Using Digital Steganography to Protect National Security Information

Ancient forms of steganography included tattooing shaven scalps and letting the hair grow back
Figure 1: Least Significant Bit Steganography (Data Genetics, 2013).

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Story Of An Uncommon and Unsung Hero

{UPDATE} Mahjong Venice Mystery Classic Hack Free Resources Generator

How to Configure IPsec VPN between Cisco FTD/FMC and Fortinet Firewallβ€Šβ€”β€ŠICT Fella

Ruminations on risk management, fault tolerance, and Amazon’s HQ2

Just over a decade ago, an anonymous developer known as Satoshi discovered a new, unstoppable form…

Practical Ransomware Prevention Techniques & Practices That Won’t Break the Bank

SAFEP Holders are 20,000 NOW!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
κ§π“Šˆπ’†œπŸ†‰3πŸ†πŸ…ΎπŸ†ƒπŸ†πŸ†„πŸ†‚πŸ†ƒπ’†œπ“Š‰κ§‚

κ§π“Šˆπ’†œπŸ†‰3πŸ†πŸ…ΎπŸ†ƒπŸ†πŸ†„πŸ†‚πŸ†ƒπ’†œπ“Š‰κ§‚

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Cybersecurity incidents in NZ for the 4th quarter of 2021

Evolving non-standard viruses languages will get you in a trap