Skip to content

Covert Communication Techniques: Hiding in Plain Sight, Deceptive Messages Unveiled

Hidden Threats Looming: The Steadily Growing Trend - click on an seemingly innocuous image could potentially trigger a malware attack, owing to the practice of steganography. This practice, rooted in the ancient Greek words 'steganos' and 'graphein,' involves concealing data within images.

Hidden Messages: A Masked Reality
Hidden Messages: A Masked Reality

Covert Communication Techniques: Hiding in Plain Sight, Deceptive Messages Unveiled

Steganography, derived from the Greek words "steganos" and "graphein," meaning "writing covertly," is a fascinating technique that has been used for centuries to hide information in plain sight. In modern times, digital steganography has become increasingly popular due to its utility in the digital age.

Digital steganography involves hiding information in images, audio files, or other digital content in a way that is not detected by human senses or perceived as unimportant noise. For instance, in PNG images, up to 20% of the file size can be inconspicuously accommodated in the form of binary data. This is particularly useful given that digital image and audio files are suitable for hiding data due to their large file size.

The goal of steganography is to store information hidden on an inconspicuous medium. To achieve this, a binary bit (i.e., 0 or 1) is slightly changed in one of the RGB basic colors, causing a color change that is not perceptible. This subtle alteration goes unnoticed, allowing the hidden data to remain undetected.

However, detecting steganography is nearly impossible for anti-virus software. This is because the changes made are so minute that they are often overlooked. An additional data encryption makes it even harder for anti-virus software to detect steganography.

Cybercriminals have taken advantage of this, using digital steganography to spread malicious code unobtrusively. For example, Chinese hacker groups are known to hide malware in image files and spread it stealthily through channels like Skype, targeting financial institutions.

File disinfection can help combat digital steganography by converting risky file types into safe formats. It can also analyze and disinfect zipped or password-protected files without affecting their functionality.

In ancient times, steganography was time-consuming or laborious. For example, slaves had their heads shaved to tattoo information on their scalp. Today, we have more sophisticated methods, such as the semagram, where information is hidden in harmless messages, images, or audio files.

Modern versions of steganography include the Machine Identification Code (MIC), also known as "yellow dots," which are printed by color laser printers. These dots can reveal the serial number, date, and time of the printout.

It's essential to be aware of the existence and potential threats of digital steganography. While it offers intriguing possibilities for covert communication, it can also be used maliciously. As our digital world continues to evolve, so too will the methods of steganography, making it crucial to stay informed and vigilant.

Read also: