_Inch_Nails_-_My_Violent_Heart.png 2x" data-file-width="587" data-file-height="638" /></a></span></div><div class="thumbcaption"><a href="/wiki/Spectrogram" title="Spectrogram">Spectrogram</a> of a <a href="/wiki/Easter_egg_(media)" title="Easter egg (media)">hidden image</a> encoded as sound in the song "My Violent Heart" by <a href="/wiki/Nine_Inch_Nails" title="Nine Inch Nails">Nine Inch Nails</a> from the <i><a href="/wiki/Year_Zero_(album)" title="Year Zero (album)">Year Zero</a></i> album (2007)</div></div></div></div></div> <div class="mw-heading mw-heading3"><h3 id="Steganography_in_streaming_media">Steganography in streaming media</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=6" title="Edit section: Steganography in streaming media"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Since the era of evolving network applications, steganography research has shifted from image steganography to steganography in streaming media such as <a href="/wiki/Voice_over_Internet_Protocol" class="mw-redirect" title="Voice over Internet Protocol">Voice over Internet Protocol</a> (VoIP). </p><p>In 2003, Giannoula et al. developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2005, Dittmann et al. studied steganography and watermarking of multimedia contents such as VoIP.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2008, Yongfeng Huang and Shanyu Tang presented a novel approach to information hiding in low bit-rate VoIP speech stream, and their published work on steganography is the first-ever effort to improve the codebook partition by using Graph theory along with Quantization Index Modulation in low bit-rate streaming media.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2011 and 2012, Yongfeng Huang and Shanyu Tang devised new steganographic algorithms that use codec parameters as cover object to realise real-time covert VoIP steganography. Their findings were published in <i>IEEE Transactions on Information Forensics and Security</i>.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2024, Cheddad &amp; Cheddad proposed a new framework <sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> for reconstructing lost or corrupted audio signals using a combination of machine learning techniques and latent information. The main idea of their paper is to enhance audio signal reconstruction by fusing steganography, halftoning (dithering), and state-of-the-art shallow and deep learning methods (e.g., RF, LSTM). This combination of steganography, halftoning, and machine learning for audio signal reconstruction may inspire further research in optimizing this approach or applying it to other domains, such as image reconstruction (i.e., inpainting). </p> <div class="mw-heading mw-heading3"><h3 id="Adaptive-Steganography">Adaptive-Steganography</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=7" title="Edit section: Adaptive-Steganography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Adaptive steganography is a technique for concealing information within digital media by tailoring the embedding process to the specific features of the cover medium. An example of this approach is demonstrated in the work <sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup>. Their method develops a skin tone detection algorithm, capable of identifying facial features, which is then applied to adaptive steganography. By incorporating face rotation into their approach, the technique aims to enhance its adaptivity to conceal information in a manner that is both less detectable and more robust across various facial orientations within images. This strategy can potentially improve the efficacy of information hiding in both static images and video content. </p> <div class="mw-heading mw-heading3"><h3 id="Cyber-physical_systems/Internet_of_Things"><span id="Cyber-physical_systems.2FInternet_of_Things"></span>Cyber-physical systems/Internet of Things</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=8" title="Edit section: Cyber-physical systems/Internet of Things"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Academic work since 2012 demonstrated the feasibility of steganography for <a href="/wiki/Cyber-physical_system" class="mw-redirect" title="Cyber-physical system">cyber-physical systems</a> (CPS)/the <a href="/wiki/Internet_of_Things" class="mw-redirect" title="Internet of Things">Internet of Things</a> (IoT). Some techniques of CPS/IoT steganography overlap with network steganography, i.e. hiding data in communication protocols used in CPS/the IoT. However, specific techniques hide data in CPS components. For instance, data can be stored in unused registers of IoT/CPS components and in the states of IoT/CPS actuators.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Printed">Printed</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=9" title="Edit section: Printed"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Digital steganography output may be in the form of printed documents. A message, the <i><a href="/wiki/Plaintext" title="Plaintext">plaintext</a></i>, may be first encrypted by traditional means, producing a <i><a href="/wiki/Ciphertext" title="Ciphertext">ciphertext</a></i>. Then, an innocuous <i>cover text</i> is modified in some way so as to contain the ciphertext, resulting in the <i>stegotext</i>. For example, the letter size, spacing, <a href="/wiki/Typeface" title="Typeface">typeface</a>, or other characteristics of a cover text can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. <a href="/wiki/Francis_Bacon" title="Francis Bacon">Francis Bacon</a> developed <a href="/wiki/Bacon%27s_cipher" title="Bacon&#39;s cipher">Bacon's cipher</a> as such a technique. </p><p>The ciphertext produced by most digital steganography methods, however, is not printable. Traditional digital methods rely on perturbing noise in the channel file to hide the message, and as such, the channel file must be transmitted to the recipient with no additional noise from the transmission. Printing introduces much noise in the ciphertext, generally rendering the message unrecoverable. There are techniques that address this limitation, one notable example being ASCII Art Steganography.<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:HP_Color_Laserjet_3700_schutz_g.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8e/HP_Color_Laserjet_3700_schutz_g.jpg/220px-HP_Color_Laserjet_3700_schutz_g.jpg" decoding="async" width="220" height="129" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8e/HP_Color_Laserjet_3700_schutz_g.jpg/330px-HP_Color_Laserjet_3700_schutz_g.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8e/HP_Color_Laserjet_3700_schutz_g.jpg/440px-HP_Color_Laserjet_3700_schutz_g.jpg 2x" data-file-width="600" data-file-height="351" /></a><figcaption>Yellow dots from a laser printer</figcaption></figure> <p>Although not classic steganography, some types of modern color laser printers integrate the model, serial number, and timestamps on each printout for traceability reasons using a dot-matrix code made of small, yellow dots not recognizable to the naked eye — see <a href="/wiki/Printer_steganography" class="mw-redirect" title="Printer steganography">printer steganography</a> for details. </p> <div class="mw-heading mw-heading3"><h3 id="Network">Network</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=10" title="Edit section: Network"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2015, a taxonomy of 109 network hiding methods was presented by Steffen Wendzel, Sebastian Zander et al. that summarized core concepts used in network steganography research.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> The taxonomy was developed further in recent years by several publications and authors and adjusted to new domains, such as CPS steganography.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 1977, Kent concisely described the potential for covert channel signaling in general network communication protocols, even if the traffic is encrypted (in a footnote) in "Encryption-Based Protection for Interactive User/Computer Communication," Proceedings of the Fifth Data Communications Symposium, September 1977. </p><p>In 1987, Girling first studied covert channels on a local area network (LAN), identified and realised three obvious covert channels (two storage channels and one timing channel), and his research paper entitled “Covert channels in LAN’s” published in <i>IEEE Transactions on Software Engineering</i>, vol. SE-13 of 2, in February 1987.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 1989, Wolf implemented covert channels in LAN protocols, e.g. using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol.<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 1997, Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2002, Kamran Ahsan made an excellent summary of research on network steganography.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2005, Steven J. Murdoch and Stephen Lewis contributed a chapter entitled "Embedding Covert Channels into TCP/IP" in the "<i>Information Hiding</i>" book published by Springer.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p><p>All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> Contrary to typical steganographic methods that use digital media (images, audio and video files) to hide data, network steganography uses communication protocols' control elements and their intrinsic functionality. As a result, such methods can be harder to detect and eliminate.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> </p><p>Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can be applied to the <a href="/wiki/Protocol_data_unit" title="Protocol data unit">protocol data unit</a> (PDU),<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> to the time relations between the exchanged PDUs,<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> or both (hybrid methods).<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> </p><p>Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol steganography.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> Alternatively, multiple network protocols can be used simultaneously to transfer hidden information and so-called control protocols can be embedded into steganographic communications to extend their capabilities, e.g. to allow dynamic overlay routing or the switching of utilized hiding methods and network protocols.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Wiley-IEEE_41-0" class="reference"><a href="#cite_note-Wiley-IEEE-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> </p><p>Network steganography covers a broad spectrum of techniques, which include, among others: </p> <ul><li>Steganophony – the concealment of messages in <a href="/wiki/Voice-over-IP" class="mw-redirect" title="Voice-over-IP">Voice-over-IP</a> conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK – Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup></li> <li>WLAN Steganography – transmission of steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks)<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Additional_terminology">Additional terminology</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=11" title="Edit section: Additional terminology"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Security_through_obscurity" title="Security through obscurity">Security through obscurity</a></div> <p>Discussions of steganography generally use terminology analogous to and consistent with conventional radio and communications technology. However, some terms appear specifically in software and are easily confused. These are the most relevant ones to digital steganographic systems: </p><p>The <i>payload</i> is the data covertly communicated. The <i>carrier</i> is the signal, stream, or data file that hides the payload, which differs from the <i>channel</i>, which typically means the type of input, such as a JPEG image. The resulting signal, stream, or data file with the encoded payload is sometimes called the <i>package</i>, <i>stego file</i>, or <i>covert message</i>. The proportion of bytes, samples, or other signal elements modified to encode the payload is called the <i>encoding density</i> and is typically expressed as a number between 0 and 1. </p><p>In a set of files, the files that are considered likely to contain a payload are <i>suspects</i>. A <i>suspect</i> identified through some type of statistical analysis can be referred to as a <i>candidate</i>. </p> <div class="mw-heading mw-heading2"><h2 id="Countermeasures_and_detection">Countermeasures and detection</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=12" title="Edit section: Countermeasures and detection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Detecting physical steganography requires a careful physical examination, including the use of magnification, developer chemicals, and <a href="/wiki/Ultraviolet" title="Ultraviolet">ultraviolet light</a>. It is a time-consuming process with obvious resource implications, even in countries that employ many people to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. </p><p>During <a href="/wiki/World_War_II" title="World War II">World War II</a>, prisoner of war camps gave prisoners specially-treated <a href="/wiki/Paper" title="Paper">paper</a> that would reveal <a href="/wiki/Invisible_ink" title="Invisible ink">invisible ink</a>. An article in the 24 June 1948 issue of <i>Paper Trade Journal</i> by the Technical Director of the <a href="/wiki/United_States_Government_Printing_Office" class="mw-redirect" title="United States Government Printing Office">United States Government Printing Office</a> had Morris S. Kantrowitz describe in general terms the development of this paper. Three prototype papers (<i>Sensicoat</i>, <i>Anilith</i>, and <i>Coatalith</i>) were used to manufacture postcards and stationery provided to German prisoners of war in the US and Canada. If POWs tried to write a hidden message, the special paper rendered it visible. The US granted at least two <a href="/wiki/Patent" title="Patent">patents</a> related to the technology, one to Kantrowitz, <span><a rel="nofollow" class="external text" href="https://patents.google.com/patent/US2515232">U.S. patent 2,515,232</a></span>, "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented 18 July 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," <span><a rel="nofollow" class="external text" href="https://patents.google.com/patent/US2445586">U.S. patent 2,445,586</a></span>, patented 20 July 1948. A similar strategy issues prisoners with writing paper ruled with a water-soluble ink that runs in contact with water-based invisible ink. </p><p>In computing, steganographically encoded package detection is called <a href="/wiki/Steganalysis" title="Steganalysis">steganalysis</a>. