The Steg Chronicles — In the Beginning

Image for post
Image for post
The classic Russian doll is a perfect example of hiding something in plain sight; credit
Image for post
Image for post
Tattooing or permanent ink messages were an ancient form of steganography; credit
Image for post
Image for post
Some of the variations of modern steganography, not all methods are listed. Credit
Image for post
Image for post
How Least Significant Bit (LSB) digital image steganography works; credit

Current Applications of Steganography

“Steg” Right Up Into the Spotlight: Introducing <Graphstega>

Image for post
Image for post
Image for post
Image for post
An example of how Graphstega might be employed in the wild; credit
Image for post
Image for post
Image for post
Image for post
A couple of recommended books about digital steganography

Steganalysis Software Applications

Image for post
Image for post
Excerpted selection of Steganalysis products offered by Wetstone Technologies, Inc.

Written by

26+yrs security engineer; privacy & dfir threat research

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store