Talk:Steganography

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Former good article nomineeSteganography was a good articles nominee, but did not meet the good article criteria at the time. There may be suggestions below for improving the article. Once these issues have been addressed, the article can be renominated. Editors may also seek a reassessment of the decision if they believe there was a mistake.
Article milestones
DateProcessResult
January 29, 2005Peer reviewReviewed
June 11, 2006Good article nomineeNot listed
Current status: Former good article nominee

Dreadful English[edit]

Needs thorough revision. — Preceding unsigned comment added by 92.12.18.129 (talk) 20:57, 26 December 2021 (UTC)[reply]

Untitled[edit]

Archive: /Archive 1

Fact Checking - Ancient Wax Tablets[edit]

Several facts about the wax tablets sent after the battle of Thermopylae were wrong in the article. The tablets were not sent to Xerxes but from Demaratus to Greece. In fact Xerxes was King of the Persians, the very person Demaratus didn't want to learn about the hidden message. Also according to Herodotus, nothing was written in the wax poured on top of the hidden message. I think this fact is often ignored to make the story a more convenient example of early steganography. I had to go to the original source, Polymnia by Herodotus, to scrounge up what really happened. Wikipidia wasn't the only place I looked with the wrong facts on this point. I have a book on cryptography in front of me right now that states the tablets were sent to King Leonidas. Leonidas was dead when the tablets were sent! Here's a link to the appropriate page in Polymnia.

--Takaitra 01:01, 5 March 2006 (UTC)[reply]

Removed sentence[edit]

Effective detection of steganographically encoded materials in communications intercepts between suspected terrorists is therefore extremely important, but very complicated, as we will see below.

I removed this sentence as it appeared completely out of place following a lengthy tract on showing that there is no actual evidience for Al Quaeda use of steganography. Refdoc 23:38, 8 March 2006 (UTC)[reply]

Evening Courier[edit]

The article mentions Il Corriere della Sera as an Italian tabloid newspaper. The paper is in fact a somewhat high-brow broadsheet.

Also, the article states that an item of news reported in this newspaper was not confirmed by any reputable Italian newspaper. There is a debatable implication there to the effect that Il Corriere della Sera is not reputable. Given that Il Corriere della Sera is generally considered one of Italy's more serious and less biassed newspapers, and given that it has the second-highest distribution of all newspapers in Italy, it might be worth considering an adjustment to the paragraph in question.

(More info on the paper here: http://en.wikipedia.org/wiki/Il_Corriere_della_sera )

--Croc996 00:25, 26 March 2006 (UTC)[reply]

GA failed[edit]

For these reasons:

  • See WP:LEAD as the present lead section doesn't summarize the article but gives insight into etymology.
  • 2 references is not enough.
  • This section would be better if transformed into prose.
  • The external links through the text should be transformed into inline citations. See WP:FOOT.
Lincher 00:23, 11 June 2006 (UTC)[reply]

No better photos?[edit]

The picture for Pike's Peak is poor. Doesn't anyone have any better shots?


Steganography + Crypto[edit]

Is it worth adding a discussion of how to do encrypted steganography? In particular, this ought to escape detection. In the case of the photo, with the cat/trees, what you do instead is:

1)Take your plaintext (cat). 2)Add error-checking 3)Compress it (to make the data look random) - and to save space 4)Encrypt it. (the resulting data should now look very-nearly like random noise) 5)Replace the least-significant 2 bits of the tree image.

At this point, we should have a steganographic file, which will not draw attention to itself, which will probably (depending on randomness of step 4) escape detection even if it is suspected, and which even if it is discovered to be steganographic, cannot (hopefully) be unencrypted.