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known clean copies of the materials and then compare them against the current contents of the site. The differences, if the carrier is the same, comprise the payload. In general, using extremely high compression rates makes steganography difficult but not impossible. Compression errors provide a hiding place for data, but high compression reduces the amount of data available to hold the payload, raising the encoding density, which facilitates easier detection (in extreme cases, even by casual observation). </p><p>There are a variety of basic tests that can be done to identify whether or not a secret message exists. This process is not concerned with the extraction of the message, which is a different process and a separate step. The most basic approaches of <a href="/wiki/Steganalysis" title="Steganalysis">steganalysis</a> are visual or aural attacks, structural attacks, and statistical attacks. These approaches attempt to detect the steganographic algorithms that were used.<sup id="cite_ref-Wanyer2009_44-0" class="reference"><a href="#cite_note-Wanyer2009-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> These algorithms range from unsophisticated to very sophisticated, with early algorithms being much easier to detect due to statistical anomalies that were present. The size of the message that is being hidden is a factor in how difficult it is to detect. The overall size of the cover object also plays a factor as well. If the cover object is small and the message is large, this can distort the statistics and make it easier to detect. A larger cover object with a small message decreases the statistics and gives it a better chance of going unnoticed. </p><p>Steganalysis that targets a particular algorithm has much better success as it is able to key in on the anomalies that are left behind. This is because the analysis can perform a targeted search to discover known tendencies since it is aware of the behaviors that it commonly exhibits. When analyzing an image the least significant bits of many images are actually not random. The camera sensor, especially lower-end sensors are not the best quality and can introduce some random bits. This can also be affected by the file compression done on the image. Secret messages can be introduced into the least significant bits in an image and then hidden. A steganography tool can be used to camouflage the secret message in the least significant bits but it can introduce a random area that is too perfect. This area of perfect randomization stands out and can be detected by comparing the least significant bits to the next-to-least significant bits on an image that hasn't been compressed.<sup id="cite_ref-Wanyer2009_44-1" class="reference"><a href="#cite_note-Wanyer2009-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> </p><p>Generally, though, there are many techniques known to be able to hide messages in data using steganographic techniques. None are, by definition, obvious when users employ standard applications, but some can be detected by specialist tools. Others, however, are resistant to detection—or rather it is not possible to reliably distinguish data containing a hidden message from data containing just noise—even when the most sophisticated analysis is performed. Steganography is being used to conceal and deliver more effective cyber attacks, referred to as <i>Stegware</i>. The term Stegware was first introduced in 2017<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> to describe any malicious operation involving steganography as a vehicle to conceal an attack. Detection of steganography is challenging, and because of that, not an adequate defence. Therefore, the only way of defeating the threat is to transform data in a way that destroys any hidden messages,<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> a process called <a href="/wiki/Content_Threat_Removal" title="Content Threat Removal">Content Threat Removal</a>. </p> <div class="mw-heading mw-heading2"><h2 id="Applications">Applications</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=13" title="Edit section: Applications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Use_in_modern_printers">Use in modern printers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=14" title="Edit section: Use in modern printers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Printer_steganography" class="mw-redirect" title="Printer steganography">Printer steganography</a></div> <p>Some modern computer printers use steganography, including <a href="/wiki/Hewlett-Packard" title="Hewlett-Packard">Hewlett-Packard</a> and <a href="/wiki/Xerox" title="Xerox">Xerox</a> brand color laser printers. The printers add tiny yellow dots to each page. The barely-visible dots contain encoded printer serial numbers and date and time stamps.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Example_from_modern_practice">Example from modern practice</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=15" title="Edit section: Example from modern practice"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The larger the cover message (in binary data, the number of <a href="/wiki/Bit" title="Bit">bits</a>) relative to the hidden message, the easier it is to hide the hidden message (as an analogy, the larger the "haystack", the easier it is to hide a "needle"). So <a href="/wiki/Digital_image" title="Digital image">digital pictures</a>, which contain much data, are sometimes used to hide messages on the <a href="/wiki/Internet" title="Internet">Internet</a> and on other digital communication media. It is not clear how common this practice actually is. </p><p>For example, a 24-bit <a href="/wiki/Bitmap" title="Bitmap">bitmap</a> uses 8 bits to represent each of the three color values (red, green, and blue) of each <a href="/wiki/Pixel" title="Pixel">pixel</a>. The blue alone has 2<sup>8</sup> different levels of blue intensity. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the <a href="/wiki/Least_significant_bit" class="mw-redirect" title="Least significant bit">least significant bit</a> can be used more or less undetectably for something else other than color information. If that is repeated for the green and the red elements of each pixel as well, it is possible to encode one letter of <a href="/wiki/ASCII" title="ASCII">ASCII</a> text for every three <a href="/wiki/Pixel" title="Pixel">pixels</a>. </p><p>Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) because of the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible. The changes are indistinguishable from the <a href="/wiki/Noise_floor" title="Noise floor">noise floor</a> of the carrier. All media can be a carrier, but media with a large amount of redundant or compressible information is better suited. </p><p>From an <a href="/wiki/Information_theory" title="Information theory">information theoretical</a> point of view, that means that the <a href="/wiki/Communication_channel" title="Communication channel">channel</a> must have more <a href="/wiki/Channel_capacity" title="Channel capacity">capacity</a> than the "surface" <a href="/wiki/Signal_(information_theory)" class="mw-redirect" title="Signal (information theory)">signal</a> requires. There must be <a href="/wiki/Redundancy_(information_theory)" title="Redundancy (information theory)">redundancy</a>. For a digital image, it may be <a href="/wiki/Noise" title="Noise">noise</a> from the imaging element; for <a href="/wiki/Digital_audio" title="Digital audio">digital audio</a>, it may be noise from recording techniques or <a href="/wiki/Amplifier" title="Amplifier">amplification</a> equipment. In general, electronics that digitize an <a href="/wiki/Analog_signal" title="Analog signal">analog signal</a> suffer from several noise sources, such as <a href="/wiki/Johnson-Nyquist_noise" class="mw-redirect" title="Johnson-Nyquist noise">thermal noise</a>, <a href="/wiki/Flicker_noise" title="Flicker noise">flicker noise</a>, and <a href="/wiki/Shot_noise" title="Shot noise">shot noise</a>. The noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition, <a href="/wiki/Lossy_compression" title="Lossy compression">lossy compression</a> schemes (such as <a href="/wiki/JPEG" title="JPEG">JPEG</a>) always introduce some error to the decompressed data, and it is possible to exploit that for steganographic use, as well. </p><p>Although steganography and digital watermarking seem similar, they are not. In steganography, the hidden message should remain intact until it reaches its destination. Steganography can be used for <a href="/wiki/Digital_watermark" class="mw-redirect" title="Digital watermark">digital watermarking</a> in which a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified (for example, <a href="/wiki/Coded_Anti-Piracy" class="mw-redirect" title="Coded Anti-Piracy">Coded Anti-Piracy</a>) or even just to identify an image (as in the <a href="/wiki/EURion_constellation" title="EURion constellation">EURion constellation</a>). In such a case, the technique of hiding the message (here, the watermark) must be robust to prevent tampering. However, digital watermarking sometimes requires a brittle watermark, which can be modified easily, to check whether the image has been tampered with. That is the key difference between steganography and digital watermarking. </p> <div class="mw-heading mw-heading3"><h3 id="Alleged_use_by_intelligence_services">Alleged use by intelligence services</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=16" title="Edit section: Alleged use by intelligence services"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2010, the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> alleged that the <a href="/wiki/Foreign_Intelligence_Service_(Russia)" title="Foreign Intelligence Service (Russia)">Russian foreign intelligence service</a> uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents without diplomatic cover) stationed abroad.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> </p><p>On 23 April 2019 the U.S. Department of Justice unsealed an indictment charging Xiaoqing Zheng, a Chinese businessman and former Principal Engineer at General Electric, with 14 counts of conspiring to steal intellectual property and trade secrets from General Electric. Zheng had allegedly used steganography to exfiltrate 20,000 documents from General Electric to Tianyi Aviation Technology Co. in Nanjing, China, a company the FBI accused him of starting with backing from the Chinese government.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Distributed_steganography">Distributed steganography</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=17" title="Edit section: Distributed steganography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There are distributed steganography methods,<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> including methodologies that distribute the payload through multiple carrier files in diverse locations to make detection more difficult. For example, <span><a rel="nofollow" class="external text" href="https://patents.google.com/patent/US8527779">U.S. patent 8,527,779</a></span> by cryptographer William Easttom (<a href="/wiki/Chuck_Easttom" title="Chuck Easttom">Chuck Easttom</a>). </p> <div class="mw-heading mw-heading3"><h3 id="Online_challenge">Online challenge</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=18" title="Edit section: Online challenge"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The puzzles that are presented by <a href="/wiki/Cicada_3301" title="Cicada 3301">Cicada 3301</a> incorporate steganography with cryptography and other solving techniques since 2012.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> Puzzles involving steganography have also been featured in other <a href="/wiki/Alternate_reality_game" title="Alternate reality game">alternate reality games</a>. </p><p>The communications<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> of <a href="/wiki/Arizona_Daily_Wildcat#The_May_Day_mystery" title="Arizona Daily Wildcat">The May Day mystery</a> incorporate steganography and other solving techniques since 1981.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Computer_malware">Computer malware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=19" title="Edit section: Computer malware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Stegomalware" title="Stegomalware">Stegomalware</a></div> <p>It is possible to steganographically hide computer malware into digital images, videos, audio and various other files in order to evade detection by <a href="/wiki/Antivirus_software" title="Antivirus software">antivirus software</a>. This type of malware is called stegomalware. It can be activated by external code, which can be malicious or even non-malicious if some vulnerability in the software reading the file is exploited.<sup id="cite_ref-Chaganti-2021_55-0" class="reference"><a href="#cite_note-Chaganti-2021-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p><p>Stegomalware can be removed from certain files without knowing whether they contain stegomalware or not. This is done through <a href="/wiki/Content_Disarm_%26_Reconstruction" title="Content Disarm &amp; Reconstruction">content disarm and reconstruction</a> (CDR) software, and it involves reprocessing the entire file or removing parts from it.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> Actually detecting stegomalware in a file can be difficult and may involve testing the file behaviour in <a href="/wiki/Virtualization" title="Virtualization">virtual</a> environments or <a href="/wiki/Deep_learning" title="Deep learning">deep learning</a> analysis of the file.<sup id="cite_ref-Chaganti-2021_55-1" class="reference"><a href="#cite_note-Chaganti-2021-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Steganalysis">Steganalysis</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=20" title="Edit section: Steganalysis"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Steganalysis" title="Steganalysis">Steganalysis</a></div> <div class="mw-heading mw-heading3"><h3 id="Stegoanalytical_algorithms">Stegoanalytical algorithms</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=21" title="Edit section: Stegoanalytical algorithms"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Stegoanalytical algorithms can be cataloged in different ways, highlighting: according to the available information and according to the purpose sought. </p> <div class="mw-heading mw-heading4"><h4 id="According_to_the_information_available">According to the information available</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=22" title="Edit section: According to the information available"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There is the possibility of cataloging these algorithms based on the information held by the stegoanalyst in terms of clear and encrypted messages. It is a technique similar to cryptography, however, they have several differences: </p> <ul><li>Chosen stego attack: the stegoanalyst perceives the final target stego and the steganographic algorithm used.</li> <li>Known cover attack: the stegoanalyst comprises the initial conductive target and the final target stego.</li> <li>Known stego attack: the stegoanalyst knows the initial carrier target and the final target stego, in addition to the algorithm used.</li> <li>Stego only attack: the stegoanalyst perceives exclusively the stego target.</li> <li>Chosen message attack: the stegoanalyst, following a message selected by him, originates a stego target.</li> <li>Known message attack: the stegoanalyst owns the stego target and the hidden message, which is known to them.</li></ul> <div class="mw-heading mw-heading4"><h4 id="According_to_the_purpose_sought">According to the purpose sought</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=23" title="Edit section: According to the purpose sought"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The principal purpose of steganography is to transfer information unnoticed, however, it is possible for an attacker to have two different pretensions: </p> <ul><li>Passive steganalysis: does not alter the target stego, therefore, it examines the target stego in order to establish whether it carries hidden information and recovers the hidden message, the key used or both.</li> <li>Active steganalysis: changes the initial stego target, therefore, it seeks to suppress the transfer of information, if it exists.</li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=24" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col"> <ul><li><a href="/wiki/40-track_mode" title="40-track mode">40-track mode</a>&#160;– Method for hiding data on a floppy disk</li> <li><a href="/wiki/Acrostic" title="Acrostic">Acrostic</a>&#160;– Text formed from parts of another text</li> <li><a href="/wiki/BPCS-Steganography" class="mw-redirect" title="BPCS-Steganography">BPCS-Steganography</a>&#160;– computer message obfuscation technology<span style="display:none" class="category-wikidata-fallback-annotation">Pages displaying wikidata descriptions as a fallback</span></li> <li><a href="/wiki/Hacktivismo#Camera.2FShy" title="Hacktivismo">Camera/Shy</a></li> <li><a href="/wiki/Canary_trap" title="Canary trap">Canary trap</a>&#160;– Method for exposing an information leak</li> <li><a href="/wiki/Warrant_canary" title="Warrant canary">Warrant canary</a>&#160;– Method of indirect notification of a subpoena</li> <li><a href="/wiki/Covert_channel" title="Covert channel">Covert channel</a>&#160;– Computer security attack</li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a>&#160;– Practice and study of secure communication techniques</li> <li><a href="/wiki/Deniable_encryption" title="Deniable encryption">Deniable encryption</a>&#160;– Encryption techniques where an adversary cannot prove that the plaintext data exists</li> <li><a href="/wiki/Digital_watermarking" title="Digital watermarking">Digital watermarking</a>&#160;– Marker covertly embedded in a signal</li> <li><a href="/wiki/Invisible_ink" title="Invisible ink">Invisible ink</a>&#160;– Substance used for writing which is invisible and can later be made visible</li> <li><a href="/wiki/Music_cipher#Musical_Steganagraphy" title="Music cipher">Musical Steganography</a> – Hiding a message using musical notation</li> <li><a href="/wiki/Polybius_square" title="Polybius square">Polybius square</a>&#160;– Type of code</li> <li><a href="/wiki/Security_engineering" title="Security engineering">Security engineering</a>&#160;– Process of incorporating security controls into an information system</li> <li><a href="/wiki/Semiotics" title="Semiotics">Semiotics</a>&#160;– Study of signs and sign processes</li> <li><a href="/wiki/Steganographic_file_system" title="Steganographic file system">Steganographic file system</a></li> <li><a href="/wiki/Steganography_tools" title="Steganography tools">Steganography tools</a>&#160;– Software for embedding hidden data inside a carrier file</li> <li><a href="/wiki/Audio_watermark" title="Audio watermark">Audio watermark</a>&#160;– Electronic identifier embedded in an audio signal</li> <li><a href="/wiki/Visual_cryptography" title="Visual cryptography">Visual cryptography</a>&#160;– Cryptographic technique</li> <li><a href="/wiki/Security_printing" title="Security printing">Security printing</a>&#160;– Field of the printing industry for banknotes and other security products</li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=25" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.merriam-webster.com/dictionary/steganography">"Definition of STEGANOGRAPHY"</a>. <i>Merriam-webster.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">14 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Merriam-webster.com&amp;rft.atitle=Definition+of+STEGANOGRAPHY&amp;rft_id=https%3A%2F%2Fwww.merriam-webster.com%2Fdictionary%2Fsteganography&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-stegokey-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-stegokey_2-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFridrichM._GoljanD._Soukal2004" class="citation journal cs1">Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (eds.). <a rel="nofollow" class="external text" href="http://www.ws.binghamton.edu/fridrich/Research/Keysearch_SPIE.pdf">"Searching for the Stego Key"</a> <span class="cs1-format">(PDF)</span>. <i>Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI</i>. Security, Steganography, and Watermarking of Multimedia Contents VI. <b>5306</b>: 70–82. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2004SPIE.5306...70F">2004SPIE.5306...70F</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1117%2F12.521353">10.1117/12.521353</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:6773772">6773772</a><span class="reference-accessdate">. Retrieved <span class="nowrap">23 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Proc.+SPIE%2C+Electronic+Imaging%2C+Security%2C+Steganography%2C+and+Watermarking+of+Multimedia+Contents+VI&amp;rft.atitle=Searching+for+the+Stego+Key&amp;rft.volume=5306&amp;rft.pages=70-82&amp;rft.date=2004&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A6773772%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1117%2F12.521353&amp;rft_id=info%3Abibcode%2F2004SPIE.5306...70F&amp;rft.aulast=Fridrich&amp;rft.aufirst=Jessica&amp;rft.au=M.+Goljan&amp;rft.au=D.+Soukal&amp;rft_id=http%3A%2F%2Fwww.ws.binghamton.edu%2Ffridrich%2FResearch%2FKeysearch_SPIE.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPahati2001" class="citation web cs1">Pahati, OJ (29 November 2001). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20070716093719/http://www.alternet.org/story/11986/">"Confounding Carnivore: How to Protect Your Online Privacy"</a>. <a href="/wiki/AlterNet" title="AlterNet">AlterNet</a>. Archived from <a rel="nofollow" class="external text" href="http://www.alternet.org/story/11986/">the original</a> on 16 July 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">2 September</span> 2008</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Confounding+Carnivore%3A+How+to+Protect+Your+Online+Privacy&amp;rft.pub=AlterNet&amp;rft.date=2001-11-29&amp;rft.aulast=Pahati&amp;rft.aufirst=OJ&amp;rft_id=http%3A%2F%2Fwww.alternet.org%2Fstory%2F11986%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPetitcolasAnderson_RJKuhn_MG1999" class="citation journal cs1">Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). <a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~fapp2/publications/ieee99-infohiding.pdf">"Information Hiding: A survey"</a> <span class="cs1-format">(PDF)</span>. <i>Proceedings of the IEEE</i>. <b>87</b> (7): 1062–78. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.333.9397">10.1.1.333.9397</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2F5.771065">10.1109/5.771065</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2 September</span> 2008</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Proceedings+of+the+IEEE&amp;rft.atitle=Information+Hiding%3A+A+survey&amp;rft.volume=87&amp;rft.issue=7&amp;rft.pages=1062-78&amp;rft.date=1999&amp;rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.333.9397%23id-name%3DCiteSeerX&amp;rft_id=info%3Adoi%2F10.1109%2F5.771065&amp;rft.aulast=Petitcolas&amp;rft.aufirst=FAP&amp;rft.au=Anderson+RJ&amp;rft.au=Kuhn+MG&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~fapp2%2Fpublications%2Fieee99-infohiding.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://daten.digitale-sammlungen.de/~db/0002/bsb00026190/images/index.html?seite=71">"Polygraphiae (cf. p. 71f)"</a> (in German). Digitale Sammlungen<span class="reference-accessdate">. Retrieved <span class="nowrap">27 May</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Polygraphiae+%28cf.+p.+71f%29&amp;rft.pub=Digitale+Sammlungen&amp;rft_id=http%3A%2F%2Fdaten.digitale-sammlungen.de%2F~db%2F0002%2Fbsb00026190%2Fimages%2Findex.html%3Fseite%3D71&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-knit-6"><span class="mw-cite-backlink">^ <a href="#cite_ref-knit_6-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-knit_6-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://getpocket.com/explore/item/the-wartime-spies-who-used-knitting-as-an-espionage-tool">"The Wartime Spies Who Used Knitting as an Espionage Tool – Atlas Obscura"</a>. <i>Pocket</i><span class="reference-accessdate">. Retrieved <span class="nowrap">4 March</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Pocket&amp;rft.atitle=The+Wartime+Spies+Who+Used+Knitting+as+an+Espionage+Tool+%E2%80%93+Atlas+Obscura&amp;rft_id=https%3A%2F%2Fgetpocket.com%2Fexplore%2Fitem%2Fthe-wartime-spies-who-used-knitting-as-an-espionage-tool&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNewman" class="citation magazine cs1">Newman, Lily Hay. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220608222058/https://www.wired.com/story/merryl-goldberg-music-encryption-ussr-phantom-orchestra/">"How a Saxophonist Tricked the KGB by Encrypting Secrets in Music"</a>. <i>Wired</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1059-1028">1059-1028</a>. Archived from <a rel="nofollow" class="external text" href="https://www.wired.com/story/merryl-goldberg-music-encryption-ussr-phantom-orchestra/">the original</a> on 8 June 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired&amp;rft.atitle=How+a+Saxophonist+Tricked+the+KGB+by+Encrypting+Secrets+in+Music&amp;rft.issn=1059-1028&amp;rft.aulast=Newman&amp;rft.aufirst=Lily+Hay&amp;rft_id=https%3A%2F%2Fwww.wired.com%2Fstory%2Fmerryl-goldberg-music-encryption-ussr-phantom-orchestra%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://boingboing.net/2013/05/22/social-steganography-how-teen.html">Social Steganography: how teens smuggle meaning past the authority figures in their lives</a>, Boing Boing, 22 May 2013. Retrieved 7 June 2014.</span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.scenariomagazine.com/social-steganography/">Social Steganography</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140714143900/http://www.scenariomagazine.com/social-steganography/">Archived</a> 14 July 2014 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Scenario Magazine, 2013.</span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCheddadCondellCurranMc_Kevitt2010" class="citation journal cs1">Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2010). "Digital image steganography: Survey and analysis of current methods". <i>Signal Processing</i>. <b>90</b> (3): 727–752. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2010SigPr..90..727C">2010SigPr..90..727C</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.sigpro.2009.08.010">10.1016/j.sigpro.2009.08.010</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Signal+Processing&amp;rft.atitle=Digital+image+steganography%3A+Survey+and+analysis+of+current+methods&amp;rft.volume=90&amp;rft.issue=3&amp;rft.pages=727-752&amp;rft.date=2010&amp;rft_id=info%3Adoi%2F10.1016%2Fj.sigpro.2009.08.010&amp;rft_id=info%3Abibcode%2F2010SigPr..90..727C&amp;rft.aulast=Cheddad&amp;rft.aufirst=Abbas&amp;rft.au=Condell%2C+Joan&amp;rft.au=Curran%2C+Kevin&amp;rft.au=Mc+Kevitt%2C+Paul&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBenderGruhlMorimotoLu1996" class="citation journal cs1">Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. (1996). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200611050549/https://pdfs.semanticscholar.org/8c82/c93dfc7d3672e58efd982a23791a8a419053.pdf">"Techniques for data hiding"</a> <span class="cs1-format">(PDF)</span>. <i>IBM Systems Journal</i>. <b>35</b> (3.4). IBM Corp.: 313–336. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1147%2Fsj.353.0313">10.1147/sj.353.0313</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0018-8670">0018-8670</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:16672162">16672162</a>. Archived from <a rel="nofollow" class="external text" href="https://pdfs.semanticscholar.org/8c82/c93dfc7d3672e58efd982a23791a8a419053.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 11 June 2020.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IBM+Systems+Journal&amp;rft.atitle=Techniques+for+data+hiding&amp;rft.volume=35&amp;rft.issue=3.4&amp;rft.pages=313-336&amp;rft.date=1996&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A16672162%23id-name%3DS2CID&amp;rft.issn=0018-8670&amp;rft_id=info%3Adoi%2F10.1147%2Fsj.353.0313&amp;rft.aulast=Bender&amp;rft.aufirst=W.&amp;rft.au=Gruhl%2C+D.&amp;rft.au=Morimoto%2C+N.&amp;rft.au=Lu%2C+A.&amp;rft_id=https%3A%2F%2Fpdfs.semanticscholar.org%2F8c82%2Fc93dfc7d3672e58efd982a23791a8a419053.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGiannoulaHatzinakos2003" class="citation book cs1">Giannoula, A.; Hatzinakos, D. (2003). "Compressive data hiding for video signals". <i>Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)</i>. Vol.&#160;1. IEEE. pp.&#160;I–529–32. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ficip.2003.1247015">10.1109/icip.2003.1247015</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0780377508" title="Special:BookSources/0780377508"><bdi>0780377508</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:361883">361883</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Compressive+data+hiding+for+video+signals&amp;rft.btitle=Proceedings+2003+International+Conference+on+Image+Processing+%28Cat.+No.03CH37429%29&amp;rft.pages=I-529-32&amp;rft.pub=IEEE&amp;rft.date=2003&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A361883%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2Ficip.2003.1247015&amp;rft.isbn=0780377508&amp;rft.aulast=Giannoula&amp;rft.aufirst=A.&amp;rft.au=Hatzinakos%2C+D.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDittmannHesseHillert2005" class="citation journal cs1">Dittmann, Jana; Hesse, Danny; Hillert, Reyk (21 March 2005). Delp Iii, Edward J; Wong, Ping W (eds.). "Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set". <i>Security, Steganography, and Watermarking of Multimedia Contents VII</i>. <b>5681</b>. SPIE: 607. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2005SPIE.5681..607D">2005SPIE.5681..607D</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1117%2F12.586579">10.1117/12.586579</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:206413447">206413447</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Security%2C+Steganography%2C+and+Watermarking+of+Multimedia+Contents+VII&amp;rft.atitle=Steganography+and+steganalysis+in+voice-over+IP+scenarios%3A+operational+aspects+and+first+experiences+with+a+new+steganalysis+tool+set&amp;rft.volume=5681&amp;rft.pages=607&amp;rft.date=2005-03-21&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A206413447%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1117%2F12.586579&amp;rft_id=info%3Abibcode%2F2005SPIE.5681..607D&amp;rft.aulast=Dittmann&amp;rft.aufirst=Jana&amp;rft.au=Hesse%2C+Danny&amp;rft.au=Hillert%2C+Reyk&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text">B. Xiao, Y. Huang, and S. Tang, "An Approach to Information Hiding in Low Bit-Rate Speech Stream", in <i>IEEE GLOBECOM 2008</i>, IEEE, pp. 371–375, 2008. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4244-2324-8" title="Special:BookSources/978-1-4244-2324-8">978-1-4244-2324-8</a>.</span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHuangTangYuan2011" class="citation journal cs1">Huang, Yong Feng; Tang, Shanyu; Yuan, Jian (June 2011). <a rel="nofollow" class="external text" href="https://repository.uwl.ac.uk/id/eprint/3935/1/Steganography%20in%20inactive%20frames%20of%20VoIP%20streams%20encoded%20by%20source%20codec.pdf">"Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec"</a> <span class="cs1-format">(PDF)</span>. <i>IEEE Transactions on Information Forensics and Security</i>. <b>6</b> (2): 296–306. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ftifs.2011.2108649">10.1109/tifs.2011.2108649</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1556-6013">1556-6013</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:15096702">15096702</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Transactions+on+Information+Forensics+and+Security&amp;rft.atitle=Steganography+in+Inactive+Frames+of+VoIP+Streams+Encoded+by+Source+Codec&amp;rft.volume=6&amp;rft.issue=2&amp;rft.pages=296-306&amp;rft.date=2011-06&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A15096702%23id-name%3DS2CID&amp;rft.issn=1556-6013&amp;rft_id=info%3Adoi%2F10.1109%2Ftifs.2011.2108649&amp;rft.aulast=Huang&amp;rft.aufirst=Yong+Feng&amp;rft.au=Tang%2C+Shanyu&amp;rft.au=Yuan%2C+Jian&amp;rft_id=https%3A%2F%2Frepository.uwl.ac.uk%2Fid%2Feprint%2F3935%2F1%2FSteganography%2520in%2520inactive%2520frames%2520of%2520VoIP%2520streams%2520encoded%2520by%2520source%2520codec.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHuangLiuTangBai2012" class="citation journal cs1">Huang, Yongfeng; Liu, Chenghao; Tang, Shanyu; Bai, Sen (December 2012). <a rel="nofollow" class="external text" href="https://repository.uwl.ac.uk/id/eprint/3932/1/Steganography%20Integration%20into%20a%20low-bit%20rate%20speech%20codec.pdf">"Steganography Integration Into a Low-Bit Rate Speech Codec"</a> <span class="cs1-format">(PDF)</span>. <i>IEEE Transactions on Information Forensics and Security</i>. <b>7</b> (6): 1865–1875. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ftifs.2012.2218599">10.1109/tifs.2012.2218599</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1556-6013">1556-6013</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:16539562">16539562</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Transactions+on+Information+Forensics+and+Security&amp;rft.atitle=Steganography+Integration+Into+a+Low-Bit+Rate+Speech+Codec&amp;rft.volume=7&amp;rft.issue=6&amp;rft.pages=1865-1875&amp;rft.date=2012-12&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A16539562%23id-name%3DS2CID&amp;rft.issn=1556-6013&amp;rft_id=info%3Adoi%2F10.1109%2Ftifs.2012.2218599&amp;rft.aulast=Huang&amp;rft.aufirst=Yongfeng&amp;rft.au=Liu%2C+Chenghao&amp;rft.au=Tang%2C+Shanyu&amp;rft.au=Bai%2C+Sen&amp;rft_id=https%3A%2F%2Frepository.uwl.ac.uk%2Fid%2Feprint%2F3932%2F1%2FSteganography%2520Integration%2520into%2520a%2520low-bit%2520rate%2520speech%2520codec.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGhosalMukhopadhyayHossainSarkar2020" class="citation journal cs1">Ghosal, Sudipta Kr; Mukhopadhyay, Souradeep; Hossain, Sabbir; Sarkar, Ram (2020). "Application of Lah transform for security and privacy of data through information hiding in telecommunication". <i>Transactions on Emerging Telecommunications Technologies</i>. <b>32</b> (2). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fett.3984">10.1002/ett.3984</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:225866797">225866797</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Transactions+on+Emerging+Telecommunications+Technologies&amp;rft.atitle=Application+of+Lah+transform+for+security+and+privacy+of+data+through+information+hiding+in+telecommunication&amp;rft.volume=32&amp;rft.issue=2&amp;rft.date=2020&amp;rft_id=info%3Adoi%2F10.1002%2Fett.3984&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A225866797%23id-name%3DS2CID&amp;rft.aulast=Ghosal&amp;rft.aufirst=Sudipta+Kr&amp;rft.au=Mukhopadhyay%2C+Souradeep&amp;rft.au=Hossain%2C+Sabbir&amp;rft.au=Sarkar%2C+Ram&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCheddadCheddad2024" class="citation book cs1">Cheddad, Zohra Adila; Cheddad, Abbas (2024). "Active Restoration of Lost Audio Signals Using Machine Learning and Latent Information". <i>Proceedings 2023 Intelligent Systems Conference (IntelliSys'23)</i>. Lecture Notes in Networks and Systems. Vol.&#160;822. LNCS,Springer. pp.&#160;1–16. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-031-47721-8_1">10.1007/978-3-031-47721-8_1</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-031-47720-1" title="Special:BookSources/978-3-031-47720-1"><bdi>978-3-031-47720-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Active+Restoration+of+Lost+Audio+Signals+Using+Machine+Learning+and+Latent+Information&amp;rft.btitle=Proceedings+2023+Intelligent+Systems+Conference+%28IntelliSys%2723%29&amp;rft.series=Lecture+Notes+in+Networks+and+Systems&amp;rft.pages=1-16&amp;rft.pub=LNCS%2CSpringer&amp;rft.date=2024&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-031-47721-8_1&amp;rft.isbn=978-3-031-47720-1&amp;rft.aulast=Cheddad&amp;rft.aufirst=Zohra+Adila&amp;rft.au=Cheddad%2C+Abbas&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCheddadCondellCurranMc_Kevitt2009" class="citation journal cs1">Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2009). "A skin tone detection algorithm for an adaptive approach to steganography". <i>Signal Processing</i>. <b>89</b> (12): 2465–2478. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2009SigPr..89.2465C">2009SigPr..89.2465C</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.sigpro.2009.04.022">10.1016/j.sigpro.2009.04.022</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Signal+Processing&amp;rft.atitle=A+skin+tone+detection+algorithm+for+an+adaptive+approach+to+steganography&amp;rft.volume=89&amp;rft.issue=12&amp;rft.pages=2465-2478&amp;rft.date=2009&amp;rft_id=info%3Adoi%2F10.1016%2Fj.sigpro.2009.04.022&amp;rft_id=info%3Abibcode%2F2009SigPr..89.2465C&amp;rft.aulast=Cheddad&amp;rft.aufirst=Abbas&amp;rft.au=Condell%2C+Joan&amp;rft.au=Curran%2C+Kevin&amp;rft.au=Mc+Kevitt%2C+Paul&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWendzelMazurczykHaas" class="citation journal cs1">Wendzel, Steffen; Mazurczyk, Wojciech; Haas, Georg. "Don't You Touch My Nuts: Information Hiding In Cyber Physical Systems Using Smart Buildings". <i>Proceedings of the 2017 IEEE Security &amp; Privacy Workshops</i>. IEEE.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Proceedings+of+the+2017+IEEE+Security+%26+Privacy+Workshops&amp;rft.atitle=Don%27t+You+Touch+My+Nuts%3A+Information+Hiding+In+Cyber+Physical+Systems+Using+Smart+Buildings&amp;rft.aulast=Wendzel&amp;rft.aufirst=Steffen&amp;rft.au=Mazurczyk%2C+Wojciech&amp;rft.au=Haas%2C+Georg&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTuptukHailes" class="citation journal cs1">Tuptuk, Nilufer; Hailes, Stephen. "Covert channel attacks in pervasive computing". <i>Proceedings 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Proceedings+2015+IEEE+International+Conference+on+Pervasive+Computing+and+Communications+%28PerCom%29&amp;rft.atitle=Covert+channel+attacks+in+pervasive+computing&amp;rft.aulast=Tuptuk&amp;rft.aufirst=Nilufer&amp;rft.au=Hailes%2C+Stephen&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVincent_Chu" class="citation web cs1">Vincent Chu. <a rel="nofollow" class="external text" href="https://pictureworthsthousandwords.appspot.com/">"ASCII Art Steganography"</a>. <i>Pictureworthsthousandwords.appspot.com</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Pictureworthsthousandwords.appspot.com&amp;rft.atitle=ASCII+Art+Steganography&amp;rft.au=Vincent+Chu&amp;rft_id=https%3A%2F%2Fpictureworthsthousandwords.appspot.com%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWendzelZanderFechnerHerdin2015" class="citation journal cs1">Wendzel, Steffen; Zander, Sebastian; Fechner, Bernhard; Herdin, Christian (16 April 2015). <a rel="nofollow" class="external text" href="https://www.researchgate.net/publication/263048788">"Pattern-Based Survey and Categorization of Network Covert Channel Techniques"</a>. <i>ACM Computing Surveys</i>. <b>47</b> (3): 1–26. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1406.2901">1406.2901</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2684195">10.1145/2684195</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14654993">14654993</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=ACM+Computing+Surveys&amp;rft.atitle=Pattern-Based+Survey+and+Categorization+of+Network+Covert+Channel+Techniques&amp;rft.volume=47&amp;rft.issue=3&amp;rft.pages=1-26&amp;rft.date=2015-04-16&amp;rft_id=info%3Aarxiv%2F1406.2901&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14654993%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2684195&amp;rft.aulast=Wendzel&amp;rft.aufirst=Steffen&amp;rft.au=Zander%2C+Sebastian&amp;rft.au=Fechner%2C+Bernhard&amp;rft.au=Herdin%2C+Christian&amp;rft_id=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F263048788&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMazurczykWendzelCabaj2018" class="citation book cs1">Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof (27 August 2018). "Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach". <i>Proceedings of the 13th International Conference on Availability, Reliability and Security</i>. pp.&#160;1–10. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3230833.3233261">10.1145/3230833.3233261</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781450364485" title="Special:BookSources/9781450364485"><bdi>9781450364485</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:51976841">51976841</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Towards+Deriving+Insights+into+Data+Hiding+Methods+Using+Pattern-based+Approach&amp;rft.btitle=Proceedings+of+the+13th+International+Conference+on+Availability%2C+Reliability+and+Security&amp;rft.pages=1-10&amp;rft.date=2018-08-27&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A51976841%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F3230833.3233261&amp;rft.isbn=9781450364485&amp;rft.aulast=Mazurczyk&amp;rft.aufirst=Wojciech&amp;rft.au=Wendzel%2C+Steffen&amp;rft.au=Cabaj%2C+Krzysztof&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHildebrandtAltschaffelLamshöftLange2020" class="citation journal cs1">Hildebrandt, Mario; Altschaffel, Robert; Lamshöft, Kevin; Lange, Matthias; Szemkus, Martin; Neubert, Tom; Vielhauer, Claus; Ding, Yongjian; Dittmann, Jana (2020). "Threat Analysis of Steganographic and Covert Communication in Nuclear I&amp;C Systems". <i>International Conference on Nuclear Security: Sustaining and Strengthening Efforts</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Conference+on+Nuclear+Security%3A+Sustaining+and+Strengthening+Efforts&amp;rft.atitle=Threat+Analysis+of+Steganographic+and+Covert+Communication+in+Nuclear+I%26C+Systems&amp;rft.date=2020&amp;rft.aulast=Hildebrandt&amp;rft.aufirst=Mario&amp;rft.au=Altschaffel%2C+Robert&amp;rft.au=Lamsh%C3%B6ft%2C+Kevin&amp;rft.au=Lange%2C+Matthias&amp;rft.au=Szemkus%2C+Martin&amp;rft.au=Neubert%2C+Tom&amp;rft.au=Vielhauer%2C+Claus&amp;rft.au=Ding%2C+Yongjian&amp;rft.au=Dittmann%2C+Jana&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMilevaVelinovHartmannWendzel2021" class="citation journal cs1">Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura; Wendzel, Steffen; Mazurczyk, Wojciech (May 2021). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.cose.2021.102207">"Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels"</a>. <i>Computers &amp; Security</i>. <b>104</b>: 102207. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.cose.2021.102207">10.1016/j.cose.2021.102207</a></span>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:232342523">232342523</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Comprehensive+analysis+of+MQTT+5.0+susceptibility+to+network+covert+channels&amp;rft.volume=104&amp;rft.pages=102207&amp;rft.date=2021-05&amp;rft_id=info%3Adoi%2F10.1016%2Fj.cose.2021.102207&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A232342523%23id-name%3DS2CID&amp;rft.aulast=Mileva&amp;rft.aufirst=Aleksandra&amp;rft.au=Velinov%2C+Aleksandar&amp;rft.au=Hartmann%2C+Laura&amp;rft.au=Wendzel%2C+Steffen&amp;rft.au=Mazurczyk%2C+Wojciech&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.cose.2021.102207&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGirling1987" class="citation journal cs1 cs1-prop-long-vol">Girling, C.G. (February 1987). "Covert Channels in LAN's". <i>IEEE Transactions on Software Engineering</i>. SE-13 (2): 292–296. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2Ftse.1987.233153">10.1109/tse.1987.233153</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0098-5589">0098-5589</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:3042941">3042941</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Transactions+on+Software+Engineering&amp;rft.atitle=Covert+Channels+in+LAN%27s&amp;rft.volume=SE-13&amp;rft.issue=2&amp;rft.pages=292-296&amp;rft.date=1987-02&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A3042941%23id-name%3DS2CID&amp;rft.issn=0098-5589&amp;rft_id=info%3Adoi%2F10.1109%2Ftse.1987.233153&amp;rft.aulast=Girling&amp;rft.aufirst=C.G.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text">M. Wolf, “Covert channels in LAN protocols,” in Proceedings of the Workshop on Local Area Network Security (LANSEC’89) (T.A. Berson and T. Beth, eds.), pp. 91–102, 1989.</span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRowland1997" class="citation journal cs1">Rowland, Craig H. (5 May 1997). <a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v2i5.528">"Covert channels in the TCP/IP protocol suite"</a>. <i>First Monday</i>. <b>2</b> (5). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.5210%2Ffm.v2i5.528">10.5210/fm.v2i5.528</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1396-0466">1396-0466</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=First+Monday&amp;rft.atitle=Covert+channels+in+the+TCP%2FIP+protocol+suite&amp;rft.volume=2&amp;rft.issue=5&amp;rft.date=1997-05-05&amp;rft_id=info%3Adoi%2F10.5210%2Ffm.v2i5.528&amp;rft.issn=1396-0466&amp;rft.aulast=Rowland&amp;rft.aufirst=Craig+H.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.5210%252Ffm.v2i5.528&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text">Kamran Ahsan, “Covert Channel Analysis and Data Hiding in TCP/IP,” MSc Thesis, University of Toronto, 2002.</span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMurdochLewis2005" class="citation cs2">Murdoch, Steven J.; Lewis, Stephen (2005), "Embedding Covert Channels into TCP/IP", <i>Information Hiding</i>, Springer Berlin Heidelberg, pp.&#160;247–261, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F11558859_19">10.1007/11558859_19</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9783540290391" title="Special:BookSources/9783540290391"><bdi>9783540290391</bdi></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Hiding&amp;rft.atitle=Embedding+Covert+Channels+into+TCP%2FIP&amp;rft.pages=247-261&amp;rft.date=2005&amp;rft_id=info%3Adoi%2F10.1007%2F11558859_19&amp;rft.isbn=9783540290391&amp;rft.aulast=Murdoch&amp;rft.aufirst=Steven+J.&amp;rft.au=Lewis%2C+Stephen&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKrzysztof_Szczypiorski2003" class="citation web cs1">Krzysztof Szczypiorski (4 November 2003). <a rel="nofollow" class="external text" href="http://www.tele.pw.edu.pl/~krzysiek/pdf/steg-seminar-2003.pdf">"Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System – HICCUPS"</a> <span class="cs1-format">(PDF)</span>. <i>Institute of Telecommunications Seminar</i><span class="reference-accessdate">. Retrieved <span class="nowrap">17 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Institute+of+Telecommunications+Seminar&amp;rft.atitle=Steganography+in+TCP%2FIP+Networks.+State+of+the+Art+and+a+Proposal+of+a+New+System+%E2%80%93+HICCUPS&amp;rft.date=2003-11-04&amp;rft.au=Krzysztof+Szczypiorski&amp;rft_id=http%3A%2F%2Fwww.tele.pw.edu.pl%2F~krzysiek%2Fpdf%2Fsteg-seminar-2003.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPatrick_Philippe_Meier2009" class="citation web cs1">Patrick Philippe Meier (5 June 2009). <a rel="nofollow" class="external text" href="http://irevolution.wordpress.com/2009/06/05/steganography-2-0-digital-resistance-against-repressive-regimes/">"Steganography 2.0: Digital Resistance against Repressive Regimes"</a>. <i>irevolution.wordpress.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">17 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=irevolution.wordpress.com&amp;rft.atitle=Steganography+2.0%3A+Digital+Resistance+against+Repressive+Regimes&amp;rft.date=2009-06-05&amp;rft.au=Patrick+Philippe+Meier&amp;rft_id=http%3A%2F%2Firevolution.wordpress.com%2F2009%2F06%2F05%2Fsteganography-2-0-digital-resistance-against-repressive-regimes%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCraig_Rowland1997" class="citation web cs1">Craig Rowland (May 1997). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130126135920/http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/issue/view/80">"Covert Channels in the TCP/IP Suite"</a>. <i>First Monday Journal</i>. Archived from <a rel="nofollow" class="external text" href="http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/issue/view/80">the original</a> on 26 January 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">16 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=First+Monday+Journal&amp;rft.atitle=Covert+Channels+in+the+TCP%2FIP+Suite&amp;rft.date=1997-05&amp;rft.au=Craig+Rowland&amp;rft_id=http%3A%2F%2Ffirstmonday.org%2Fhtbin%2Fcgiwrap%2Fbin%2Fojs%2Findex.php%2Ffm%2Fissue%2Fview%2F80&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSteven_J._MurdochStephen_Lewis2005" class="citation web cs1">Steven J. Murdoch &amp; Stephen Lewis (2005). <a rel="nofollow" class="external text" href="http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf">"Embedding Covert Channels into TCP/IP"</a> <span class="cs1-format">(PDF)</span>. <i>Information Hiding Workshop</i><span class="reference-accessdate">. Retrieved <span class="nowrap">16 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Information+Hiding+Workshop&amp;rft.atitle=Embedding+Covert+Channels+into+TCP%2FIP&amp;rft.date=2005&amp;rft.au=Steven+J.+Murdoch&amp;rft.au=Stephen+Lewis&amp;rft_id=http%3A%2F%2Fwww.cl.cam.ac.uk%2F~sjm217%2Fpapers%2Fih05coverttcp.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKamran_AhsanDeepa_Kundur2002" class="citation web cs1">Kamran Ahsan &amp; Deepa Kundur (December 2002). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121029155725/http://wwwiti.cs.uni-magdeburg.de/iti_amsl/acm/acm02/ahsan_kundur.pdf">"Practical Data Hiding in TCP/IP"</a> <span class="cs1-format">(PDF)</span>. <i>ACM Wksp. Multimedia Security</i>. Archived from <a rel="nofollow" class="external text" href="http://wwwiti.cs.uni-magdeburg.de/iti_amsl/acm/acm02/ahsan_kundur.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 29 October 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">16 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ACM+Wksp.+Multimedia+Security&amp;rft.atitle=Practical+Data+Hiding+in+TCP%2FIP&amp;rft.date=2002-12&amp;rft.au=Kamran+Ahsan&amp;rft.au=Deepa+Kundur&amp;rft_id=http%3A%2F%2Fwwwiti.cs.uni-magdeburg.de%2Fiti_amsl%2Facm%2Facm02%2Fahsan_kundur.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKundur_D.Ahsan_K.2003" class="citation web cs1">Kundur D. &amp; Ahsan K. (April 2003). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121029155725/http://www.ece.tamu.edu/~deepa/pub/KunAhsTXSecWrkshp03.pdf">"Practical Internet Steganography: Data Hiding in IP"</a> <span class="cs1-format">(PDF)</span>. <i>Texas Wksp. Security of Information Systems</i>. Archived from <a rel="nofollow" class="external text" href="http://www.ece.tamu.edu/~deepa/pub/KunAhsTXSecWrkshp03.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 29 October 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">16 June</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Texas+Wksp.+Security+of+Information+Systems&amp;rft.atitle=Practical+Internet+Steganography%3A+Data+Hiding+in+IP&amp;rft.date=2003-04&amp;rft.au=Kundur+D.&amp;rft.au=Ahsan+K.&amp;rft_id=http%3A%2F%2Fwww.ece.tamu.edu%2F~deepa%2Fpub%2FKunAhsTXSecWrkshp03.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWojciech_MazurczykKrzysztof_Szczypiorski2008" class="citation book cs1">Wojciech Mazurczyk &amp; Krzysztof Szczypiorski (November 2008). "Steganography of VoIP Streams". <i>On the Move to Meaningful Internet Systems: OTM 2008</i>. Lecture Notes in Computer Science. Vol.&#160;5332. pp.&#160;1001–1018. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/0805.2938">0805.2938</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-540-88873-4_6">10.1007/978-3-540-88873-4_6</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-540-88872-7" title="Special:BookSources/978-3-540-88872-7"><bdi>978-3-540-88872-7</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14336157">14336157</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Steganography+of+VoIP+Streams&amp;rft.btitle=On+the+Move+to+Meaningful+Internet+Systems%3A+OTM+2008&amp;rft.series=Lecture+Notes+in+Computer+Science&amp;rft.pages=1001-1018&amp;rft.date=2008-11&amp;rft_id=info%3Aarxiv%2F0805.2938&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14336157%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-540-88873-4_6&amp;rft.isbn=978-3-540-88872-7&amp;rft.au=Wojciech+Mazurczyk&amp;rft.au=Krzysztof+Szczypiorski&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBartosz_JankowskiWojciech_MazurczykKrzysztof_Szczypiorski2010" class="citation arxiv cs1">Bartosz Jankowski; Wojciech Mazurczyk &amp; Krzysztof Szczypiorski (11 May 2010). "Information Hiding Using Improper Frame Padding". <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1005.1925">1005.1925</a></span> [<a rel="nofollow" class="external text" href="https://arxiv.org/archive/cs.CR">cs.CR</a>].</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=preprint&amp;rft.jtitle=arXiv&amp;rft.atitle=Information+Hiding+Using+Improper+Frame+Padding&amp;rft.date=2010-05-11&amp;rft_id=info%3Aarxiv%2F1005.1925&amp;rft.au=Bartosz+Jankowski&amp;rft.au=Wojciech+Mazurczyk&amp;rft.au=Krzysztof+Szczypiorski&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWendzelKeller2011" class="citation book cs1">Wendzel, Steffen; Keller, Joerg (20 October 2011). "Low-Attention Forwarding for Mobile Network Covert Channels". <a rel="nofollow" class="external text" href="https://www.researchgate.net/publication/215661202"><i>Communications and Multimedia Security</i></a>. Lecture Notes in Computer Science. Vol.&#160;7025. pp.&#160;122–133. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-24712-5_10">10.1007/978-3-642-24712-5_10</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-24711-8" title="Special:BookSources/978-3-642-24711-8"><bdi>978-3-642-24711-8</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Low-Attention+Forwarding+for+Mobile+Network+Covert+Channels&amp;rft.btitle=Communications+and+Multimedia+Security&amp;rft.series=Lecture+Notes+in+Computer+Science&amp;rft.pages=122-133&amp;rft.date=2011-10-20&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-642-24712-5_10&amp;rft.isbn=978-3-642-24711-8&amp;rft.aulast=Wendzel&amp;rft.aufirst=Steffen&amp;rft.au=Keller%2C+Joerg&amp;rft_id=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F215661202&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-Wiley-IEEE-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-Wiley-IEEE_41-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMazurczykWendzelZanderHoumansadr2016" class="citation book cs1">Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof (2016). <a rel="nofollow" class="external text" href="http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118861698.html"><i>Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications</i></a> (1&#160;ed.). Wiley-IEEE. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-118-86169-1" title="Special:BookSources/978-1-118-86169-1"><bdi>978-1-118-86169-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Hiding+in+Communication+Networks%3A+Fundamentals%2C+Mechanisms%2C+and+Applications&amp;rft.edition=1&amp;rft.pub=Wiley-IEEE&amp;rft.date=2016&amp;rft.isbn=978-1-118-86169-1&amp;rft.aulast=Mazurczyk&amp;rft.aufirst=Wojciech&amp;rft.au=Wendzel%2C+Steffen&amp;rft.au=Zander%2C+Sebastian&amp;rft.au=Houmansadr%2C+Amir&amp;rft.au=Szczypiorski%2C+Krzysztof&amp;rft_id=http%3A%2F%2Feu.wiley.com%2FWileyCDA%2FWileyTitle%2FproductCd-1118861698.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJózef_LubaczWojciech_MazurczykKrzysztof_Szczypiorski2010" class="citation web cs1">Józef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski (February 2010). <a rel="nofollow" class="external text" href="https://spectrum.ieee.org/vice-over-ip-the-voip-steganography-threat">"Vice Over IP: The VoIP Steganography Threat"</a>. <i>IEEE Spectrum</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 February</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=IEEE+Spectrum&amp;rft.atitle=Vice+Over+IP%3A+The+VoIP+Steganography+Threat&amp;rft.date=2010-02&amp;rft.au=J%C3%B3zef+Lubacz&amp;rft.au=Wojciech+Mazurczyk&amp;rft.au=Krzysztof+Szczypiorski&amp;rft_id=https%3A%2F%2Fspectrum.ieee.org%2Fvice-over-ip-the-voip-steganography-threat&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKrzysztof_Szczypiorski2003" class="citation web cs1">Krzysztof Szczypiorski (October 2003). <a rel="nofollow" class="external text" href="http://krzysiek.tele.pw.edu.pl/pdf/acs2003-hiccups.pdf">"HICCUPS: Hidden Communication System for Corrupted Networks"</a> <span class="cs1-format">(PDF)</span>. <i>In Proc. of: The Tenth International Multi-Conference on Advanced Computer Systems ACS'2003, pp. 31–40</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 February</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=In+Proc.+of%3A+The+Tenth+International+Multi-Conference+on+Advanced+Computer+Systems+ACS%272003%2C+pp.+31%E2%80%9340&amp;rft.atitle=HICCUPS%3A+Hidden+Communication+System+for+Corrupted+Networks&amp;rft.date=2003-10&amp;rft.au=Krzysztof+Szczypiorski&amp;rft_id=http%3A%2F%2Fkrzysiek.tele.pw.edu.pl%2Fpdf%2Facs2003-hiccups.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-Wanyer2009-44"><span class="mw-cite-backlink">^ <a href="#cite_ref-Wanyer2009_44-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Wanyer2009_44-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Wayner, Peter (2009). <i>Disappearing Cryptography: Information Hiding: Steganography &amp; Watermarking</i>, Morgan Kaufmann Publishers, Amsterdam; Boston <sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citing_sources" title="Wikipedia:Citing sources"><span title="Please supply an &#73;SBN for this book.">ISBN&#160;missing</span></a></i>&#93;</sup></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLancioni2017" class="citation web cs1">Lancioni, German (16 October 2017). <a rel="nofollow" class="external text" href="https://www.mcafee.com/blogs/enterprise/seeing-through-stegware/">"What's Hidden in That Picture Online? Seeing Through "Stegware"<span class="cs1-kern-right"></span>"</a>. <a href="/wiki/McAfee" title="McAfee">McAfee</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What%27s+Hidden+in+That+Picture+Online%3F+Seeing+Through+%22Stegware%22&amp;rft.pub=McAfee&amp;rft.date=2017-10-16&amp;rft.aulast=Lancioni&amp;rft.aufirst=German&amp;rft_id=https%3A%2F%2Fwww.mcafee.com%2Fblogs%2Fenterprise%2Fseeing-through-stegware%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWiseman2017" class="citation report cs1">Wiseman, Simon (2017). <a rel="nofollow" class="external text" href="https://www.researchgate.net/publication/319943090">Defenders Guide to Steganography</a> (Report). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.13140%2FRG.2.2.21608.98561">10.13140/RG.2.2.21608.98561</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Defenders+Guide+to+Steganography&amp;rft.date=2017&amp;rft_id=info%3Adoi%2F10.13140%2FRG.2.2.21608.98561&amp;rft.aulast=Wiseman&amp;rft.aufirst=Simon&amp;rft_id=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F319943090&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/press/archives/2005/10/16">"Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print"</a>. <a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a>. 16 October 2005.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Secret+Code+in+Color+Printers+Lets+Government+Track+You%3B+Tiny+Dots+Show+Where+and+When+You+Made+Your+Print&amp;rft.pub=Electronic+Frontier+Foundation&amp;rft.date=2005-10-16&amp;rft_id=https%3A%2F%2Fwww.eff.org%2Fpress%2Farchives%2F2005%2F10%2F16&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.justice.gov/opa/documents/062810complaint2.pdf">"Criminal complaint by Special Agent Ricci against alleged Russian agents"</a> <span class="cs1-format">(PDF)</span>. United States Department of Justice.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Criminal+complaint+by+Special+Agent+Ricci+against+alleged+Russian+agents&amp;rft.pub=United+States+Department+of+Justice&amp;rft_id=https%3A%2F%2Fwww.justice.gov%2Fopa%2Fdocuments%2F062810complaint2.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://blog.twinstate.com/news/ge-trade-secrets-theft">"GE Engineer Charged in Elaborate Theft of Trade Secrets"</a>. Twinstate Technologies.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=GE+Engineer+Charged+in+Elaborate+Theft+of+Trade+Secrets&amp;rft.pub=Twinstate+Technologies&amp;rft_id=https%3A%2F%2Fblog.twinstate.com%2Fnews%2Fge-trade-secrets-theft&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLiaoWenShi2011" class="citation book cs1">Liao, Xin; Wen, Qiao-yan; Shi, Sha (2011). "Distributed Steganography". <i>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing</i>. <a href="/wiki/IEEE" class="mw-redirect" title="IEEE">IEEE</a>. pp.&#160;153–156. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FIIHMSP.2011.20">10.1109/IIHMSP.2011.20</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4577-1397-2" title="Special:BookSources/978-1-4577-1397-2"><bdi>978-1-4577-1397-2</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:17769131">17769131</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Distributed+Steganography&amp;rft.btitle=2011+Seventh+International+Conference+on+Intelligent+Information+Hiding+and+Multimedia+Signal+Processing&amp;rft.pages=153-156&amp;rft.pub=IEEE&amp;rft.date=2011&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A17769131%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FIIHMSP.2011.20&amp;rft.isbn=978-1-4577-1397-2&amp;rft.aulast=Liao&amp;rft.aufirst=Xin&amp;rft.au=Wen%2C+Qiao-yan&amp;rft.au=Shi%2C+Sha&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJane_Wakefield2014" class="citation news cs1">Jane Wakefield (9 January 2014). <a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/technology-25667292">"Cicada 3301: The darknet treasure trail reopens"</a>. <i>BBC News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=BBC+News&amp;rft.atitle=Cicada+3301%3A+The+darknet+treasure+trail+reopens&amp;rft.date=2014-01-09&amp;rft.au=Jane+Wakefield&amp;rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Ftechnology-25667292&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.maydaymystery.org/mayday/texts/index.html">"The texts"</a>. <i>Maydaymystery.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 November</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Maydaymystery.org&amp;rft.atitle=The+texts&amp;rft_id=http%3A%2F%2Fwww.maydaymystery.org%2Fmayday%2Ftexts%2Findex.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.maydaymystery.org/mayday/recent.html">"Recent things"</a>. <i>Maydaymystery.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 November</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Maydaymystery.org&amp;rft.atitle=Recent+things&amp;rft_id=http%3A%2F%2Fwww.maydaymystery.org%2Fmayday%2Frecent.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.maydaymystery.org/mayday/mystery.html">"The Mystery"</a>. <i>Maydaymystery.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 November</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Maydaymystery.org&amp;rft.atitle=The+Mystery&amp;rft_id=http%3A%2F%2Fwww.maydaymystery.org%2Fmayday%2Fmystery.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-Chaganti-2021-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-Chaganti-2021_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Chaganti-2021_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChagantiRAlazabPham2021" class="citation report cs1">Chaganti, Raj; R, Vinayakumar; Alazab, Mamoun; Pham, Tuan (12 October 2021). <a rel="nofollow" class="external text" href="https://www.techrxiv.org/articles/preprint/Stegomalware_A_Systematic_Survey_of_Malware_Hiding_and_Detection_in_Images_Machine_Learning_Models_and_Research_Challenges/16755457/1">Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges</a> (Report). <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/2110.02504">2110.02504</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.36227%2Ftechrxiv.16755457.v1">10.36227/techrxiv.16755457.v1</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Stegomalware%3A+A+Systematic+Survey+of+Malware+Hiding+and+Detection+in+Images%2C+Machine+Learning+Models+and+Research+Challenges&amp;rft.date=2021-10-12&amp;rft_id=info%3Aarxiv%2F2110.02504&amp;rft_id=info%3Adoi%2F10.36227%2Ftechrxiv.16755457.v1&amp;rft.aulast=Chaganti&amp;rft.aufirst=Raj&amp;rft.au=R%2C+Vinayakumar&amp;rft.au=Alazab%2C+Mamoun&amp;rft.au=Pham%2C+Tuan&amp;rft_id=https%3A%2F%2Fwww.techrxiv.org%2Farticles%2Fpreprint%2FStegomalware_A_Systematic_Survey_of_Malware_Hiding_and_Detection_in_Images_Machine_Learning_Models_and_Research_Challenges%2F16755457%2F1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span> (pre-print, not peer reviewed)</span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVotiro2021" class="citation web cs1">Votiro (30 November 2021). <a rel="nofollow" class="external text" href="https://votiro.com/blog/what-to-look-for-in-cdr-file-sanitization-vendors/">"Finding a Content Disarm &amp; Reconstruction (CDR) Vendor"</a>. <i>Votiro</i><span class="reference-accessdate">. Retrieved <span class="nowrap">11 January</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Votiro&amp;rft.atitle=Finding+a+Content+Disarm+%26+Reconstruction+%28CDR%29+Vendor&amp;rft.date=2021-11-30&amp;rft.au=Votiro&amp;rft_id=https%3A%2F%2Fvotiro.com%2Fblog%2Fwhat-to-look-for-in-cdr-file-sanitization-vendors%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://secureiqlab.com/content-disarm-and-reconstruct/">"Content Disarm and Reconstruct – SecureIQLab"</a>. 12 April 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">11 January</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Content+Disarm+and+Reconstruct+%E2%80%93+SecureIQLab&amp;rft.date=2022-04-12&amp;rft_id=https%3A%2F%2Fsecureiqlab.com%2Fcontent-disarm-and-reconstruct%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="Sources">Sources</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=26" title="Edit section: Sources"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin" style=""> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWayner,_Peter2002" class="citation book cs1">Wayner, Peter (2002). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20101224093251/http://www.wayner.org/node/6"><i>Disappearing cryptography: information hiding: steganography &amp; watermarking</i></a>. Amsterdam: MK/Morgan Kaufmann Publishers. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-558-60769-9" title="Special:BookSources/978-1-558-60769-9"><bdi>978-1-558-60769-9</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://www.wayner.org/node/6">the original</a> on 24 December 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">4 November</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Disappearing+cryptography%3A+information+hiding%3A+steganography+%26+watermarking&amp;rft.place=Amsterdam&amp;rft.pub=MK%2FMorgan+Kaufmann+Publishers&amp;rft.date=2002&amp;rft.isbn=978-1-558-60769-9&amp;rft.au=Wayner%2C+Peter&amp;rft_id=http%3A%2F%2Fwww.wayner.org%2Fnode%2F6&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWayner,_Peter2009" class="citation book cs1">Wayner, Peter (2009). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20101224093238/http://www.wayner.org/node/13"><i>Disappearing cryptography 3rd Edition: information hiding: steganography &amp; watermarking</i></a>. Amsterdam: MK/Morgan Kaufmann Publishers. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-123-74479-1" title="Special:BookSources/978-0-123-74479-1"><bdi>978-0-123-74479-1</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://www.wayner.org/node/13">the original</a> on 24 December 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">4 November</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Disappearing+cryptography+3rd+Edition%3A+information+hiding%3A+steganography+%26+watermarking&amp;rft.place=Amsterdam&amp;rft.pub=MK%2FMorgan+Kaufmann+Publishers&amp;rft.date=2009&amp;rft.isbn=978-0-123-74479-1&amp;rft.au=Wayner%2C+Peter&amp;rft_id=http%3A%2F%2Fwww.wayner.org%2Fnode%2F13&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPetitcolas,_Fabien_A.P.Katzenbeisser,_Stefan2000" class="citation book cs1">Petitcolas, Fabien A.P.; Katzenbeisser, Stefan (2000). <a rel="nofollow" class="external text" href="http://petitcolas.net/fabien/publications/book99-ih/"><i>Information Hiding Techniques for Steganography and Digital Watermarking</i></a>. Artech House Publishers. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-580-53035-4" title="Special:BookSources/978-1-580-53035-4"><bdi>978-1-580-53035-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Hiding+Techniques+for+Steganography+and+Digital+Watermarking&amp;rft.pub=Artech+House+Publishers&amp;rft.date=2000&amp;rft.isbn=978-1-580-53035-4&amp;rft.au=Petitcolas%2C+Fabien+A.P.&amp;rft.au=Katzenbeisser%2C+Stefan&amp;rft_id=http%3A%2F%2Fpetitcolas.net%2Ffabien%2Fpublications%2Fbook99-ih%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson,_NeilDuric,_ZoranJajodia,_Sushil2001" class="citation book cs1">Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001). <i>Information hiding: steganography and watermarking: attacks and countermeasures</i>. Springer. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-792-37204-2" title="Special:BookSources/978-0-792-37204-2"><bdi>978-0-792-37204-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+hiding%3A+steganography+and+watermarking%3A+attacks+and+countermeasures&amp;rft.pub=Springer&amp;rft.date=2001&amp;rft.isbn=978-0-792-37204-2&amp;rft.au=Johnson%2C+Neil&amp;rft.au=Duric%2C+Zoran&amp;rft.au=Jajodia%2C+Sushil&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPetitcolas,_Fabien_A.P.Katzenbeisser,_Stefan2016" class="citation book cs1">Petitcolas, Fabien A.P.; Katzenbeisser, Stefan (2016). <a rel="nofollow" class="external text" href="http://petitcolas.net/book15-ih/"><i>Information Hiding</i></a>. Artech House Publishers. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1608079285" title="Special:BookSources/978-1608079285"><bdi>978-1608079285</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Hiding&amp;rft.pub=Artech+House+Publishers&amp;rft.date=2016&amp;rft.isbn=978-1608079285&amp;rft.au=Petitcolas%2C+Fabien+A.P.&amp;rft.au=Katzenbeisser%2C+Stefan&amp;rft_id=http%3A%2F%2Fpetitcolas.net%2Fbook15-ih%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ASteganography" class="Z3988"></span></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Steganography&amp;action=edit&amp;section=27" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-External_links plainlinks metadata ambox ambox-style ambox-external_links" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/40px-Edit-clear.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/60px-Edit-clear.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/f/f2/Edit-clear.svg/80px-Edit-clear.svg.png 2x" data-file-width="48" data-file-height="48" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This section's <b>use of <a href="/wiki/Wikipedia:External_links" title="Wikipedia:External links">external links</a> may not follow Wikipedia's policies or guidelines</b>.<span class="hide-when-compact"> Please <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Steganography&amp;action=edit">improve this article</a> by removing <a href="/wiki/Wikipedia:What_Wikipedia_is_not#Wikipedia_is_not_a_mirror_or_a_repository_of_links,_images,_or_media_files" title="Wikipedia:What Wikipedia is not">excessive</a> or <a href="/wiki/Wikipedia:External_links" title="Wikipedia:External links">inappropriate</a> external links, and converting useful links where appropriate into <a href="/wiki/Wikipedia:Citing_sources" title="Wikipedia:Citing sources">footnote references</a>.</span> <span class="date-container"><i>(<span class="date">May 2024</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Steganography" class="extiw" title="commons:Category:Steganography">Steganography</a></span>.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="https://www.youtube.com/watch?v=-7FBPgQDX5o">An overview of digital steganography, particularly within images, for the computationally curious</a> by Chris League, Long Island University, 2015</li> <li><a rel="nofollow" class="external text" href="http://petitcolas.net/fabien/steganography/image_downgrading/index.html">Examples showing images hidden in other images</a></li> <li><a rel="nofollow" class="external text" href="http://www.jjtc.com/Steganography">Information Hiding: Steganography &amp; Digital Watermarking.