  1. Encrypting can certainly be an additional useful step, in that it prevents total disaster if the message is detected. But it is not necessarily true that the near-random distribution of bits found in modern digital ciphertexts will be harder to detect. Your step 5) can be generalised to "map the hidden message to the covertext in such a way as to minimise changes in its statistical properties". If the LSBs of the image are not as random as a ciphertext -- as is usually the case -- then it is not impossible that encrypting first will actually increase detectability. The continued study of steganography of course looks at mapping methods which minimise these changes for various types of input texts, and for some combinations of methods and covertexts it might happen that a very random stegotext is optimal. But probably not for this method.
  2. In general, if you are going to add ECC you need to do them after encryption. Most encryption methods, and all compression methods of which I am aware, expand errors; so if an error occurs in transmission, the message will decrypt with a lot of junk, decompress with even more (if it decompresses at all) and then there will be too much garbage for the ECC to be able to salvage anything. Of course if you do ECC after encryption that then adds structure to the message which might make steganography harder; but there doesn't seem to be much point doing it the other way. -- Securiger 06:17, 2 August 2006 (UTC)[reply]
The above proposed technique is incredibly weak against statistical analysis and can be blindly detected on single image. You've replaced the least significant bits with uniform random data, yet the original LSB were not uniform random data (if they were, we might as well not store and transmit them as they'd be conveying nothing useful). There are more complicated techniques which attempt to preserve the overall statistical properties by flipping even more bits, but these too are highly vulnerable to simple *linear* analysis through tools like Stegdetect. The current state of the art in undetectable digital steganography is the technique of Perturbed Quantization of J. Fridrich (a free software implementation exists [1]).--Gmaxwell (talk) 02:46, 11 April 2009 (UTC)[reply]

Keyboards that talk IP![edit]

Removed bogus "technique". This doesn't even sound plausible; removed for now. Viral keyboard firmware which can transmit data over a network? It's not even April 1st! Come on guys, let's sanity check out facts before making edits... If anyone would like to reinstate, please include suitable citations!

This was done at USENIX this year: https://db.usenix.org/events/sec06/tech/shah/shah_html/index.html

Lunkwill 21:29, 12 August 2006 (UTC)[reply]

Camera/Shy and Hacktivismo[edit]

Should Camera/Shy, a steganography program dedicated towards allowing users in censored countries to access censored material be added, or does this violate some WP policy? If I don't get a response soon I'll post up a bit on it.

Isn't that encouraging people not to reply? I've looked up Camera/Shy and you might want to use the following link: Camera/Shy Perhaps in the external links with a short blurp ("a <what is it> that <what makes it special>"). Shinobu 18:09, 31 August 2006 (UTC)[reply]

External Links deleted?[edit]

Why?

I don't know... perhaps Wikipedia is not a link farm? I can't be any more specific without the actual url that has been removed. Shinobu 01:48, 23 September 2006 (UTC)[reply]

Use of italics[edit]

Despite being dismissed by security experts [2][3], the story has been widely repeated and resurfaces frequently. It was noted that the story apparently originated with a press release from "iomart" [4], a vendor of steganalysis software. No corroborating evidence has been produced by any other source.
Moreover, a captured al-Qaeda training manual makes no mention of this method of steganography. The chapter on communications in the al-Qaeda manual acknowledges the technical superiority of US security services, and generally advocates low-technology forms of covert communication.

The italics in this section look very dodgy (and, specifically, not NPOV). The actual comments within the italics are fine, provided that they are true, but do not need to be italicised.

Unless the italics are some kind of steganographic signal pointing at hidden content, of course... :) --Sapphire Wyvern 07:10, 27 September 2006 (UTC)[reply]

I have removed the italics. I agree with Sapphire Wyvern's post. The italics immediately jumped out to me as potentially violating NPOV when I first read the article: not just offering the evidence contradicting the NYT article but 'trying to make a point' about just how wrong the article was. Rfrohardt 19:33, 22 February 2007 (UTC)[reply]

Thermal Noise is not 1/f Noise[edit]

This article states that "Any system with an analog (signal) amplification stage will also introduce so-called thermal or "1/f" noise, which can be exploited as a noise cover." This sentence makes it sound like thermal noise is 1/f noise. In fact, 1/f noise is Flicker Noise, which is a completely separate noise source from thermal. I suggest this error be corrected as soon as possible. Since this is considered a 'good article' I hesitate to make the changes myself. --Dirkbike 19:55, 30 October 2006 (UTC)[reply]

Well, it's been about a week so I decided to make the corrections anyway. Please let me know if there are any objections.--Dirkbike 23:58, 5 November 2006 (UTC)[reply]

Fujitsu system for hiding message in a printed picture[edit]

i have just read a bbc news item about a system that fujitsu are developing to hide messages. I them looked at this artical to see if I could find more info about it. maybe someone should add somthing to this artical about this. the url was http://news.bbc.co.uk/1/hi/technology/6361891.stm --82.12.52.135 17:43, 15 February 2007 (UTC)[reply]

Ah ha, darn, you beat me to it :[ I was just going to talk about that here. That Jason 23:47, 15 February 2007 (UTC)[reply]

Implementations section[edit]

Would anyone have any objections if I removed all of the software listed under the "Implementations" section which didn't have a Wikipedia entry/moved it under "See also"?

At present, it seems to fall foul of WP:NOT#LINK; those software systems which are notable should probably have Wikipedia article on them - otherwise it just seems like a linkspam-magnet? Nuwewsco 13:23, 6 July 2007 (UTC)[reply]

I wouldn't remove all of them since some are indeed valuable examples of steganography. Why not just remove the ones that can't be used quickly and easily (i.e. 2 of the 3 online ones are libraries, not complete steganography tools. I am sure the same is true of some of the downloadable ones.) 15:23, 9 July 2007 (UTC)

quotes[edit]

Several quotes on this page are both enclosed in quotation marks and italicized. Typical English usage is to quote only or italicize only. Is there a manual of style guideline for this? --ESP 14:50, 9 August 2007 (UTC)[reply]

Re: Terrorism Rumors[edit]

Ref 9, the Jamestown Group is an interesting summary, but is it supported by any other references or evidence? Is there any assertion or evidence of the Jameson Group's NPOV or objectivity?

Ref 10, the Steganography Analysis and Research Center appears to be a commercial product rather than a resource. Can anyone confirm it's utility? Is there a freely available database, eg at Mitre?

Although Niels Provos' research is dated, his brute force analysis of eBay and Usenet in 2001 do help to debunk this pernicious rumor about terrorists. and if anyone is familiar with that work, perhaps they could stub out a page on it. Both statements apply equally to Elonka Dunin's work as well. Both are linked at the bottom of the article, but perhaps could be cited directly in the section on the rumors.

-- No it doesn't. The Provos study looked for evidence of 5 steganography applications. You cannot assert that steganography is not being used when you are only looking for 5 out of hundreds, if not thousands of steganography applications exist. — Preceding unsigned comment added by 24.131.123.84 (talkcontribs) 00:42, 5 April 2013‎

Politically, I'd like to see the rumor soundly debunked, as would many others. This sort of unproven rumor is used to justify restrictions on security software and decreased civil liberties the world over. Scientifically, I would love to see some proof or disproof, and surely this is not so hard to provide. My main motivation for commenting here is that the debunking in the main article doesn't seem very strong or clear.

Thanks, Adricnet 21:53, 2 October 2007 (UTC)[reply]

Braincopter[edit]

In case someone is interested, there is an esoteric programming language called "Braincopter", which is based on Brainloller which itself is based on Brainfuck.
It can be used to hide Brainfuck applications on png images. Some examples: Hello world and Lost kingdom. --83.34.126.69 (talk) 15:05, 13 April 2008 (UTC)[reply]

lossless[edit]

I'd like to see "lossless" defined, with a good hyperlink MargaretBartley (talk) 02:53, 5 June 2008 (UTC)[reply]

you are doing stegno —Preceding unsigned comment added by 220.225.6.32 (talk) 06:06, 30 July 2008 (UTC)[reply]

Lossless is just a common term which means that no data of the image is lost when you save in that format. When you save as a jpeg (lossy compression), the image you save will not be identical to the original image. Gazok (talk) 15:00, 24 May 2009 (UTC)[reply]

References/links[edit]

The references section was really a massive dump of external links. I've removed most of them, particularly those that provide programs that let you generate or read encrypted pictures or whatever. The DMOZ is a good place to find stuff like that (now an EL), but overall it's just begging to be stuffed with spammy links to programs and companies, and they're not informative. I've split the section into "Footnotes" for inline citations, and "References" for the, I assume, general reference citations. These would be more useful to readers if embedded as inline citations, but for now they are OK. I've also removed the lower-quality and value links, such as the links to large masses of other articles. If it's not a link to an actual article, it's not a reference. WLU (talk) 14:56, 2 September 2008 (UTC)[reply]

Alleged use by terrorists section removed[edit]

In that section, some of the referenced links did not work, however the remaining references were (common) journals, which are not exactly to be the source of Wikipedia. I agree on a section on "use by terrorists" - however the topic should be widened, e.g. "use by warez pages", "famous historical stories" maybe in world war II or during the cold war, etc. So I think, before putting the removed section on again, it is to be reedited. (I hope, you understand and accept my reasons, my english is probably not good enough to explain my reasons well enough.) —Preceding unsigned comment added by 80.98.218.173 (talk) 21:52, 4 January 2009 (UTC) Sorry, I forgot the artistic use in literature. Maybe it should be mentioned in a lexicon. —Preceding unsigned comment added by 80.98.218.173 (talk) 21:55, 4 January 2009 (UTC)[reply]

Sorry, I was total wrong, and inconsiderate, you're right. Good job. —Preceding unsigned comment added by 80.98.218.173 (talk) 20:28, 5 January 2009 (UTC)[reply]


Citation link broken[edit]

The link for Citation # 3 is no longer valid. I've never edited Wikipedia before, so I'm not sure how to go about resolving that. 24.31.231.26 (talk) 06:27, 17 April 2009 (UTC)[reply]

Trying the cat-in-the-tree example yourself[edit]

I suggest to add following somewhere near the image:

(We know that we need the 2 least significant bits, so i AND-mask the 8-bit channel values with 00000011 binary, or 0x03 hex, so the RGB bitmask is 0x030303) To recover the cat from the tree-image, you can do the following (note: the convert tool is part of ImageMagick)

 convert StenographyOriginal.png -evaluate And 0x030303 HiddenImage.png

This hidden image contains the cat, but it is very dark (since it only uses the 2 LSBs), so i left-shift the bit values by 6 places, so my maximum possible 00000011 bit value becomes 11000000.

 convert StenographyOriginal.png -evaluate And 0x030303 -evaluate LeftShift 6 HiddenImageEqualized.png

Now you can clearly see the cat.

what do you think? 84.59.115.163 (talk) 07:04, 24 April 2009 (UTC)[reply]

Well, I don't know. I tried that and it didn't seem to work for me. I copy-pasted your code exactly and it still only produced a darkened image.

Gazok (talk) 15:23, 24 May 2009 (UTC)[reply]

ImageMagick reacts differently when called from Cygwin or Dos prompt - simply try converting the hex number to dezimal, so instead of 0x030303 use 197379 —Preceding unsigned comment added by 217.238.237.206 (talk) 21:33, 13 September 2009 (UTC)[reply]

I think that instructions like this should be provided. Otherwise these images should be replaced with something more accessible and open source. The "cat avatar" in Use By terrorists section[1] includes a really easy to use example with an accessible web interface. Meanwhile I couldn't figure out from this article how to easily turn StenographyOriginal[2] into Steganography_recovered[3].

In their present form, I believe that these images provide far less value than the "cat avatar" as a learning resource. Likewise there are a couple of example of free online systems that can be used to test out steganography without purchasing software or in some cases without downloading anything. More on that later. KonigProbst (talk) 07:31, 17 March 2014 (UTC)[reply]

References

Physical steganography[edit]

Another example for under section # 2.1 Physical steganography is the scytale.--66.206.249.200 (talk) 14:48, 12 August 2009 (UTC)[reply]

Steganography Example[edit]

You might want to check out Amherst's Woods. —Preceding unsigned comment added by 70.109.253.46 (talk) 05:55, 26 August 2009 (UTC)[reply]

"Technical Mujahid, a Training Manual for Jihadis"[edit]

I've added a {{fact}} template to the section concerning this - from the Jamestown article, "Technical Mujahid, a Training Manual for Jihadis" is an online publication, so shouldn't be too hard to include a reference to it - but I can't find any?! I would expect such a manual to be extremely easy to find on the internet, but... Nothing. Sounds a bit dubious? Nuwewsco (talk) 21:30, 26 November 2009 (UTC)[reply]

Use in popular fiction[edit]

The Intersect, a joint CIA/NSA computer in the TV series "Chuck", consists mainly of a large database encoded with Steganography techniques in images. —Preceding unsigned comment added by 174.27.35.161 (talk) 06:14, 4 February 2010 (UTC)[reply]


Security by obscurity?[edit]

I would not consider steganography in general to fall under this category. The algorithm and the design part are not necessarily secret, and just hiding "something" is not enough to fall under this category, which has a derogatory connotation. Symmetric ciphers also keep the secret keys and the encrypted message secret and are not considered to be security by obscurity. MarioS (talk) 18:34, 22 September 2010 (UTC)[reply]

The definition of Security through obscurity fits. The derogatory connotation isn't really relevant. Steganography may include but does not imply encryption. The integral concept is that of using "secrecy to provide security." Spacexplosion[talk] 20:06, 22 September 2010 (UTC)[reply]
From Security through obscurity: "A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them." This clearly refers to the secrecy of the design, not secrecy as a security goal. --MarioS (talk) 13:11, 12 October 2010 (UTC)[reply]
That quote is an independent statement that does indeed refer to secrecy of the design. Much of the context in which security by obscurity is often talked about does not apply to steganography, but the basic definition does. In its simplest form steganography supplies security only through secrecy. One might argue that steganography is not a form of security at all, but that would depend on the assumption that secrecy is not a valid security goal. Spacexplosion[talk] 16:00, 12 October 2010 (UTC)[reply]

Security through obscurity has a specific definition in security engineering. This article stretched that definition incorrectly. In the context of security engineering, obscurity refers to the secrecy of an algorithm or implementation, in contrast to Kerckhoffs's principle. Not all implementations of steganography are "a form of security through obscurity." This is explained by Professor Fridrich et al. in **Searching for the Stego Key**, with M. Goljan and D. Soukal, *Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI*, vol. 5306, San Jose, CA, pp. 70-82, 2004. If someone wishes to change the academic definition, they can publish in academic journals, not impose their opinions contrary to the scientific consensus on Wikipedia. — Preceding unsigned comment added by 206.126.80.37 (talk) 15:14, 23 January 2014 (UTC)[reply]

Link to an external Steganography Webinar and scientific research community[edit]

Hello,

We've added an external link to the steganography related webinar to this article and to Steganography tools article. But our website has been reported as a spam. We understand what's we've done wrong according the policy of Wikipedia and we are very sorry about this.

But we'd like to keep a link to us on 'Steganography' page only because this is not an advertisement, but real scientific work that our community at Belarusian State University is doing during last 5 years. The next steps that we are going to execute based on our road map are to broadcast and share our knowledge with others who are interested in this area. As a first step the webinar has been executed in collaboration with IEEE Lithuanian section and Vilnius Gediminas Technical University. Our plans for next year(s) are to continue work in security area, to share our knowledge and to be joined with all interested people all over the world. That's the only reason we've decided to put a link on a Wikipedia site, as we'd like to connect our knowledge via that external link.

Our only one goal is to leverage and share knowledge in steganography area.

Hope this will change a look to our scientific community web-portal from black to white.