</a> Papers and information about steganography and steganalysis research from 1995 to the present. Includes Steganography Software Wiki list. Dr. Neil F. Johnson.</li> <li><a rel="nofollow" class="external text" href="http://niels.xtdnet.nl/papers/detecting.pdf">Detecting Steganographic Content on the Internet.</a> 2002 paper by <a href="/wiki/Niels_Provos" title="Niels Provos">Niels Provos</a> and Peter Honeyman published in <i>Proceedings of the Network and Distributed System Security Symposium</i> (San Diego, CA, 6–8 February 2002). NDSS 2002. Internet Society, Washington, D.C.</li> <li><a rel="nofollow" class="external text" href="http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/528/449">Covert Channels in the TCP/IP Suite</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121023122054/http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/528/449">Archived</a> 23 October 2012 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>&#160;&#8211;&#32;1996 paper by Craig Rowland detailing the hiding of data in TCP/IP packets.</li> <li><a rel="nofollow" class="external text" href="http://stegano.net/tutorials.html">Network Steganography Centre Tutorials</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171216153846/http://stegano.net/tutorials.html">Archived</a> 16 December 2017 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. How-to articles on the subject of network steganography (Wireless LANs, VoIP – Steganophony, TCP/IP protocols and mechanisms, Steganographic Router, Inter-protocol steganography). By Krzysztof Szczypiorski and Wojciech Mazurczyk from Network Security Group.</li> <li><a rel="nofollow" class="external text" href="http://datahide.org/BPCSe/">Invitation to BPCS-Steganography.</a></li> <li><a rel="nofollow" class="external text" href="http://www.spy-hunter.com/Steganography_V7.0_DefCon_V3_S.pdf">Steganography by Michael T. Raggo</a>, DefCon 12 (1 August 2004)</li> <li><a rel="nofollow" class="external text" href="http://ecommons.txstate.edu/cscitad/7">File Format Extension Through Steganography</a> by Blake W. Ford and Khosrow Kaikhah</li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140221205846/http://er.nau.edu.ua/bitstream/NAU/8049/1/CompSteganoRU.pdf">Computer steganography. Theory and practice with Mathcad (Rus)</a> 2006 paper by Konakhovich G. F., Puzyrenko A. Yu. published in <i>MK-Press</i> Kyiv, Ukraine</li> <li><a rel="nofollow" class="external text" href="https://bztsrc.gitlab.io/stegano">stegano</a> a Free and Open Source steganography web service.</li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style></div><div role="navigation" class="navbox" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks mw-collapsible mw-collapsed navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_navbox" title="Template:Cryptography navbox"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_navbox" title="Template talk:Cryptography navbox"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_navbox" title="Special:EditPage/Template:Cryptography navbox"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptography" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">General</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/History_of_cryptography" title="History of cryptography">History of cryptography</a></li> <li><a href="/wiki/Outline_of_cryptography" title="Outline of cryptography">Outline of cryptography</a></li> <li><a href="/wiki/Classical_cipher" title="Classical cipher">Classical cipher</a></li> <li><a href="/wiki/Cryptographic_protocol" title="Cryptographic protocol">Cryptographic protocol</a> <ul><li><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication protocol</a></li></ul></li> <li><a href="/wiki/Cryptographic_primitive" title="Cryptographic primitive">Cryptographic primitive</a></li> <li><a href="/wiki/Cryptanalysis" title="Cryptanalysis">Cryptanalysis</a></li> <li><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrency</a></li> <li><a href="/wiki/Cryptosystem" title="Cryptosystem">Cryptosystem</a></li> <li><a href="/wiki/Cryptographic_nonce" title="Cryptographic nonce">Cryptographic nonce</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hash_function" title="Hash function">Hash function</a> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Key_derivation_function" title="Key derivation function">Key derivation function</a></li> <li><a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a></li></ul></li> <li><a href="/wiki/Digital_signature" title="Digital signature">Digital signature</a></li> <li><a href="/wiki/Kleptography" title="Kleptography">Kleptography</a></li> <li><a href="/wiki/Key_(cryptography)" title="Key (cryptography)">Key (cryptography)</a></li> <li><a href="/wiki/Key_exchange" title="Key exchange">Key exchange</a></li> <li><a href="/wiki/Key_generator" title="Key generator">Key generator</a></li> <li><a href="/wiki/Key_schedule" title="Key schedule">Key schedule</a></li> <li><a href="/wiki/Key_stretching" title="Key stretching">Key stretching</a></li> <li><a href="/wiki/Keygen" title="Keygen">Keygen</a></li> <li><a href="/wiki/Template:Cryptography_machines" title="Template:Cryptography machines">Machines</a></li> <li><a href="/wiki/Cryptojacking_malware" class="mw-redirect" title="Cryptojacking malware">Cryptojacking malware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Random_number_generation" title="Random number generation">Random number generation</a> <ul><li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Cryptographically secure pseudorandom number generator</a> (CSPRNG)</li></ul></li> <li><a href="/wiki/Pseudorandom_noise" title="Pseudorandom noise">Pseudorandom noise</a> (PRN)</li> <li><a href="/wiki/Secure_channel" title="Secure channel">Secure channel</a></li> <li><a href="/wiki/Insecure_channel" class="mw-redirect" title="Insecure channel">Insecure channel</a></li> <li><a href="/wiki/Subliminal_channel" title="Subliminal channel">Subliminal channel</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Decryption" class="mw-redirect" title="Decryption">Decryption</a></li> <li><a href="/wiki/End-to-end_encryption" title="End-to-end encryption">End-to-end encryption</a></li> <li><a href="/wiki/Harvest_now,_decrypt_later" title="Harvest now, decrypt later">Harvest now, decrypt later</a></li> <li><a href="/wiki/Information-theoretic_security" title="Information-theoretic security">Information-theoretic security</a></li> <li><a href="/wiki/Plaintext" title="Plaintext">Plaintext</a></li> <li><a href="/wiki/Codetext" class="mw-redirect" title="Codetext">Codetext</a></li> <li><a href="/wiki/Ciphertext" title="Ciphertext">Ciphertext</a></li> <li><a href="/wiki/Shared_secret" title="Shared secret">Shared secret</a></li> <li><a href="/wiki/Trapdoor_function" title="Trapdoor function">Trapdoor function</a></li> <li><a href="/wiki/Trusted_timestamping" title="Trusted timestamping">Trusted timestamping</a></li> <li><a href="/wiki/Key-based_routing" title="Key-based routing">Key-based routing</a></li> <li><a href="/wiki/Onion_routing" title="Onion routing">Onion routing</a></li> <li><a href="/wiki/Garlic_routing" title="Garlic routing">Garlic routing</a></li> <li><a href="/wiki/Kademlia" title="Kademlia">Kademlia</a></li> <li><a href="/wiki/Mix_network" title="Mix network">Mix network</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mathematics</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Block_cipher" title="Block cipher">Block cipher</a></li> <li><a href="/wiki/Stream_cipher" title="Stream cipher">Stream cipher</a></li> <li><a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithm</a></li> <li><a href="/wiki/Authenticated_encryption" title="Authenticated encryption">Authenticated encryption</a></li> <li><a href="/wiki/Public-key_cryptography" title="Public-key cryptography">Public-key cryptography</a></li> <li><a href="/wiki/Quantum_key_distribution" title="Quantum key distribution">Quantum key distribution</a></li> <li><a href="/wiki/Quantum_cryptography" title="Quantum cryptography">Quantum cryptography</a></li> <li><a href="/wiki/Post-quantum_cryptography" title="Post-quantum cryptography">Post-quantum cryptography</a></li> <li><a href="/wiki/Message_authentication_code" title="Message authentication code">Message authentication code</a></li> <li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Random numbers</a></li> <li><a class="mw-selflink selflink">Steganography</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Cryptography" title="Category:Cryptography">Category</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"></div><div role="navigation" class="navbox" aria-labelledby="Espionage" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Espionage" title="Template:Espionage"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Espionage" title="Template talk:Espionage"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Espionage" title="Special:EditPage/Template:Espionage"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Espionage" style="font-size:114%;margin:0 4em"><a href="/wiki/Espionage" title="Espionage">Espionage</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><div class="hlist"><ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a></li><li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Assets</a></li></ul></div></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Agent_handling" title="Agent handling">Agent handling</a></li> <li><i><a href="/wiki/Agent_provocateur" title="Agent provocateur">Agent provocateur</a></i></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a> <ul><li><a href="/wiki/Covert_agent" title="Covert agent">Agent</a></li></ul></li> <li><a href="/wiki/Double_agent" title="Double agent">Double agent</a></li> <li><a href="/wiki/Field_agent" title="Field agent">Field agent</a></li> <li><a href="/wiki/Mole_(espionage)" title="Mole (espionage)">Mole</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a href="/wiki/Sleeper_agent" title="Sleeper agent">Sleeper agent</a></li> <li><a href="/wiki/Spymaster" class="mw-redirect" title="Spymaster">Spymaster</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Analysis</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">competing hypotheses</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Devices and<br />communications</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Burn_notice" title="Burn notice">Burn notice</a></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening device</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Invisible_ink" title="Invisible ink">Invisible ink</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Phone_surveillance" title="Phone surveillance">Phone surveillance</a></li> <li><a href="/wiki/Short-range_agent_communications" title="Short-range agent communications">Short-range agent communications</a></li> <li><a class="mw-selflink selflink">Steganography</a> <ul><li><a href="/wiki/Microdot" title="Microdot">microdot</a></li></ul></li> <li><a href="/wiki/Surveillance_tools" title="Surveillance tools">Surveillance tools</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Tradecraft" title="Tradecraft">Tradecraft</a> and<br />techniques</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Canary_trap" title="Canary trap">Canary trap</a></li> <li><a href="/wiki/Front_organization" title="Front organization">Front organization</a></li> <li><a href="/wiki/Limited_hangout" title="Limited hangout">Limited hangout</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Operations</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chinese_intelligence_activity_abroad" title="Chinese intelligence activity abroad">Chinese intelligence activity abroad</a> <ul><li><a href="/wiki/Chinese_espionage_in_the_United_States" title="Chinese espionage in the United States">Chinese espionage in the United States</a></li></ul></li> <li><a href="/wiki/Cold_War_espionage" title="Cold War espionage">Cold War espionage</a></li> <li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Recruitment</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li> <li><a href="/wiki/Wetwork" title="Wetwork">wetwork</a></li></ul></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a> <ul><li><a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a></li> <li><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">MASINT</a></li></ul></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Interpersonal (HUMINT) intelligence</a> <ul><li><a href="/wiki/Interrogation" title="Interrogation">interrogation</a></li> <li><a href="/wiki/Safe_house" title="Safe house">safe house</a></li></ul></li> <li><a href="/wiki/COINTELPRO" title="COINTELPRO">COINTELPRO</a></li> <li><a href="/wiki/Project_MINARET" title="Project MINARET">MINARET</a></li> <li><a href="/wiki/Project_SHAMROCK" title="Project SHAMROCK">SHAMROCK</a></li> <li><a href="/wiki/Five_Eyes" title="Five Eyes">FVEY</a></li> <li><a href="/wiki/Sexpionage" title="Sexpionage">Sexpionage</a></li> <li><a href="/wiki/Stay-behind" title="Stay-behind">Stay-behind</a></li> <li><a href="/wiki/Sting_operation" title="Sting operation">Sting operation</a></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a> <ul><li><a href="/wiki/Global_surveillance" title="Global surveillance">Global</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass</a></li></ul></li> <li><a href="/wiki/Targeted_surveillance" title="Targeted surveillance">Targeted surveillance</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Intelligence_management" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Intelligence_cycle_management" title="Template:Intelligence cycle management"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Intelligence_cycle_management" title="Template talk:Intelligence cycle management"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Intelligence_cycle_management" title="Special:EditPage/Template:Intelligence cycle management"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Intelligence_management" style="font-size:114%;margin:0 4em"><a href="/wiki/Intelligence_cycle_management" title="Intelligence cycle management">Intelligence management</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_collection_management" title="Intelligence collection management">Collection</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Human (HUMINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Special_reconnaissance" title="Special reconnaissance">Special reconnaissance</a> <ul><li><a href="/wiki/List_of_Special_Reconnaissance_organizations" class="mw-redirect" title="List