Thanks and Kind Regards, ScientistBy Research Team (dr. Iryna Chvarkova, dr. Siarhei Tsikhanenka) ByScientist (talk) 11:12, 26 December 2010 (UTC)[reply]

While I would ask you to remember WP:COI, the link looks OK to me. Peridon (talk) 13:33, 26 December 2010 (UTC)[reply]
@BYScientist: Before adding that link again, ask yourself to what extent it is interesting to Wikipedia and the article. Will people having read the article find the information you provide useful? Per WP:EL, why would a WP:FA on this subject include a link to your site? --Fama Clamosa (talk) 17:49, 26 December 2010 (UTC)[reply]
@Fama Clamosa: we think that the link is really interesting for people, because there it is possible to find video webinar (the first in a scheduled chain) where the main principles of LSB based steganograpgy are explained, and also foundation of the steganalysis (the most comlicated part of steganography) is well described. We'd like to only share our knowledge, as we are doing researches at Belarusian State University (Minsk, Belarus) in Steganography area during last 6-7 years, prepared about 15 students in this area and one PhD. Now we are on the stage that we are preparing an external video course for steganography and steganalysis. Do think that a link to us will not be interested to people who'd like to know more about Steganography? ByScientist (talk) 22:23, 26 December 2010 (UTC)[reply]
@Fama Clamosa: we've reviewed WP:EL once again and found out that information that we are going to link suites to 'What should be linked' section point #3. Additionally, our web site is driven by Belarusian State University (Belarus) in collaboration with Vilnius Gedimino Technical University (Lithuania) and we beleive that results of such kind of collaboration will be new and quite interesting ByScientist (talk) 22:42, 26 December 2010 (UTC)[reply]
You keeping name-dropping the two universities. I'm not impressed. What's this about only having 15 students? Why is this lecture better than any of the others available online? Spacexplosion[talk] 00:02, 27 December 2010 (UTC)[reply]

@All: Dear Wikipedia Editors, Let us please briefly describe what is new in our webinar session and why we’d like to link it to this article. During last years we’ve made researches of robustness of the steganographic algorithms and also in steganalysis area, as a tool of testing robustness. There are several scientific articles have been published by us in Belarusian scientific magazines for the following topics:

  • LSB modifications for several bits in each sample replacement in audio containers and still images analysis;
  • Steganographic security schemas: from password capturing to real data shuffling;
  • Steganalysis approaches for hidden data allocation in LSB modified still images

Now we’ve faced with an issue that according to the copyrights documents that have been signed by authors there is impossible to post our results directly to the Steganography Wikipedia article, but we can share the basis via our video lecture, and we will continue doing our best to make this information public. That’s the main difference between our webinar and regular steganography relevant videos that could be found at Internet, and moreover, we have not mentioned any software that we’ve developed or use for embedding and steganalysis, we’d like to broadcast only scientific foundation and the results. That’s the reason why we’d like to connect our ideas and researches with world wide known information about steganography. Kind Regards, ByScientist (talk) 05:38, 27 December 2010 (UTC)[reply]

The articles that you mention don't seem to be present at the site you linked. I appreciate your politeness and that you are editing in good faith, but I don't think this lecture is a very useful external link. The Further reading section already needs pruning. Spacexplosion[talk] 21:29, 3 January 2011 (UTC)[reply]
@Spacexplosion Good, thanks for clarifications! I've also talked with Fama Clamosa and it seems now it is clear for me how to make this article better and not just link to our scientific community web portal. ByScientist (talk) 09:47, 4 January 2011 (UTC)[reply]

Steganart[edit]

Can someone convince me that the "steganart" image is at all relevant to this article? It looks like a vanity insertion by the artist. I can't even interpret it, and even if I could I don't think it's "steganography", just some eccentric rule-based art. -- Madeleine 23:13, 2 May 2011 (UTC)[reply]

Well, nobody responded.... I'm going to go remove it.Madeleine 02:39, 19 May 2011 (UTC)[reply]

Real-life intersect?[edit]

Hey there! I am new to Wikipedia and I was doing some searches of my own on the intersect from the "Chuck" TV show and I read at different places that all the insersect thing could be possible and that it was based off the steganography. I watched some intersect videos on Youtube and other websites and amazingly enough, while watching the TV show, these informations I would have seen from the intersect videos would come up in my mind and I would remember them. I don't know if it's just me or what, but I have tried watching other similar videos where we see multiple pictures sliding really quick and it didn't do anything (as far as I could see). Only the ones from the "Chuck" TV show were actually getting into my brain and I think it was due to the way they were shown with the weird sound and everything in the videos.

So this makes me wonder if the intersect thing would be possible in real-life and if so, how?

Sorry if this is not the right place to post, but since it is a "Talk" and not a normal article, I thought it was okay and meant for it. Thanks for replying and have a nice day! HTCormier (talk) 03:13, 7 June 2011 (UTC)[reply]

P.S.: I will add the links to the different videos and wikipedia links I talked about, but feel free to comment and/or edit and add more information as well.

This is definitely not a place to ask hypothetical questions about real life. See Wikipedia is not a forum. Spacexplosion[talk] 18:05, 7 June 2011 (UTC)[reply]

Removing ADS[edit]

There somebody from SARC who's repeatedly adding ADS and indirect ADS to this article. Removed all that promo links and texts. People interested in steganography sw may add links to relevant/experimental opensource projects (non commercial) in the proper page. Blackvisionit (talk) 17:59, 19 July 2011 (UTC)[reply]

I took a look at the activity of this IP : 75.145.35.25. During this month he's been doing a continuous spam work for SARC. Should we block its access to this page for a while? Blackvisionit (talk) 18:40, 19 July 2011 (UTC)[reply]
There is a misunderstanding about the current state of research in steganography detection. There is the traditional approach, called Blind Detection, that looks for steganography without prior knowledge of the steganography application used to hide information. A new approach, called the Analyical Approach to Steganalysis, was developed by the Steganography Analysis and Research Center (SARC). This two-pronged approach begins with detecting the presence of steganography applications (called artifacts). StegAlyzerAS is the only software available (commercially or otherwise) that uses this methodology. The second step in the Analytical Approach to Steganalysis detects files that have been manipulated by steganography applications (called signatures). Again, StegAlyzerSS is the only software available (commercially or otherwise) that uses this methodology. That being said, the references to the software are not advertisements, yet simply demonstrations of software with the capability to perform the Analytical Approach to Steganalysis. If another person or company comes out with software that performs this, then they should be listed as well. There are several instances on Wikipedia where examples of a particular type of product relating to the subject matter are explicitly mentioned in the article. For example, according to Blackvisionit's logic, it would also be wrong to list Microsoft Windows as an example of an operating system. — Preceding unsigned comment added by 75.145.35.25 (talk) 19:36, 22 July 2011 (UTC)[reply]
Really going to think that you didn't already understand the basic rules and principles of Wikipedia. However as long as keep your advertising-style comments in this page there's really no problem! Blackvisionit (talk) 21:31, 22 July 2011 (UTC)[reply]
I'm not impressed. I don't care what the US Patent Office says; naming a trivial combination of procedures doesn't make it a new approach that "no other software (commercially or otherwise) is using." If it's so revolutionary, let's see some reliable secondary sources heralding this innovation. Spacexplosion[talk] 23:19, 22 July 2011 (UTC)[reply]
I also not impressed at all. All this Analytical Approach stuff sounds to me as junk-sw sold to steganography newbies. I'm a steganography developer and a serious stego-sw would never be revelead by such an approach! Blackvisionit (talk) 00:26, 23 July 2011 (UTC)[reply]

Neverending spam activity from User:75.145.35.25 (= SARC), up to now:

  • section: Analytical approach
  • reference: James E. Wingate and Chad W. Davis. "An Analytical Approach to Steganalysis". Forensic Focus Journal. Retrieved 13 October 2011.
  • reference: StegAlyzerAS Steganography Analyzer Artifact Scanner
  • reference: StegAlyzerSS Steganography Analyzer Signature Scanner
  • external link: SARC A Backbone Security Center of Excellence providing tools for steganography detection and extraction as well as Certified Steganography Examiner Training]

Page should be semi-protected to stop this activity ZipoBibrok5x10^8 (talk) 16:34, 13 October 2011 (UTC)[reply]

Reverted blanking/vandalism from User:24.131.123.84. The IP geolocation is from the same country as User:75.145.35.25... ZipoBibrok5x10^8 (talk) 03:57, 23 April 2013 (UTC)[reply]

This article was mentioned during an NPR interview[edit]

Disguising Secret Messages, In A Game Of Spy Vs Spy - May 11, 2012

Last May, German investigators found secret files embedded in a pornographic video on memory cards being carried by a suspected al Qaeda operative. Peter Wayner describes the history and technology of the technique for hiding information, known as steganography.