of Special Reconnaissance organizations">organizations</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Clandestine_human_intelligence" title="Clandestine human intelligence">Clandestine</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Asset recruiting</a></li> <li><a href="/wiki/Clandestine_cell_system" title="Clandestine cell system">Cell system</a></li> <li><a href="/wiki/Clandestine_HUMINT_and_covert_action" title="Clandestine HUMINT and covert action">Covert action</a></li> <li><a href="/wiki/Direct_action_(military)" title="Direct action (military)">Direct action</a></li> <li><a href="/wiki/Clandestine_HUMINT_operational_techniques" title="Clandestine HUMINT operational techniques">Operational techniques</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Espionage" title="Espionage">Espionage</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a> <ul><li><a href="/wiki/Field_agent" title="Field agent">field</a></li> <li><a href="/wiki/Agent_handling" title="Agent handling">handling</a></li></ul></li> <li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Asset</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li></ul></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Defection" title="Defection">Defection</a> / <a href="/wiki/Turncoat" title="Turncoat">Turncoat</a></li> <li><a href="/wiki/Denial_and_deception" title="Denial and deception">Denial and deception</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Interrogation" title="Interrogation">Interrogation</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a class="mw-selflink selflink">Steganography</a></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals (SIGINT)</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Signals_intelligence_by_alliances,_nations_and_industries" title="Signals intelligence by alliances, nations and industries">By alliances, nations and industries</a></li> <li><a href="/wiki/Signals_intelligence_in_modern_history" title="Signals intelligence in modern history">In modern history</a></li> <li><a href="/wiki/Signals_intelligence_operational_platforms_by_nation" title="Signals intelligence operational platforms by nation">Operational platforms by nation</a></li> <li><a href="/wiki/Direction_finding" title="Direction finding">Direction finding</a></li> <li><a href="/wiki/Traffic_analysis" title="Traffic analysis">Traffic analysis</a></li> <li><a href="/wiki/Tempest_(codename)" title="Tempest (codename)">TEMPEST</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">Measurement and<br />signature (MASINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Electro-optical_MASINT" title="Electro-optical MASINT">Electro-optical</a></li> <li><a href="/wiki/Geophysical_MASINT" title="Geophysical MASINT">Geophysical</a></li> <li><a href="/wiki/Nuclear_MASINT" title="Nuclear MASINT">Nuclear</a></li> <li><a href="/wiki/Radar_MASINT" title="Radar MASINT">Radar</a></li> <li><a href="/wiki/Radiofrequency_MASINT" title="Radiofrequency MASINT">Radiofrequency</a></li> <li><a href="/wiki/Materials_MASINT" title="Materials MASINT">Materials</a></li> <li><a href="/wiki/Casualty_estimation" title="Casualty estimation">Casualty estimation</a>&#160;(<a href="/wiki/Earthquake_casualty_estimation" title="Earthquake casualty estimation">earthquake</a>)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Financial_intelligence" title="Financial intelligence">Financial (FININT)</a></li> <li><a href="/wiki/Geospatial_intelligence" title="Geospatial intelligence">Geospatial (GEOINT)</a></li> <li><a href="/wiki/Imagery_intelligence" title="Imagery intelligence">Imagery (IMINT)</a></li> <li><a href="/wiki/Open-source_intelligence" title="Open-source intelligence">Open-source (OSINT)</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Technical (TECHINT)</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_analysis_management" title="Intelligence analysis management">Analysis</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">Competing hypotheses</a></li> <li><a href="/wiki/Intelligence_cycle_(target-centric_approach)" title="Intelligence cycle (target-centric approach)">Target-centric</a></li> <li><a href="/wiki/Words_of_estimative_probability" title="Words of estimative probability">Words of estimative probability</a></li> <li><a href="/wiki/All-source_intelligence" title="All-source intelligence">All-source intelligence</a></li> <li><a href="/wiki/Basic_intelligence" title="Basic intelligence">Basic intelligence</a></li> <li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a></li> <li><a href="/wiki/Medical_intelligence" title="Medical intelligence">Medical intelligence</a></li> <li><a href="/wiki/Military_geography" title="Military geography">Military geography</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Scientific &amp; Technical intelligence</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_dissemination_management" title="Intelligence dissemination management">Dissemination</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_cycle_security" title="Intelligence cycle security">Intelligence cycle security</a></li> <li><a href="/wiki/Counterintelligence" title="Counterintelligence">Counterintelligence</a> <ul><li><a href="/wiki/List_of_counterintelligence_organizations" title="List of counterintelligence organizations">organizations</a></li></ul></li> <li><a href="/wiki/Counter-intelligence_and_counter-terrorism_organizations" title="Counter-intelligence and counter-terrorism organizations">Counterintelligence and counter-terrorism organizations</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Hidden_messages" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Hidden_messages" title="Template:Hidden messages"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Hidden_messages" title="Template talk:Hidden messages"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Hidden_messages" title="Special:EditPage/Template:Hidden messages"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Hidden_messages" style="font-size:114%;margin:0 4em"><a href="/wiki/Hidden_message" title="Hidden message">Hidden messages</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Main</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Subliminal_stimuli" title="Subliminal stimuli">Subliminal message</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Audio</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backmasking" title="Backmasking">Backmasking</a> <ul><li><a href="/wiki/List_of_backmasked_messages" title="List of backmasked messages">list</a></li></ul></li> <li><a href="/wiki/Hidden_track" title="Hidden track">Hidden track</a> <ul><li><a href="/wiki/List_of_albums_containing_a_hidden_track" title="List of albums containing a hidden track">list</a></li> <li><a href="/wiki/List_of_albums_with_tracks_hidden_in_the_pregap" title="List of albums with tracks hidden in the pregap">pregap list</a></li></ul></li> <li><a href="/wiki/Phonetic_reversal" title="Phonetic reversal">Phonetic reversal</a></li> <li><a href="/wiki/Reverse_speech" title="Reverse speech">Reverse speech</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Numeric</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Chronogram" title="Chronogram">Chronogram</a></li> <li><a href="/wiki/Numerology" title="Numerology">Numerology</a></li> <li><a href="/wiki/Theomatics" title="Theomatics">Theomatics</a></li> <li><a href="/wiki/Bible_code" title="Bible code">Bible code</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptology</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Visual</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Fnord" title="Fnord">Fnord</a></li> <li><a href="/wiki/Hidden_text" title="Hidden text">Hidden text</a></li> <li><a href="/wiki/Paranoiac-critical_method" title="Paranoiac-critical method">Paranoiac-critical method</a></li> <li><a href="/wiki/Pareidolia" title="Pareidolia">Pareidolia</a></li> <li><a href="/wiki/Psychorama" title="Psychorama">Psychorama</a></li> <li><a href="/wiki/Sacred_geometry" title="Sacred geometry">Sacred geometry</a></li> <li><a class="mw-selflink selflink">Steganography</a></li> <li><a href="/wiki/Visual_cryptography" title="Visual cryptography">Visual cryptography</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Apophenia" title="Apophenia">Apophenia</a></li> <li><a href="/wiki/Asemic_writing" title="Asemic writing">Asemic writing</a></li> <li><a href="/wiki/Clustering_illusion" title="Clustering illusion">Clustering illusion</a></li> <li><a href="/wiki/Cryptic_crossword" title="Cryptic crossword">Cryptic crossword</a> <ul><li><a href="/wiki/Anagram" title="Anagram">Anagram</a></li></ul></li> <li><a href="/wiki/Easter_egg_(media)" title="Easter egg (media)">Easter egg</a></li> <li><a href="/wiki/Observer-expectancy_effect" title="Observer-expectancy effect">Observer-expectancy effect</a></li> <li><a href="/wiki/Pattern_recognition_(psychology)" title="Pattern recognition (psychology)">Pattern recognition</a></li> <li><a href="/wiki/Palindrome" title="Palindrome">Palindrome</a></li> <li><a href="/wiki/Simulacrum" title="Simulacrum">Simulacrum</a></li> <li><a href="/wiki/Synchronicity" title="Synchronicity">Synchronicity</a></li> <li><a href="/wiki/Unconscious_mind" title="Unconscious mind">Unconscious mind</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q15032#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4617648-2">Germany</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Image steganography"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh2018001545">United States</a></span></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="steganografie"><a rel="nofollow" class="external text" href="https://aleph.nkp.cz/F/?func=find-c&amp;local_base=aut&amp;ccl_term=ica=ph695215&amp;CON_LNG=ENG">Czech Republic</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&amp;local_base=NLX10&amp;find_code=UID&amp;request=987012575135405171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐6b7f745dd4‐mfsxm Cached time: 20241125142816 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.116 seconds Real time usage: 1.383 seconds Preprocessor visited node count: 8036/1000000 Post‐expand include size: 212002/2097152 bytes Template argument size: 3644/2097152 bytes Highest expansion depth: 16/100 Expensive parser function count: 13/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 254088/5000000 bytes Lua time usage: 0.740/10.000 seconds Lua memory usage: 20312237/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1198.673 1 -total 34.83% 417.493 1 Template:Reflist 14.89% 178.488 19 Template:Annotated_link 12.94% 155.102 22 Template:Cite_web 11.65% 139.612 7 Template:Navbox 8.98% 107.581 16 Template:Cite_journal 8.44% 101.135 2 Template:Wikt-lang 6.26% 75.067 1 Template:Cryptography_navbox 5.10% 61.084 12 Template:Cite_book 4.42% 52.951 1 Template:Commons_category --> <!-- Saved in parser cache with key enwiki:pcache:idhash:28733-0!canonical and timestamp 20241125142816 and revision id 1259461847. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Steganography&amp;oldid=1259461847">https://en.wikipedia.org/w/index.php?title=Steganography&amp;oldid=1259461847</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Steganography" title="Category:Steganography">Steganography</a></li><li><a href="/wiki/Category:Espionage_techniques" title="Category:Espionage techniques">Espionage techniques</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Pages_using_the_Phonos_extension" title="Category:Pages using the Phonos extension">Pages using the Phonos extension</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:Pages_with_missing_ISBNs" title="Category:Pages with missing ISBNs">Pages with missing ISBNs</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_November_2023" title="Category:Use dmy dates from November 2023">Use dmy dates from November 2023</a></li><li><a href="/wiki/Category:Pages_including_recorded_pronunciations" title="Category:Pages including recorded pronunciations">Pages including recorded pronunciations</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_December_2016" title="Category:Articles with unsourced statements from December 2016">Articles with unsourced statements from December 2016</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_April_2024" title="Category:Articles with unsourced statements from April 2024">Articles with unsourced statements from April 2024</a></li><li><a href="/wiki/Category:Pages_displaying_wikidata_descriptions_as_a_fallback_via_Module:Annotated_link" title="Category:Pages displaying wikidata descriptions as a fallback via Module:Annotated link">Pages displaying wikidata descriptions as a fallback via Module:Annotated link</a></li><li><a href="/wiki/Category:Wikipedia_external_links_cleanup_from_May_2024" title="Category:Wikipedia external links cleanup from May 2024">Wikipedia external links cleanup from May 2024</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 25 November 2024, at 08:15<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Steganography&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-688fc9465-ckh9j","wgBackendResponseTime":141,"wgPageParseReport":{"limitreport":{"cputime":"1.116","walltime":"1.383","ppvisitednodes":{"value":8036,"limit":1000000},"postexpandincludesize":{"value":212002,"limit":2097152},"templateargumentsize":{"value":3644,"limit":2097152},"expansiondepth":{"value":16,"limit":100},"expensivefunctioncount":{"value":13,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":254088,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1198.673 1 -total"," 34.83% 417.493 1 Template:Reflist"," 14.89% 178.488 19 Template:Annotated_link"," 12.94% 155.102 22 Template:Cite_web"," 11.65% 139.612 7 Template:Navbox"," 8.98% 107.581 16 Template:Cite_journal"," 8.44% 101.135 2 Template:Wikt-lang"," 6.26% 75.067 1 Template:Cryptography_navbox"," 5.10% 61.084 12 Template:Cite_book"," 4.42% 52.951 1 Template:Commons_category"]},"scribunto":{"limitreport-timeusage":{"value":"0.740","limit":"10.000"},"limitreport-memusage":{"value":20312237,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-6b7f745dd4-mfsxm","timestamp":"20241125142816","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Steganography","url":"https:\/\/en.wikipedia.org\/wiki\/Steganography","sameAs":"http:\/\/www.wikidata.org\/entity\/Q15032","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q15032","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-10-31T16:33:32Z","dateModified":"2024-11-25T08:15:02Z","headline":"hiding messages in other messages"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10