....

FLATOW: Is there someplace you can study it? You know, is it a topic you can take in college, or do you have to go to a special school or military to study this?

WAYNER: Well, you know, there are several books out there, and, you know, some - if you want to take it in college, there are some general courses on encryption, and they often get kind of lumped in there, and they'll spend a week or two on steganography.

There are - you know, you can poke around. The article on Wikipedia is quite nice. And so somewhere along all those different choices, you can get a pretty good education.

http://www.npr.org/2012/05/11/152508358/disguising-secret-messages-in-a-game-of-spy-vs-spy

-- Avanu (talk) 22:25, 16 May 2012 (UTC)[reply]

  • Thank you for your suggestion. I've added this as an official mention of Wikipedia in a news source. Glad to hear that Wayner has such a high opinion of our work here. KonigProbst (talk) 06:16, 17 March 2014 (UTC)[reply]

Exemples:[edit]

Check the abuse on the "Matzek" "leading" user.

http://www.youtube.com/watch?v=ALhwQKTRAgA http://www.youtube.com/watch?v=YFh2vpGeoIk http://www.youtube.com/watch?v=CW9sR0UGovA http://www.youtube.com/watch?v=9cNZs_SKdGQ

http://www.youtube.com/watch?v=k9Kf4esMvdE http://www.youtube.com/watch?v=RWPQS0LiuFI — Preceding unsigned comment added by 79.117.44.240 (talk) 06:34, 11 December 2013 (UTC)[reply]

Post Scriptum: Edward Snowden "scammers" are, in fact, "spammers"79.117.44.240 (talk) 06:40, 11 December 2013 (UTC)[reply]

  • Can we delete above? This comment doesn't make sense. First link is to a lyrics video. I don't think that this article needs more links to "exemples (sic) on YouTube."

KonigProbst (talk) 05:54, 17 March 2014 (UTC)[reply]

'VICIPEDIA' reference[edit]

Perhaps there could be a note as to how the Latin text is manipulated to produce Vicipedia ('ie every Xth letter' or whatever) Jackiespeel (talk) 11:19, 29 November 2014 (UTC)[reply]

In "Polygraphiae" by Johannes Trithemius is a kind of table starting at page 71 with a code word for each letter which has to be coded. The code words for VICIPEDIA are on page 71 to page 75. Try it yourself! Dominus sapientissimus constochens homines retribuat exquirentibus dulcedo sanctissimi = Eisfisch (talk) 23:36, 29 June 2016 (UTC)[reply]

error (unused vs. unsued registers of IoT/CPS)?[edit]

At the section: Cyber-physical Systems/Internet of Things we can see, what I think is a typo (miswriting)

Academic work since 2012 demonstrated the feasibility of steganography for Cyber-physical systems (CPS)/the Internet of Things (IoT). (...) However, specific techniques hide data in CPS components. For instance, data can be stored in unsued registers of IoT/CPS components and in the states of IoT/CPS actuators.
  • stored in unsued registers of IoT/CPS

I've changed the word: unused versus unsued. --PLA y Grande Covián (talk) 13:13, 15 September 2017 (UTC)[reply]

Splitting the article up[edit]

I'd like to make some bold changes. There is a list of steganographic techniques that is quite long, but is incomplete. I recommend creating an inclusive separate article, called "List of steganographic techniques". The "Steganography" article would be pared down, summarizing the main categories of steganography, with only some notable examples. I think this would make the article more readable, but also retain lots of good information. Thoughts? Epachamo (talk) 01:23, 28 November 2023 (UTC)[reply]